• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27 Educators providing Other courses in Gainsborough

Bishop Grosseteste University

bishop grosseteste university

4.5(79)

England

We’re set on a single-site campus, so just about everything you need is close by, whether it be your tutors, your friends, your lectures or the places in which you like to relax. We began life in 1862 as an Anglican teacher training college for women. To mark our centenary in 1962, our name was changed to incorporate the current ‘Bishop Grosseteste’ title, in honour of Robert Grosseteste, the thirteenth century scientist, philosopher, educator, and Bishop of Lincoln (so he’s the one you have to thank for the long name!). In 2012 we achieved full university status and haven’t looked back since. We’ve seen a lot of things come and go since 1862, but we’ve never stopped providing first-class education and turning out high-calibre graduates who go out into the world and change people’s lives for the better. In recent years we’ve undergone an explosion of growth in many areas, remaining a small and friendly university whilst expanding and developing our portfolio of courses into more exciting new areas than ever before. We still consider ourselves experts in education – we have been doing it for 160 years after all – but our teaching courses now sit alongside an exciting range of other disciplines. We currently educate over 2,000 students in a wide range of subjects – within our ever-expanding undergraduate portfolio, our traditional PGCE teacher training routes, work-based Foundation Degrees, Master's courses and even Doctoral study (and much more in between). We pride ourselves on being a supportive community, always striving to improve the lives of our students. We’re exceptionally proud of the fact that, over the past 160 years, our commitment to first-class education has remained consistent. Our students are some of the happiest in the UK, which is incredibly important to us. We really care about our students and aim to support them all of the way through their studies, from application to graduation. Life after BGU is extremely important and we offer many different methods of support for your future career along the way.

Linda Clark - The Spotted Dog Flower Co

linda clark - the spotted dog flower co

4.8(69)

GAINSBOROUGH

My name is Linda and I have been working full time growing and selling flowers since 2014. Prior to this I worked in the constrution industry for many years, initially in administration and marketing, followed 12 years as PA to the Chairman, through the highs and lows building roads and sewage systems! Then a move into the IT department managing the teams installating IT and telecoms on big construction sites and a lot less exciting stuff resulting in spending far too much time on Doncaster railway station. Time for a change!! Joining the fledgling organisation Flowers from the Farm (FFTF) in 2012 when members numbered around 50, led to becoming co-ordinator for the East Midlands region in 2015 and Co-Chair for a two year fixed term 2018-20. Since I joined FFTF has grown to nearly 1000 members championing local grown flowers. My business increased from selling a few bunches of flowers a week to supplying flowers and floristry for weddings, funerals and in 2020 a big expansion in selling flowers to the general public, followed by a return to farmers’ markets in 2021 where from March to September you will find The Spotted Dog at Brigg, Lincoln and Saxilby. My flowers are grown with the environment in mind. The poly tunnel is unheated, the greenhouse uses electric for only two months of the year, the flowers pesticide free and tonnes of compost are supplied from our own horses and livestock every year, supplemented by bulk green waste. Flowers are supplied wrapped in kraft paper or re-useable vases or buckets depending on volume supplied! I use primarily British flowers, either grown by myself or sourced from other growers, locally in Lincolnshire and Cornwall early/late season. On very rare occasions I will use carefully sourced imported flowers if needed for the work being undertaken although more and more customers are requesting “only British” and are happy to work with the seasons. Media mentions have included BBC Radio 4 Open Country with Helen Mark on her programme ‘Inspired by Flowers in Lincolnshire’, Radio 4 ‘Farming Today’ during British Flowers Week, Radio Newark with Girls About Town, BBC television for RHS Chelsea Flower Show 2018 when I was filmed cutting flowers to ready to transport to London for use in the Flowers from the Farm exhibit when the amazing team won a gold medal. There have also been articles in My Weekly Magazine, Flower Arranger magazine, The Gainsborough Standard, The Lincoln Business Journal and in 2020 The Daily Telegraph in an article about the flower industry during the Covid pandemic. In 2021 I was delighted to welcome Lizzie Musham from BBC Radio Lincolnshire for a field walk ahead of FFTF Flower Farmers Big Weekend and we met up again in November when she joined one of our wreath making workshops at The Cross Keys Stow and made a wreath live on air! I’m passionate about promoting natural funeral flowers suitable for green burial grounds, never use floral foam and in 2020 became an associate member of the Association of Green Funeral Directors. My wedding flowers have appeared on Love My Dress and Rock My Wedding blogs and I undertake weddings only within a 50 mile radius of my home.

