• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

17288 Other courses in Gravesend delivered Online

Operations, Maintenance and Testing of Power Transformer & Electric Motors

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT)  Electrical machines, mainly power transformers and electric motors are critical equipment that run production, and it must operate without any abnormalities. A wide variety of tests and standards have been developed to assist manufacturers and users of motors and transformer winding, assess the condition of the electrical insulation. The objective of this training course is to provide an understanding of power transformers and electric motors, their materials, components, and how they operate. It will also emphasize the importance of transformer life management, especially for those transformers and electric motors which have been in operation for than 10 years. The course will address in detail all aspects related to transformer principles, calculations, operation, testing and maintenance. Training Objectives This course aims to provide participants with the understanding of the fundamentals and constructional features of power transformers and electric motors, with particular reference to the design, testing, operation and maintenance of transformers in power systems. Delegates will gain a detailed appreciation of the following: Practical solutions for specifying, operating and maintaining power transformers and electric motors in a utility or plant environment Comprehensive understanding of principles, protection, maintenance and troubleshooting of power transformers and electric motors The necessary safe procedures relating to transformer operation and related circuitry Understand the principles of operation of the transformer and electric motors Identify the different features of power transformers and electric motors Appreciate the principles of transformer design, ratings, winding, core structure and materials, insulation and cooling methods, insulation and lifetime Utilize thermal limits and loading guides of transformers Analyze transformer and electric motors failure modes Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods The VILT will be delivered online in 4 half-day sessions comprising 4 hours per day, with 1 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be requested. Participants are invited but not obliged to bring a short presentation (10 mins max) on a practical problem they encountered in their work. This will then be explained and discussed during the VILT. A short test or quiz will be held at the end the course. Trainer Our key expert is actively involved in electrical inspections, energy audits, energy efficiency and technical consultation for M&E activities for industrial and commercial sectors. He is involved in testing and commissioning works of factory substations of up to 132kV system. He previously worked for Jimah coal-fired power plant in Port Dickson for 9 years with his last position being Electrical Maintenance Section Head. He was involved in the commissioning of coal-fired power plant mainly with 500kV generator transformer, 934 MVA generator, and up to 33kV MV motors and switchgear panels. Our key expert has managed the maintenance team to perform routine maintenance activities (together with supporting tools such as motor lube oil analysis, infrared thermography analysis, transformer oil analysis) & electrical troubleshooting and plant outages for critical and non-critical equipment. Besides that, our key expert has published several IEEE conference papers and journals such as: (2009). Effectiveness of auxiliary system monitoring & continuous hydrogen scavenging operation on hydrogen-cooled generator at power plant. In Energy and Environment, 2009. ICEE 2009. 3rd International Conference on (pp. 151-160). IEEE. (2010). Study on electric motor mass unbalance based on vibration monitoring analysis technique. In Mechanical and Electrical Technology (ICMET), 2010 2nd International Conference on (pp. 539-542). IEEE. (2012). Re-Design of AC Excitation Busduct based on Infrared (IR) Thermography: Condition-Based Monitoring (CBM) data analysis. eMaintenance, 101. (2016). Energy Saving Studies for a University Campus: An Educational-Based Approach, 3rd International Conference on Language, Education, Humanities and Innovation 2016. 'Grid-tied photovoltaic and battery storage systems with Malaysian electrcity tariff - A review on maximum demand shaving.' Energies 10.11 (2017): 1884 'Techno-Economic Optimization of Grid-Connected Photovoltaic (PV) and Battery Systems Based on Maximum Demand Reduction (MDRed) Modelling in Malaysia.' Energies 12.18 (2019): 3531 POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Operations, Maintenance and Testing of Power Transformer & Electric Motors
Delivered in Internationally or OnlineFlexible Dates
£1,238 to £2,336

Develop your Interpersonal Skills

By Ei4Change

Authentic relationships are built around empathy, trust and values. Developing healthy relationships as adults means building interpersonal skills and refining them around others’ needs as well as your own.

