• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

401 Shell courses delivered Online

About this Training Course Well engineers who are responsible for technically evaluating and authorizing programs for drilling or working over wells must have the required skills and competencies to safely design wells of varying nature. They also need to be able to confirm that well delivery and intervention programs generate intrinsic well control assurance. Such work programs must establish, verify, monitor and maintain suitable and sufficient barriers for the entire well lifecycle - from spud to abandonment. Well engineers must also be able to select a suitable drilling or workover rig, capable of safely performing the work within its operational envelope. This 3 full-day course aims to further develop and assess the knowledge required to work on and eventually, authorize a well delivery program as deemed fit for purpose. It also addresses elements of well control that must be embedded into well design, well work programming and equipment selection. This course is intended for participants who already have a sound understanding of the principles of the design and/or delivery of wells and with more than 3 years of relevant industry experience. Training Objectives By the end of this course, participants will be able to: Feel confident to design and plan drilling and workover activities while considering geological risks, formation pressures/strengths, and any integrity or well control concerns. Monitor wells operations and ensure that they can and will remain within the accepted design envelope. Assess risks and then apply mitigation or recovery methods in cases where design envelopes are threatened. Participants should be capable of assessing a drilling or workover program and then be able to answer the following key questions: Does the program delivery have a sound design and work plan that allows the well(s) to be drilled or worked over safely? Have we determined the appropriate kick tolerance for each open hole section and is it realistic for all drilling hazards that may be encountered? Have all drilling hazards been suitably assessed, and the associated risk mitigated to a level as low as reasonably practicable? Are there adequate, verifiable barriers in place throughout the operation and does everybody know their role and responsibility? And, as applicable, is the selected rig capable of implementing the work program? Target Audience This course is intended for personnel directly or indirectly involved in the preparation, review or authorization of drilling and workover programs. This includes: Well engineers and drilling supervisors who are responsible for planning and executing drilling and workover operations. Contractor well engineers, rig managers and other senior drilling staff. Senior well engineers and rig superintendents who are responsible for managing the delivery of a project or well. Technical authority holders who are responsible for licensing drilling and workover operations from a regulatory perspective. Assessment: A satisfactory command of critical knowledge and skills is assured by a 1+ hour closed book assessment. This assessment has a mix of multiple-choice questions (MCQs), calculations and answers that must be written up. The exam is taken electronically. Participants are provided with a suitable formula sheet. The pass mark for issuing a certificate is 70% and participants who are not successful will be issued with a certificate of attendance instead. Trainer Your expert course leader has over 45 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in the well engineering domain. After being employed in 1974 by Shell, one of the major oil & gas producing operators, he worked as an apprentice on drilling rigs in the Netherlands. After a year, he was sent for his first international assignment to the Sultanate of Oman where he climbed up the career ladder from Assistant Driller, to Driller, to wellsite Petroleum Engineer and eventually on-site Drilling Supervisor, actively engaged in the drilling of development and exploration wells in almost every corner of this vast desert area. At that time, drilling techniques were fairly basic and safety was just a buzz word, but such a situation propels learning and the fruits of 'doing-the-basics' are still reaped today when standing in front of a class. After some seven years in the Middle East, a series of other international assignments followed in places like the United Kingdom, Indonesia, Turkey, Denmark, China, Malaysia, and Russia. Apart from on-site drilling supervisory jobs on various types of drilling rigs (such as helicopter rigs) and working environments (such as jungle and artic), he was also assigned to research, to projects and to the company's learning centre. In research, he was responsible for promoting directional drilling and surveying and advised on the first horizontal wells being drilled, in projects, he was responsible for a high pressure drilling campaign in Nigeria while in the learning centre, he looked after the development of new engineers joining the company after graduating from university. He was also involved in international well control certification and served as chairman for a period of three years. In the last years of his active career, he worked again in China as a staff development manager, a position he nurtured because he was able to pass on his knowledge to a vast number of new employees once again. After retiring in 2015, he has delivered well engineering related courses in Australia, Indonesia, Brunei, Malaysia, China, South Korea, Thailand, India, Dubai, Qatar, Kuwait, The Netherlands, and the United States. The training he provides includes well control to obtain certification in drilling and well intervention, extended reach drilling, high pressure-high temperature drilling, stuck pipe prevention and a number of other ad-hoc courses. He thoroughly enjoys training and is keen to continue taking classes as an instructor for some time to come. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Advanced Well Engineering
Delivered in Internationally or OnlineFlexible Dates
£2,579 to £2,999