Education And Skills Training & Development

education and skills training & development

Doncaster

Welcome to the Education and Skills Training & Development Ltd's privacy notice. Education and Skills Training & Development Ltd respects your privacy and is committed to protecting your personal data. This privacy notice will inform you as to how we look after your personal data when you visit our website (regardless of where you visit it from) and tell you about your privacy rights and how the law protects you. This privacy notice is provided in a layered format so you can click through to the specific areas set out below. Please also use the Glossary to understand the meaning of some of the terms used in this privacy notice. 1. IMPORTANT INFORMATION AND WHO WE ARE 2. THE DATA WE COLLECT ABOUT YOU 3. HOW IS YOUR PERSONAL DATA COLLECTED 4. HOW WE USE YOUR PERSONAL DATA 5. DISCLOSURES OF YOUR PERSONAL DATA 6. INTERNATIONAL TRANSFERS 7. DATA SECURITY 8. DATA RETENTION 9. YOUR LEGAL RIGHTS 10. GLOSSARY 1. Important information and who we are Purpose of this privacy notice This privacy notice aims to give you information on how Education and Skills Training & Development Ltd collects and processes your personal data through your use of this website, including any data you may provide through this website when you sign up to our newsletter, purchase a product or service, take part in a competition or enrol yourself or one of your employees onto one of our courses. This website is not intended for children and we do not knowingly collect data relating to children. It is important that you read this privacy notice together with any other privacy notice or fair processing notice we may provide on specific occasions when we are collecting or processing personal data about you so that you are fully aware of how and why we are using your data. This privacy notice supplements the other notices and is not intended to override them. Controller Education and Skills Training & Development Ltd is the controller and responsible for your personal data (collectively referred to as "COMPANY", "we", "us" or "our" in this privacy notice). We have appointed a data protection officer (DPO) who is responsible for overseeing questions in relation to this privacy notice. If you have any questions about this privacy notice, including any requests to exercise your legal rights, please contact the DP] using the details set out below. Contact details Our full details are: Full name of legal entity: Education and Skills Training & Development Ltd Name or title of DPO : James Hart Email address: james.hart@education-and-skills.com Postal address: 5C Oxford House, Sixth Avenue, Doncaster DN9 3GG Telephone number: 01302 802220 You have the right to make a complaint at any time to the Information Commissioner's Office (ICO), the UK supervisory authority for data protection issues (www.ico.org.uk). We would, however, appreciate the chance to deal with your concerns before you approach the ICO so please contact us in the first instance. Changes to the privacy notice and your duty to inform us of changes This version was last updated on 1st July 2018 and is reviewed annually. It is important that the personal data we hold about you is accurate and current. Please keep us informed if your personal data changes during your relationship with us. Third-party links This website may include links to third-party websites, plug-ins and applications. Clicking on those links or enabling those connections may allow third parties to collect or share data about you. We do not control these third-party websites and are not responsible for their privacy statements. When you leave our website, we encourage you to read the privacy notice of every website you visit. 2. The data we collect about you Personal data, or personal information, means any information about an individual from which that person can be identified. It does not include data where the identity has been removed (anonymous data). We may collect, use, store and transfer different kinds of personal data about you which we have grouped together follows: · Identity Data includes first name, maiden name, last name, username or similar identifier, marital status, title, date of birth, national insurance number and gender. · Contact Data includes billing address, delivery address, email address and telephone numbers. · Financial Data includes bank account and payment card details. · Transaction Data includes details about payments to and from you and other details of products and services you have purchased from us. · Technical Data includes internet protocol (IP) address, your login data, browser type and version, time zone setting and location, browser plug-in types and versions, operating system and platform and other technology on the devices you use to access this website. · Profile Data includes your username and password, purchases or orders made by you, your interests, preferences, feedback and survey responses. · Usage Data includes information about how you use our website, products and services. · Marketing and Communications Data includes your preferences in receiving marketing from us and our third parties and your communication preferences. We also collect, use and share Aggregated Data such as statistical or demographic data for any purpose. Aggregated Data may be derived from your personal data but is not considered personal data in law as this data does not directly or indirectly reveal your identity. For example, we may aggregate your Usage Data to calculate the percentage of users accessing a specific website feature. However, if we combine or connect Aggregated Data with your personal data so that it can directly or indirectly identify you, we treat the combined data as personal data which will be used in accordance with this privacy notice. We do not collect any Special Categories of Personal Data about you (this includes details about your race or ethnicity, religious or philosophical beliefs, sex life, sexual orientation, political opinions, trade union membership, information about your health and genetic and biometric data). Nor do we collect any information about criminal convictions and offences. If you fail to provide personal data Where we need to collect personal data by law, or under the terms of a contract we have with you and you fail to provide that data when requested, we may not be able to perform the contract we have or are trying to enter into with you (for example, to provide you with goods or services). In this case, we may have to cancel a product or service you have with us but we will notify you if this is the case at the time. 3. How is your personal data collected? We use different methods to collect data from and about you including through: · Direct interactions. You may give us your Identity, Contact and Financial Data by filling in forms or by corresponding with us by post, phone, email or otherwise. This includes personal data you provide when you: · apply for our products or services; · enrol on one of our courses – government funded or not · create an account on our website; · subscribe to our service or publications; · request marketing to be sent to you; · enter a competition, promotion or survey; or · give us some feedback. · Automated technologies or interactions. As you interact with our website, we may automatically collect Technical Data about your equipment, browsing actions and patterns. We collect this personal data by using cookies, server logs and other similar technologies. We may also receive Technical Data about you if you visit other websites employing our cookies. · Third parties or publicly available sources. We may receive personal data about you from various third parties and public sources as set out below: · Technical Data from the following parties: (a) analytics providers such as Google based outside the EU; (b) advertising networks based inside the EU; and (c) search information providers based inside OR outside the EU. · Contact, Financial and Transaction Data from providers of technical, payment and delivery services based inside OR outside the EU. · Identity and Contact Data from data brokers or aggregators based inside OR outside the EU. · Identity and Contact Data from publicly availably sources such as Companies House and the Electoral Register based inside the EU. · Achievement of prior qualifications from the Learner Records Service and Department of Education via the ESFA or Student Loans Company 4. How we use your personal data We will only use your personal data when the law allows us to. Most commonly, we will use your personal data in the following circumstances: · Where we need to perform the contract we are about to enter into or have entered into with you. · Where it is necessary for our legitimate interests (or those of a third party) and your interests and fundamental rights do not override those interests. · Where we need to comply with a legal or regulatory obligation. Generally we do not rely on consent as a legal basis for processing your personal data other than in relation to sending third party direct marketing communications to you via email or text message. You have the right to withdraw consent to marketing at any time by contacting us. Purposes for which we will use your personal data We have set out below, in a table format, a description of all the ways we plan to use your personal data, and which of the legal bases we rely on to do so. We have also identified what our legitimate interests are where appropriate. Note that we may process your personal data for more than one lawful ground depending on the specific purpose for which we are using your data. Please contact us if you need details about the specific legal ground we are relying on to process your personal data where more than one ground has been set out in the table below.

