• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

44286 RES courses

29th September Rebeka Finch #Agent121. Looking for: NA, ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION, NEW ADULT Rebeka Finch is a Junior Agent at the Darley Anderson Literary Agency. Alongside assisting Darley on his list of authors, Rebeka is building her own list of romance and romantasy authors, specifically for the BookTok hungry new adult/20+ markets. She is on the hunt for messy, cheesy, heartbreaking, relatable, characters and stories with romance at the very heart of the narrative. For those writing romantasy, Rebeka is looking for books that strike the perfect balance of romance, pace, action and world-building, with series potential. Importantly, she looks for strong, diverse, brave and relatable characters in these settings. People that feel like both a friend, a champion and an ally. Rebeka would like you to submit a covering letter, 1 -2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Rebeka is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 22nd September 2025

29th September Rebeka Finch #Agent121. Looking for: NA, ADULT FICTION
Delivered Online + more
£72

Definitive Microsoft Lync for engineers

5.0(3)

By Systems & Network Training

Microsoft Lync training course description This course teaches IT staff how to plan, design, deploy, configure, and administer a Microsoft Lync Server solution. The course emphasizes Lync Server Enterprise Unified Communications features focussing particularly on coexisting with and migrating from legacy communication services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat. This course helps prepare for Exam 70-336. What will you learn Describe the Lync Server architecture. Install and deploy Lync Server. Use Lync Server management interfaces. Deploy and manage clients. Manage and administer dial-in conferencing. Design audio and video for web conferencing. Plan for instant message and presence Federation. Deploy and configure persistent chat in Lync. Configure archiving and monitoring services. Troubleshoot Lync Server. Describe the required daily, weekly, and monthly maintenance tasks. Use SIP commands and analyze SIP logs. Configure high availability features in Lync. Design load balancing in Lync Server. Backup and restore Lync Server data. Microsoft Lync training course details Who will benefit: Technical staff working with Microsoft Lync. Prerequisites: Supporting Windows 2008 or 2012. Duration 5 days Microsoft Lync training course contents Microsoft Lync Server architecture Lync Server architecture, Lync core capabilities, Lync design process, assessing infrastructure requirements and updating the design, planning for all Microsoft solutions framework phases. Designing a Lync Server topology Infrastructure requirements for Lync Server, using the planning tool, using topology builder, server infrastructure, documentation. Hands on Environment preparation and Lync Server pools. Users and rights in Microsoft Lync Server Managing Lync Server, role based access control. Hands on Using the management shell, configuring role-based access control. Client/device deployment and management Deploy and manage clients, prepare for device deployment, IP phones. Hands on Clients. Conferencing in Lync Server Introduction to conferencing in Lync Server, designing for audio\video and web conferencing, dial-in conferencing in Lync Server, managing and administering conferencing. Hands on Conferencing in Microsoft Lync. Designing and deploying external access Conferencing and external capabilities of Lync Server, planning for IM and presence federation, designing edge services. Hands on Deploying Edge Server and Configuring Remote Access, Validating the Edge Server. Deploying Lync Server persistent chat Overview of persistent chat architecture in Lync Server, designing persistent chat, deploying and persistent chat. Hands on persistent chat server. Monitoring and archiving The archiving service, the monitoring service, configuring archiving and monitoring. Hands on Archiving and monitoring in Lync Server. Administration and maintenance of Lync Lync Server troubleshooting tools, Lync Server operational tasks, Lync Server troubleshooting techniques. Hands on Lync administration tools, centralized logging service, analysing Lync Server logs and traces. High Availability in Lync Server High availability in Lync Server, configuring high availability in Lync Server, planning for load balancing, designing load balancing. Hands on Configuring database mirroring, experiencing a scheduled SQL Server outage, experiencing an unscheduled SQL Server outage. Disaster recovery in Lync Server Disaster recovery in Lync Server, tools for backing up and restoring Lync Server, critical Lync Server data to back up and restore, critical data to export and import, designing branch site resiliency. Hands on Configure pool pairing, experiencing a pool failure or outage. Planning a migration to Lync Server Coexistence and migration, migration steps, planning for clients and devices. Designing a client migration and device migration strategy. Hands on Creating a migration plan, documenting the migration phases.

Definitive Microsoft Lync for engineers
Delivered in Internationally or OnlineFlexible Dates
£4,997

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

MEF Carrier Ethernet 2.0 Certification

5.0(3)

By Systems & Network Training

MEF Carrier Ethernet training course description The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. What will you learn Discuss and understand key Carrier Ethernet Concepts. Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. Carry out informed discussions using industry Carrier Ethernet 'vocabulary. Pass the MEF CECP 2.0 professional accreditation exam. MEF Carrier Ethernet training course details Who will benefit: Anyone working with Carrier Ethernet Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. Duration 5 days MEF Carrier Ethernet training course contents Section One: Introduction to Carrier Ethernet Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. Section Two: Carrier Ethernet Concepts in depth Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle.Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. LOAMs: Link discovery, link monitoring, etc. Terminology and Concepts: MEG levels, MIPs. Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies:Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services

MEF Carrier Ethernet 2.0 Certification
Delivered in Internationally or OnlineFlexible Dates
£4,997

Facilitating excellent RSE sessions with people with learning disabilities

By Claire Lightley

A fabulous four day (3 days face to face and one day virtually) facilitation course for anyone wanting to teach or support people with learning disabilities with sex and relationships. A course participant from September 2022 said: “I wanted to thank you for the training last week. It was enjoyable and invaluable. It's been a while since I funded training myself and the last time I had, I was concerned as it wasn't particularly fulfilling but this was a completely different experience. Thanks to both of you.” Aim: To support participants to develop their current knowledge, skills and confidence to plan, deliver and evaluate relationships and sex education (RSE) sessions to groups and individuals with learning disabilities  Learning Outcomes: By the end of the course, participants will have:  • considered their work environment in relation to delivering RSE  • identified how to assess the relationships and sex needs of the group or individual with learning disabilities  • created an inclusive, factually correct, interactive RSE session for a group or an individual with learning disabilities  • used a range of resources and exercises to design their session taking into account different learning styles  • practised their session with the training participants  • delivered a session to a group of their choice and returned to discuss this session with other participants  This course is appropriate for teachers, care workers, clinical staff, social workers, SALTs, OTs, anyone working with people with learning disabilities. 

Facilitating excellent RSE sessions with people with learning disabilities
Delivered In-Person in London
£599

Food Allergen Awareness (Retail And Manufacturing)

5.0(50)

By Pochat Training

Qualsafe Food Allergen Awareness (RQF) Half day course This course gives learners the knowledge and understanding of food allergens and foods that commonly cause intolerances Teaches how to minimise the risk of cross-contamination from allergenic ingredients Benefits of this course: This qualification is aimed at food handlers and other staff involved in food preparation and services It provides knowledge and understanding of food allergens and foods that commonly cause intolerances Many people are allergic to foods, or have a food intolerance There is a duty in law for food handlers to ensure these people do not come to harm, either by going into anaphylactic shock and their potential death, or by making them feel really ill for a long period after consuming the food. Course Contents: The characteristics and consequences of food allergies and intolerances How to identify and control contamination from allergenic ingredients Ways to accurate communicate of allergen information to consumers Accredited, Ofqual regulated qualification: This Food Allergen Awareness training course is a nationally recognised, Ofqual regulated qualifications accredited by Qualsafe Awards. This means that you can be rest assured that your Food Allergen Awareness Certificate provides information for best practice to make a real difference to the lives of people who suffer from food allergies or intolerances. It also helps to stay on the right side of the law! The Ofqual Register number for this course is 610/0114/8 Classroom £95.00 pp Enquire about this course Half day course This course gives learners the knowledge and understanding of food allergens and food intolerances Teaches how to minimise the risk of cross-contamination from allergenic ingredients Enquire about this courseCourse ContentsUpcoming Dates Face to Face / Classroom Courses Would you like this course? Contact us and we'll set a date. We also run short, CPD Accredited training sessions in Food Allergens and Intolerances. Enquire about this courseCourse Contents Benefits of this course: This qualification is aimed at those who are working in, or preparing to work in a food handling, food retail or food manufacturing role It provides knowledge and understanding of food allergens and intolerances Many people are allergic to foods, or have a food intolerance There is a duty in law for food handlers to ensure these people do not come to harm, either by going into anaphylactic shock and their potential death, or by making them feel really ill for a long period after consuming the food. This is an Ofqual regulated qualification, showing your due diligence and care for your customers Enquire about this course Course Contents The characteristics of food allergens, food intolerance and coeliac disease The importance of, and procedures for identifying and controlling food allergen risks How to provide accurate food allergen information Enquire about this course Our Reviews Facebook 5.0 Rating READ FACEBOOK REVIEWS "Informative and very enjoyable!" Google Reviews 5.0 Rating READ GOOGLE REVIEWS Accredited, Ofqual regulated qualification This Food Allergen Awareness training course is a nationally recognised, Ofqual regulated qualifications accredited by Qualsafe Awards. This means that you can be rest assured that your Food Allergen Awareness Certificate provides information for best practice to make a real difference to the lives of people who suffer from food allergies or intolerances. It also helps to stay on the right side of the law! The Ofqual Register number for this course is 610/0114/8

Food Allergen Awareness (Retail And Manufacturing)
Delivered in Chesterfield or Online + more
£85

About this Virtual Instructor Led Training (VILT)  The Advanced Reservoir Engineering VILT course will address modern practical aspects of reservoir engineering during 5 half-days packed with lectures, virtual exercises, discussions and literature reviews. The participants' understanding of fundamental concepts and modern practical reservoir engineering methods will be deepened and a wide range of topics will be addressed. Topics covered The VILT course will emphasise reservoir engineering applications and include topics such as: Rock properties of clastic and carbonate reservoirs Reservoir characterisation Reservoir fluid behaviour Identification of main production mechanisms Design and analysis of well tests Production forecasting Application of Decline Curve Analysis in mature fields Detailed modeling of wells and reservoirs Water flooding Application of EOR methods Reserves and resource estimation Reservoir simulation approaches, model construction and well, aquifer and fluid modelling Development planning Uncertainty handling and scenario methods Depending on the background and requirements of the participants, some topics may be given more emphasis.   Training Objectives In this VILT course, reservoir engineering methods will be addressed which are of use in the daily reservoir engineering practice. The focus will be on practical applicability. Use is made of practical and actual reservoir engineering problems and examples to illustrate relevant subjects. By attending this VILT course, participants will have a deeper knowledge of modern reservoir engineering practices for reservoir development and production, including the construction and use of reservoir models. Target Audience The VILT course is intended for experienced reservoir engineers with prior technical or engineering exposure to production activities. Petroleum engineers and geoscientists who require more than general knowledge of reservoir engineering will also find this course useful. Participants are invited but not obliged to bring a short presentation (max of 15 minutes) on a practical problem they encountered in their work. This will then be explained and discussed in the VILT class. A short test or quiz will be held at the end the VILT course. Training Methods This VILT course will be delivered online over 5 half-days. There will be 2 blocks of two hours per day, including lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be required. Two breaks of 10 minutes will be provided each day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your course leader is an independent Reservoir Engineering Consultant. He provides project consultancy, quality assurance and reservoir engineering training for major oil companies, governments, engineering firms and other global customers. Before he retired from Shell in 2012, he held positions as Senior Reserves Consultant for the Middle East and Reservoir Engineering Discipline Lead. He is a petroleum engineering professional, with global experience, mostly in Shell companies and joint ventures (NAM, SSB, SCL, PDO, SKDBV). He has been involved in reserves and resource management, has extensive reservoir modelling and reservoir simulation expertise, and wide experience in the design and delivery of training programmes for employee development. PROFESSIONAL EXPERIENCE 2012 - 2016 Independent Reservoir Engineering Consultant Project consultancy, quality assurance and reservoir engineering training for major oil companies, governments, engineering firms and other global customers. Delivering specialised and general Reservoir Engineering courses to a multitude of international companies. 2008 - 2012 Shell International E&P, the Hague, the Netherlands Senior Reserves Consultant for the Middle East Region Assurance of SEC and SPE compliance of reserves and resources in Shell Middle East region. Contributor to the 2012 SPE guidelines on reserves and resources assessment. 2006 - 2008 Shell E&P Technology Solutions, Rijswijk, the Netherlands Reservoir Engineering Discipline Lead Responsible for QA/QC of Reservoir Engineering in global E&P projects as well as for staff development. (over 60 international Reservoir Engineers) 2001 - 2005 Centre for Carbonate Studies, SQU, Oman / Shell International E&P Technology Applications and Research /Shell Representative Office Oman Petroleum Engineering Manager PE manager in the Carbonate Research centre, at Sultan Qaboos University in Oman. Industrial research projects and support to teaching on recovery aspects of carbonate reservoir development. Design and delivery of industrial courses on carbonate reservoirs 1997- 2000 Shell International E&P, Rijswijk, the Netherlands Principal Reservoir engineer. Acting Shell Group Reserves Co-ordinator in 1997-1998. Facilitation of workshops with government shareholders, including discussions on sensitive reserves issues (BSP Petroleum Unit Brunei, PDO Oman, SPDC government Nigeria). Co-ordination of the NOV subsurface team in Shell Kazakhstan Development BV in 2000. Leading role in Shell Gamechanger project on natural gas hydrates. 1992- 1996 Shell Training Centre, Noordwijkerhout, the Netherlands Reservoir Engineering Programme Training Director Directed Shell Group Reservoir Engineering Training. Introduced advanced PE training events, QA/QC and learning transfer measures, Design and delivery of reservoir engineering and multidiscipline courses to Shell staff from a wide range of nationalities. 1985- 1992 Shell International, SIPM, the Hague, The Netherlands Senior Reservoir Engineer Full field reservoir simulation projects supporting Field Development Plans, operational strategies and unitisation negotiations for Shell Group Operating Companies in the United Kingdom, New Zealand and Egypt. Major contributor to the Shell internal Gas Field Planning Tool development. 1984- 1985 Geological Survey of the Netherlands (RGD), Ministry of Economic Affairs Reservoir Engineering Section Head Responsible for Petroleum Engineering advice on oil and gas licences to the Ministry of Economic Affairs. First-hand experience with a government view on resource management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Advanced Reservoir Engineering
Delivered in Internationally or OnlineFlexible Dates
£1,536 to £2,899

About this Training Course This 5 full-day course has been designed to develop skills in understanding the geometry and petrophysical characteristics of carbonate reservoirs. Depositional fabric, grain type and size and subsequent diagenetic modifications are the major controls on carbonate reservoir behaviour. The complex inter-relationship of the depositional and burial history can be unravelled to allow prediction of reservoir facies and reconstruction of three-dimensional reservoir models. This course will demonstrate the value of the reservoir model in volumetric assessment and development of carbonate reservoirs. *Previous knowledge of carbonate sedimentology is not required. Course Content in Summary: Carbonate reservoirs: Basic principles; depositional concepts; grain types; textures and fabrics; environmental reconstruction. The reservoir model - depositional and diagenetic characteristics: Sabkha/tidal flat; lagoon; shelf; reef (rudist and coral/algal); barrier/shoal; slope and redeposited; aeolian and lacustrine; karst plays. Carbonate diagenesis: Primary and secondary porosity; compaction; pressure solution; cementation; dolomitisation; porosity generation and destruction; fractures. Carbonate sequence stratigraphy Log response in carbonate rocks: Gamma; sonic; neutron; density; FMS. Reservoir assessment: Fracture reservoirs; reservoir modelling; volumetric assessment in correlation and mapping; effects of capillary pressure; interface with engineering. Training Objectives By attending this course, participants will be able to: Understand carbonate depositional systems and controls. Recognise and model controls on reservoir quality and pore systems, including diagenesis and fracturing. Understand and apply carbonate seismic stratigraphy and sequence stratigraphy. Interpret log responses. Target Audience This course is intended for petroleum geologists, explorationists, petrophysicists, geophysicists and engineers involved with exploration of carbonate plays and development of carbonate reservoirs. Trainer Your expert course leader is a Director and Senior Consultant Geologist who has worked on various carbonate consultancy projects, conducted detailed sedimentological, sequence stratigraphic and diagenetic technical studies and delivered training programmes. He was formerly Managing Director of Robertson UK Limited and was responsible for the integration between different disciplines, recognition, and encouragement of technical innovation and research and development programmes across all oil and gas divisions in the company. He was also responsible for all aspects of the performance of the main Geological, Geophysical and Reservoir Engineering Services in the company. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Carbonate Reservoir Geology
Delivered in Internationally or OnlineFlexible Dates
£2,493 to £2,899

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997