• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

674 Operations courses in Bath delivered Live Online

About this Training Course  This 3 full-day course covers the design of systems for natural gas handling and treatment from the wellhead to the gas processing plant to achieve marketable products that meet desired product specifications. This course will emphasize on field handling equipment and separation systems, dehydration, fluid measurement, sampling and analysis as well as introduction into reciprocating and centrifugal compressors. It will comprise interactive presentations including exercises/quizzes. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives At the end of the course, the participants will be able to describe and explain the following: Gas processing principles of dehydration (water removal) by absorption, adsorption, refrigeration and low temperature separation (JT effect) and basic associated equipment Gas processing in-depth by absorption using glycol and glycol proper (Pre- Cooling requirements, Dew Point control and related processes). Glycol regeneration including principles of stripping, DRIZO and Coldfinger. Process equipment involved for water removal by absorption. (Knock out drums; Contactor - absorber and internals, heat exchangers, re-boilers, pumps, filters and glycol storage). Principles of gas metering and types of meter (Measurement Units (MJ, BTU, nM3, scf and conversions). Typical gas contracts & sales specifications. Gas pipeline operations. Target Audience Production and processing personnel involved with natural gas and associated liquids to acquaint or reacquaint themselves with gas conditioning and processing unit operations. This course is for production operations engineers, operations field supervisors, facility engineers, process engineers, design engineers, operations personnel and others who select, design, install, evaluate or operate gas processing plants and related facilities. Course Level Intermediate Trainer Your expert course leader has more than 25 years of accumulated experience in the Oil & Gas Industry, particularly in LNG / Offshore LNG Industry as Project Manager (8 years) and Process Technology Design (12 years). From 2010 to 2012, he worked for TOTAL E&P as Manager of R&D activities related to LNG, FLNG, Gas Treatment and Safety Engineering. From 1992 to 2010, he worked for Technip, spending 12 years (1992 to 2004) in the Process and Technology Division, where he was the Principal Engineer on gas treatment and LNG projects such as Yemen LNG and Nigeria LNG. From 2004 to 2010, he was actively involved in the development of Technip Offshore LNG technologies as Project Manager - several patents filed, author or co-author of different publications on LNG transfer technologies. He has also been a member of: the Foreign Advisory Committee on the 2nd Trondheim Technology Gas Conference, Norway, 2-3 November 2011 the Steering Committee on the SPE Forum 'Economic and Sustainability Challenges in the Future Development of Sour Gas', Bali, Indonesia, 8-13 May 2011 The Technip 'Experts Network' as 'Main Expert - LNG' for several years He holds a 'summa cum laude' master's degree in Chemical Engineering from Rome University 'La apienza' (1992) and has been a member of the Italian Register of Engineers. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Gas Conditioning and Processing
Delivered in Internationally or OnlineFlexible Dates
£2,329 to £2,709

MB-300T00 Microsoft Finance and Operations Core

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A Dynamics 365 for Finance and Operations Functional Consultant is responsible for performing discovery, capturing requirements, engaging subject matter experts and stakeholders, translating requirements, and configuring the solution and applications. The Functional Consultant implements a solution using out of the box capabilities, codeless extensibility, application and service integrations. Overview This course provides the practical knowledge to Navigate and efficiently use search, filtering and queries Use operational workspaces Work with Business Document Management Work with record templates Integrate Power BI with Dynamics 365 Finance and Operations apps Personalize workspaces Run and analyze security reports Create and use workflow for approval Work with Organization Hierarchy and its purposes. How to use personalization feature Use Data Management workspace Create and use and entity templates Import and export data and manage data by using Office Integration Dynamics 365 Finance and Operations apps include, but are not limited to, Dynamics 365 Finance, Dynamics 365 Supply Chain Management, and Dynamics 365 Supply Chain Management, Manufacturing. This foundational course provides students with the important first steps in automating and modernizing both global financial and supply chain operations. USE COMMON FUNCTIONALITY AND IMPLEMENTATION TOOLS Introduction Identify and use common Dynamics 365 Finance and Operations apps features and functionality Describe use cases for Power Platform apps and services Module Summary CONFIGURE SECURITY, PROCESSES, AND OPTIONS Introduction Implement security Design and create workflows Configure Organization administration features Configure System administration features Module Summary MANAGE DYNAMICS 365 FINANCE AND OPERATION DATA Introduction Manage data in Dynamics 365 Finance and Operations apps Plan a migration strategy Prepare data for migration and migrate data Module Summary VALIDATE AND SUPPORT THE SOLUTION Introduction Test solutions in Dynamics 365 Finance and Operations apps Implement Lifecycle Services tools Module Summary Additional course details: Nexus Humans MB-300T00 Microsoft Dynamics 365: Core Finance and Operations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-300T00 Microsoft Dynamics 365: Core Finance and Operations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-300T00 Microsoft Finance and Operations Core
Delivered OnlineFlexible Dates
Price on Enquiry