Voluntary Action North Lincolnshire

voluntary action north lincolnshire

Scunthorpe

Voluntary Action North Lincolnshire (VANL) is a Registered Charity and a Company Limited by Guarantee, governed by a Memorandum and Articles of Association adopted on 19th March 1997, amended on 7th October 2004 and again on 4th October 2007. The date of Incorporation was 1st April 1997. A Board of Trustees (15 in total) directs the policy and management of VANL. The members of the Board are Directors of the Company for the purpose of charity law. They are elected from the membership, or can be self-nominated as individual representatives if they have specialist skills that will complement the make-up of the Board, to serve for three years. They can also be co-opted annually if there are vacancies. VANL’s purposes are the advancement of education, the protection of health and the relief of poverty, distress and sickness. These aims are pursued by bringing together voluntary and statutory organisations in Council and by encouraging co-operation between organisations. VANL is a Council for Voluntary Service (CVS). Its core work is to support, promote and develop the voluntary and community sector (VCS) within North Lincolnshire. As well as its core activities for members, at any one time VANL manages a variety of projects running on both a small and large scale. VANL needs to evidence its work in five key areas, these are: Services and support to promote VCS effectiveness: ranging from typing and duplicating facilities to advice on charitable, organisational and funding matters, and community accountancy. Liaison: encouraging networking between groups within the sector and between the VCS and statutory and private sectors. Representation: through facilitating forums and other groups to ensure views are put forward on local policies. Development work: identifying gaps in service provision and working with the VCS groups to develop new services to meet those needs.

Lincoln Castle Academy

lincoln castle academy

Lincolnshire,

I am both incredibly proud and profoundly delighted to be able to offer you a warm welcome to Lincoln Castle Academy. We know that the website is the first point of call for many people new to the academy and a regular destination for those who work with us more closely. As a consequence, we want this to be a friendly and informative site which gives visitors detailed information about us in an appealing, interesting and exciting way. We also hope the site keeps you up to date with the latest news and events from the academy. We are unashamedly focused on the educational outcomes of our students and deem that our students deserve to achieve the very best grades that they are capable of. We believe that this is the whole point of running a great school and we are exceedingly proud that we achieve this by taking a truly child-centred approach. Our students are the most important people in our building! We are keen for everyone to understand our vision: “We seek to inspire greatness in every child and to equip them with the academic achievements, life skills and personal attributes to lead happy, safe, successful lives.” In addition to our core business, there are also endless opportunities to learn, develop, make new friends and have fun through extra-curricular activities. We have a strong sporting ethos, and there are many different sports offered throughout the year. In addition to this, we offer extra-curricular opportunities in many other areas through our Involve and Achieve programs. I hope you already share or will come to share, my belief that Lincoln Castle Academy is an exceptional place to attend as a student or to work in as an adult. I feel extremely privileged to be the Principal and hope our website will help you to find out more about us.

