• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7143 Opera courses in Glasgow delivered Online

ICA Certified Money Laundering Reporting Officer

By International Compliance Association

The role of an MLRO is one of high responsibility, with financial and personal consequences if something goes wrong. As an MLRO or Deputy MLRO, you need the confidence and practical skills to tackle the unique challenges these roles present.  Part of the ICA Practitioner Series, this unique certification is written by MLROs for MLROs and provides a practical framework and toolkit that gives you the knowledge and skills to: navigate the complex role of a Money Laundering Reporting Officer mitigate risks make changes and set goals challenge stakeholders make informed decisions and demonstrate the rationale manage relationships with boards and regulators effectively. This qualification covers the following topics: Interview questions and wider due diligence before taking up an MLRO / Deputy MLRO position Governance - senior management responsibilities - prescribed responsibilities Management information & report writing Risk assessment and risk appetite Policies, procedures & operational implementation Staff, training, leading and influencing/psychological models to develop interpersonal skills Quality of oversight - obtaining trusted data First 100 days - main risks and expectations Form A - FCA Registration, fit & proper interview Building Trust - stakeholder management, committees, management information, regulatory interaction, the MLRO Report Problem shooting and escalation pathways

ICA Certified Money Laundering Reporting Officer
Delivered Online On Demand9 weeks
£3,495

Cisco Cyber Ops Security Bundle with 5 Exams

By Hudson

This course bundle is ideal for anyone looking to launch their Cisco networking career, specifically in Cisco cyber ops and security. It consists of one Cisco Certified Technician (CCT) certification in Routing and Switching, one Cisco Certified Network Associate (CCNA) certification, one Cisco Certified CyberOps Associate certification, and one Cisco Certified Networking Professional (CCNP) certifications, specialising in Cisco security. Although there are no formal prerequisites to enrol on the CCNA, or CCNP certification courses and sit the exams, learners should have a good foundation knowledge in networking. The Cisco Certified Technician Routing and Switching (CCT Routing and Switching) certification focuses on the skills required for onsite support and maintenance of Cisco routers, switches, and operating environments. It’s a great starting point if you’re new to Cisco networking. Technicians in this area must be able to identify Cisco router and switch models, accessories, cabling, and interfaces; understand the Cisco IOS Software operating modes and identify commonly found software; and be able to use the Cisco Command Line Interface (CLI) to connect and service products. Achieving CCT Routing and Switching certification is considered the best foundation for supporting other Cisco devices and systems. Earning the CCNA is usually the first ‘major’ certification step in preparing for a career in Cisco networking technologies. To earn your CCNA certification, you only need to pass one exam – which covers a broad range of fundamentals for IT careers, based on the latest networking technologies. The Cisco Certified CyberOps Associate certification program validates the day-today, tactical knowledge and skills that Security Operations Center (SOC) teams need to detect and respond to cyber security threats. The certification validates the fundamentals needed for associate-level job roles, with one exam and one training course to help you prepare. The exam and training cover knowledge and skills related to security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures. From a recognized provider of security solutions and certifications, the CyberOps Associate certification and training program is your pathway to a career in cyber security operations. The CCNP Security certification is designed to help you prove your skills in the ever-changing landscape of security technologies. The program prepares you for today’s professional-level job roles in security technologies. One of the industry’s most respected certifications, CCNP validates the core knowledge you need while providing the flexibility to choose a focus area. To earn your CCNP Security, you must pass two exams: a core exam and a concentration exam of your choice. This course bundle includes the core exam and concentration exam. The core exam’s focus is ‘Securing Networks with Cisco Firepower Technologies‘ – Cisco CCNP Security SNCF (Exam 300-710).

Cisco Cyber Ops Security Bundle with 5 Exams
Delivered Online On Demand
£1,395

TEMA & HTRI Heat Exchanger Design & Cost Saving Management – Virtual Instructor Led Training (VILT)

By EnergyEdge - Training for a Sustainable Energy Future

Acquire in-depth knowledge of heat exchanger design and cost-saving management with EnergyEdge's TEM & HTRI course. Join our virtual instructor-led training to stay ahead in the industry.

