About this Training Course This separately bookable 3 full-day course is not designed to skill Oil & Gas engineers to be accountants, but to give the participants the confidence and ability to communicate with accountants and finance managers and to improve their own financial decision making. For technical professionals, a high level of single subject matter expertise is no longer sufficient for superior management performance. Oil & Gas technical professionals who wish to succeed in the resources industry are required to develop skills beyond their core functional knowledge. An understanding of financial information and management, and an awareness of the economic theory that drives value creation, are an integral part of the managers required suite of skills. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Workshop A: Finance for Non-Finance for Oil & Gas Professionals Attend this industry specific course and benefit from the following: Demystify financial jargon and fully interpret financial statements Understand Balance Sheets and Profit & Loss statements of Oil & Gas companies Discover the crucial distinction between cash flow and profit Understand how to make correct investment decisions using Net present Value and Internal Rate of Return Interpret oil and gas company financial reports using ratio analysis Learn the difference between cash costs and full costing of energy products Learn how to manage working capital for increased shareholder value Workshop B: Petroleum Fiscal Regimes and Applied Finance for Oil & Gas Industry Professionals Attend this advanced Training course to enhance your financial acumen from the following: Build and compare cash flow based models of both production sharing contract projects and royalty regime projects Gain an awareness of the different valuation methods for producing properties and undeveloped acreage Learn the industry specific accounting issues that apply when interpreting oil and gas company financial statements Understand how the physical characteristics of energy assets (e.g. reserves, reservoir quality) are translated into project valuations Learn how the investment analysts value oil and gas stocks and make buy/sell recommendations Target Audience This course is specifically designed for those with a non-finance background training from the Oil & Gas sector and requires only basic mathematical ability as a pre-requisite. It is presented in a manner that reduces the jargon to basic principles and applies them to numerous real-life examples. This course has been researched and developed for Managers, Superintendents, Supervisors, Engineers, Planners, Lawyers, Marketers, Team Leaders and Project Coordinators in the technical and non-technical departments in the Oil and Gas industry. Course Level Basic or Foundation Trainer Your expert course leader has presented over 300 courses and seminars in financial management. He began his career as a graduate in the Corporate Treasury of WMC Ltd having completed a degree in Applied Mathematics and Geology at Monash University. After five years with WMC, he pursued an MBA in finance and accounting at Cornell University in New York. He later gained a PhD in energy policy from the University of Melbourne. He worked for WMC Ltd in Perth as a Senior Financial Analyst in the Minerals Division and subsequently as an Energy Analyst in the Petroleum Division. In April 1997, he established an independent consultancy business providing advice to companies such as Woodside, Shell and Japan Australia LNG (MIMI). He spent many years as a consultant and commercial manager in the North West Shelf Gas project in Western Australia. Since 2006, he has been an Adjunct Fellow at the Macquarie University Applied Finance Centre where he teaches courses in valuation, financial statement modelling, and resources industry investment analysis. His background in geology and mathematics allows him to empathise with those who seek an understanding of finance but are approaching the learning experience with a technical mind. He receives consistently high ratings for his breadth of knowledge of the subject matter. He presents in a lively interactive style using real life examples and cases. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Enhance your skills in cost estimation and analysis of well abandonment activities with EnergyEdge's comprehensive course. Join now!
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Enhance your knowledge with EnergyEdge's course on Floating Liquefied Natural Gas (FLNG) design technology. Sign up now!
About this Virtual Instructor Led Training (VILT) This 4 half-day Virtual Instructor Led Training (VILT) course will address a variety of contract and loan structuring issues associated with geothermal energy projects as well as comparison with solar, wind and battery storage. The course is designed to investigate how various project finance techniques and contract structures can be used to achieve a competitive power prices while maintaining a satisfactory equity return. Distinctive project finance features of power facilities that depend on geothermal, wind, hydro or solar resources will be evaluated with financial models. The course will cover economic analysis of exploration and development of geothermal facilities and how to incorporate probability of failure and success into an IRR framework. Subsequent sessions will address the theory underlying liquidated damages for delay, and performance as well as design of other incentives that is inherent in different contract structures. Nuanced project finance issues associated with structuring debt for renewable projects will be discussed including under what conditions the DSCR drives debt capacity and when the debt to capital ratio is instrumental. The course will be taught with a combination of theoretical discussions, term sheet review and focused financial models. Training Objectives Evaluation of the economic risks that arise from uncertainty associated with drilling exploration wells and development wells for geothermal projects. Analyse the theoretical issues with computing LCOE for geothermal projects compared to other renewable and non-renewable resources and the importance of cost of capital for renewable projects; Understand differences in contract structures for renewable projects and dispatchable projects and how a single price structure can distort incentives for efficient construction and operation; Understand components of financing that influence the bid price required to meet a required rate of return on equity and can result in relatively low prices with reasonable returns. Understand the importance of debt sizing constraints and what strategies are relevant when the debt to capital constraint applies relative to when the debt service coverage ratio drives the debt size; Understand how to compute P50, P90 and P99 for different projects driven by resource risk; Understand the difference between mean reverting resource variation and estimation mistakes that do not correct as the basis for 1-year P90 and 10-year P90. Understand under what conditions debt sculpting can affect returns and how synthetic sculpting can be used to increase returns when the DSCR constraint applies. Understand the theory of credit spreads, variable rate debt and interest rates in different currencies and compute the implied probability of default that in inherent in credit spreads. Understand how to evaluate the costs to equity investors and the benefits to lenders for various credit enhancements including DSRA accounts, cash flow sweeps and covenants. Course Level Basic or Foundation Training Methods The VILT will be delivered online in 4 sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day, including time for lectures, discussion, quizzes and short classroom exercises. Trainer Your expert course leader provides financial and economic consulting services to a variety of clients, he teaches professional development courses in an assortment of modelling topics (project finance, M&A, and energy). He is passionate about teaching in Africa, South America, Asia and Europe. Many of the unique analytical concepts and modelling techniques he has developed have arisen from discussion with participants in his courses. He has taught customized courses for MIT's Sloan Business School, Bank Paribas, Shell Oil, Society General, General Electric, HSBC, GDF Suez, Citibank, CIMB, Lind Lakers, Saudi Aramco and many other energy and industrial clients. His consulting activities include developing complex project finance, corporate and simulation models, providing expert testimony on financial and economic issues before energy regulatory agencies, and advisory services to support merger and acquisition projects. Our key course expert has written a textbook titled Corporate and Project Finance Modelling, Theory and Practice published by Wiley Finance. The book introduces unique modelling techniques that address many complex issues that are not typically used by even the most experienced financial analysts. For example, it describes how to build user-defined functions to solve circular logic without cumbersome copy and paste macros; how to write function that derives the ratio of EV/EBITDA accounting for asset life, historical growth, taxes, return on investment, and cost of capital; and how to efficiently solve many project finance issues related to debt structuring. He is in the process of writing a second book that describes a series of valuation and analytical mistakes made in finance. This book uses many case studies from Harvard Business School that were thought to represent effective business strategies and later turned into valuation nightmares. Over the course of his career our key course expert has been involved in formulating significant government policy related to electricity deregulation; he has prepared models and analyses for many clients around the world; he has evaluated energy purchasing decisions for many corporations; and, he has provided advice on corporate strategy. His projects include development of a biomass plant, analysis and advisory work for purchase of electricity generation, distribution and transmission assets by the City of Chicago, formulation of rate policy for major metro systems and street lighting networks, advocacy testimony on behalf of low income consumers, risk analysis for toll roads, and evaluation of solar and wind projects. He has constructed many advisory analyses for project finance and merger and acquisition transactions. Lastly, our key course expert was formerly Vice President at the First National Bank of Chicago where he directed analysis of energy loans and also created financial modelling techniques used in advisory projects. He received an MBA specializing in econometrics (with honours) from the University of Chicago and a BSc in Finance from the University of Illinois (with highest university honours). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
About this training course This 3-days training will provide a comprehensive review of integrity of wells exposed to carbon dioxide (CO2) in the context of Carbon Capture Utilization for enhanced oil recovery and Storage (CCUS). CO2 geological storage is a proven technology to reduce greenhouse gas emissions from sources such as coal power plants, cement kilns and steel mills. Wells are widely considered the most critical containment element, especially older wells that are not used to inject CO2 or monitor the plume evolution in the storage reservoir. The main reason for this perceived risk is the high corrosion rate of carbon steel when exposed to wet CO2, and the tendency of Portland cement to react with the gas. The training course advanced contents build on 15 years' experience in carbon storage, both in the development and deployment of technologies. First-hand, in-depth knowledge of the subject will allow us to debunk myths and focus on the real challenges of wells encountering CO2. Training Objectives After the completion of this training course, participants will be able to: Explain the CCUS market drivers Examine the behavior of CO2, on surface and in the reservoir Diagnose cement defects and design repairs Understand the limits of Portland cement Assess the benefits of different technologies and materials Realize why geology is a dominant factor in cement performance Critically choose the most appropriate monitoring techniques Classify aging processes of cement, steel, and rock when exposed to CO2 Assess the risk of existing wells if they encounter the CO2 plume Examine recent advances in real-time approaches to the production monitoring and lift management Target Audience This training course is suitable and will greatly benefit: All surface technical personnel such as process engineers & technologists Facility engineers, production engineers & technologists Drilling engineers and Well engineers Design engineers and Integrity engineers P&A engineers and Cementing engineers Geologists Senior management executives will benefit from this training as covers an overview of the technical and commercial details of CO2 capture technologies and risks involved. Course Level Intermediate Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 3 days in total (21 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 20. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader is an engineer with a passion for well integrity and possesses 28 years of international experience in field operations, technology development and management in the oil & gas and carbon storage sectors. Since 2018 he is program chair of the Well Integrity Technical Section of the Society of Petroleum Engineers (SPE). He is also author or co-author of 31 technical papers, a book chapter on CO2 geological storage and 7 patent applications. He delivers training on well integrity, plug and abandonment, asset integrity, risk management and QHSE across the Eastern Hemisphere, and carries out active research on harnessing geological barriers, modeling leaks through cement, and quantifying methane emissions from oil & gas wells. He has extensive expertise in: Well integrity, cementing, corrosion, upstream oil & gas (drilling, completion), carbon capture and storage, mathematical modeling, risk management, reliability, HSSE (health/safety/security/environment), asset integrity, management systems, sustainable development, project management, portfolio management, training, and technology development and innovation. He has personally worked on CCS projects in Europe (France, Germany, Netherlands, Norway), Algeria, Japan and USA. Partial list of companies that have benefited from the trainer's expertise: Vermilion Energy Geostock Aker BP Shell Statoil ENI TNO Geogreen Wintershall Archer INA and many more Recent CCS consulting track record: Schlumberger Total Oxand TNO THREE60 Energy and others POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable
Duration 5 Days 30 CPD hours This course is intended for NULL Overview Topics include: basic file manipulation; basic and advanced filesystem features; I/O redirection and pipes; text manipulation and regular expressions; managing jobs and processes; vi, the standard Unix editor; automating tasks with shell scripts; managing software; secure remote administration; and more. The GL120 is a challenging course that focuses on the fundamental tools and concepts of Linux and Unix. Students gain proficiency using the command line. Beginners develop a solid foundation in Unix, while advanced users discover patterns and fill in gaps in their knowledge. Like all Guru Labs courses, the course material is designed to provide extensive hands-on experience. The GL120 is a challenging course that focuses on the fundamental tools and concepts of Linux and Unix. Students gain proficiency using the command line. Beginners develop a solid foundation in Unix, while advanced users discover patterns and fill in gaps
Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special Electrical Machines for Electrical Engineering Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The Electrical Machines for Electrical Engineering Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Electrical Machines for Electrical Engineering Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Electrical Machines for Electrical Engineering Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Electrical Machines for Electrical Engineering? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Electrical Machines for Electrical Engineering there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Electrical Machines for Electrical Engineering course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Electrical Machines for Electrical Engineering does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Electrical Machines for Electrical Engineering was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Electrical Machines for Electrical Engineering is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Unit 1: Introduction to Electric Machines Module 1- Introduction to Electric Machines 00:03:00 Module 2- Types of Electric Machines and Principle of Electrical Generation 00:09:00 Unit 2: DC Machines Module 1- Importance and Construction of DC Machines 00:26:00 Module 2- Armature Winding and EMF Equation 00:40:00 Module 3-Solved Example 1 00:05:00 Module 4-Solved Example 2 00:04:00 Module 5-Solved Example 3 00:07:00 Module 6-Solved Example 4 00:06:00 Module 7-Separately Excited DC Machine 00:21:00 Module 8-Shunt and Series DC Machines 00:25:00 Module 9-Solved Example 1 on Separately Excited DC Machine 00:07:00 Module 10-Solved Example 2 on Separately Excited DC Machine 00:07:00 Module 11-Solved Example 3 on Shunt Generator 00:04:00 Module 12-Solved Example 4 on Shunt Generator 00:07:00 Module 13-Solved Example 5 on Series DC Generator 00:06:00 Module 14-Types and Applications of Compound DC Motors 00:07:00 Module 15- Torque-Speed Characteristics and Speed Control of Separately Excited DC Motor 00:33:00 Module 16- Torque-Speed Characteristics of Series DC Motor 00:08:00 Module 17-Solved Example 1 on Speed Control 00:08:00 Module 18-Solved Example 2 on Speed Control 00:06:00 Module 19- Starting of DC Machine 00:14:00 Module 20- Armature Reaction in DC Machines 00:10:00 Module 21-Losses in DC Machines 00:04:00 Unit 3: Construction of Transformers Module 1- What is a Transformer 00:02:00 Module 2- Importance of Transformer 00:04:00 Module 3-Iron Core of Transformer 00:04:00 Module 4- Magnetic Circuit Inside Transformer 00:05:00 Module 5- Windings of Transformer 00:03:00 Module 6- Why are Windings Made of Copper 00:01:00 Module 7- Classification of Windings 00:05:00 Module 8- Insulating Material and Transformer Oil 00:02:00 Module 9- Conservator of Transformer 00:03:00 Module 10- Breather of Transformer 00:04:00 Module 11- Bushings of Transformer 00:04:00 Module 12- Tap Changer of Transformer 00:03:00 Module 13- Cooling Tubes of Transformer 00:01:00 Module 14- Buchholz Relay of Transformer 00:02:00 Module 15- Explosion Vent 00:02:00 Module 16- Methods of Cooling 00:03:00 Module 17-Types of Transformers 00:03:00 Module 18- Power Transformer and Distribution Transformer 00:05:00 Module 19- Single Phase Core Type Transformer 00:04:00 Module 20-Single Phase Shell Type Transformer 00:05:00 Module 21- 3 Phase Core Type 00:02:00 Module 22- 3 Phase Shell Type 00:01:00 Module 23- Comparison between Shell and Core CSA 00:01:00 Module 24- Comparison between Shell and Core Type 00:01:00 Module 25- Notes 00:03:00 Module 26-Video Explaining The Components in 3D and Real Life 00:05:00 Unit 4: Fundamentals of Magnetic Circuits Module 1- Introduction to Magnetic Circuits 00:02:00 Module 2- Induced Emf and Current 00:04:00 Module 3- Ampere Right Hand Rule 00:04:00 Module 4- Magnetic Circuit and Important Definitions 00:06:00 Module 5- Linear and Non Linear Materials 00:03:00 Module 6-Flux Linkage and Reluctance 00:04:00 Module 7- Analogy between Electric and Magnetic Circuits 00:06:00 Module 8- Fringing Effect 00:02:00 Module 9- Example 1 Magnetic Circuits 00:07:00 Module 10- Example 2 00:03:00 Module 11- Example 3 00:06:00 Module 12- Application on Magnetic Circuit - Transformers 00:04:00 Unit 5: Theoretical Part on Transformers Module 1- Introduction to Transformers 00:02:00 Module 2- Construction of Transformer 00:02:00 Module 3-Theory of Operation 00:04:00 Module 4- Ideal Transformer 00:05:00 Module 5-Non Ideal Transformer 00:02:00 Module 6- Effect of Loading on Transformer 00:03:00 Module 7- Transformer Regulation 00:03:00 Module 8- Transformer Losses 00:03:00 Module 9- Transformer Efficiency 00:05:00 Module 10- Transformer Rating 00:02:00 Module 11- Question 1 00:01:00 Module 12- Question 2 00:02:00 Module 13- Question 3 00:01:00 Module 14- Example 1 00:01:00 Module 15- Voltage Relation of Transformer 00:04:00 Module 16- Transformer Exact Equivalent Circuit 00:06:00 Module 17- Concept of Refereeing 00:04:00 Module 18- Approximate Equivalent Circuit 00:02:00 Unit 6: Synchronous Machines Module 1- Construction and Principle of Operation of Synchronous Generator 00:29:00 Module 2- Principle of Operation of Synchronous Motor 00:24:00 Module 3- Equivalent Circuit and Phasor Diagram of Non Salient Synchronous Machine 00:29:00 Module 4-Solved Example 1 on Non Salient Machine 00:05:00 Module 5-Solved Example 2 on Non Salient Machine 00:11:00 Module 6-Solved Example 3 on Non Salient Machine 00:07:00 Module 7- Solved Example 4 on Non Salient Machine 00:04:00 Module 8-Solved Example 5 on Non Salient Machine 00:07:00 Module 9-Solved Example 6 on Non Salient Machine 00:03:00 Module 10- Equivalent Circuit and Phasor Diagram of Salient Synchronous Machine 00:39:00 Module 11-Solved Example 1 on Salient Machine 00:09:00 Module 12- Solved Example 2 on Salient Machine 00:05:00 Module 13-Solved Example 3 on Salient Machine 00:10:00 Module 14- Parallel Operation of Two Generators 00:17:00 Module 15- Synchronization of Machine with Grid 00:10:00 Unit 7: Induction Machines Module 1- Construction and Theory of Operation of Induction Machines 00:27:00 Module 2- Equivalent Circuit and Power Flow in Induction Motor 00:23:00 Module 3- Torque-Speed Characteristics of Induction Motor 00:20:00 Module 4- Solved Example 1 on Induction Motor 00:08:00 Module 5-Solved Example 2 on Induction Motor 00:06:00 Module 6-Solved Example 3 on Induction Motor 00:06:00 Module 7-Solved Example 4 on Induction Motor 00:18:00 Module 8-Solved Example 5 on Induction Motor 00:13:00 Module 9- Methods of Speed Control of Induction Motor 00:27:00 Module 10- Methods of Starting of Induction Motor 00:21:00 Module 11-Solved Example on Motor Starter 00:15:00 Module 12- Principle of Operation of Doubly Fed Induction Generator 00:11:00 Module 13-Self Excited Induction Generator 00:08:00 Assignment Assignment - Electrical Machines for Electrical Engineering 00:00:00
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many other of F5's BIG-IP instructor-led training courses. Overview Getting started with the BIG-IP system Traffic processing with BIG-IP Local Traffic Manager (LTM) Using the TMSH (TMOS Shell) command line interface Using NATs and SNATs Monitoring application health and managing object status Modifying traffic behavior with profiles, including SSL offload and re-encryption Modifying traffic behavior with persistence, including source address affinity and cookie persistence Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump User roles and administrative partitions vCMP concepts Customizing application delivery with iRules This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Configuring the Management Interface Activating the Software License Provisioning Modules and Resources Importing a Device Certificate Specifying BIG-IP Platform Properties Configuring the Network Configuring Network Time Protocol (NTP) Servers Configuring Domain Name System (DNS) Settings Configuring High Availability Options Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Traffic Processing Building Blocks Identifying BIG-IP Traffic Processing Objects Configuring Virtual Servers and Pools Load Balancing Traffic Viewing Module Statistics and Logs Using the Traffic Management Shell (TMSH) Understanding the TMSH Hierarchical Structure Navigating the TMSH Hierarchy Managing BIG-IP Configuration State and Files BIG-IP System Configuration State Loading and Saving the System Configuration Shutting Down and Restarting the BIG-IP System Saving and Replicating Configuration Data (UCS and SCF) Using NATs and SNATs Address Translation on the BIG-IP System Mapping IP Addresses with NATs Solving Routing Issues with SNATs Configuring SNAT Auto Map on a Virtual Server Monitoring for and Mitigating Port Exhaustion Monitoring Application Health Introducing Monitors Types of Monitors Monitor Interval and Timeout Settings Configuring Monitors Assigning Monitors to Resources Managing Pool, Pool Member, and Node Status Using the Network Map Modifying Traffic Behavior with Profiles Introducing Profiles Understanding Profile Types and Dependencies Configuring and Assigning Profiles Introducing SSL Offload and SSL Re-Encryption Managing Object State Modifying Traffic Behavior with Persistence Understanding the Need for Persistence Introducing Source Address Affinity Persistence Managing Object State Administering the BIG-IP System Configuring Logging Legacy Remote Logging Introducing High Speed Logging (HSL) High-Speed Logging Filters HSL Configuration Objects Configuring High Speed Logging Using TCPDUMP on the BIG-IP System Leveraging the BIG-IP iHealth System Viewing BIG-IP System Statistics Defining User Roles and Administrative Partitions Leveraging vCMP Configuring High Availability Introducing Device Service Clustering (DSC) Preparing to Deploy a DSC Configuration Configuring DSC Communication Settings Establishing Device Trust Establishing a Sync-Failover Device Group Synchronizing Configuration Data Exploring Traffic Group Behavior Understanding Failover Managers and Triggers Achieving Stateful Failover with Mirroring
This concise and comprehensive course takes you through the basic and advanced topics of Ansible, explaining all the concepts clearly and thoroughly. You will not only master the concepts but also learn how to use Ansible with cloud services and containers.