Act Fast Nl

act fast nl

Scunthorpe

Act Fast is a well-established Independent School near Scunthorpe in North Lincolnshire. Act Fast has grown organically as the need for a high standard of provision has emerged and developed. The premise of Act Fast’s provision is that we are promoting the value of education to previously disaffected young people. what we do We operate a bespoke curriculum at Act Fast, which is both written and delivered by in house staff and is in line with the DfE Independent Schools Standards. We overtly deliver lessons in the following subject areas: Maths up to Functional Skills level 2 standard English up to Functional Skills level 2 standard Motor Vehicle Technology with the Institute of the Motor Industry up to level 2 standard PSHE (Including RSE) against a verified and recognised scheme Motocross, delivered by qualified and experienced staff Physical Education through a range of on-site and off-site activities. Art/Crafts Music Further to this, lessons in the following subject areas are delivered as embedded features of the timetabled lessons. Human and Social Understanding Aesthetic and Creative Scientific Technological British Values Our learners know if they work hard, they are awarded by riding the motorcycles here at Act Fast. This has proven to be successful, helping young adults to achieve their qualifications and have a positive attitude towards learning. Curriculum Act Fast has made a commitment to give every young person who is capable of the opportunity to reintegrate and to take a range of exams. For those subjects that Act Fast does not currently deliver, as we develop learners opportunities will increase. We are an accredited exam centre through OCR, NCFE, ABC, D of E, and when required will extend this to meet the needs of our learners. Our curriculum also enables and encourages learners to develop their interests and talents. We have a number of students here who have found their passion for music, learning how to play the guitar, as well as a large number of young, talented motorbike riders who love learning about riding, fixing and maintaining the bikes. It’s important to us to support our learners in keeping them physically and mentally healthy. We have access to: Mental Health Champions, outreach support and therapeutic counselling services, available to all our learners. We have regular sports activities within our timetable to encourage physical exercise, as well as access to local gyms and leisure centres. These activities help to prepare young people to access their community in adulthood. Hidden Curriculum Act Fast’s curriculum, throughout the range of its delivery, is heavily invested in the “Hidden Curriculum”. The Hidden Curriculum argument is that the most valuable lessons our young people receive here are to arrive on time, respect authority, follow instructions, keep regard for safety, take responsibility for their actions, behave in an acceptable standard, liaise with other people respectfully, and respect other people’s personal choices, encouraging equality and diversity. Other ways in which we promote equality and diversity include: Challenging negative attitudes amongst students. Setting clear rules regarding how people treat each other. Treating all students and staff equally and fairly. Using resources that have multicultural themes. Creating lessons that reflect and promote diversity in the classroom. Making sure that all students have equal access to participation and opportunities. Ensuring that all procedures and policies are non-discriminatory. Making sure that classroom materials never discriminate against anyone. Safeguarding protected characteristics throughout our culture and ethos. All of these things, to a greater extent than formalised subject lessons, will make them responsible, independent, resilient and above all else employable young people once they finish their school career. Act Fast has trained and qualified staff to recognise some of the barriers to learning that students face. These barriers might be due to Adverse Childhood Experiences and with knowledge and understanding of such issues Act Fast staff can help students overcome them to maximise their potentials. Referral, Application and Introduction After a referral is made to Act Fast, we invite a representative from the referring body (usually the Inclusion Officer), the learner and the learner’s parents into Act Fast for a familiarisation visit. During that visit the learner is given a tour of the facility, is introduced to key staff members and receives an explanation of the culture of Act Fast. Learners are given the opportunity to voice any concerns and any questions they have are answered. We set a high expectation on behaviour here, and partly because expectations are high, but also because more established learners mentor new arrivals, new learners very soon fall into compliance with our way of doing things. Act Fast works because our learners buy into the culture. This is the first opportunity that a young person has to involve themselves in how we operate here. Application forms must be completed prior to a young person starting at Act Fast. Once applications are complete, the referring body typically takes a few days (sometimes up to a week) to arrange their transport. Personal data will be stored and processed at this point, and details entered into our MIS system, Arbor. We insist on a Personal Learning Plan (PLP) meeting with stakeholders and the young person present within the first month. This allows any teething troubles to be voiced and solutions to be sought. Further PLP meetings are held regularly, no less frequently than once a term. At those meetings, Act Fast staff will deliver a report detailing the engagement of the young person, levels of educational attainment, attendance, general engagement, and commentary on the likelihood of a reintegration being successful. Reintegration planning must be tailored to suit the needs of the individual. Staff Investment Our staff all take part in quality training including regular CPD sessions and ongoing programmes of accreditation such as SSS online training (recently completed by all staff members). Training needs identified are acted on as soon as practical. The organisation believes and invests in the continuous professional development of its people. Our commitment to CPD is such that every member of staff has received CPD accredited training in the last 12 months. Our qualified teachers ensure pedagogical content methods are in place to deliver