About this Training Course This separately bookable 3 full-day course is not designed to skill Oil & Gas engineers to be accountants, but to give the participants the confidence and ability to communicate with accountants and finance managers and to improve their own financial decision making. For technical professionals, a high level of single subject matter expertise is no longer sufficient for superior management performance. Oil & Gas technical professionals who wish to succeed in the resources industry are required to develop skills beyond their core functional knowledge. An understanding of financial information and management, and an awareness of the economic theory that drives value creation, are an integral part of the managers required suite of skills. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Workshop A: Finance for Non-Finance for Oil & Gas Professionals Attend this industry specific course and benefit from the following: Demystify financial jargon and fully interpret financial statements Understand Balance Sheets and Profit & Loss statements of Oil & Gas companies Discover the crucial distinction between cash flow and profit Understand how to make correct investment decisions using Net present Value and Internal Rate of Return Interpret oil and gas company financial reports using ratio analysis Learn the difference between cash costs and full costing of energy products Learn how to manage working capital for increased shareholder value Workshop B: Petroleum Fiscal Regimes and Applied Finance for Oil & Gas Industry Professionals Attend this advanced Training course to enhance your financial acumen from the following: Build and compare cash flow based models of both production sharing contract projects and royalty regime projects Gain an awareness of the different valuation methods for producing properties and undeveloped acreage Learn the industry specific accounting issues that apply when interpreting oil and gas company financial statements Understand how the physical characteristics of energy assets (e.g. reserves, reservoir quality) are translated into project valuations Learn how the investment analysts value oil and gas stocks and make buy/sell recommendations Target Audience This course is specifically designed for those with a non-finance background training from the Oil & Gas sector and requires only basic mathematical ability as a pre-requisite. It is presented in a manner that reduces the jargon to basic principles and applies them to numerous real-life examples. This course has been researched and developed for Managers, Superintendents, Supervisors, Engineers, Planners, Lawyers, Marketers, Team Leaders and Project Coordinators in the technical and non-technical departments in the Oil and Gas industry. Course Level Basic or Foundation Trainer Your expert course leader has presented over 300 courses and seminars in financial management. He began his career as a graduate in the Corporate Treasury of WMC Ltd having completed a degree in Applied Mathematics and Geology at Monash University. After five years with WMC, he pursued an MBA in finance and accounting at Cornell University in New York. He later gained a PhD in energy policy from the University of Melbourne. He worked for WMC Ltd in Perth as a Senior Financial Analyst in the Minerals Division and subsequently as an Energy Analyst in the Petroleum Division. In April 1997, he established an independent consultancy business providing advice to companies such as Woodside, Shell and Japan Australia LNG (MIMI). He spent many years as a consultant and commercial manager in the North West Shelf Gas project in Western Australia. Since 2006, he has been an Adjunct Fellow at the Macquarie University Applied Finance Centre where he teaches courses in valuation, financial statement modelling, and resources industry investment analysis. His background in geology and mathematics allows him to empathise with those who seek an understanding of finance but are approaching the learning experience with a technical mind. He receives consistently high ratings for his breadth of knowledge of the subject matter. He presents in a lively interactive style using real life examples and cases. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Mental Health and Wellbeing Training Courses Building resilience CPD Accredited, Interactive Workshops Enquire about this course 2-5 hour workshops Suitable for anyone who'd like to improve their mental wellbeing and resilience Giving them the chance to cope with life's challenges
Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices
Blue CSCS Card Level 2 NVQ Diploma in Construction Operations and Civil Engineering Services - Highways Maintenance Induction - As soon as you register you will be given a dedicated assessor. They will arrange an induction and together with your assessor, you will get to decide on the pathway which best proves your competency. The induction is used to plan out how you will gather the relevant evidence to complete the course. During the course - The assessor will work with you to build a portfolio of evidence that allows you to showcase your knowledge, skills and experience. The assessor will also regularly review and provide you with feedback. This will allow you to keep on track to progress quickly. You will be assessed through various methods such as observations, written questions, evidence generated from the workplace, professional discussion, and witness testimonials. On completion - Once all feedback has been agreed, the Internal Quality Assurer will review your portfolio and in agreement with your assessor the certificate will be applied for. To download our PDF for this course then please click here.
