• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

183 Risk Assessment courses in Matlock delivered Live Online

NIST Cyber Security Professional (NCSP) Foundation

By Nexus Human

Duration 1 Days 6 CPD hours Overview The purpose of this document is to provide the learning outcomes for the course and the assessment criteria. It also provides an overview of the examination design in terms of the types of questions asked.Starting with Chapter 2, Digital Transformation, the BL 1 & 2 (for Bloom's Taxonomy 1 & 2) provides the number of questions that will appear on the exam. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explain what it means to ?become digital.? Discuss the difference between industrial and digital era enterprises. Explain how cybersecurity supports an organization?s digital transformation. Understanding cyber Risks Explain the cyber risk equation. Identify and explain each component of the cyber risk equation. Describe the basics of a risk assessment. NIST Cybersecurity Framework Fundamentals9 Explain the genesis of the NIST-CSF. List and describe the components of the NIST-CSF. Describe each of the NIST-CSF?s objectives. Core Functions, Categories & Subcategories Understand and explain the a.Core Functions b.Framework Categories c.Informative References. Implementation Tiers & Profiles Understand and explain Implementation Tier terms and their use. Understand and explain each Implementation Tier. Understand and describe the three risk categories Understand and explain Profiles and their use a.Current b.Target Understand and describe the use of Profiles when a.Determining gaps b.Identify & prioritize focus areas Cybersecurity Improvement Understand and explain how an organization can approach the adoption and adaptation of the NIST-CSF Understand and describe how to implement cybersecurity controls using an incremental improvement approach. Understand and describe CIIS as a practice within an organization.

NIST Cyber Security Professional (NCSP) Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

ISO 14001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Managers or consultants involved in Environmental Management, Expert advisors seeking to master the implementation of an Environmental Management System, Individuals responsible for maintaining conformance with EMS requirements , EMS team members Overview Acknowledge the correlation between ISO 14001, ISO 14040 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of an EMS Learn how to interpret the ISO 14001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an EMS Acquire the expertise to advise an organization in implementing Environmental Management System best practices ISO 14001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Environmental Management System (EMS) based on ISO 14001. During this training course, you will also gain a thorough understanding of the best practices of Environmental Management Systems, consequently reducing an organization?s negative environmental impacts and improving its overall performance and efficiency Introduction to ISO 14001 and initiation of an EMS Course objective and structure Standard and regulatory framework Environmental Management System (EMS) Fundamental principles of environmental management Initiating the EMS implementation Understanding the organization and clarifying the environmental objectives Analysis of the existing management system Plan the implementation of the EMS Leadership and approval of the EMS project EMS scope Policies for environmental management Risk assessment Definition of the organizational structure of environmental management Implementation of an EMS Definition of the document management process Design of controls and drafting of specific policies & procedures Communication plan Training and awareness plan Implementation of controls Incident Management Operations Management EMS monitoring, measurement, continuous improvement and preparation for certification audit Monitoring, measurement, analysis and evaluation Internal audit Management review Treatment of problems and non-conformities Continual improvement Preparing for the certification audit Competence and evaluation of implementers Closing the training

ISO 14001 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry

ISO 22301 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in business continuity Expert advisors seeking to master the implementation of the business continuity management system Individuals responsible to maintain conformity with BCMS requirements within an organization Members of the BCMS team Overview Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. Understand the operation of the business continuity management system and its processes based on ISO 22301. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business. In light of this, proper planning is essential to mitigating risks, avoiding consequences, coping with the negative effects of disasters and incidents, but at the same time, continuing your daily operations so that customer needs do not remain unfulfilled.This training course will prepare its participants to implement a business continuity management system (BCMS) in compliance with the requirements of ISO 22301. Attending this training course allows you to gain a comprehensive understanding of the best practices of the business continuity management system and to be able to establish a framework that allows the organization to continue operating efficiently during disruptive events Introduction to ISO 22301 and initiation of a BCMS Training course objectives and structure Standards and regulatory frameworks Business continuity management system (BCMS) Fundamental business continuity concepts and principles Initiation of the BCMS implementation Understanding the organization and its context BCMS scope Implementation plan of a BCMS Leadership and commitment Business continuity policy Risks, opportunities, and business continuity objectives Support for the BCMS Business impact analysis Risk assessment Implementation of a BCMS Business continuity strategies and solutions Business continuity plans and procedures Incident response and emergency response Crisis management Exercise programs Monitoring, measurement, analysis, and evaluation Internal audit BCMS monitoring, continual improvement, and preparation for the certification audi Management review Treatment of nonconformities Continual improvement Preparation for the certification audit Closing of the training course