high standards of teaching for our young learners. We engage with our staff continuously here and know of the main pressures on them, including managing workload. We aim to support every staff member to help guide them throughout their career at Act Fast. Educational Framework It is our aim to provide an educational framework which is heavily invested in the hidden curriculum. By that, we mean that as well as lessons formalised in Maths and English for example, our young people develop an understanding of: working to a process arriving on time respecting authority abiding by the rules accepting that their first choice may not always be the right choice following instructions not expecting to leave early attending every day These are the skills whereby a young person will be employable post 16. Without these key skills, a young person is unlikely to be able to function in the workplace. We develop the hidden curriculum, embedded in everything we do, in order that our learners gain an understanding of their expectations being matched by the expectations of attendance, compliance and engagement We have a tracking system in place for our core subjects. We also use a “readiness to learn” scale, whereby a learners attitude, engagement, and involvement in their own work is measured. Bespoken When evolving Act Fast into an independent school I was very mindful that Mainstream school had not been a successful outcome for the majority if not all of our learners. It was imperative that we were bespoke and able to meet the needs of all our learners and not just the few. For this reason we created our own curriculum that is more sympathetic to our learners’ needs. Our teachers create an environment that allows our young people to focus on learning. 1:1 support as well as small group teaching (where appropriate) is in place to make teaching more effective, allowing tutors to concentrate on each individual learner’s needs. We believe in student voice here at Act Fast. Our EHCP’s (Educational Health Care plans) allow us to capture our learners’ views. It’s not only in our annual reviews that we give learner’s opportunity to be heard. For example, one young adult suggested we invested in a bigger bike here, so we put arrangements in place and made this happen. We encourage our learners to make their voices heard. Below are some examples of student voice council meetings held at Act Fast and how they shape decisions made at the school. Student Voice Meeting 040322 We have effective arrangements to identify learners who may need early help or are at risk of neglect, abuse, grooming or exploitation. We strongly promote our policies and legislation such as safeguarding, diversity and equality of our staff and learners at Act Fast. Ofsted Report 2022 Best Bits: “Act Fast school is a place where the proprietor and staff go the extra mile to support the pupils who attend. It has a unique vision of how to ‘hook’ pupils back into education, and it is successful in doing so. Act Fast has started to re-engage pupils who have experienced difficulties in their education”. “Parents believe that, finally, a school ‘gets’ their child. The wider curriculum, built around motor-cross, is a distinctive feature of the school. It motivates pupils to attend and to behave well. For those pupils who do not wish to ride the bikes, staff work with them to find alternatives. The proprietor and staff have limitless ambition for what pupils can achieve in their personal development. At the heart of this is a patient, careful building of relationships, and, in many cases, a re-building of trust between the pupil and their experience of education.” “The special educational needs coordinator (SENCo) has a strong understanding of the requirements of pupils with special educational needs and/or disabilities (SEND). Recently, the SENCo has started to work with a senior leader to more effectively incorporate pupils’ SEND targets from their education, health and care (EHC) plans into teachers’ planning.” “Leaders have also recently taken action to improve the school’s support for pupils’ reading. For instance, a primary specialist has been appointed with experience of teaching phonics to the weakest readers. The English lead is in the process of building a programme to encourage pupils to read widely and for enjoyment. Leaders’ wider curriculum for pupils’ personal development is, to very large extent, a strength of the school.” “The proprietor’s vision for getting young people who have had difficult experiences of school back into education is impressive. It is backed up by an innovative personal development curriculum, built on a range of activities that take place in the afternoons. These include a variety of motor vehicle-related opportunities, as well as visits out of school to a range of venues. Recently, for instance, pupils have started to be taken to a local engineering firm to participate in a scheme to broaden their career aspirations. Pupils know that there is a plan in place for them to make a suitable next step into further education or training at the end of Year 11.” Improvements: “Leaders’ PSHE curriculum includes reference to the protected characteristics and the school is a respectful community: however, coverage of the protected characteristics in the curriculum strategy is not as detailed as it could be, so pupils’ understanding is not as developed as it could be. Leaders should revisit their curriculum thinking for PSHE so that teaching of the protected characteristics is made more overt.” “The current curriculum is based on a limited set of qualifications in two subjects. For a registered special school, this lacks ambition. As a result, pupils experience a narrow curriculum, including a limited suite of qualifications. Leaders should take action to broaden and deepen their curriculum so that pupils have opportunities to study a wider range of subject content, organised coherently and cumulatively over the entire secondary and post-16 phases; and, for those who are capable, to a higher level of accreditation.” “Leaders have not taken the required action with regard to the statutory guidance for the teaching of RSHE. Consequently, parents have not been made aware of the school’s policy and their parental rights within the policy. Also, the teaching of Inspection report: Act Fast NL Ltd. RSHE is not clearly planned in the school’s curriculum. Leaders should take action to be compliant with the statutory guidance and to ensure that curriculum thinking incorporates structured RSHE teaching.”

Courses matching "Other"

Show all 668

Reservoir Engineering for Geosciences Professionals and Other Disciplines

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course Reservoir engineering methods, data and models are used in the E&P business to describe and optimise hydrocarbon recovery. This 5 full-day course addresses reservoir engineering concepts and methods to enable cross-disciplinary team work and the smooth exchange of ideas and experience. In this course, participants will gain an in-depth understanding of the fundamentals of reservoir engineering and a broad range of modern reservoir engineering principles and practices for reservoir development and production, including the estimation of oil and gas reserves. The topics covered in this course will be illustrated with practical and actual field cases. Some self-study or reading will be required from participants. Training Objectives By the end of this course, participants will be able to: Describe use of permeability and fluid saturation in reservoir engineering. Explain the assessment of hydrocarbon resources and recoverable reserves estimation. Understand analysis and modelling of fluid behaviour. Explain oil and gas reservoir performance. Describe material balance methods in oil and gas reservoirs. Understand design and analysis of well tests. Understand analysis and production of producing wells and forecasting methods. Describe fluid displacement at the pore and reservoir scale. Explain reservoir simulation approaches. Describe tools for handling the uncertainty in reservoir analysis. Describe various recovery methods from primary to enhanced recovery. Target Audience This course is intended for professionals with prior technical or engineering exposure to exploration and production activities. Targeted participants include geoscientists, production engineers, petrophysicists and petroleum engineers involved with exploration and development of oil & gas reservoirs. The course will also benefit petroleum engineering team leaders as well as IT staff and support staff who work with reservoir engineering, development and production departments. Course Level Basic or Foundation Trainer Your expert course leader is an independent Reservoir Engineering Consultant, providing project consultancy and reservoir engineering training for global customers. He retired from Shell in 2012 and during the last years of his Shell career, he held the Senior Reserves Consultant for the Middle East and Reservoir Engineering Discipline Lead positions. He is a seasoned Petroleum Engineering professional, with global experience in Shell companies and joint ventures (NAM, SSB, SCL, PDO, SKDBV). His technical expertise is in reserves and resource management, reservoir engineering quality assurance, and staff development as well as carbonate reservoirs, modelling and reservoir simulation.  PROFESSIONAL EXPERIENCE 2012 to date Independent Reservoir Engineering Consultant Petroleum and reservoir engineering advice, training and services. Reservoir engineering training for major oil companies, engineering firms and other global customers. Assurance of SPE and SEC reserves compliance. Participation in SPE reserves and resources estimation Advanced Technology Workshops both as an organising committee member and as session speaker.   2008 - 2012 Shell International E&P, the Hague, the Netherlands Senior Reserves Consultant for Shell business units and joint ventures in the Middle East Region Assurance of SEC and SPE compliance of reserves and resources. Industry publications and conference contributions a.o. SPE guidelines on probabilistic reserves estimation.   2006 - 2008 Shell E&P Technology Solutions, Rijswijk, the Netherlands Reservoir Engineering Discipline Lead Responsible for Reservoir Engineering in global projects and for staff planning and development (over 60 international Reservoir Engineers).   2001 - 2005 Centre for Carbonate Studies, SQU, Oman / Shell International E&P Applications and Research / Shell Representative Office Oman   Petroleum Engineering Manager PE Manager in the Carbonate Research Centre, a joint venture between Sultan Qaboos University in Oman and Shell International. Industrial research projects and teaching on recovery aspects of carbonate reservoir development.   1997 - 2000 Shell International E&P, Rijswijk, the Netherlands Principal Reservoir Engineer Coordination of the NOV subsurface team in Shell Kazakhstan Development BV in 2000. Leading role in Shell Gamechanger project on natural gas hydrates. Acting Shell Group Reserves Co-ordinator in 1997-1998. Facilitation of workshops with government shareholders, including discussions on sensitive reserves issues (BSP Petroleum Unit Brunei, PDO Oman, SPDC government Nigeria).   1992 - 1996 Shell Training Centre, Noordwijkerhout, the Netherlands Reservoir Engineering Programme Training Director Advanced PE training events, QA/QC, design and delivery of courses to Shell staff.   1985 - 1992 Shell International, SIPM, the Hague, The Netherlands Senior Reservoir Engineer Reservoir simulation, integrated reservoir modelling and gas field development and major contributor to the Shell internal Gas Field Planning Tool development. Full field reservoir simulation projects supporting Field Development Plans, operational strategies and unitisation negotiations for Shell Group Operating Companies in the United Kingdom, New Zealand and Egypt.   1984 - 1985 Geological Survey of the Netherlands, Ministry of Economic Affairs Reservoir Engineering Section Head Responsible for Petroleum Engineering advice on oil and gas licences to the Ministry of Economic Affairs. First-hand experience with a government view on resource management.   1976 - 1984 NAM, Assen, The Netherlands and SSB/SSPC, Miri, Malaysia Wellsite Operations Engineer / Operational Reservoir Engineer POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Reservoir Engineering for Geosciences Professionals and Other Disciplines
Delivered in Internationally or OnlineFlexible Dates
£3,697 to £4,299