Data Analytics Workflows for Artificial Lift, Production and Facility Engineers

By EnergyEdge - Training for a Sustainable Energy Future

About this training course Business Impact: The main aim is to provide insight and understanding of data analytics and machine learning principles through applications. Field data is used to explain data-analysis workflows. Using easy to follow solution scripts, the participants will assess and extract value from the data sets. Hands-on solution approach will give them confidence to try out applicable techniques on data from their field assets. Data analysis means cleaning, inspecting, transforming, and modeling data with the goal of discovering new, useful information and supporting decision-making. In this hands-on 2-day training course, the participants learn some data analysis and data science techniques and workflows applied to petroleum production (specifically artificial lift) while reviewing code and practicing. The focus is on developing data-driven models while keeping our feet closer to the underlying oil and gas production principles. Unique Features: Eight business use cases covering their business impact, code walkthroughs for most all and solution approach. Industry data sets for participants to practice on and take home. No software or complicated Python frameworks required. Training Objectives After the completion of this training course, participants will be able to: Understand digital oil field transformation and its impact on business Examine machine learning methods Review workflows and code implementations After completing the course, participants will have a set of tools and some pathways to model and analyze their data in the cloud, find trends, and develop data-driven models Target Audience This training course is suitable and will greatly benefit the following specific groups: Artificial lift, production and facilities engineers and students to enhance their knowledge base, increase technology awareness, and improve the facility with different data analysis techniques applied on large data sets Course Level Intermediate Advanced Training Methods The course discusses several business use-cases that are amenable to data-driven workflows. For each use case, the instructor will show the solution using a data analysis technique with Python code deployed in the Google cloud. Trainees will solve a problem and tweak their solution. Course Duration: 2 days in total (14 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 20. This course is also available through our Virtual Instructor Led Training (VILT) format. Prerequisites: Understanding of petroleum production concepts Knowledge of Python is not a must but preferred to get the full benefit. The training will use the Google Collaboratory environment available in Google-Cloud for hands-on exercises Trainees will need to bring a computer with a Google Chrome browser and a Google email account (available for free) Trainer Your expert course leader has over 35 years' work-experience in multiphase flow, artificial lift, real-time production optimization and software development/management. His current work is focused on a variety of use cases like failure prediction, virtual flow rate determination, wellhead integrity surveillance, corrosion, equipment maintenance, DTS/DAS interpretation. He has worked for national oil companies, majors, independents, and service providers globally. He has multiple patents and has delivered a multitude of industry presentations. Twice selected as an SPE distinguished lecturer, he also volunteers on SPE committees. He holds a Bachelor's and Master's in chemical engineering from the Gujarat University and IIT-Kanpur, India; and a Ph.D. in Petroleum Engineering from the University of Tulsa, USA. Highlighted Work Experience: At Weatherford, consulted with clients as well as directed teams on digital oilfield solutions including LOWIS - a solution that was underneath the production operations of Chevron and Occidental Petroleum across the globe. Worked with and consulted on equipment's like field controllers, VSDs, downhole permanent gauges, multiphase flow meters, fibre optics-based measurements. Shepherded an enterprise-class solution that is being deployed at a major oil and gas producer for production management including artificial lift optimization using real time data and deep-learning data analytics. Developed a workshop on digital oilfield approaches for production engineers. Patents: Principal inventor: 'Smarter Slug Flow Conditioning and Control' Co-inventor: 'Technique for Production Enhancement with Downhole Monitoring of Artificially Lifted Wells' Co-inventor: 'Wellbore real-time monitoring and analysis of fracture contribution' Worldwide Experience in Training / Seminar / Workshop Deliveries: Besides delivering several SPE webinars, ALRDC and SPE trainings globally, he has taught artificial lift at Texas Tech, Missouri S&T, Louisiana State, U of Southern California, and U of Houston. He has conducted seminars, bespoke trainings / workshops globally for practicing professionals: Companies: Basra Oil Company, ConocoPhillips, Chevron, EcoPetrol, Equinor, KOC, ONGC, LukOil, PDO, PDVSA, PEMEX, Petronas, Repsol, , Saudi Aramco, Shell, Sonatrech, QP, Tatneft, YPF, and others. Countries: USA, Algeria, Argentina, Bahrain, Brazil, Canada, China, Croatia, Congo, Ghana, India, Indonesia, Iraq, Kazakhstan, Kenya, Kuwait, Libya, Malaysia, Oman, Mexico, Norway, Qatar, Romania, Russia, Serbia, Saudi Arabia, S Korea, Tanzania, Thailand, Tunisia, Turkmenistan, UAE, Ukraine, Uzbekistan, Venezuela. Virtual training provided for PetroEdge, ALRDC, School of Mines, Repsol, UEP-Pakistan, and others since pandemic. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Data Analytics Workflows for Artificial Lift, Production and Facility Engineers
Delivered in Internationally or OnlineFlexible Dates
£2,132 to £2,480