Develop your Interpersonal Skills
Delivered Online On Demand
£78

Writing Clear Business Communication: On-Demand

By IIL Europe Ltd

Writing Clear Business Communication: On-Demand This program is about learning about the writing process and covers the full spectrum of documents used when corresponding in the workplace. The ability to write effectively comes naturally to some people, but for the vast majority, it is a task often approached with a mixture of trepidation and dread. Effective writing seldom, if ever, 'magically materializes' on the spot. In reality, it is most often the product of planning, writing, and rewriting. This is why writing is called a process; it must go through a series of steps before it is clear and complete. This program is about learning about the writing process and covers the full spectrum of documents used when corresponding in the workplace. The ability to write effectively comes naturally to some people, but for the vast majority, it is a task often approached with a mixture of trepidation and dread. However, the ability to communicate in the written word, for whatever purpose, is an important part of our working and personal lives and can have a direct impact on our ability to persuade, gain commitment or agreement and enhance understanding. Good writing sounds like talking on paper, which is why this program is focused on getting the message across and achieving the desired results using the 'keep it simple and direct' approach. What you Will Learn At the end of this program, you will be able to: Write effective e-mails, letters, memos, and reports Clearly articulate the message Achieve desired results from correspondence Organize content for maximum impact Format for enhanced understanding Choose the appropriate communication medium for each document Revise documents to increase clarity and impact Foundations Concepts Business writing as a form of professional communication How business writing compares to other forms of writing Characteristics of good business writing Challenges with business writing The Project Environment Business writing in the project environment The concept of art, science, and optics of business writing Art Economy Precision Action Music Personality Science Purpose, simple, compound, and complex sentence structures Techniques to engage the reader Point of view: tone, attitude, and humor Organization: opening, body, and closing Support and coherence Optics Visual optics Sound optics Feel optics Effective optics Efficient optics Email Formal vs. informal emails Suggestions for improving email communication Instant and text messaging Reports Common types of reports created Formatting of reports Guidelines for meeting minutes Contracts Types of contracts Common agreements Procurement documents Templates, Forms, and Checklists Templates Forms Checklists Other Formatting Good Documentation Practices Good documentation practices Data integrity in business communication

Writing Clear Business Communication: On-Demand
Delivered Online On Demand30 minutes
£550

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered OnlineFlexible Dates
£2,975

Teaching English: 120 hours TEFL / TESOL Diploma - Level 7 QLS Endorsed

4.7(47)

By Academy for Health and Fitness

24-Hour Knowledge Knockdown! Prices Reduced Like Never Before The English language has become a global lingua franca, with millions of people across the world seeking to learn and improve their English proficiency. In the United Kingdom, the demand for skilled English language teachers remains high, with the British Council reporting a significant increase in the number of students pursuing English language courses. Are you passionate about language education and interested in embarking on a rewarding career as an English language teacher? This Advanced Diploma in TEFL (TESOL) at QLS Level 7 course is endorsed by The Quality Licence Scheme (with 180 CPD Points) Main Course: Advanced Diploma in TEFL (TESOL) at QLS Level 7 Additionally, we are offering 3 more courses related to TEFL (TESOL and ESOL) absolutely free. Bonus Course 1: Functional Skills English at QLS Level 2 Bonus Course 2: British English Pronunciation and Accent Course Bonus Course 3: English Spelling, Punctuation, and Grammar Training Teaching English as a Second or Foreign Language (TESOL) is a programme that provides equal educational opportunities for students who have a primary or home language other than English. So, if you are looking for a way to improve your English fluency and punctuation, whether you are writing emails at work or essays at university, then this TEFL (TESOL/ESOL) course is the right one for you! Whether you're an expert or a beginner, this TEFL (TESOL/ESOL) course covers everything you need to know. So, enrol now and start thriving. What will I learn from this TEFL (TESOL) course? An overview of English language teaching and learning Improve linguistics, pronunciation, grammar, and vocabulary Understand language teaching methodologies Various teaching receptive and productive skills How to plan lessons and determine course materials The importance of using different and fun teaching approaches Familiarise yourself with classroom management and student motivation Fundamentals of teaching English: A Situational Approach Deepen knowledge of personal development and employment Why Choose Us? Get a Free CPD Accredited Certificate upon completion of TEFL (TESOL) Get a free student ID card with TEFL (TESOL) Training The TEFL (TESOL) is affordable and simple to understand This course is entirely online, interactive lesson with voiceover audio Lifetime access to the TEFL (TESOL) course materials The TEFL (TESOL) comes with 24/7 tutor support Take a step towards a brighter future with our TTEFL (TESOL/ESOL) course. *** Course Curriculum of TEFL (TESOL/ESOL) *** Here is the curriculum breakdown for the Advanced Diploma in TEFL (TESOL) at QLS Level 7: Introduction to English Language Teaching and Learning Linguistics English Pronunciation Teaching Grammar and Vocabulary Language Teaching Methodologies Teaching Receptive Skills: Reading Teaching Productive Skills: Writing Teaching Receptive Skills: Listening Teaching Productive Skills: Speaking Lesson Planning and Creating Materials Use of Games and Activities Technology in Second Language Teaching and Learning Classroom Management and Student Motivation Teaching English: Situational Approach Professional Development and Employment How will I get my Certificate? After successfully completing the course, you will be able to order your Certificates as proof of your achievement. PDF Certificate: Free (Previously it was £12.99*4 = £51) CPD Hard Copy Certificate: £29.99 CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This TEFL (TESOL/ESOL) course is ideal for: Aspiring English language teachers Current English language teachers looking to upskill Individuals interested in teaching English abroad Individuals who wish to gain a better understanding of English language teaching methodologies Requirements You will not need any prior background or expertise to enrol in this TEFL (TESOL) course. Career path TEFL (TESOL/ESOL) Online Training Enrolling in this TEFL (TESOL) course can lead you to the following career paths: ESOL Tutor Sessional Tutor Main Grade Lecturer Specialist Practitioner Teaching Assistant Employability Trainer And many more! Certificates CPDQS Accredited Certificate Digital certificate - Included Upon passing the Course, you need to order a Digital Certificate for each of the courses inside this bundle as proof of your new skills that are accredited by CPD QS for Free. CPD Accredited Hard Copy Certificate Hard copy certificate - £29.99 Please note that International students have to pay an additional £10 as a shipment fee. Advanced Diploma in TEFL (TESOL) at QLS Level 7 Hard copy certificate - £139