TEMA & HTRI Heat Exchanger Design & Cost Saving Management – Virtual Instructor Led Training (VILT)
Delivered in Internationally or OnlineFlexible Dates
£2,099 to £2,199

Demand Side Management - Integration of New Technologies, Regulatory Changes & Renewable Energy Resources

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This Virtual Instructor Led Training (VILT) course presents advanced methodologies that implement demand response and energy conservation programs in light of the integration of new technologies, regulatory changes and the accelerated penetration of renewable energy resources. This VILT course provides examples and case studies from North American and European jurisdictions covering the operational flexibilities on the demand side including requirements for new building codes to achieve zero net energy. The course describes a public agency's goals and objectives for conserving and otherwise reducing energy consumption and managing its demand for energy. This course presents the demand response implemented for economics and system security such as system balancing and relieving transmission congestion, or for system adequacy. The course also presents the principal attributes of conservation programs and the associated success criteria. In a system with increased penetration of renewable resources, demand response provides flexibility to system operators, helping them to maintain the reliability and the security of supply. Demand response is presented as a competitive alternative to additional power sources, enhancing competition and liquidity in electricity markets. The unique characteristics are discussed from a local, consumer centric and also from a system perspective bringing to life the ever changing paradigm for delivery energy to customers. Interoperability aspects and standards are discussed, as well as the consumer centric paradigm of Transactive Energy with IOT enabled flexibilities at system level, distribution networks and microgrids. The VILT course introduces the blockchain as a new line of defense against cyber threats and its increasing application in P2P transactions and renewable certificates. Our trainer's industry experience spans three decades with one of the largest Canadian utilities where she led or contributed to large operational studies and energy policies and decades of work with IEEE, NSERC and CIGRE. Our key expert also approaches to the cross sectional, interdisciplinary state of the art methodologies brings real life experience of recent industry developments. Training Objectives Innovative Digital Technologies How systems Facilitate Operational Flexibility on the Demand Side The Ecosystem of Demand Side Management Programs Advanced Machine Learning techniques with examples from CAISO Regulatory Policy Context and how to reduce regulatory barriers Industry Examples from NERC and ENTSO Relevant Industry standards: IEEE and IEC Manage Congestion with Distributed Operational Flexibilities: Grid to Distribution Controls; examples from NERC (NA) and ENTSO (Europe) Grid solutions with IEC 61850 communication protocols Decentralized grid controls The New Grid with accelerated V2G and Microgrids How DSM is and will be applied in Your System: Examples and discussions Target Audience Regulators and government agencies advising on public energy conservation programs All professionals interested in expanding their expertise, or advancing their career, or take on management and leadership roles in the rapidly evolving energy sector Energy professionals implementing demand side management, particularly in power systems with increased renewable penetration, to allow the much needed operational flexibility paramount to maintaining the reliability and stability of the power system and in the same time offering all classes of customers flexible and economical choices Any utility professional interested in understanding the new developments in the power industry Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your first expert course leader is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Your second expert course leader is the co-founder and Director of Research at Xesto Inc. Xesto is a spatial computing AI startup based in Toronto, Canada and it has been voted as Toronto's Best Tech Startup 2019 and was named one of the top 10 'Canadian AI Startups to Watch' as well as one of 6th International finalists for the VW Siemens Startup Challenge, resulting in a partnership. His latest app Xesto-Fit demonstrates how advanced AI and machine learning is applied to the e-commerce industry, as a result of which Xesto has been recently featured in TechCrunch. He specializes in both applied and theoretical machine learning and has extensive experience in both industrial and academic research. He is specialized in Artificial Intelligence with multiple industrial applications. At Xesto, he leads projects that focus on applying cutting edge research at the intersection of spatial analysis, differential geometry, optimization of deep neural networks, and statistics to build scalable rigorous and real time performing systems that will change the way humans interact with technology. In addition, he is a Ph.D candidate in the Mathematics department at UofT, focusing on applied mathematics. His academic research interests are in applying advanced mathematical methods to the computational and statistical sciences. He earned a Bachelor's and MSc in Mathematics, both at the University of Toronto. Having presented at research seminars as well as instructing engineers on various levels, he has the ability to distill advanced theoretical concept to diverse audiences on all levels. In addition to research, our key expert is also an avid traveler and plays the violin. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Demand Side Management - Integration of New Technologies, Regulatory Changes & Renewable Energy Resources
Delivered in Internationally or OnlineFlexible Dates
£1,112 to £2,099