Elevate your understanding of relay protection in power systems with EnergyEdge's specialized classroom training course and gain valuable insights.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is someone who works, or has ambition to work, in a leadership role in data center operations such as a data center facilities manager, data center operations manager, who has the responsibility to achieve and improve the high-availability and manageability of the data center operations. Overview After completion of the course the participant will be able to: Perform the needs analysis translating business requirements to data center services Set-up and manage the data center operations team Implement and monitor safety- and security practices Identify a suitable maintenance program for the data center facility and its equipment Select the appropriate policies and procedures required for data center operations Monitor the data center availability, capacity and capability Manage and implement basic data center projects Set-up and implement an environmental sustainability program Select an appropriate back-up site to support organizational resilience Identify and respond to risk in the data center Manage and support the document life cycle Create a basic budget proposal Select and manage vendors and measure their performance Manage data center assets Managing the facilities of today?s high-end and high-availability data centers is an extremely demanding and complex task which is often underestimated. There is often very little appreciation and understanding of the complexities of managing today's mission-critical data centers where downtime is not an option, especially since many of the data centers are operating at, or near, their design limits. Operations management at the facilities layer makes all the difference. Even a data center designed to the highest redundancy level as per the ANSI/TIA-942 standard could still experience many unscheduled downtime events due to poor planning, operations, maintenance and management processes. Service Level Management Service Level Management Needs analysis Capability assessment Service portfolio Service catalogue Service Level Agreements (SLAs) Availability measurement Data points in SLA Service reporting Complaint procedure Customer satisfaction measurement Service Improvement Process (SIP) SLA content The Data Center Organization Operational issues Organization chart Roles and responsibilities Skills matrix Contingency / backup roles Shift management Performance management Career development Training and assessment Job rotation Succession planning Disciplinary program Managing Safety & Statutory Requirements Safety policies and regulations Occupational Health and Safety (OH&S) Safety awareness training Permit to Work (PTW) Lock-out / Tag-out Personal Protective Equipment (PPE) Testing and tagging of equipment Emergency preparedness and response Reporting of safety issues Reviews / internal audit / external audit Managing Physical Security Security policies and procedures Security standards and guidelines Security staff Security awareness Security incident management Disciplinary program Reviews, internal and external audits Facilities Management Maintenance policies and procedures Various maintenance programs Outsourcing of maintenance activities Maintenance contract options Warranty Maintenance schedule Service situations Spart part management Contamination control Data Center Operations Policies and procedures for data center operations Service operations and the daily data center operations Monitoring / Reporting / Control Monitoring requirements Escalation procedures Reporting Trend analysis Reviews Project Management Project management Project organization Project manager Project phases Environment Sustainability The importance of sustainability Sustainability policies Environmental management Power efficiency indicators - Waste management - Water management ICT utilisation management Environmental performance measurements Renewable energy factor (REF) Organizational Resilience Business continuity Data center facility options Business Impact Analysis Type of facility Human resources Facility, equipment and consumables Governance, Risk and Compliance Management commitment Coordination, collaboration and integration Compliance Risk management Document management Financial management Vendor management Asset management Additional course details: Nexus Humans Certified Data Center Facilities Operations Manager (CDFOM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Center Facilities Operations Manager (CDFOM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
12-Week Intensive Program: Designed for students in Grades 7 to 10, GCSE, and A Level. Three distinct groups tailored to different levels of maths proficiency. Small Group Sessions: Limited spots available to ensure personalised attention and effective learning. Engage with peers and benefit from collaborative learning.
About this Virtual Instructor Led Training (VILT) This 2-half-day Virtual Instructor Led Training (VILT) course will discuss the chemical aspects of the water-steam cycle in a power plant. The VILT course will examine the different types of chemicals used in boilers, potential issues in a water-steam cycle as well as aspects of monitoring and specifications regarding target values and alarm levels. Participants will also be equipped on what to do or key action steps to take in the event of chemistry-related incidents. This course is delivered in partnership with ENGIE Laborelec. Training Objectives The VILT course will cover the following: Detailed aspects of chemistry in a water steam cycle, including types of chemicals used in boilers depending on the treatment and type of boiler Potential issues in a water-steam cycle such as corrosion and deposition Monitoring & analytical programmes and knowledge of specifications for the water steam cycle (normal values targets - alarm levels) Chemistry aspects during transition periods: start-up, shutdown and preservation Actions to be taken in the event of an alarm Examples of incidents or deviations compared to normal chemistry Target Audience The VILT course is intended for: Power plant chemists Plant operation or maintenance engineers Consultants and technical project managers Boiler engineers Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 2 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 2 half-day sessions, 4 hours per session (8 hours in total). Trainer Your expert course leader is a chemistry consultant in the energy sector. He works with operators of power plants and industrial facilities. He is active in water-steam cycle chemistry, where he provides support to increase chemistry maturity through audits, trainings or development of key performance indicators. His role also includes operational assistance in the field of chemical cleaning and troubleshooting. More recently, he expanded his field of competence towards electrical storage. In this regard, he specializes in electrochemistry and is in charge of different tests on batteries and their components within the ENGIE Batteries Lab. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations