• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

29816 PLA courses

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

RÉSUMÉ WRITING, NETWORKING, & INTERVIEWING WORKSHOP

5.0(4)

By Improving Communications Uk

PARTICIPANTS WILL ENGAGE IN A TRAINING SESSION TO IMPROVE AND REFINE THEIR RÉSUMÉS. OPPORTUNITIES TO ENGAGE IN ONE-ON-ONE RÉSUMÉ BUILDING & REVIEW SESSIONS CAN BE OFFERED AS WELL. It’s time to move on—or maybe you’ve been “in transition” for too long. Either way, you need some input so that you know what others see when they look at your résumé, and what they hear when they interview you. Participants will engage in a training session to improve and refine their résumés. Opportunities to engage in one-on-one Résumé Building & Review sessions can be offered as well. Part I Data Collection and Organization – assessing work/activities and IMPACT (results) Success Story Format (Situation, Action, Results) Writing With Impact – how to tie actions to results Choosing The Right Words – transferable skills and powerful words Sales 101 – How will these skills benefit the hiring person’s organization? Part II UB4I Writing (“YOU”/ “YOUR,” not “I,” “me,” “my”) Reference list Principles of networking Cover Letter and Résumé Formats – margins, font, type size, small caps, etc. Role Play – Mock Interviews Participants will be able to: Create a complete and correct résumé, a marketing device to attract attention, generate interest, describe accomplishments, and invite contact. Discover, correct, and improve self-marketing messages, leading to a systematic assessment of specific work-related skills. Examine transferable skills and increase personal alignment with prospective organizational mission and goals. Online Format—Résumé Writing, Networking, & Interviewing Workshop 4-hour interactive virtual class. Register for this class and you will be sent ONLINE login instructions prior to the class date. After a two-day seminar, our attendees remained in their seats wanting more from Dr Atkins. His direct, yet challenging approach to presenting topics seemed to mesmerize the participants. Many very lively discussions were part of our workshop’s context. Personally, I am very interested in re-booking this type of experience every year for new leaders to undergo! Michael J. Whitlock, Director of Fay Corey Union & ConferencesSUNY Cortland

RÉSUMÉ WRITING, NETWORKING, & INTERVIEWING WORKSHOP
Delivered Online + more
£316

Advanced Junos Service Provider Routing

5.0(3)

By Systems & Network Training

Advanced Junos SP Routing course description This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. What will you learn Describe and configure OSPF area types and operations. Configure and monitor IS-IS. Describe basic BGP operation. Explain the causes for route instability. Describe how to troubleshoot routing policy. Explain the default behaviour of damping on links. Advanced Junos SP Routing course details Who will benefit: Network staff working with Junos at layer 3. Prerequisites: Junos Intermediate Routing Duration 5 days Advanced Junos SP Routing course contents OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting

Advanced Junos Service Provider Routing
Delivered in Internationally or OnlineFlexible Dates
£4,997

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Computer System Validation Training Course (ONLINE). Extend Your Role to CSV Projects. Get Certified and Become a CSV Professional

By Getreskilled (UK)

Has the Computer System Validation Engineer left and you’ve been handed their responsibilities? Do the thoughts of your next audit fill you with dread? CSV can be frustrating but this program will show you how to manage electronic data in a regulated manufacturing/laboratory/clinical environment using the GAMP framework and ensure compliance with FDA’s 21 CFR Part 11, EU Annex 11 or other regulatory guidelines.