ISO 22301 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Penetration Testing Professional (CPENT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Penetration Testing Professional (CPENT)
Delivered OnlineFlexible Dates
Price on Enquiry

Project management 'masterclasses' (In-House)

By The In House Training Company

Masterclasses? Refreshers? Introductions? It depends what you're looking for and where you want to pitch them, but here are six tried-and-tested highly focused sessions that organisations can take individually or as a series, to help develop their teams' project management capabilities one topic at a time. Objectives for each individual session are set out below, as part of the session outlines. Taken together, as a series, however, these modules are an ideal opportunity to develop your team's levels of project management capability maturity, whether that's by introducing them to the basic principles, refreshing them on best practice, or giving them the opportunity to really drill down into a specific area of challenge in your particular operating environment. Session outlines 1 Stakeholder management Session objectives This session will help participants: Understand why stakeholders matter to projects Be able to identify and engage stakeholders Be able to categorise stakeholders by their significance 1 Key principles What does 'stakeholder' mean - in theory? What does this mean in practice? Why stakeholders matter Consequences of missing stakeholders The stakeholder management process:IdentifyAssessPlanEngage 2 Identifying stakeholders Rapid listing CPIG analysis PESTLE analysis Drawing on the knowledge and experience of others Other ways to identify stakeholders 3 Assessing stakeholders Which stakeholders are significant? Stakeholder radar Power-interest maps Power-attitude maps 4 Planning The adoption curve Dealing with obstacles Who should engage which stakeholder? How should the project's organisation be structured? How will communication happen? 5 Engaging Seven principles of stakeholder engagement 2 Requirements and prioritisation Session objectives This session will help participants: Understand how clarity of requirements contributes to project success Use different techniques for prioritising requirements Agree requirements with stakeholders Manage changes to requirements 1 Understanding and managing stakeholder needs and expectations What are 'requirements'? What is 'requirements management'? Sources of requirements - and the role of stakeholders Are stakeholders sufficiently expert to specify their needs? Do they understand the detail of what they want, or do they need help to tease that out? What do stakeholders want to achieve? Working within constraints Prioritising requirements - three techniques 2 MoSCoW prioritisation 'Must have', should have', 'could have, 'won't have this time' When to use MoSCoW 3 The Kano Model Customer satisfaction - 'attractive' and 'must-be' qualities When to use Kano 4 Value-based prioritisation Understanding risk v value Using risk v value to prioritise features and schedules 5 Agreeing requirements Perfect v 'good enough' Establishing acceptance criteria Requirements traceability Agreeing project scope 6 Changing requirements Why requirements change Why change control matters Impact on projects A formal change control process Paying for change - managing change for different types of project 3 Estimating Session objectives This session will help participants: Understand the different purposes estimates satisfy Be able to use different estimating techniques Understand how to achieve different levels of accuracy 1 Key principles What's an estimate? Informed guesswork What needs to be estimated? Costs, resources, effort, duration Tolerances Precision v accuracy 2 Estimating through the lifecycle Start Plan Do 3 Early estimates Comparative ('analogous') estimating Parametric estimating Using multiple estimating techniques 4 Bottom-up estimating Bottom-up ('analytical') estimating Pros Cons 5 Three-point estimating Three-point ('PERT': Programme Evaluation and Review Technique) estimating Uncertainty and the range of estimates Calculating a weighted average Three-point with bottom-up 4 Scheduling Session objectives This session will help participants: Understand how to create a viable schedule Be able to use different forms of schedule Understand the concept of the critical path 1 Key principles The planning horizon Rolling wave planning Release planning 2 Viable scheduling Creating a viable schedule Define the scope Sequence the work Identify the risks and build in mitigations Identify the resources Estimate the effort and durations Check resource availability Refine until a workable schedule is produced 3 Critical path analysis The critical path Network diagrams Sequence logic Practical application:Network diagram with estimated durationsThe 'forward pass'The 'backward pass'Calculating total floatIdentifying the critical pathCalculating free float Gantt charts 5 Risk and issue management Session objectives This session will help participants: Understand the difference between risks and issues Be able to identify and assess risks Understand ways of mitigating risks Manage issues 1 Key principles Understanding risk Threats and opportunities The risk management processPreparation - proactive risk managementThe process - identify, assess, plan, implementStakeholder communication Roles and responsibilities Risk management strategy The risk register Risk appetite 2 Risk identification Brainstorming Interviews Assumption analysis Checklists 3 Risk assessment and prioritisation Probability, impact and proximity Triggers Qualitative risk assessment Qualitative impact assessment Qualitative probability assessment Probability / impact grid Bubble charts Risk tolerance 4 Planning countermeasures To mitigate or not to mitigate? Categories of risk response Avoid and exploit Reduce and enhance Transfer Share Accept Contingency Secondary risks 5 Issue management What is an issue? Tolerances Issues and tolerances The PRINCE2 view of issues Ownership of issues An issue management process Issue register 6 Budgeting and cost control Session objectives This session will help participants: Understand what to include in a budget - and why Choose - and use - the appropriate estimating technique Align the budget with the schedule Understand how to monitor spend and control costs Trouble-shoot effectively to get projects back within budget Session format Flexible. The session can be tailored to the participants' average level of project management maturity - a 60-minute session (delivered virtually) is an effective introduction. A 90-minute session allows for more in-depth treatment. A half-day session (face-to-face or virtual) gives time for a more challenging workshop, particularly to discuss specific cost control issues with any of the participants' current projects. 1 Where is the money coming from? Can we pay from revenue? Do we need to borrow? How long will the project take to pay back? The lifecycle of the budget Through-life costs Stakeholder involvement 2 Estimating costs Reminder: the relationship between estimates Reminder: possible estimating techniques What do we need to estimate?PeopleEquipmentMaterialsFacilities and operating costsWork package estimateEstimated project costs Estimating agile projects 3 Aligning budget and schedule Scheduling and financial periods Spreading the budget 4 Reserves and agreeing the budget Contingency reserve Management reserve Agreeing the budget 5 Cost control Planned spend over time Actual spend over time Work completed over time Evaluating different scenarios: delivery v spend 6 Trouble-shooting Why are we where we are? What has caused the project to spend at the rate it is? Why is it delivering at the rate it is? What are the root causes? What can we do about it?