Networking Microsoft Systems

5.0(3)

By Systems & Network Training

Networking Microsoft Systems course description A hands-on course covering the network aspects of Microsoft systems. The course progresses from basic TCP/IP tools and configuration settings through to advanced security considerations finishing with an overview of Exchange and IIS. Hands on sessions are based on a choice of Windows Server 2003 or Windows 2000 server and Windows XP or Windows 2000 professional. Customised versions with other Microsoft platforms are also available. What will you learn Design networks with consideration for Microsoft issues such as logons. Design, configure and troubleshoot TCP/IP, DNS, WINS and DHCP. Configure security features such as PKI and IPSec. Describe the Windows TCP/IP implementation details. Networking Microsoft Systems course details Who will benefit: Anyone working with Microsoft systems. Prerequisites: TCP/IP foundation for engineers Supporting Windows ( XP or 2000 or 2003) Duration 5 days Networking Microsoft Systems course contents Configuring network cards PnP, resources, Ethernet cards, wireless cards, dial up networking, other cards, Ethernet settings, layer 2 QoS. Configuring and supporting IP Basic IP settings, advanced IP settings, advanced TCP settings, DrTCP and registry settings, security DHCP DHCP server, authorising the DHCP service, DHCP client, DHCP relays, Address pools, options, lease duration's, Integrating with DNS. Microsoft networking overview Workgroups and domains, Domain controllers, the logon process in a network, the role of Active Directory, synchronisation, protocol stacks and bindings. Accessing file and print resources Shared folders, permissions, network printers, browsing, NetBIOS, SMB. WINS Servers, clients, Client registration, renewing and releasing of names. NetBIOS node types. DNS1 Overview, Primary and secondary servers, DDNS, zones, resource records. The browser service Master, backup and other browser roles, elections, announcements, recovery from failure, Inter subnet browsing. TCP/IP implementation details Dead gateway detection, Multi homing, multicasting, MTU path discovery, registry settings, QOS and RSVP, Windows as a router, performance implications of Microsoft services. Internet Access Options, NAT, Firewall capabilities and Proxy server, Internet Authentication Service. Remote Access Installing, RAS servers. RAS process, protocols Security: PKI PPTP, L2TP, What is IPSec, configuring IPSec. Security: VPNs PPTP, L2TP, What is IPSec, configuring IPSec. Other Microsoft networking services & tools Netmeeting, instant messaging, white boarding, document collaboration, video conferencing Microsoft Exchange, IIS, Directory replication, SNMP, Net Monitor, integration with other platforms.

Networking Microsoft Systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Complete Python programming

5.0(3)