ITIL 4 Specialist: High Velocity IT: Virtual In-House Training

By IIL Europe Ltd

ITIL® 4 Specialist: High Velocity IT: Virtual In-House Training The ITIL® 4 Specialist: High-Velocity IT module is part of the Managing Professional stream for ITIL® 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: High-Velocity IT exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. This module addresses the specifics of digital transformation and helps organizations to evolve towards a convergence of business and technology, or to establish a new digital organization. It was designed to enable practitioners to explore the ways in which digital organizations and digital operating models function in high-velocity environments. Working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing are included. What You Will Learn At the end of this course, participants will be able to: Understand concepts regarding the high-velocity nature of the digital enterprise, including the demand it places on IT. Understand the digital product lifecycle in terms of the ITIL operating model. Understand the importance of the ITIL guiding principles and other fundamental concepts for delivering high-velocity IT. Know how to contribute to achieving value with digital products. Course Introduction Let's Get to Know Each Other Course Learning Objectives Target Audience Characteristics ITIL® 4 Certification Scheme Course Components Course Agenda Module-End Exercises Exam Details Introduction to High-Velocity IT High-Velocity IT Digital Technology Digital Organizations Digital Transformation High-Velocity IT Approaches Relevance of High-Velocity IT Approaches High-Velocity IT Approaches in Detail High-Velocity IT Operating Models Introduction ITIL® Perspective High-Velocity IT Aspects High-Velocity IT Applications ITIL® Building Blocks for High-Velocity IT Digital Product Lifecycle Service Value Streams Four Dimensions of Service Management ITIL® Management Practices High-Velocity IT Culture Key Behavior Patterns ITIL® Guiding Principles Supporting Models and Concepts for Purpose Ethics Design Thinking Supporting Models and Concepts for People Reconstructing for Service Agility Safety Culture Stress Prevention Supporting Models and Concepts for Progress Working in Complex Environments Lean Culture ITIL® Continual Improvement Model High-Velocity IT Objectives and Techniques High-Velocity IT Objectives High-Velocity IT Techniques Techniques for Valuable Investments Prioritization Techniques Minimum Viable Products and Services Product / Service Ownership A/B Testing Techniques for Fast Developments Basic Concepts Related to Fast Development Infrastructure as Code Reviews Continual Business Analysis Continuous Integration / Continuous Delivery (CI/CD) Continuous Testing Kanban Techniques for Resilient Operations Introduction to Resilient Operations Technical Debt Chaos Engineering Definition of Done Version Control Algorithmic IT Operations ChatOps Site Reliability Engineering (SRE) Techniques for Co-created Value Basic Concepts of Co-created Value Service Experience Techniques for Assured Conformance DevOps Audit Defense Toolkit DevSecOpsPeer Review

ITIL 4 Specialist: High Velocity IT: Virtual In-House Training
Delivered OnlineFlexible Dates
£2,150

Definitive VSAT

5.0(3)

By Systems & Network Training

VSAT training course description This 2 day training course examines what VSAT is, its usages and users. It then looks at the hardware required for VSAT. What will you learn Explain how VSAT is used Describe the hardware required for VSAT operation. VSAT training course details Who will benefit: Anyone working with VSAT. Prerequisites: None. Duration 2 days VSAT training course contents Introduction History of PMR VSAT Introduction A Brief History Satellite Services Satellite Communications Satellite Footprint Radio Frequency Bands ITU Definitions VSAT Users What is a VSAT? VSATs - Usage VSATs - Users VSAT Hardware Typical System Hardware VSAT ODU and IDU VSAT Station Equipment Diplexer and Feed Horn Typical Waveguide Element Polarisation VSAT Hub Antenna Pointing Outdoor Unit Outdoor (continued) VSAT Network Earth Stations Indoor Unit VSAT Network Earth Stations Indoor Unit Element Hub Station Hub Sub-station Hub Options Hub Options (2) Hub Options (3) Temporary Mount

Definitive VSAT
Delivered in Internationally or OnlineFlexible Dates
£1,727

Essential WiMax

5.0(3)

By Systems & Network Training

WiMax training course description Broadband wireless access is an emerging technology area. This course looks at WiMAX, where it can be used, how it works and the alternative technologies. What will you learn Describe WiMAX. Explain how WiMAX works. Compare and contrast WiMAX with alternative broadband wireless access technologies. WiMax training course details Who will benefit: Anyone wishing to know more about WiMAX. Prerequisites: None. Duration 2 days WiMax training course contents Introduction What is WiMAX? WiMAX applications, The Internet, Internet access choices, wireless broadband access, WiMAX benefits. WiMAX overview Spectrums, LOS vs. non-LOS, bit rates, modulation, mobility, channel bandwidth, cell radius. WiMAX standards The WiMAX forum, IEEE, ETSI, HIPERACCESS, HIPERMAN, 802.16, 802.16-2004, 802.16a, 802.16e, 802.16f. WiMAX architecture Subscriber Stations (SS), Indoors, outdoors, antennas, Radio Base Stations (BS), LOS, Non LOS BackHaul, Point to multipoint, mesh support. Physical layer 10 - 66GHz, TDMA, TDD, FDD, 2 -11 GHz, SC2, OFDM, OFDMA, QPSK, QAM, Radio Link Control (RLC), uplink, downlink. MAC layer Traffic types (continuous, bursty), QoS, service types. MAC operations, connection oriented, frame structure, addressing. Convergence sublayers, service specific, common part, profiles (IP, ATM). Bandwidth request-grant, ARQ, Management messages. Security MAC privacy sublayer, network access authentication, AAA, 802.1x, key exchange and privacy. WiMAX alternatives WiMAX vs. 3G, WiMAX vs. 802.20.

