The NVQ Diploma in Senior Construction Management Qualification is suited to those who are engaged in high level management activity of a construction business and who working in a senior management role and are seeking to obtain the Black CSCS Card. Our team will discuss the qualification process with you prior to signing up in order to ensure that you will be able to complete the qualification. Complete your qualification quickly with the support of your assessor in as little as 10 to 12 weeks providing that you work with your assessor to provide the required evidence. We offer two other qualifications that lead to the Black CSCS card, follow the links below for more information (open in new window): Level 6 NVQ Diploma in Construction Contracting Operations Management – 8 Units – Complete in as little as 10 weeks. Level 6 NVQ Diploma in Construction Site Management – 19 units – Complete in as little 16 to 20 weeks. CSCS Cards We can provide CSCS tests and CSCS cards alongside your qualification without the need to attend the test centre. Speak to our friendly and helpful team for more information.
Overview This course will provide you with the skills and knowledge required by Non-Accounts Managers to understand Finance and Accounting processes they face in their daily work schedule. The main objective of this course is to highlight accounting, understand the framework of accounting, and stages of accounts and also to elaborate rules and principles of accounting. With a lot of Case studies and open discussions with live examples, participants will gain detailed knowledge to understand their company from a financial perspective and also to help manage financial matters. At the end of the course, you will learn how to apply financial techniques, understand financial reports and annual reports, the relationship between accounting and finance thereby gaining knowledge of the use of debits and credits and last but not least to identify limitations of financial statements. At the end of this training course, participants will: Be able to Record Transactions in the Accounting System Understand the Format and Contents of Financial Statements Use Accounting Information to Interpret and Evaluate a Business Make Efficient and Profitable Decisions, based on Cost Information Apply Budgetary Control Techniques to ensure that Targets are Achieved
Complete Python training course description Python is an agile, robust, expressive, fully objectoriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. This course covers Python from the very basics of 'hello world!' through to object oriented programming and advanced topics such as multi threading. Hands on follows all the major sections in order to reinforce the theory. What will you learn Read Python programs. Write Python programs. Debug Python programs. Use Python's objects and memory model as well as its OOP features. Complete Python programming training course details Who will benefit: Anyone wishing to learn Python. Prerequisites: None. Duration 5 days Complete Python programming training course contents Welcome to Python: What is Python? Origins, features. Downloading and installing Python, Python manuals, comparing Python, other implementations. Getting started: Program output, the print statement, "hello world!", Program input, raw_input(), comments, operators, variables and assignment, numbers, strings, lists and tuples, dictionaries, indentation, if statement, while Loop, for loop. range(), list comprehensions. Files, open() and file() built-in functions. Errors and exceptions. Functions, Classes, Modules, useful functions. Python basics: Statements and syntax, variable assignment, identifiers, basic style guidelines, memory management, First Python programs, Related modules/developer tools. Python Objects: Other built-in types, Internal Types, Standard type operators, Standard type built-in functions, Categorizing standard types, Unsupported types. Numbers: Integers, Double precision floating point numbers, Complex numbers, Operators, Built-in and factory functions, Other numeric types. Sequences: strings, lists, and tuples: Sequences, Strings, Strings and operators, String-only operators, Built-in functions, String built-in methods, Special features of strings, Unicode, Summary of string highlights, Lists, Operators, Built-in functions, List type built-in methods, Special features of lists, Tuples, Tuple operators and built-in functions, Tuples special features, Copying Python objects and shallow and deep copies. Mapping and set types: Mapping Type: dictionaries and operators, Mapping type built-in and factory functions, Mapping type built-in methods, Dictionary keys, Set types, Set type operators, Built-in functions, Set type built-in methods. Conditionals and loops: If, else and elif statements, Conditional