Project management 'masterclasses' (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

EC-Council Disaster Recovery Professional (EDRP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for: IT Professionals in the BC/DR or system administration domain, business continuity and disaster recovery consultants, individuals wanting to establish themselves in the field of IT business, continuity and disaster recovery, IT risk managers and consultants, and CISOs and IT directors. Before taking this course, some experience in the IT BC/DR domain is recommended. More info can be found here: https://www.eccouncil.org/wp-content/uploads/2017/05/edrpv3-brochure.pdf Overview EC-Council Disaster Recovery Professional (EDRP) is a comprehensive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. EDRP teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization's critical data in the aftermath of a disaster. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization?s critical data in the aftermath of a disaster. The program is designed to provide much needed step-by-step guidance to attendees and then tests their knowledge through case studies. EDRPv3 addresses gaps in other BC/DR programs by providing helpful templates that are applied to BC/DR efforts in an enterprise. Course Outline Introduction to Disaster Recovery and Business Continuity Business Continuity Management (BCM) Risk Assessment Business Impact Analysis (BIA) Business Continuity Planning (BCP) Disaster Recovery Planning Process Data Backup Strategies Data Recovery Strategies Virtualization-Based Disaster Recovery System Recovery Centralized and Decentralized System Recovery BCP Testing, Maintenance, and Training Additional course details: Nexus Humans EC-Council Disaster Recovery Professional (EDRP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Disaster Recovery Professional (EDRP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Disaster Recovery Professional (EDRP)
Delivered OnlineFlexible Dates
Price on Enquiry