Computer System Validation Training Course (ONLINE). Extend Your Role to CSV Projects. Get Certified and Become a CSV Professional
Delivered Online On Demand
£699 to £9,996

PL-100T00 Microsoft Power Platform App Maker

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The App Maker builds solutions to simplify, automate, and transform tasks and processes for themselves and their team where they have deep expertise in the solution business domain. They have basic data modeling, user experience design, requirements analysis, and process analysis skills. The App Maker creates and enforces business processes, structures digital collection of information, improves efficiency of repeatable tasks, and automates business processes. The App Maker uses the Maker tools of Power Platform to solve business problems. They may use advanced features of Microsoft apps and third-party productivity tools. The App Maker is aware of the capabilities and limitations of available tools and understands how to apply them. The App Maker is self-directed, and solution focused. They may not have formal IT training but are comfortable using technology to solve business problems with a personal growth mindset. They understand the operational need and have a vision of the desired outcome. They approach problems with phased and iterative strategies. This course will teach you how to build apps with low-code techniques to simplify, automate, and transform business tasks and processes using Microsoft Power Platform. This course contains a 1-day Applied Workshop. This workshop will allow you to practice your App Maker skills by creating an end-to-end solution to solve a problem for a fictitious company. The solution will include a Microsoft Dataverse database, Power Apps canvas app, and Power Automate flows. 1 - Get started with Microsoft Power Platform for app makers Identify components Create apps Get started with Microsoft Dataverse Work with Copilot in Microsoft Power Platform 2 - Create tables in Dataverse Table characteristics Table relationships Dataverse logic and security Dataverse auditing Dual-write vs. virtual tables 3 - Create and manage columns within a table in Dataverse Define columns in Microsoft Dataverse Column types in Microsoft Dataverse Add a column to a table Primary name column Restrictions that apply to columns in a table Create an auto numbering column Create an alternate key 4 - Load/export data and create data views in Dataverse View data in a table Create or edit views of data in a table Dataverse data import options Load data into a table Dataverse data export options Export Add, update, or delete data in a table by using Excel Import data using Power Query 5 - Export data from Dataverse and use Microsoft Excel to edit records Export data to Excel Edit and update data in Excel 6 - Get started with Microsoft Dataverse for Teams Dataverse for Teams vs Dataverse Provision your first Dataverse environment Create your first table to store data 7 - Build your first app with Power Apps and Dataverse for Teams Create your first app with the hero template Customize your app with Power Apps Studio Publish your app Install template apps 8 - Build your first workflow with Power Automate and Dataverse for Teams Types of workflows that Power Automate can build in Dataverse Schedule a flow 9 - Create reports with Power BI and Dataverse for Teams Connect to and transform Dataverse for Teams data from Power BI Create a Power BI report Publish the report Share the data 10 - Get started building with Power BI Use Power BI Building blocks of Power BI Tour and use the Power BI service 11 - Explore what Power BI can do for you What can I do with the Power BI service as a consumer? View content in the Power BI service Collaborate and share in Power BI Find and view dashboards and reports 12 - Create and manage workspaces in Power BI Distribute a report or dashboard Monitor usage and performance Recommend a development life cycle strategy Troubleshoot data by viewing its lineage Configure data protection 13 - Manage semantic models in Power BI Use a Power BI gateway to connect to on-premises data sources Configure a semantic model scheduled refresh Configure incremental refresh settings Manage and promote semantic models Troubleshoot service connectivity Boost performance with query caching (Premium) 14 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 15 - Implement row-level security Configure row-level security with the static method Configure row-level security with the dynamic method 16 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 17 - Secure, publish, and share data in Power BI Share and use reports in Power BI Row-level security Publish a report to a Power BI workspace Share reports and user experience Protect data in Power BI Data refresh and alerts 18 - Embed Power BI content Embed Power BI reports Embed other Power BI content types Optimize the embedding experience 19 - How to build your first model-driven app with Dataverse Model-driven apps, powered by Microsoft Dataverse Explore sample apps 20 - Get started with model-driven apps in Power Apps Introducing model-driven apps Components of model-driven apps Design model-driven apps Incorporate business process flows 21 - Configure forms, charts, and dashboards in model-driven apps Forms overview Form elements Configure multiple forms Use specialized form components Configure