expressions, while, for, break, continue and pass statements, else statement . . . take two, Iterators and iter(), List comprehensions, Generator expressions. Files and input/output: File objects, File built-in functions [open() and file()], File built-in methods and attributes, Standard files, Command-line arguments, File system, File execution, Persistent storage modules. Errors and exceptions: What are exceptions? Detecting and handling exceptions, Context management, Exceptions as strings, Raising exceptions, Assertions, Standard exceptions, Creating Exceptions, Why exceptions, Exceptions and the sys module. Functions: Calling, creating and passing functions, formal arguments, variable-length arguments, functional programming, Variable scope, recursion, generators. Modules: Modules and files, Namespaces, Importing modules, Module import features, Module built-in functions, Packages, Other features of modules. Object-Oriented Programming (OOP): Classes, Class attributes, Instances, Instance attributes, Binding and method invocation, Static methods and class methods, Composition, Sub-classing and derivation, Inheritance, Built-in functions for classes, and other objects, Customizing classes with special methods, Privacy, Delegation, Advanced features of new-style classes (Python 2.2+), Related modules and documentation. Execution environment: Callable and code Objects, Executable object statements and built-in functions, Executing other programs. 'Restricted' and 'Terminating' execution, operating system interface. Regular expressions: Special symbols and characters, REs and Python, Regular expressions example. Network programming: Sockets: communication endpoints, Network programming in Python, SocketServer module, Twisted framework introduction. Internet client programming: What are internet clients? Transferring files, Network news, E-mail. Multithreaded Programming: Threads and processes Python, threads, and the global interpreter lock, The thread and threading Modules. GUI programming: Tkinter and Python programming, Tkinter Examples, Brief tour of other GUIs. Web programming: Web surfing with Python: creating simple web clients, Advanced Web clients, CGI: helping web servers process client data, Building CGI applications, Using Unicode with CGI, Advanced CGI, Web (HTTP) Servers. Database programming: Python database application programmer's interface (DB-API), ORMs. Miscellaneous Extending Python by writing extensions, Web Services, programming MS Office with Win32 COM, Python and Java programming with Jython.
Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging
Perl training course description A hands on introduction to programming in Perl. What will you learn Write Perl programs. Use Perl modules. Debug Perl programs. Examine existing code and determine its function. Perl training course details Who will benefit: Anyone wishing to learn Perl. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Perl training course contents Introduction to Perl What is Perl? When to use Perl, downloading Perl, installing Perl, documentation, perldoc, running Perl, the Perl environment. Perl under UNIX, Perl under Windows. "Hello world". Variables Scalars, data types, $_, strings and numbers, assignment, constants, strict, scope, STDIN. Operators Number operators, string operators, precedence and associativity, converting numbers and strings, shortcut operators. Flow control Blocks, if, else, elseif, unless, foreach, while, for do, until. Regular expressions What are regular expressions? Pattern matching, Perl as a filter, file editing. Strings Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Subroutines Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Arrays and hashes Working with arrays, element access, push(), pop(), shift(), unshift(), <STDIN> as an array, associative arrays, hashes of arrays, hash references, arrays of hashes, hashes of hashes. Files Simple file handling, open, close, <FILEHANDLE>, <>, file tests, directory access, directory handles, database access, packing and packing binary data. I/O STDIN, STDOUT and STDERR, Command line arguments,@ARGV. Perl debugging The built in debugger, running the debugger, debugger commands, graphical debuggers. Script syntax errors, single stepping, breakpoints, watches. Packages and modules CPAN, Finding modules, installing modules, using modules, scope. Report formatting Formats, defining a format, invoking a format, field holders. Process management System interaction, system(), exec(), signals. Security issues.
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, follow a methodical workflow to develop sound solutions, use open-source, off-the-shelf tools to develop, test, and deploy those solutions, and ensure that they protect the privacy of users. This course includes hands-on activities for each topic area.
About this Training Course This 5 full-day course is aimed at engineers and supervisors who already have a basic understanding of well construction methods but who would benefit from a more detailed knowledge of completion design. The course will concentrate on the important aspects of completion design and what makes a safe and efficient well. A common thread of practical examples will be used throughout the course in the form of a case study or 'red-thread' exercise. The case study is based around data all taken from a single field where those attending will work through all the basic issues of a completion design. The exercises associated with the case study is performed in the student's own time after each of the formal sessions. However, at the start of the next day, the case study is reviewed and discussed. The whole case study will continue through all sessions, with each element being reviewed at the start of the next session. There is no 'right' answer to the exercise - producing interesting discussions! The purpose of the course is not to go over specific equipment in detail. Teaching methods include presentations, videos, and animations and the case study. The course will cover: Types and configurations of completions The completion design process Inflow performance, skin and formation damage Perforating; selection, deployment and interface with rest of completion Stimulation and impact on completion and flow performance with coverage of modern horizontal multifrac tools Open hole, non-sand control completions including open hole packers and horizontal well clean up Sand control; when do you need it, basic types and selection guidelines. Includes standalone screens, ICDs, various gravel packing techniques, frac packs and expandable screens Tubing sizing, flow estimation and liquid loading Artificial lift; types and selection criteria, interface with drilling, reservoir and facilities. Design of gas lift and ESPs included Production chemistry impacts on completion, prevention and removal (scales, wax, asphaltene, hydrates, and souring) Metallurgy, corrosion, and erosion; metal types and selection of Elastomers and plastics; types and selection of Tubing stress analysis; picking the grade and weight of tubing, plus selection criteria for packers and expansion devices. Interface between tubing stress analysis and casing design Completion equipment; basic types of equipment, reliability and selection criteria for each (tree, safety valve, mandrel, packers, expansion devices etc) Completion installation; importance of wellbore clean-out, function and types of brines, pointers for efficient completion installation Non-conventional wells; types and when / where to use them (multilaterals, smart (intelligent) wells and also SAGD, CO2 sequestration, CBM, etc) Training Objectives By the end of this course, the participants should be able to: Have a good understanding of the completion design process and what makes a good completion design Understand the importance of the installation process (completion running) in the design process Have an appreciation of new and developing completion techniques (intelligent wells) Target Audience This course will benefit engineers and field-based personnel such as completion supervisors and production engineers. It is also suitable for completion vendors, specialists such as chemists and subsurface personnel including geologists, reservoir engineers and petrophysicists. Trainer Your expert course leader has 30 years of oil and gas industry experience. A first class degree in geophysics and a master degree in Petroleum Engineering was a prelude to seven years with BP as a petroleum engineer. He left BP and following a short spell in Camco, jointly founded ICE Energy. After six years of completions and petroleum engineering consultancy and training, ICE Energy merged with TRACS International, where he continued with petroleum and completion engineering studies, leading integrated teams, and developing / delivering training courses for a variety of different clients in diverse world-wide locations. In the last five years, he is independent again - focusing on technical consulting and course delivery. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Video coding training course description This course investigates the characteristics of video coding with an emphasis on compression and the standards used in IP networks. What will you learn Explain how video coding works. Describe the main video coding standards. Evaluate and compare the major video coding standards. Video coding training course details Who will benefit: Anyone working with MPEG. Prerequisites: None. Duration 2 days Video coding training course contents Introduction Video coding systems, encoding, transmission, decoding. Digital video formats: Old formats (CIFâ¦), PC formats (VGAâ¦), SD, HD, UHD. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing. Codec types Lossy, lossless, uncompressed. Quality, bandwidth. Video Fps, bitstreams, pictures, frames, fields. Aspect ratios. Colour Colour perception, RGB, YUV, YCbCr sampling, 4:00, 4:2:0, 4:2:2, 4:4:4. Hybrid video coding scheme Picture partitioning, intra prediction, inter prediction, motion estimation, residual coding, in loop filtering, entropy coding. Containers Relationship with codecs, audio, video. Audio Video Interleave (.avi), .asf, QuickTime, AVCHD, Flash, .mp4, 3gp. MPEG-TS. MPEG Analysing MPEG frames. Video coding standards H.264/AVC: Profiles MPEG, bit rates, resolution. I, B, P frames, GOP. MPEG 2, MPEG 4, H.264, H.265, VP9, AV1. Hands onand levels, how it works. H.265/HEVC: Profiles and levels, Quadtrees, slices, how it works. Open video coding: VP8, VP9, AV1.
CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.