Essential WiMax
Delivered in Internationally or OnlineFlexible Dates
£1,727

Total IS-IS for engineers

5.0(3)

By Systems & Network Training

IS-IS training course description A hands on course on IS-IS link state routing protocol. The main focus of the course is the use of IS-IS in an IP only environment but can be tailored to concentrate on the use of IS-IS in CLNP networks. Hands on sessions use Cisco routers. What will you learn Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. IS-IS training course details Who will benefit: Network administrators. Network operators. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IS-IS training course contents Introduction The history of IS-IS, OSI background, terminology, addressing, how OSI networking works, ES-IS, ISIS, IS types, basic OSI configuration, other configuration parameters. Running IS-IS in an IP environment Integrated routing, Dual IS-IS, OSI only IS-IS, IP only IS-IS, packet formats and the use of CLNP, Basic configuration. How IS-IS works in detail Link state theory, tuneable parameters, IS-IS metrics, hellos, CSNP intervals, retransmissions, TLVs, Sub TLVs, Designated routers and pseudo nodes, authentication. Level 1 and level 2 in detail Router types, circuit types, Hot potato routing, route leaking, Area partitioning. Multiple addresses Redistribution and summarisation Tagging and filtering

Total IS-IS for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Total STP for engineers

5.0(3)

By Systems & Network Training

Total STP training course description The Spanning Tree Protocol (STP) dates from 1985. This course explores in depth how the protocol works and the implications this has on network performance. We also study STP variants including 802.1w (RSTP) and 802.1s (MSTP). What will you learn Explain how STP works. Explain how RSTP works. Explain how MSTP works. Troubleshoot STP and variants. Total STP training course details Who will benefit: Technical network staff. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total STP training course contents STP What is 802.1D, what is STP, resilience, broadcast storms, forwarding and blocking, single path. Hands on Impact of broadcast storms, enabling disabling STP. Operation STP frames, BPDUs, root bridge election, blocked ports, root ports, designated ports. STP path costs. Hands on Analysing STP, troubleshooting implications. Topology changes Hello timer, Forward delay timer, max age timer, Topology Change Notification (TCN) BPDU. Hands on STP convergence. STP enhancements and tuning Bridge ID, Bridge priority, port priority, 30 second delay, Edge ports, PortFast, root guard, loop guard, BPDU guard. Hands on Root bridge positioning, improving STP convergence. RSTP 802.1w, Improvements, convergence times. RSTP bridge port roles, RSTP switch port states. Edge ports, link ports. Hands on RSTP configuration and convergence. VLANs and STP Access/untagged ports, trunk/tagged ports, PVST, PVST+, RPVST, MISTP, MSTP and 802.1s. MSTP BPDUs. Instances, Load balancing, impact on CPU. Hands on MSTP load balancing. Interoperability Regions, Virtual bridges, domains. Hands on STP, RSTP and MSTP interoperation.

Total STP for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Securing Kubernetes and Containers

5.0(3)

By Systems & Network Training

Securing Kubernetes training course description This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. What will you learn Harden Kubernetes systems and clusters. Harden containers. Configure and use Kubernetes audit logs. Securing Kubernetes training course details Who will benefit: Technical staff working with Kubernetes Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers Duration 2 days Securing Kubernetes training course contents This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise Module 1: User and authorization management Users and service accounts in Kubernetes Authenticating users Managing authorizations with RBAC Module 2: Supply chain security Vulnerabilit checking for images Image validation in Kubernetes Reducing image footprint Secure image registries Module 3: Validating cluster setup and penetration testing Use CIS benchmark to review the security configuration of Kubernetes components. Modify the cluster components' configuration to match the CIS Benchmark. Penetration testing Kubernetes for known vulnerabilities. Module 4: System hardening Use kernel hardening tools Setup appropriate OS level security domains Container runtime sandboxes Limit network access Module 5: Monitoring and logging Configure Kubernetes audit logs Configure Audit Policies Monitor applications behaviour with Falco

Securing Kubernetes and Containers
Delivered in Internationally or OnlineFlexible Dates
£1,727