views overview Configure grids Create and edit views Configure charts overview Dashboards overview Use interactive streams and tiles 22 - Manage Dynamics 365 model-driven app settings and security Configure role-based security Manage teams and business units Explore settings and customizations 23 - Use specialized components in a model-driven form Create business process flows Embed a canvas app in a model-driven form Add a timeline in a model-driven form Create a report in a model-driven form 24 - Get started with Power Apps canvas apps Start Power Apps Power Apps data sources Use Power Apps with Power Automate and Power BI Designing a Power Apps app 25 - Customize a canvas app in Power Apps Improve your app by making basic customizations Explore controls and screens in canvas apps 26 - How to build the User Interface in a canvas app in Power Apps Use themes to quickly change the appearance of your app Brand a control Icons Images Personalization Build for phones or tablets 27 - Navigation in a canvas app in Power Apps Understanding navigation The Navigate and Back functions More ways to use the Navigate function 28 - Manage apps in Power Apps Power Apps review 29 - Build a mobile-optimized app from Power Apps Learn about mobile-optimized apps Identify components to make a canvas app mobile-optimized Create a mobile-optimized app that uses responsive designs Identify performance considerations for a mobile-optimized canvas app 30 - Use and understand Controls in a canvas app in Power Apps Core properties of controls Entering and displaying data with text controls Additional controls for enhancing your app's usability Media Modern controls Work with component libraries 31 - Create formulas to change properties in a Power Apps canvas app Formulas overview Use a formula to modify the format of controls Use formulas to perform calculations Use a control to modify the property of other controls Conditional formatting Functions for validating data 32 - Use imperative development techniques for canvas apps in Power Apps Imperative versus declarative development The three types of variables in Power Apps Global variables Contextual variables Collections Additional variable concepts 33 - Manage apps in Power Apps Power Apps review 34 - Create formulas to change properties in a Power Apps canvas app Formulas overview Use a formula to modify the format of controls Use formulas to perform calculations Use a control to modify the property of other controls Conditional formatting Functions for validating data 35 - Create formulas to change behaviors in a Power Apps canvas app Formulas and functionality Understanding true and false Understanding control behaviors and actions Performing multiple actions in a formula Control the display mode through a formula Use controls and functions to create a dynamic formula 36 - Author a basic formula that uses tables and records in a Power Apps canvas app Records and tables Using the Table function Store a table Filter your table Use the lookup function to return a record Additional table functions 37 - Build a canvas app for a real estate solution with Copilot in Power Apps 38 - Get started with Power Automate Introducing Power Automate Create your first flow Troubleshoot flows 39 - Build approval flows with Power Automate Provide solutions to real-world scenarios. 40 - Build flows to manage user information 41 - Power Automate's deep integration across multiple data sources 42 - Use the Admin center to manage environments and data policies in Power Automate Administer flows Export and import flows Learn how to distribute button flows 43 - Use AI Builder in Power Automate AI Builder in Power Automate saves time Advanced usage of AI Builder in Power Automate 44 - Optimize your business process with process advisor Get familiar with process advisor Create your first recording Edit recordings and group actions Analyze recordings and interpret results Automation recommendations 45 - Optimize your business process with process advisor Get familiar with process advisor Create your first recording Edit recordings and group actions Analyze recordings and interpret results Automation recommendations 46 - Build flows for a real estate solution using Copilot in Power Automate When to use Copilot in Power Automate 47 - Use Dataverse triggers and actions in Power Automate Dataverse triggers Query data Create, update, delete, and relate actions 48 - Create tables in Dataverse Table characteristics Table relationships Dataverse logic and security Dataverse auditing Dual-write vs. virtual tables 49 - Create and manage columns within a table in Dataverse Define columns in Microsoft Dataverse Column types in Microsoft Dataverse Add a column to a table Primary name column Restrictions that apply to columns in a table Create an auto numbering column Create an alternate key 50 - Get started with Power Apps canvas apps Start Power Apps Power Apps data sources Use Power Apps with Power Automate and Power BI Designing a Power Apps app 51 - How to build the User Interface in a canvas app in Power Apps Use themes to quickly change the appearance of your app Brand a control Icons Images Personalization Build for phones or tablets 52 - Get started with Power Automate Introducing Power Automate Create your first flow Troubleshoot flows 53 - Challenge Project - Build a booking requests app with Power Apps and Power Automate Prepare