IMPORT/EXPORT DIAGNOSTICS CREATING A PROCEDURE MANUAL

By Export Unlocked Limited

This module aims to develop knowledge and practical skills in Import/Export Customs Diagnostic enabling the learner to create a procedural manual to complete international trade operations.

IMPORT/EXPORT DIAGNOSTICS CREATING A PROCEDURE MANUAL
Delivered Online
£395

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Well Intervention and Productivity School

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course Well interventions have a large opportunity to enhance well production if correctly designed and implemented. Conversely, they can have a large negative impact on production if they're not. The Well Intervention & Productivity School (WIPS) is designed to help well intervention specialists, well service supervisors, and petroleum engineers become more aware of the problems that can arise in the planning and execution of well interventions. This 5 full-day course is designed to make those that attend aware of how their job can directly impact the productivity. Early identification of problems in wells and effective interventions to fix problems can have a significant impact by minimising lost oil through formation damage and non productive time. As well as discussing best practice, time will be made available for discussion relating to specific problems that may be affecting fields operated by members of the class. The course is a mixture of informal teaching and lectures. In addition, group exercises are used to reinforce the subjects covered during the lectures. This encourages cross discipline awareness, communication and motivates team building. The course has recently been updated in the areas of Subsea and HPHT interventions. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Upon completion of this course, the participants will be able to: Identify the main reasons for performing well interventions. Identify the main formation damage mechanisms and understand how to prevent them. Improve your knowledge and understanding of well barriers. Improve your knowledge of pumping and stimulation operations. Improve your knowledge of wireline, coiled tubing and hydraulic workover operations. Target Audience The course is aimed at all engineers and contractors involved in the planning and execution of well interventions. This is a school where engineers and supervisors can hone their skills, especially at a time when increased production is a high priority. In the past, course attendees have been a mix of Petroleum engineers, Well Intervention engineers, Reservoir and Drilling engineers, Production Operators, Wellsite supervisors, as well as Geologists. In recent years, delegates have come from a wide range of disciplines and backgrounds. Experience before coming on the course has varied from no field experience and no experience of planning and programming well interventions through to many years working in well interventions. In order to be able to best adapt the course to the delegates expectations, you will be required to submit a pre-course questionnaire upon submission of your registration. Course Level Intermediate Trainer Your expert course leader has over 40 years in the oil industry. During that time, he has worked exclusively in well intervention and completions. After a number of years working for intervention service companies (mostly slickline), he joined BP as an offshore well service supervisor. He was responsible for the day-to-day supervision of well intervention work on many of BP's North Sea platforms and subsea wells. This included coil tubing, e-line, slickline, stimulation and well test operations. An office-based role as a well operations engineer followed. He was responsible for planning, programming and organising of all the well intervention work on the Bruce and later the Magnus fields. In 1995, he moved into completion design. Since then, he has designed many platform and sub-sea completions, often travelling to the rig site to oversee the installation. In addition to his day-to-day work as a completion engineer, he regularly teaches completion and well intervention courses all over the world. He is also the author of the book, Well Control for Completions and Interventions, Gulf Publishing - April 2018. He has also appeared as an expert witness ant the International Court of Arbitration.   POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Well Intervention and Productivity School
Delivered in Internationally or OnlineFlexible Dates
£3,869 to £4,499

DevOps for networking engineers

5.0(3)

By Systems & Network Training

Network DevOps course description This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. What will you learn Evaluate network automation tools. Automate tasks with ansible. Use git for version control. Use Python to manage network devices. Use Python libraries for network devices. Network DevOps course details Who will benefit: Administrators automating tasks. Prerequisites: TCP/IP Foundation Duration 5 days Network DevOps course contents What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. Ansible templating and roles aConfiguration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. Programming with Python Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip instal. Hands on Python programming with pyping. More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install. Hands on Python programming with pyping. Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.

DevOps for networking engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

DevOps Foundation©

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Foundation course includes Management, Operations, Developers, QA and Testing professionals such as: Individuals involved in IT development IT operations or IT service management. Individuals who require an understanding of DevOps principles. IT professionals working within, or about to enter, an Agile Service Design Environment The following IT roles: Automation Architects, Application Developers, Business Analysts, Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Consultants, DevOps Engineers, Infrastructure Architect, Integration Specialists, IT Directors, IT Managers, IT Operations, IT Team Leaders, Lean Coaches, Network Administrators, Operations Managers, Project Managers, Release Engineers, Software Developers, Software Tester/QA, System Administrators, Systems Engineers, System Integrators, Tool Providers. Overview The learning objectives for DevOps Foundation include an understanding of: DevOps objectives and vocabulary Benefits to the business and IT Principles and practices including Continuous Integration, Continuous Delivery, testing, security and the Three Ways DevOps relationship to Agile, Lean and ITSM Improved workflows, communication and feedback loops Automation practices including deployment pipelines and DevOps toolchains Scaling DevOps for the enterprise Critical success factors and key performance indicators Real-life examples and results The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organizational success. Learners will gain an understanding of DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation to improve the flow of work between software developers and IT operations professionals. This course prepares you for the DevOps Foundation (DOFD) certification. Exploring DevOps Defining DevOps Why Does DevOps Matter? Core DevOps Principles The Three Ways The First Way The Theory of Constraints The Second Way The Third Way Chaos Engineering Learning Organizations Key DevOps Practices Continuous Testing, Integration, Delivery, Deployment Site Reliability & Resilience Engineering DevSecOps ChatOps Kanban Business and Technology Frameworks Agile ITSM Lean Safety Culture Learning Organizations Continuous Funding Culture, Behaviors & Operating Models Defining Culture Cultural Debt Behavioral Models Organizational maturity models Automation & Architecting DevOps Toolchains CI/CD Cloud, Containers, and Microservices AI and Machine Learning Automation DevOps Toolchains Measurement, Metrics, and Reporting The Importance of Measurement DevOps Metrics - Speed, Quality, Stability, Culture Change lead/cycle time Value Driven Metrics Sharing, Shadowing and Evolving DevOps in the Enterprise Roles DevOps Leadership Organizational Considerations Getting Started Challenges, Risks, and Critical Success Factors Additional course details: Nexus Humans DevOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevOps Foundation©
Delivered OnlineFlexible Dates
£1,495

Healthcare Hero Instructor Training Certification: Level 1

By HFX Training

At HFX Training, we are passionate about business simulations because they bring learning to life through hands-on experience. This Level 1 Certification Program is the first step in our Instructor Training Certification Pathway, equipping you to confidently use the Healthcare Hero simulation in your teaching environment. In this program, you will experience the simulation as a student, navigating its complexities and dynamics. Upon successfully completing Level 1, you’ll be ready to advance to Level 2 Training, where you will deepen your expertise in simulation facilitation and administration. The program is cohort-based, and the timetable is coordinated in advance through discussions with the HFX team to ensure maximum participation. For more information on the program structure, instructional materials, and certification requirements, please read on. What to Expect: The Healthcare Hero simulation places you in charge of a fictional hospital. Over eight simulation rounds - each representing one quarter of business operations - you will make strategic decisions to optimize patient care while managing staffing, capacity, quality, and finances. Throughout the simulation, you’ll navigate challenges like healthcare and economic crises, all while balancing the needs of multiple stakeholders. Your ultimate goal is to outperform competing hospitals managed by other participants in the program. Program and Certification Requirements This program equips you to confidently lead the simulation by requiring more than attendance or participation. To earn certification, you must: Thoroughly Prepare: Review all instructional materials and the scenario manual before the course begins. Fully Participate: Attend all Zoom sessions and complete each simulation round with focus and effort. Demonstrate Mastery: Show a comprehensive understanding of the simulation’s dynamics, decision-making processes, and strategies during practice and live rounds. Engage in Reflection: Actively participate in debrief sessions, assess your performance, and identify strategies for improvement. This certification ensures you are equipped to facilitate this complex simulation with confidence. Auditing the course is an option, but participants who choose to audit will not receive certification. Program Format The program is delivered intensively over one or more Zoom sessions, totaling six hours. This compressed format demands your full attention and focus to successfully navigate the simulation’s complexities. Eligibility Requirements: By registering for this training program, you acknowledge the following: You have discussed your needs with the HFX team and confirmed that the simulation aligns with your class or program objectives. You are an instructor at an academic institution. You agree to the confidentiality terms and commit not to distribute, disclose, or replicate any program content for purposes outside of this training. This program is offered in goodwill to academic instructors as a resource to enhance their teaching. As part of this agreement, you understand that all materials, including the simulation itself, are proprietary to HFX and its partners. Any use of these materials for purposes beyond this program, such as developing similar tools or simulations, is strictly prohibited. Course Structure: After registering, you will gain immediate access to the simulation’s instructional materials. This includes: The Scenario Manual: Your guide to understanding the game. The Capacity Planner Worksheet and Financial Planning Worksheet: Tools to help you strategize. The Strategy Planning Exercise: Designed to align your decisions with overall objectives. The Portal Guide: A walkthrough of the simulation platform. The program unfolds in four key phases: Phase 1: Pre Zoom Call / Study / Set Up Register using the button at the bottom of this page. Review the instructional materials thoroughly. Once the cohort is finalized, you will be sent your login credentials for the simulation itself. Try to submit decisions for the first practice round using the simulation portal at www.simulationportal.com. Phase 2: Play We run two practice rounds over the first 2 hours of the zoom call. This allows you to familiarize yourself with the platform and decision-making process, and think through what your strategy might be in the live game. The simulation resets ("zeroed") after the practice rounds. A brief session will clarify lessons learned and expectations for the live rounds. Over eight rounds, you’ll compete against other participants while refining your strategic decisions. Phase 3: Feedback Reflect on your performance during a structured debrief, including: Strengths and areas for improvement. Insights into competitors’ strategies. Strategic lessons learned, and applicability to local healthcare organizations. Phase 4: Implementation Planning Work with the HFX team to plan your first application of the simulation in a teaching environment. Certification Outcome Upon completing this program, you will earn the HFX Instructor Training Certification: Level One, signifying your expertise in conducting impactful simulation-based training using Healthcare Hero.

Healthcare Hero Instructor Training Certification: Level 1
Delivered Online + more
$2,000

Network automation for engineers

5.0(3)

By Systems & Network Training

Network automation course description This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. What will you learn Evaluate network automation tools. Automate tasks with ansible. Use git for version control. Use Python to manage network devices. Use Python libraries for network devices. Network automation course details Who will benefit: Network engineers. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Network automation course contents What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/ or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. Ansible templating and roles Configuration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. Programming with Python Scripting versus application development, Python interactive mode, Python scripts, Python 2.7 vs Python 3. A simple Python script. Variables, loops, control statements, operators. PEP style guide. Python IDEs. Hands on Simple Python programs. More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install, Hands on Python programming with pyping. Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. PyEZ Juniper, NETCONF, installing PyEZ, a first pyEZ script, pyEZ configuration management. Hands on Juniper configuration management with pyEZ. NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.

Network automation for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered OnlineFlexible Dates
£3,250
1...34567...68