By Systems & Network Training

Complete Python training course description Python is an agile, robust, expressive, fully objectoriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. This course covers Python from the very basics of 'hello world!' through to object oriented programming and advanced topics such as multi threading. Hands on follows all the major sections in order to reinforce the theory. What will you learn Read Python programs. Write Python programs. Debug Python programs. Use Python's objects and memory model as well as its OOP features. Complete Python programming training course details Who will benefit: Anyone wishing to learn Python. Prerequisites: None. Duration 5 days Complete Python programming training course contents Welcome to Python: What is Python? Origins, features. Downloading and installing Python, Python manuals, comparing Python, other implementations. Getting started: Program output, the print statement, "hello world!", Program input, raw_input(), comments, operators, variables and assignment, numbers, strings, lists and tuples, dictionaries, indentation, if statement, while Loop, for loop. range(), list comprehensions. Files, open() and file() built-in functions. Errors and exceptions. Functions, Classes, Modules, useful functions. Python basics: Statements and syntax, variable assignment, identifiers, basic style guidelines, memory management, First Python programs, Related modules/developer tools. Python Objects: Other built-in types, Internal Types, Standard type operators, Standard type built-in functions, Categorizing standard types, Unsupported types. Numbers: Integers, Double precision floating point numbers, Complex numbers, Operators, Built-in and factory functions, Other numeric types. Sequences: strings, lists, and tuples: Sequences, Strings, Strings and operators, String-only operators, Built-in functions, String built-in methods, Special features of strings, Unicode, Summary of string highlights, Lists, Operators, Built-in functions, List type built-in methods, Special features of lists, Tuples, Tuple operators and built-in functions, Tuples special features, Copying Python objects and shallow and deep copies. Mapping and set types: Mapping Type: dictionaries and operators, Mapping type built-in and factory functions, Mapping type built-in methods, Dictionary keys, Set types, Set type operators, Built-in functions, Set type built-in methods. Conditionals and loops: If, else and elif statements, Conditional expressions, while, for, break, continue and pass statements, else statement . . . take two, Iterators and iter(), List comprehensions, Generator expressions. Files and input/output: File objects, File built-in functions [open() and file()], File built-in methods and attributes, Standard files, Command-line arguments, File system, File execution, Persistent storage modules. Errors and exceptions: What are exceptions? Detecting and handling exceptions, Context management, Exceptions as strings, Raising exceptions, Assertions, Standard exceptions, Creating Exceptions, Why exceptions, Exceptions and the sys module. Functions: Calling, creating and passing functions, formal arguments, variable-length arguments, functional programming, Variable scope, recursion, generators. Modules: Modules and files, Namespaces, Importing modules, Module import features, Module built-in functions, Packages, Other features of modules. Object-Oriented Programming (OOP): Classes, Class attributes, Instances, Instance attributes, Binding and method invocation, Static methods and class methods, Composition, Sub-classing and derivation, Inheritance, Built-in functions for classes, and other objects, Customizing classes with special methods, Privacy, Delegation, Advanced features of new-style classes (Python 2.2+), Related modules and documentation. Execution environment: Callable and code Objects, Executable object statements and built-in functions, Executing other programs. 'Restricted' and 'Terminating' execution, operating system interface. Regular expressions: Special symbols and characters, REs and Python, Regular expressions example. Network programming: Sockets: communication endpoints, Network programming in Python, SocketServer module, Twisted framework introduction. Internet client programming: What are internet clients? Transferring files, Network news, E-mail. Multithreaded Programming: Threads and processes Python, threads, and the global interpreter lock, The thread and threading Modules. GUI programming: Tkinter and Python programming, Tkinter Examples, Brief tour of other GUIs. Web programming: Web surfing with Python: creating simple web clients, Advanced Web clients, CGI: helping web servers process client data, Building CGI applications, Using Unicode with CGI, Advanced CGI, Web (HTTP) Servers. Database programming: Python database application programmer's interface (DB-API), ORMs. Miscellaneous Extending Python by writing extensions, Web Services, programming MS Office with Win32 COM, Python and Java programming with Jython.

Complete Python programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX Virtualization and High Availability course description This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. UNIX Virtualization and High Availability course details Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days UNIX Virtualization and High Availability course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

Linux virtualization and HA training course description The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. Linux virtualization and HA training course details Who will benefit: Linux professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days Linux virtualization and HA training course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

Total H.248 for Engineers

5.0(3)

By Systems & Network Training

Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.

Total H.248 for Engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Definitive Nagios for engineers

5.0(1)

By Systems & Network Training

Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging

Definitive Nagios for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

SAFe for Teams: In-House Training

By IIL Europe Ltd

SAFe® for Teams: In-House Training Build the skills needed to become a high-performing team member of an Agile Release Train (ART) and learn how to collaborate effectively with other teams by becoming a SAFe® 5 Practitioner (SP). During this course, you will gain an in-depth understanding of the ART, how it delivers value, and what you can do to effectively perform the role using Scrum, Kanban, and Extreme Programming (XP). You will also learn how to write stories and break down features, plan and execute iterations, and plan Program Increments. Finally, you'll learn about the continuous delivery pipeline and DevOps culture, how to effectively integrate with other teams in the program, and what it takes to continuously improve the train. What you will Learn To perform the role of a SAFe® Practitioner, you should be able to: Apply SAFe® to scale Lean and Agile development in their enterprise Know their team and its role on the Agile Release Train Know all other teams on the train, their roles, and the dependencies between the teams Plan Iterations Execute Iterations and demonstrate value Plan Program Increments Integrate and work with other teams on the train Introducing the Scaled Agile Framework® (SAFe®) Building an Agile Team Planning the Iteration Executing the Iteration Executing the Program Increment Practicing SAFe®

SAFe for Teams: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,795