PL-100T00 Microsoft Power Platform App Maker
Delivered OnlineFlexible Dates
£2,385

Venepuncture & Cannulation

4.8(50)

By EF Training & Consultancy Ltd

Venepuncture and cannulation course Venepuncture training for healthcare professionals Cannulation skills development Intravenous access techniques Blood sample collection training Infection control in venepuncture Hands-on venepuncture practice Cannula insertion training Nursing revalidation hours CPD accredited course Healthcare professional skills development Venepuncture and cannulation procedures Venepuncture certification program Intravenous catheter insertion Best practices in venepuncture Patient assessment for venepuncture Troubleshooting venepuncture complications Venepuncture and cannulation simulation Real-life venepuncture scenarios Healthcare career advancement with venepuncture skills

Venepuncture & Cannulation
Delivered In-Person in London
£150

Thermal Power Plant Performance Testing

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT)  This 5 half-day course provides a detailed description of all performance testing methods for all thermal power plant equipment including boilers, turbines, condensers, pumps, fans, deaerators, and feedwater heaters. The methodology, and code requirements for the performance tests for all thermal power plant equipment will be explained in detail. The preparatory work and instrumentation required for each test will also be covered during the course. The efficiency calculations for all equipment used in circulating fluidized bed (CFB) boiler and pulverized coal boiler power plants will be explained, including all processes, operational and maintenance activities, capital projects, technical options, potential initiatives and incentives to implement upgrades / repairs for increasing the power plant equipment efficiency. The course will also provide a thorough explanation of CFB and pulverized coal boiler technology including hydrodynamics, combustion, emissions, design considerations, gas-solid separators, design of CFB and pulverized coal boiler components, management of solid residues, materials, stoichiometric calculations, and model for sulfur capture. The operation, maintenance, testing, and refurbishment options of all the equipment and systems used in CFB and pulverized coal power plants will be presented, including boilers, superheaters, reheaters, turbines, condensers, feedwater heaters, deaerators, pumps, compressors, fans, electric generators, instrumentation and control systems, and governing systems, etc. The participants will get equipped on all factors which affect the CFB and pulverized coal boiler power plant efficiency and emissions, all methods used to calculate the heat rate of CFB and pulverized coal power plants as well as all areas in CFB and pulverized coal boiler power plants where efficiency loss can occur. Updated information on the methods used to improve CFB boiler and pulverized coal boiler power plant heat rate will also be provided. It includes: Optimizing the combustion process and sootblowing Controlling the steam temperature Recovering moisture from boiler flue gas Performing steam turbine maintenance Lowering condenser back pressure Pre-drying high moisture coal and reducing stack temperature Training Objectives Thermal Plant Performance Testing: Gain a thorough understanding of all the performance testing methods for all thermal power plant equipment including boilers, turbines, condensers, pumps, fans, daerators, and feedwater heaters Performance Test Methodology and Code Requirements: Understand the methodology, and code requirements for performance tests of all thermal power plant equipment Performance Test Preparatory Work and Instrumentation: Learn about the preparatory work and instrumentation required for each equipment performance test in a thermal power plant Equipment Efficiency Calculations: Gain a thorough