Teaching English: 120 hours TEFL / TESOL Diploma - Level 7 QLS Endorsed
Delivered Online On Demand7 hours
£12

ITIL 4 Specialist: High-Velocity IT: On-Demand

By IIL Europe Ltd

ITIL® 4 Specialist: High-Velocity IT: On-Demand This course is based on the ITIL® 4 Specialist: High-Velocity IT exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn At the end of this course, participants will be able to: Understand concepts regarding the high-velocity nature of the digital enterprise, including the demand it places on IT. Understand the digital product lifecycle in terms of the ITIL operating model. Understand the importance of the ITIL guiding principles and other fundamental concepts for delivering high-velocity IT. Know how to contribute to achieving value with digital products. Course Introduction Introduction to High-Velocity IT High-Velocity IT Approaches High-Velocity IT Operating Models Introduction ITIL Building Blocks for High-Velocity IT Supporting Models and Concepts for Purpose Supporting Models and Concepts for People Supporting Models and Concepts for Progress High-Velocity IT Objectives and Techniques Techniques for Valuable Investments Techniques for Fast Developments Techniques for Resilient Operations Techniques for Co-created Value Techniques for Assured Conformance

ITIL 4 Specialist: High-Velocity IT: On-Demand
Delivered Online On Demand30 minutes
£850

Supervision of supervision - online bi-monthly reflective group

5.0(2)

By Supervision Institute

bi-monthly online group for supervisors of counsellors, psychotherapists or coaches who want a reflective space to discuss your supervision practice with other supervisors

Supervision of supervision - online bi-monthly reflective group
Delivered OnlineFlexible Dates
Price on Enquiry

About this Training Course This course will provide a comprehensive, foundational content for a wide range of topics in power system operation and control. With the growing importance of grid integration of renewables and the interest in smart grid technologies, it is more important than ever to understand the fundamentals that underpin electrical power systems. Training Objectives Basic Terminology and Concepts of Electrical Systems: Gain an understanding of the basic terminology and concepts of electrical systems and the structure of a power system Transmission Line Parameters: Learn in detail all the transmission line parameters including line resistance, line inductance, transposition of transmission lines, and capacitance of transmission lines Insulators: Understand thoroughly all the various types of insulators, pin type insulators, suspension type or disc insulators, strain insulators, and testing of insulators High-Voltage Direct Current Transmission: Determine the advantages and disadvantages of high voltage direct current transmission, and gain an understanding of all the features of high-voltage direct current transmission Substations and Neutral Grounding: Gain a detailed understanding of all substation equipment, factors governing the layout of substations, station transformers, elements to be earthed in a substation, power system earthing, earthing transformers, bus bar arrangements and gas-insulated substations Distribution System: Learn about the effects of voltage on the conductor volume, distributor fed from one end, distributors fed from both ends at the same voltage, distributors fed from both ends at different voltages, and alternating current distribution Circuit Breakers: Learn about the classification of circuit breakers, plain-break oil circuit breakers, air break circuit breaker, air blast circuit breakers, vacuum circuit breakers, SF6 circuit breakers, rating and testing of circuit breakers Relaying and Protection: Learn all the requirements of relaying, zones of protection, primary and backup protection, classification of relays, electromagnetic relays, induction relays, feeder protection, phase fault protection, reactance relay, static overcurrent relay, differential protection, transformer protection, Buchholz relays, alternator protection restricted earth fault protection, rotor earth fault protection, and negative-sequence protection Economic Operation of Power Systems: Gain an understanding of steam power plants, heat rate characteristics and characteristics of hydro plants Load Frequency Control: Learn about speed governing mechanism, speed governor, steady state speed regulations and adjustment of governor characteristics Voltage and Reactive Power Control: Gain an understanding of impedance and reactive power, system voltage and reactive power, voltage regulation and power transfer Renewable Energy Sources: Learn about solar power, wind power, geothermal energy, biomass and tidal power Restructuring of Electrical Power Systems: Gain an understanding of smart grids, smart grid components, smart grid benefits, and open smart grid protocol Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Introduction to Power Systems
Delivered in Internationally or OnlineFlexible Dates
£3,499

Kick Start Your Career with CompTIA's Data Analysis Certification - Live Classes

5.0(1)

By Media Tek Training Solutions Ltd

Get job ready with CompTIA's Data Analysis Certification. Live Classes - Career Guidance - Exam Included.

Kick Start Your Career with CompTIA's Data Analysis Certification - Live Classes
Delivered OnlineFlexible Dates
£1,595