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495

Practical Python: Learn Python Basics Step by Step - Python 3

By Packt

This course for beginners will help you build a solid foundation in programming with Python 3. We will cover core concepts such as Python statements, variables, data types, lists, typecasting, comments, conditional statements, loops, file handling, OOP concepts, and more. A carefully structured course with live demonstrations to get you started.

Practical Python: Learn Python Basics Step by Step - Python 3
Delivered Online On Demand3 hours 49 minutes
£41.99

Ethical Hacking

4.7(160)

By Janets

Register on the Ethical Hacking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Ethical Hacking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Ethical Hacking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Ethical Hacking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Module 01: Introduction Course Overview 00:04:00 Module 02: Virtual Lab Environment Create a Virtual Install of Kali Linux Using VirtualBox 00:11:00 Module 03: EVM: 1 Lab preparation 00:03:00 Scanning and Enumeration 00:15:00 Exploitation and Privilege Escalation 00:10:00 Module 04: INFOSEC: Prep OSCP Lab file 01:15:00 Video - Lab Setup 00:04:00 Video - Walkthrough - CTF INFOSEC: Prep OSCP 00:18:00 Module 05: CTF - SQL Injection to Shell Walkthrough Lab Preparation 00:05:00 CTF Walkthrough - SQL Injection to Shell 00:13:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Ethical Hacking
Delivered Online On Demand2 hours 38 minutes
£25