GRC330 SAP Process Control 10.1 - Implementation and Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Implmentation Consultants, Business Users, IT Governance Experts, Compliance Managers Overview Discuss the purpose and business use of Process ControlDescribe key features and related harmonization topicsDescribe risk-based internal controlsConfigure Process Control customizing settings and those shared across GRCCreate and manage master dataDiscuss security and authorization requirementsImplement the Process Control solutionUse risk-managed financial compliance practicesPlan and process surveys and testsSet up and maintain Continuous MonitoringIntegrate and use Process Control with Policy ManagementDiscuss operational complianceAggregate deficienciesUse the harmonized reporting frameworkDescribe the use of custom-defined fields and document search This course offers hands-on configuration and implementation of SAP Process Control 10.1, as well as important concepts you will need to know in order to prepare for implementation and ongoing prevention of process risk. Enterprise Goverance, Riskl, and Compliance (eGRC) Risk-Based Approach to Managing Compliance Initiatives Integrated GRC Approach Governance Governance Overview Governance Using Process Control 10.1 Daily Business Use Harmonization Overview Harmonization Concepts Work Centers Setting Up an Entry Page Technical Landscape Configuration Requirements Customizing Central Tasks Shared Master Data and Reports Workflow Authorization Updates Process Control-Specific Customizing Create & Manage Master Data Master Data Overview Setting Up an Organization Hierarchy Setting Up the Account Group Hierarchy Setting Up the Central Process Hierarchy Setting Up the Indirect Entity-Level Control Hierarchy Harmonized Risk Model Uploading Master Data with MDUG Content Lifecycle Management Master Data Change Request Workflow Surveys and Manual Tests Survey and Test Overview Planner Overview Assessment Survey Manual Test Manual Test ? Offline Forms and Data Sheets Disclosure Survey Issue Remediation Risk-Managed Financial Compliance Risk-Based Financial Compliance Materiality Analysis Risk Assessment Control Risk Rating Test Strategy Risk Coverage Analysis Integration with SAP Audit Management Ad Hoc Issues Ad Hoc Issues Integration with SAP Fraud Management Policy Management Policy Management ? Overview Configuring Policy Management Policy Lifecycle Management Continuous Monitoring Continuous Monitoring ? Overview Continuous Monitoring ? Preconfiguration Creating a Data Source Creating a Business Rule Assigning Business Rules to a Control Scheduling a Continuous Monitoring Job Monitoring a Continuous Monitoring Job SAP Queries SAP BW Query Setting Up a Configurable Rule Subscenario Create a Programmed Rule ABAP Reports Process Integration Subscenario SoD Integration Web Service for Continuous Monitoring Event-Based Monitoring SAP HANA Views New CCM Content Upload Capabilities Operational Compliance Overview Operational Compliance Overview and Key Trends CAPA Operational Compliance-Specific Focus in CCM Closing Activies in an ICS Management Cycle Sign-Off Aggregation of Deficiencies Reporting Reports Overview Report Framework Harmonization Dashboard Overview Security & Authorization Security and Authorization ? Overview Authorization Configuration and Setup Implementation Scope and Approach Implementation Scope and Approach Establishing a Compliance Framework Configuring a Multi-Compliance Framework (MCF) Other Process Control Features Custom-Defined Fields Document Search

GRC330 SAP Process Control 10.1 - Implementation and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

PgMP Exam Prep: Virtual In-House Training

By IIL Europe Ltd

PfMP® Exam Prep: Virtual In-House Training This is an intensive PfMP® Exam preparation course. This learning experience guides you through the multi-faceted discipline of portfolio management by focusing on the related technical, leadership, and business skills required to navigate it in the real world. First and foremost, this is an intensive PfMP® exam preparation course. Over the course, we go beyond exam prep to provide selected practice in applying key portfolio management skills, tools, and techniques. This learning experience guides you through the multi-faceted discipline of portfolio management by focusing on the related technical, leadership, and business skills required to navigate it in the real world. The journey zooms in and out between governance context and specific operational activities. The ultimate goal is practical application, with the bonus of certification along the way. What You Will Learn By the end of this program, you will be able to: Align and manage the portfolio, strategically, to satisfy organizational objectives and priorities, through benefit realization Articulate and emulate the role of a portfolio manager Apply the principles and skills of a portfolio manager to your real-world environment Study and prepare for the PfMP® Examination Apply for the certification, per the PMI PfMP Handbook and pass the initial panel review on your application Getting Started Course Overview Details of the PfMP® Certification process Foundation Concepts Projects, program, and portfolios A portfolio management process Strategy and value The role of the portfolio manager The role of key stakeholders Life cycle management The Portfolio Life Cycle Overview of Life Cycle Portfolio Management Information System (PMIS) Governance within the Portfolio Life Cycle Strategic Management Strategy concepts Supporting documentation and the strategic plan Planning and optimization Organizational risk appetite Managing strategic change Governance Management Overview and Guiding Principles The Concept of Governance Effective Design Factors Governance Roles Capacity and Capability Management Overview and Guiding Principles Capacity Management and Planning Supply and Demand (Management and Optimization) Organization Capabilities (Assessment and Development) Performance Management (Reporting, Analytics, and Balance) Stakeholder Engagement The Importance of Stakeholders Overview and Guiding Principles Definition and Identification Analysis and Planning Communications Approaches and Management Value Management Overview (Guiding Principles, Definition, and Components) Negotiating Expected Value Maximizing Value Assuring Value Realizing Value Measuring and Reporting Value A Look at Tools Risk Management Overview and Guiding Principles Portfolio Risk Planning Portfolio Risk Identification Portfolio Risk Assessment Portfolio Risk Response Examination Content Outline (ECO) Overview Structure Strategic Tasks Mapping Governance Tasks Mapping Performance Tasks Mapping Risk Tasks Mapping Communication Tasks Mapping List of Knowledge and Skills Exam Prep and Practice Overview Documenting experience Submitting the application Preparing to sit for the exam

PgMP Exam Prep: Virtual In-House Training
Delivered OnlineFlexible Dates
Price on Enquiry

Insurance Risk Management

5.0(10)

By GBA Corporate

Overview For internal employees who want to understand and expand their roles related to financial reporting, as well as those who simply need a refresher on financial accounting, this course is the ideal way to get up to speed. By exploring concepts that go beyond basic accounting, this course will enable participants to approach financial auditing with renewed confidence. The programme will walk participants through an analysis of an organization's financial statements using case study exercises, where participants will calculate key ratios and analyze trends over time. Engaging in discussions on both historic and current fraud cases, participants will learn how to recognize “red flags” in financial statement reporting.

Insurance Risk Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Geomechanics at Well and Field Scale

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course Geomechanical evaluations are about the assessment of deformations and failure in the subsurface due to oil & gas production, geothermal operations, CO2 storage and other operations. All geomechanical evaluations include four types of modelling assumptions, which will be systematically addressed in this training, namely: 1. Geometrical modelling assumption: Impact of structural styles on initial stress and stress redistribution due to operations 2. Formation (or constitutive) behaviour: Linear elastic and non-linear behaviour, associated models and their parameters, and methods how to constrain these using 3. Initial stress: Relation with structural setting and methods to quantify the in-situ stress condition 4. Loading conditions: Changes in pore pressure and temperature on wellbore and field scale This 5 full-day course starts with the determination of the stresses in the earth, the impact of different structural styles, salt bodies, faulting and folding on the orientation of the three main principal stress components. Different (field) data sources will be discussed to constrain their magnitude, while exercises will be made to gain hands-on experience. Subsequently, the concepts of stress and strain will be discussed, linear elasticity, total and effective stress and poro-elasticity in 1D, 2D and 3D, as well as thermal expansion. Participants will be able to construct and interpret a Mohr-circles. Also, different failure mechanisms and associated models (plastic, viscous) will be discussed. All these concepts apply on a material point level. Next, geomechanics on the wellbore scale is addressed, starting with the stress distribution around the wellbore (Kirsch equations). The impact of mudweight on shear and tensile failure (fracturing) will be calculated, and participants will be able to determine the mudweight window stable drilling operations, while considering well deviation and the use of oil-based and water-based muds (pore pressure penetration). Fracturing conditions and fracture propagation will be addressed. Field-scale geomechanics is addressed on the fourth day, focussing on building a 3D geomechanical model that is fit-for-purpose (focussing on the risks that need evaluation). Here, geological interpretation (layering), initial stress and formation property estimation (from petrophysical logs and lab experiments) as well as determining the loading conditions come together. The course is concluded with interpretation of the field-wide geomechanical response to reservoir depletion with special attention to reservoir compaction & subsidence, well failure and fault reactivation & induced seismicity. Special attention is paid to uncertainties and formulating advice that impacts decision-making during development and production stages of a project. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Upon completing of this course, the participants will be able to: Identify potential project risks that may need a geomechanical evaluation Construct a pressure-depth plot based on available field data (density logs, (X)LOT, FIT, RFT) Employ log-based correlation function to estimate mechanical properties Produce a simplified, but appropriate geometrical (layered, upscaled) model that honours contrasts in initial stress, formation properties and loading conditions, including Construct and interpret a Mohr-circle for shear and tensile failure Calculate the mud weight that leads to shear and tensile failure (fracturing conditions) Identify potential lab experiments to measure required formation properties Describe the workflow and data to develop a field-wide fit-for-purpose geomechanical model Discuss the qualitative impact of pressure and temperature change on the risk related to compaction, well failure, top-seal integrity and fault reactivation Target Audience This course is intended for Drilling Engineers, Well Engineers, Production Technologists, Completion Engineers, Well Superintendents, Directional Drillers, Wellsite Supervisors and others, who wish to further their understanding of rock mechanics and its application to drilling and completion. There is no specific formal pre-requisite for this course. However, the participants are requested to have been exposed to drilling, completions and production operations in their positions and to have a recommended minimum of 3 years of field experience. Course Level Intermediate Trainer Your expert course leader has over 30 years of experience in the Oil & Gas industry, covering all geomechanical issues in the petroleum industry for Shell. Some of his projects included doing research and providing operational advice in wellbore stability, sand failure prediction, and oil-shale retortion among others. He guided multi-disciplinary teams in compaction & subsidence, top-seal integrity, fault reactivation, induced-seismicity and containment. He was also involved in projects related to Carbon Capture Storage (CCS). He is the founding father of various innovations and assessment tools, and developed new insights into the root causes seismicity induced by Oil & Gas production. Furthermore, he was the regional coordinator for technology deployment in Africa, and Smart Fields (DOFF, iField) design advisor for Shell globally. He was responsible for the Geomechanical competence framework, and associated virtual and classroom training programme in Shell for the last 10 years. He served as one of the Subject Matter Expert (SME) on geomechanics, provided Technical Assurance to many risk assessments, and is a co-author of Shell's global minimun standard on top-seal integry and containment. He has a MSc and PhD in Civil Engineering and computational mechanics from Delft University of Technology, The Netherlands. Training experience: Developed and delivered the following (between 2010 and 2020): The competence framework for the global geomechanical discipline in Shell Online Geomechanical training programs for petroleum engineers (post-doc level) The global minimum standard for top-seal integrity assessment in Shell Over 50 learning nuggets with Subject Matter Experts Various Shell virtual Geomechanical training courses covering all subjects Developed Advanced Geomechanical training program for experienced staff in Shell Coaching of KPC staff on Geomechanics and containment issues on an internship at Shell in The Netherlands, Q4 2014 Lectured at the Utrecht University summer school (The Netherlands, 2020) on induced seismicity among renowned earthquake experts (Prof. Mark Zoback, Prof. Jean-Philippe Avouac, Prof. Jean-Pierre Ampuero and Prof. Torsten Dahm) (https://www.nwo.nl/onderzoeksprogrammas/deepnl/bijeenkomsten/6-10-juli-2020-deepnl-webinar-series-induced-seismicity) Lectured at the Danish Technical University summer school (Copenhagen, 2021) summer school on Carbon Capture and Storage (https://www.oilgas.dtu.dk/english/Events/DHRTC-Summer-School) Virtual Carbon Capture and Storage (CCS): Project Risks & How to Manage Them training course (October and November 2021) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Geomechanics at Well and Field Scale
Delivered in Internationally or OnlineFlexible Dates
£3,697 to £4,299