understanding of the efficiency calculations for all the equipment used in circulating fluidized bed (CFB) boilers and pulverized coal boilers power plants Calculating the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Learn all the methods used to calculate the heat rate of CFB and pulverized coal boiler coal power plants Benefits of Lowering the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Understand all the benefits of lowering the heat rate of CFB coal power plants Methods Used to Improve CFB and Pulverized Coal Boiler Power Plants Heat Rate: Gain a thorough understanding of all the methods used to improve the heat rate of CFB and pulverized boiler coal power plants Processes, Operational and Maintenance Activities in CFB and Pulverized Coal Boiler Power Plants: Discover all the processes, operational and maintenance activities used to improve the heat rate of CFB and pulverized coal power plants Capital Projects Used to Improve the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Learn about all the capital projects used to improve the heat rate of CFB and pulverized coal power plants Technical Options for Improving the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Understand all the technical options used to improve the heat rate of CFB and pulverized coal boiler power plants Potential Initiatives and Incentives to Implement Upgrades / Repairs for Improving the Heat Rate of CFB and Pulverized Coal Bed Boiler Power Plants: Discover all the potential initiatives and incentives to implement upgrades / repairs for improving the heat rate of CFB and pulverized coal power plants Factors Affecting CFB and Pulverized Coal Boiler Power Plants Efficiency and Emissions: Learn about all the factors which affect CFB and pulverized coal boiler power plants efficiency and emissions Areas in CFB and Pulverized Coal Power Plants where Efficiency Loss Can Occur: Discover all the areas in CFB and pulverized coal power plants where efficiency loss can occur Optimize the Operation of CFB and Pulverized Coal Power Plant Equipment and Systems to Improve the Plant Heat Rate: Understand all the techniques and methods used to optimize the operation of CFB and pulverized coal power plant equipment and systems to improve the plant heat rate CFB and Pulverized Coal Power Plant Equipment and Systems: Learn about the various types of CFB and pulverized coal power plant equipment and systems including boilers, superheater, reheaters, steam turbines, governing systems, deaerators, feedwater heaters, coal-handling equipment, transformers, generators and auxiliaries Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Training Methods The VILT will be delivered online in 5 sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day, including time for lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be requested. Participants are invited but not obliged to bring a short presentation (10 mins max) on a practical problem they encountered in their work. This will then be explained and discussed during the VILT. A short test or quiz will be held at the end the course. The instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all the delegates gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Trainer Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a soft copy of the following materials written by the instructor: 'POWER GENERATION HANDBOOK' second edition published by McGraw-Hill in 2012 (800 pages) Excerpt of the relevant chapters from the 'POWER PLANT EQUIPMENT OPERATION AND MAINTENANCE GUIDE' published by McGraw-Hill in 2012 (800 pages) THERMAL POWER PLANT PERFORMANCE TESTING MANUAL (includes practical information about all the performance testing methods for all thermal power plant equipment - 400 pages) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Thermal Power Plant Performance Testing
Delivered in Internationally or OnlineFlexible Dates
£1,431 to £2,700

Lean Six Sigma Black Belt Certification Program

By IIL Europe Ltd

Lean Six Sigma Black Belt Certification Program This course is specifically for people wanting to become Lean Six Sigma Black Belts, who are already Lean Six Sigma practitioners. If advanced statistical analysis is needed to identify root causes and optimal process improvements, (Lean) Six Sigma Green Belts typically ask Black Belts or Master Black Belts to conduct these analyses. This course will change that. Green Belts wanting to advance their statistical abilities will have a considerable amount of hands-on practice in techniques such as Statistical Process Control, MSA, Hypothesis Testing, Correlation and Regression, Design of Experiments, and many others. Participants will also work throughout the course on a real-world improvement project from their own business environment. This provides participants with hands-on learning and provides the organization with an immediate ROI once the project is completed. IIL instructors will provide free project coaching throughout the course. What you Will Learn At the end of this program, you will be able to: Use Minitab for advanced data analysis Develop appropriate sampling strategies Analyze differences between samples using Hypothesis Tests Apply Statistical Process Control to differentiate common cause and special cause variation Explain and apply various process capability metrics Conduct Measurement System Analysis and Gage R&R studies for both discrete and continuous data Conduct and analyze simple and multiple regression analysis Plan, execute, and analyze designed experiments Drive sustainable change efforts through leadership, change management, and stakeholder management Successfully incorporate advanced analysis techniques while moving projects through the DMAIC steps Explain the main concepts of Design for Six Sigma including QFD Introduction: DMAIC Review IIL Black Belt Certification Requirements Review Project Selection Review Define Review Measure Review Analyze Review Improve Review Control Introduction: Minitab Tool Introduction to Minitab Minitab basic statistics and graphs Special features Overview of Minitab menus Introduction: Sampling The Central Limit Theorem Confidence Interval of the mean Sample size for continuous data (mean) Confidence Interval for proportions Sample size for discrete data (proportions) Sampling strategies (review) Appendix: CI and sample size for confidence levels other than 95% Hypothesis Testing: Introduction Why use advanced stat tools? What are hypothesis tests? The seven steps of hypothesis tests P value errors and hypothesis tests Hypothesis Testing: Tests for Averages 1 factor ANOVA and ANOM Main Effect Plots, Interaction Plots, and Multi-Vari Charts 2 factor ANOVA and ANOM Hypothesis Testing: Tests for Standard Deviations Testing for equal variance Testing for normality Choosing the right hypothesis test Hypothesis Testing: Chi Square and Other Hypothesis Test Chi-square test for 1 factor ANOM test for 1 factor Chi-square test for 2 factors Exercise hypothesis tests - shipping Non-parametric tests Analysis: Advanced Control Charts Review of Common Cause and Special Cause Variation Review of the Individuals Control Charts How to calculate Control Limits Four additional tests for Special Causes Control Limits after Process Change Discrete Data Control Charts Control Charts for Discrete Proportion Data Control Charts for Discrete Count Data Control Charts for High Volume Processes with Continuous Data Analysis: Non-Normal Data Test for normal distribution Box-Cox Transformation Box-Cox Transformation for Individuals Control Charts Analysis: Time Series Analysis Introduction to Time Series Analysis Decomposition Smoothing: Moving Average Smoothing: EWMA Analysis: Process Capability Process capability Discrete Data: Defect metrics Discrete Data: Yield metrics Process Capability for Continuous Data: Sigma Value Short- and long-term capabilities Cp, Cpk, Pp, Ppk capability indices Analysis: Measurement System Analysis What is Measurement System Analysis? What defines a good measurement system? Gage R&R Studies Attribute / Discrete Gage R&R Continuous Gage R&R Regression Analysis: Simple Correlation Correlation Coefficient Simple linear regression Checking the fit of the Regression Model Leverage and influence analysis Correlation and regression pitfalls Regression Analysis: Multiple Regression Analysis Introduction to Multiple Regression Multicollinearity Multiple Regression vs. Simple Linear Regression Regression Analysis: Multiple Regression Analysis with Discrete Xs Introduction Creating indicator variables Method 1: Going straight to the intercepts Method 2: Testing for differences in intercepts Logistic Regression: Logistic Regression Introduction to Logistic Regression Logistic Regression - Adding a Discrete X Design of Experiments: Introduction Design of Experiment OFAT experimentation Full factorial design Fractional factorial design DOE road map, hints, and suggestions Design of Experiments: Full Factorial Designs Creating 2k Full Factorial designs in Minitab Randomization Replicates and repetitions Analysis of results: Factorial plots Analysis of results: Factorial design Analysis of results: Fits and Residuals Analysis of results: Response Optimizer Analysis of results: Review Design of Experiments: Pragmatic Approaches Designs with no replication Fractional factorial designs Screening Design of Experiment Case Study Repair Time Blocking Closing: Organizational Change Management Organizational change management Assuring project sponsorship Emphasizing shared need for change Mobilizing stakeholder commitment Closing: Project Management for Lean Six Sigma Introduction to project management Project management for Lean Six Sigma The project baseline plan Work Breakdown Structure (WBS) Resource planning Project budget Project risk Project schedule Project executing Project monitoring and controlling and Closing Closing: Design for Lean Six Sigma Introduction to Design for Lean Six Sigma (DMADV) Introduction to Quality Function Deployment (QFD) Summary and Next Steps IIL's Lean Six Sigma Black Belt Certification Program also prepares you to pass the IASSC Certified Black Belt Exam (optional)

Lean Six Sigma Black Belt Certification Program
Delivered In-Person in LondonFlexible Dates
£6,295