Electrical Machines Online Course for Electrical Engineers - Bundle

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 1 to 2 hours Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about electrical machines Understand the core competencies and principles of electrical machines Explore the various areas of electrical machines Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert electrical engineer Electrical Machines Online Course for Electrical Engineers - Bundle Course Master the skills you need to propel your career forward in electrical machines. This course will equip you with the essential knowledge and skillset that will make you a confident electrical engineer and take your career to the next level. This comprehensive electrical machines course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this electrical machines course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective electrical machines practice and equip you with the essential skills, confidence and competence to assist you in the electrical machines industry. You'll gain a solid understanding of the core competencies required to drive a successful career in electrical machines. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for electrical engineer or for people who are aspiring to specialise in electrical machines. Enrol in this electrical machines course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive electrical machines course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this electrical machines can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This electrical machines course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This electrical machines course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This electrical machines course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Course Content Introduction to Electric Machines 00:03:00 Types of Electric Machines and Principle of Electricity Generation 00:09:00 DC Machines Importance and Construction of DC Machines 00:26:00 Armature Winding and EMF Equation 00:39:00 Solved Example 1 00:04:00 Solved Example 2 00:03:00 Solved Example 3 00:07:00 Solved Example 4 00:06:00 Separately Excited DC Machine 00:20:00 Shunt and Series DC Machines 00:25:00 Solved Example 1 on Separately Excited DC Machine 00:07:00 Solved Example 2 on Separately Excited DC Machine 00:07:00 Solved Example 3 on Shunt Generator 00:04:00 Solved Example 4 on Shunt Generator 00:06:00 Solved Example 5 on Series DC Generator 00:06:00 Types and Applications of Compound DC Motors 00:07:00 Torque-Speed Characteristics and Speed Control of Separately Excited DC Motor 00:33:00 Torque-Speed Characteristics of Series DC Motor 00:08:00 Solved Example 1 on Speed Control 00:08:00 Solved Example 2 on Speed Control 00:05:00 Starting of DC Machine 00:13:00 Armature Reaction in DC Machines 00:10:00 Losses in DC Machines 00:03:00 Construction of Transformer What is The Construction of Transformer, Importance and Iron Core 00:02:00 Magnetic Circuit Inside Transformer 00:04:00 Windings of Transformer 00:03:00 Why are Windings Made of Copper 00:01:00 Classification of Windings 00:04:00 Insulating Material and Transformer Oil 00:02:00 Conservator of Transformer 00:02:00 Breather of Transformer 00:03:00 Bushings of Transformer 00:04:00 Tap Changer of Transformer 00:03:00 Cooling Tubes of Transformer 00:01:00 Buchholz Relay of Transformer 00:02:00 Explosion Vent In Transformer 00:02:00 Methods of Cooling In Transformer 00:02:00 Types of Transformers 00:02:00 Power Transformer and Distribution Transformer 00:05:00 Single Phase Core Type Transformer 00:04:00 Single Phase Shell Type Transformer 00:04:00 Three Phase Core Type Transformer 00:01:00 Three Phase Shell Type Transformer 00:01:00 Comparison between Shell and Core CSA 00:01:00 Comparison between Shell and Core Type 00:01:00 Notes 00:03:00 Video Explaining The Components in 3D and Real Life 00:04:00 Fundamentals of Magnetic Circuits for Electrical Engineering Introduction to Magnetic Circuits 00:02:00 Induced Emf and Current 00:04:00 Ampere Right Hand Rule 00:04:00 Magnetic Circuit and Important Definitions 00:06:00 Linear and Non Linear Materials 00:02:00 Flux Linkage and Reluctance 00:03:00 Analogy between Electric and Magnetic Circuits 00:05:00 Fringing Effect 00:01:00 Example 1 Magnetic Circuits 00:06:00 Example 2 00:02:00 Example 3 00:05:00 Application on Magnetic Circuit - Transformers 00:03:00 Theoretical Part on Transformers Introduction to Transformers 00:02:00 Construction of Transformer 00:01:00 Theory of Operation 00:04:00 Ideal Transformer 00:04:00 Non Ideal Transformer 00:02:00 Effect of Loading on Transformer 00:03:00 Transformer Regulation 00:02:00 Transformer Losses 00:03:00 Transformer Efficiency 00:04:00 Transformer Rating 00:01:00 Question 1 00:01:00 Question 2 00:01:00 Question 3 00:01:00 Example 1 00:01:00 Voltage Relation of Transformer 00:04:00 Transformer Exact Equivalent Circuit 00:06:00 Concept of Refereeing 00:04:00 Approximate Equivalent Circuit 00:02:00 Synchronous Machines Construction and Principle of Operation of Synchronous Generator 00:29:00 Principle of Operation of Synchronous Motor 00:24:00 Equivalent Circuit and Phasor Diagram of Non Salient Synchronous Machine 00:29:00 Solved Example 1 on Non Salient Machine 00:04:00 Solved Example 2 on Non Salient Machine 00:10:00 Solved Example 3 on Non Salient Machine 00:07:00 Solved Example 4 on Non Salient Machine 00:04:00 Solved Example 5 on Non Salient Machine 00:07:00 Solved Example 6 on Non Salient Machine 00:03:00 Equivalent Circuit and Phasor Diagram of Salient Synchronous Machine 00:38:00 Solved Example 1 on Salient Machine 00:09:00 Solved Example 2 on Salient Machine 00:05:00 Solved Example 3 on Salient Machine 00:09:00 Parallel Operation of Two Generators 00:17:00 Synchronization of Machine with Grid 00:10:00 Induction Machines Construction and Theory of Operation of Induction Machines 00:27:00 Equivalent Circuit and Power Flow in Induction Motor 00:23:00 Torque-Speed Characteristics of Induction Motor 00:19:00 Solved Example 1 on Induction Motor 00:07:00 Solved Example 2 on Induction Motor 00:06:00 Solved Example 3 on Induction Motor 00:06:00 Solved Example 4 on Induction Motor 00:18:00 Solved Example 5 on Induction Motor 00:13:00 Methods of Speed Control of Induction Motor 00:27:00 Methods of Starting of Induction Motor 00:21:00 Solved Example on Motor Starter 00:14:00 Principle of Operation of Doubly Fed Induction Generator 00:11:00 Self Excited Induction Generator 00:08:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Electrical Machines Online Course for Electrical Engineers - Bundle
Delivered Online On Demand
£19

The Complete Pentesting and Privilege Escalation Course

By Packt

We are in such an era where cyber security plays an important part. With systems getting smarter, we are seeing machine learning interrupting computer security. With the adoption of machine learning in upcoming security products, it is important for pentesters and security researchers to understand the working of these systems and how to breach them.

The Complete Pentesting and Privilege Escalation Course
Delivered Online On Demand12 hours 16 minutes
£14.99

Level 3 Diploma in Skills for Business: IT - CPD Certified

4.5(3)

By Studyhub UK

Take the initial steps toward a successful long-term career by studying the IT package online with StudyHub through our online learning platform. After completing extensive research, we designed this customised IT course to ease your journey toward your goal. The IT course covers all of the latest information to keep you ahead of the job market and prepare you for the next step. The IT bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This IT Training Bundle consists the following career oriented courses: Course 01: IT Support Technician Course 02: Network Security and Risk Management Course 03: CompTIA Network Course 04: Information Management Course 05: Web Application Penetration Testing Course Course 06: CompTIA Cloud+ (CV0-002) Course 07: Learn Ethical Hacking From A-Z: Beginner To Expert Course 08: Computer Operating System and Troubleshooting Course 09: Building Your Own Computer Course Course 10: It: Ethical Hacking, IT Security and IT Cyber Attacking Course 11: SQL Database Administrator Course 12: MS Word Essentials - The Complete Word Course - Level 3 Course 13: Data Protection (GDPR) Practitioner Course 14: Website Hacking From Scratch Course 15: Diploma in Front-End Web Development (HTML, CSS, & Bootstrap) Course 16: Data Science and Visualisation with Machine Learning Course 17: SQL For Data Analytics & Database Development Course 18: PLC Programming Diploma Course 19: Cyber Security Incident Handling and Incident Response Course 20: Cyber Security Law Course 21: C# (C-Sharp) Course 22: Web Design (HTML, CSS, Bootstrap) Complete Course Course 23: Python Course Course 24: JavaScript Course 25: ASP.Net MVC and Entity Framework Course Course 26: Learn Spring & Angular Material with a Full Web Application Course 27: Coding Essentials - Javascript, ASP. Net, C# - Bonus HTML Course 28: Project on Deep Learning - Artificial Neural Network (ANNs) Course 29: Build Progressive Web Apps with Angular Course 30: Microsoft SQL Server Development for Everyone! Course 31: Building Big Data Pipelines with PySpark MongoDB and Bokeh Course 32: Microsoft Azure Machine Learning Course 33: Linux Basics Course 34: Linux File Management System Course 35: C Programming Language for Beginners on Linux Course 36: Linux Security and Hardening Course 37: Linux Shell Scripting Course 38: Learn Ethical Hacking From A-Z: Beginner To Expert Course 39: Securing an Ubuntu Linux Server against Hackers Masterclass Course 40: Python 3 Programming The IT Training Bundle has been prepared by focusing largely on career readiness. The IT course has been prepared by focusing largely on career readiness. It has been designed by our IT specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided with IT, if it's required by any learners. Certification After studying the complete training, you will be able to participate in the course assessment, which is included in the course. After completing the assessment, you can claim all courses pdf certificates for free. Hard Copy certificates need to be ordered at an additional cost of •8. CPD 400 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This IT Training course is suitable for - Students Recent graduates Job Seekers further progress towards NCFE Level 3 Diploma in Skills for Business: IT Requirements There is no formal qualification needed for this IT Training course. Career path You will be able to achieve a lucrative career because this IT Training Bundle includes various courses as a bonus. Certificates Certificate of completion Digital certificate - Included

Level 3 Diploma in Skills for Business: IT - CPD Certified
Delivered Online On Demand
£279

Finance for Non-Finance Professionals in Oil & Gas Petroleum Fiscal Regimes & Applied Finance for Non-Finance Oil & Gas Professionals

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This separately bookable 3 full-day course is not designed to skill Oil & Gas engineers to be accountants, but to give the participants the confidence and ability to communicate with accountants and finance managers and to improve their own financial decision making. For technical professionals, a high level of single subject matter expertise is no longer sufficient for superior management performance. Oil & Gas technical professionals who wish to succeed in the resources industry are required to develop skills beyond their core functional knowledge. An understanding of financial information and management, and an awareness of the economic theory that drives value creation, are an integral part of the managers required suite of skills. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Workshop A: Finance for Non-Finance for Oil & Gas Professionals Attend this industry specific course and benefit from the following: Demystify financial jargon and fully interpret financial statements Understand Balance Sheets and Profit & Loss statements of Oil & Gas companies Discover the crucial distinction between cash flow and profit Understand how to make correct investment decisions using Net present Value and Internal Rate of Return Interpret oil and gas company financial reports using ratio analysis Learn the difference between cash costs and full costing of energy products Learn how to manage working capital for increased shareholder value Workshop B: Petroleum Fiscal Regimes and Applied Finance for Oil & Gas Industry Professionals Attend this advanced Training course to enhance your financial acumen from the following: Build and compare cash flow based models of both production sharing contract projects and royalty regime projects Gain an awareness of the different valuation methods for producing properties and undeveloped acreage Learn the industry specific accounting issues that apply when interpreting oil and gas company financial statements Understand how the physical characteristics of energy assets (e.g. reserves, reservoir quality) are translated into project valuations Learn how the investment analysts value oil and gas stocks and make buy/sell recommendations Target Audience This course is specifically designed for those with a non-finance background training from the Oil & Gas sector and requires only basic mathematical ability as a pre-requisite. It is presented in a manner that reduces the jargon to basic principles and applies them to numerous real-life examples. This course has been researched and developed for Managers, Superintendents, Supervisors, Engineers, Planners, Lawyers, Marketers, Team Leaders and Project Coordinators in the technical and non-technical departments in the Oil and Gas industry. Course Level Basic or Foundation Trainer Your expert course leader has presented over 300 courses and seminars in financial management. He began his career as a graduate in the Corporate Treasury of WMC Ltd having completed a degree in Applied Mathematics and Geology at Monash University. After five years with WMC, he pursued an MBA in finance and accounting at Cornell University in New York. He later gained a PhD in energy policy from the University of Melbourne. He worked for WMC Ltd in Perth as a Senior Financial Analyst in the Minerals Division and subsequently as an Energy Analyst in the Petroleum Division. In April 1997, he established an independent consultancy business providing advice to companies such as Woodside, Shell and Japan Australia LNG (MIMI). He spent many years as a consultant and commercial manager in the North West Shelf Gas project in Western Australia. Since 2006, he has been an Adjunct Fellow at the Macquarie University Applied Finance Centre where he teaches courses in valuation, financial statement modelling, and resources industry investment analysis. His background in geology and mathematics allows him to empathise with those who seek an understanding of finance but are approaching the learning experience with a technical mind. He receives consistently high ratings for his breadth of knowledge of the subject matter. He presents in a lively interactive style using real life examples and cases. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Finance for Non-Finance Professionals in Oil & Gas Petroleum Fiscal Regimes & Applied Finance for Non-Finance Oil & Gas Professionals
Delivered in Internationally or OnlineFlexible Dates
£1,461 to £1,699

GL-120 Linux Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for NULL Overview Topics include: basic file manipulation; basic and advanced filesystem features; I/O redirection and pipes; text manipulation and regular expressions; managing jobs and processes; vi, the standard Unix editor; automating tasks with shell scripts; managing software; secure remote administration; and more. The GL120 is a challenging course that focuses on the fundamental tools and concepts of Linux and Unix. Students gain proficiency using the command line. Beginners develop a solid foundation in Unix, while advanced users discover patterns and fill in gaps in their knowledge. Like all Guru Labs courses, the course material is designed to provide extensive hands-on experience. The GL120 is a challenging course that focuses on the fundamental tools and concepts of Linux and Unix. Students gain proficiency using the command line. Beginners develop a solid foundation in Unix, while advanced users discover patterns and fill in gaps

GL-120 Linux Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry