• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1191 Systems courses in Nottingham delivered Live Online

3ds Max Basic to Intermediate Training

By London Design Training Courses

Why Choose 3ds Max Basic to Intermediate Training Course? Course info Looking to take your 3D modelling and animation skills to the next level then Our Intermediate 3DS Max course is designed to help you do just that! A bespoke course ideal for anyone who has a solid understanding of modelling in the 3D environment for films & games. Duration: 20 hrs Method: 1-on-1, Personalized attention. Schedule: Tailor your own schedule and hours of your choice, available from Mon to Sat between 9 am and 7 pm. Why Opt for Our 3ds Max Basic to Intermediate Course? Elevate your 3D modeling and animation skills with our tailored Intermediate 3DS Max course, perfect for those proficient in 3D modeling for films and games. 3ds Max Interface: Familiarize yourself with essential interface areas, tool names, and shortcuts. Master the Scene Explorer for comprehensive scene control. Learn initial software settings for an efficient workflow. Organize your project folder for streamlined work management. Enhance workflow through scene navigation shortcuts and visual styles setup. Understand scene unit configuration for precision. Foundations of 3D Modeling: Acquire industry-standard 3D modeling techniques. Implement compositing modeling with procedural geometry. Utilize non-destructive methods via Modifiers to enhance base geometries. Create 3D models using Splines and modifiers like Extrude, Sweep, and Lathe. Explore Boolean operations for complex shape creation. Delve into Mesh Modeling, enabling manual mesh editing for customized objects. Mesh Modeling: Navigate mesh modeling tools in 3ds Max. Model hard surface objects using mesh modeling and other techniques. Unleash creativity in modeling various objects. Material Creation and Application: Understand material basics and texture application. Create, apply, and resize materials on models. Utilize pictures as references for modeling. Apply multiple materials to one object. Incorporate transparency, reflection, and self-illuminating textures. Utilize images with transparency for intricate texture designs. Camera Control Techniques: Learn camera creation and viewpoint adjustment. Modify camera focal length and lock settings for stability. Adjust camera exposure for desired image brightness. Explore cameras with and without targets, understanding their differences. Lighting: Create realistic lighting using daylight systems. Fine-tune daylight settings based on geographical location. Optimize render settings for high-quality output. Utilize various light types for interior illumination. Master light distribution and apply color filters and textures. Implement HDRI environment images for realistic lighting effects. Animation Essentials: Gain a basic understanding of animation principles. Animate objects manually through keyframing. Create walkthrough animations using cameras and paths. Construct efficient camera rigs for path-based animations. Render animations as video output. Advanced Rendering Techniques: Explore rendering with V-Ray Simulate daylight systems and interior lighting in V-Ray Set up studio lighting configurations in both V-Ray advanced rendering. Course Requirements: A computer with 3ds Max and Vray installed (trial versions available on Autodesk and Chaos Group websites) Basic familiarity with 3D modeling concepts is beneficial but not mandatory Enthusiasm for learning 3ds Max and Vray to create impressive 3D models, visualizations, and animations

3ds Max Basic to Intermediate Training
Delivered in London or OnlineFlexible Dates
£600

Process Safety Management & Engineering Applications

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This 5 full-day course covers all the main elements of IChemE's Process Safety Competency framework: culture, knowledge and competence, engineering and design, human factors, systems and procedures, and assurance. Participants will achieve at least the second level of competence 'Basic Application', which is defined as 'Performs fundamental and routine tasks. Requires occasional supervision. Increased functional expertise and ability. Works with others.' This course examines the interrelation of the various techniques of process safety for analysing and managing process hazards in the hydrocarbon and chemical processing industries. There is a particular emphasis on engineering design aspects with extensive participation in individual and group exercises, tutored exercises and video case studies throughout the course to underpin key learning points. The learning is consolidated in a comprehensive case study and requires collaboration between members of each syndicate. This course has been reviewed and approved by the Institution of Chemical Engineers. IChemE is the global professional membership organisation for chemical, biochemical and process engineers and other professionals involved in the chemical, process and bioprocess industries. Their knowledge of professional standards, close involvement with industry, education and regulators, and their expertise as a leading global training provider, means they are uniquely positioned to independently assess and approve training courses and professional development programmes across the world. Training Objectives By the end of this course, participants will be able to: Acquire the underpinning knowledge required to achieve process safety competency Gain a comprehensive understanding of process safety management Understand the concept of the safety life cycle of a process plant from conceptual design onwards including operation, maintenance and modification Understand the hazard scenarios associated with a process plant Understand how risks can be controlled by hardware and procedural measures Identify and analyse hazard causes and consequences Recognise when specialist analytical expertise is required Generate effective and appropriate measures to reduce risks Justify and communicate practical solutions to non-technical personnel Explain the rationale for process safety measures to decision makers Target Audience This course is suitable for process industry professionals who need to acquire a comprehensive understanding of process safety management, those moving into process safety positions or those who wish to broaden their process safety knowledge within their existing discipline. It is particularly suited for anyone involved in the design, operation, modification or maintenance of a major hazard installation. This includes: Supervisors, operators and maintainers in Oil & Gas, Petrochemical and Chemical industries, process, mechanical and chemical engineers and technicians Design engineers, project engineers and HSE managers Control, automation and instrumentation engineers It will also demonstrate a substantial understanding of process safety for those engaged in Continuous Professional Development or aiming for the Chartered Engineer status. Course Level Basic or Foundation Trainer Your expert course leader has 50 years' experience in chemical and process safety engineering. His early career included 20 years in design and project engineering with various fine chemical and pharmaceutical companies where he designed chemical processes, specified plant equipment and selected materials for highly corrosive and toxic processes, often where textbook data was not available. This was followed by 10 years in offshore oil and gas design projects where he was responsible for setting up a Technical Safety group to change design safety practices in the aftermath of the 1988 Piper Alpha disaster. In recent years, he has been called upon to conduct various offshore and onshore incident investigations. His career has given him experience in project engineering, project management, process design and operations, safety engineering and risk management. He is a Fellow of the UK Institution of Chemical Engineers. He served on the Scottish Branch committee, and was elected chairman for a two-year term in 1991. He has also been chairman of the Safety and Reliability Society - North of Scotland Branch. He has delivered training courses in Process Hazard Analysis (HAZOP and HAZID), Process Safety Management, Hazard Awareness, Risk Assessment, Root Cause Analysis, Failure Modes & Effect Analysis and has lectured on Reliability Analysis to the M.Sc. course in Process Safety and Loss Prevention at Sheffield University. In addition to delivering training courses, he currently facilitates HAZOP / HAZID / LOPA studies and undertakes expert witness roles advising lawyers engaged in contractual disputes, usually involving the design or construction of chemical plants or Oil & Gas production facilities, or criminal prosecutions. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Process Safety Management & Engineering Applications
Delivered in Internationally or OnlineFlexible Dates
£3,095 to £3,599

VMware Workspace ONE: Advanced Integrations [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Identify key benefits of Workspace ONE Access to address your specific use case Describe the different identity sources supported by Workspace ONE Access and apply the most appropriate to your organization's use case Differentiate common authentication methods in Workspace ONE Access and select the most suitable method to fit your business needs Illustrate how to use access policies and implement best practices within your organization Outline various authentication methods and workflows that can be implemented to ensure a robust end-user experience, while meeting your security requirements Summarize the capabilities and benefits of VMware Workspace ONE Intelligent Hub and Hub Services and learn how to effectively implement both Discuss how to implement Workspace ONE Intelligent Hub and Hub Services effectively Describe features of VMware Workspace ONE Intelligence™ and how to use it to support daily administration and maintenance Explain how to use the Workspace ONE UEM and Workspace ONE Access APIs to perform administration and maintenance Outline Workspace ONE design methodology and how it can apply to your organization In this five-day course, you build on the foundations learned in VMWare Workspace ONE: Deploy & Manage to accelerate the advancement of your deployment and management systems with VMware Workspace ONE© UEM and VMware Workspace ONE© Access?.Through a series of hands-on labs, simulations, and interactive lectures, you effectively evaluate your organization?s current practices and discover opportunities to target improvements in identity, authentication, and access management. Additionally, you learn the strategies and techniques necessary to construct an integrated management strategy, utilizing a comprehensive set of VMware Workspace ONE© services, including Hub Services, the Unified Catalog, Intelligence, and the API. Course Introduction Introduction and course logistics Course objectives Workspace ONE Platform List the high-level components of the Workspace ONE platform Identify benefits of integrating Workspace ONE Access with other Workspace ONE products Explain what services Workspace ONE Access offers Outline the use cases for Workspace ONE Access Connector Identity Sources Identify different directory types in Workspace ONE Access based on identity sources Explain supported web standards for identity Explain Workspace ONE Access workflows of an Active Directory and an LDAP directory Identify features and use cases of third-party identity sources Identify the features and use cases of the VMware AirWatch© Provisioning app Authentication Identify the benefits of modern identity and access management Explain the workflows of connector-based authentication methods, such as Kerberos, RADIUS, and RSA SecureID Explain the workflows of cloud-based authentication methods, such as mobile SSO for iOS, mobile SSO for Android, and Workspace ONE Verify Access Policies Explain access policies and their importance Describe how identity providers (IdPs) and authentication methods work with access policies Explain how to create policy rules following best practice Catalog Define the types of resources in the Workspace ONE Access catalog Outline the common SAML authentication initiation methods for web applications in Workspace ONE Access Describe the high-level integration steps of a Horizon Cloud integration with Workspace ONE Access Hub Services Describe the relationship between Hub Services, Workspace ONE Intelligent Hub, Workspace ONE UEM, and Workspace ONE Access Illustrate the primary components of Hub Services Describe the features and use cases of Workspace ONE Verify Explain how to deploy mobile flows according to a use case Workspace ONE Intelligence Describe how Workspace ONE Intelligence supports your deployment and management strategy Explain how the Digital Employee Experience Management Solution helps improve employees' Anywhere Workspace journey Explain how you can use Dashboards to access different data for your device management use cases Explain how integration works to connect and share data with third parties Workspace ONE Application Programming Interface Outline the use cases for using the Workspace ONE API Explain how to perform Workspace ONE UEM administration and maintenance through the API Explain how to perform Workspace ONE Access administration and maintenance through the API Design Methodology Explain the Workspace ONE business drivers and use case definition Define Workspace ONE services Discuss how to make architectural design decisions Explain how to create component designs Discuss which third-party components are required for infrastructure design Discuss the process of platform integration Explain the required services for service integration Explain how to design user experience

VMware Workspace ONE: Advanced Integrations [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

3D Printing Training Course for Product Designers

By ATL Autocad Training London

Who is this course for? The 3D Printing Bespoke 1-on-1 Training Course is designed for individuals seeking personalized instruction and hands-on experience in the field of 3D printing. Click here for more info: Website Training: 40 hrs, split as per your availability. When: 9 a.m. to 7 p.m., Mon-Sat. Call 02077202581 to reserve. Live online, or in-person. Option A: AutoCAD 10 hrs, Rhino 16 hrs, Vray 4 hrs, Photoshop 4 hrs, 3D Printing 6 hrs Option B: AutoCAD 12 hrs, 3ds Max 16 hrs, Vray 4 hrs, Photoshop 4 hrs, 3D Printing 4 hrs.  Option A: AutoCAD, Rhino, Vray, Photoshop, 3D Printing (Total: 40 hours) AutoCAD (10 hours): Module 1: Introduction to AutoCAD (2 hours) Familiarization with AutoCAD interface and tools Creating, opening, and saving drawings Basic drawing and editing commands Module 2: Drawing and Editing (3 hours) Lines, circles, and arcs Polylines and polygons Modifying objects: Move, Copy, Rotate, and Scale Module 3: Precision Drawing (3 hours) Using coordinate systems Dimensioning and text Hatching and gradients Module 4: Advanced Tools (2 hours) Blocks and attributes Layers and object properties Creating layouts and plotting Rhino (16 hours): Module 1: Introduction to Rhino (2 hours) Navigating the Rhino interface Basic 2D and 3D modeling concepts Creating and manipulating objects Module 2: Advanced Modeling (6 hours) Modeling with curves and surfaces Editing and transforming geometry Building complex 3D structures Module 3: Visualization with Vray (4 hours) Understanding the Vray rendering engine Applying materials and textures Setting up lighting and cameras for realistic rendering Module 4: Presentation and Editing (2 hours) Exporting and sharing Rhino models Post-processing and enhancing designs Photoshop (4 hours): Module 1: Introduction to Photoshop (2 hours) Navigating Photoshop interface Image resolution and size Basic image editing tools Module 2: Image Editing and Enhancement (2 hours) Adjusting colors and tones Using layers and masks Retouching and image manipulation 3D Printing (6 hours): Module 1: Introduction to 3D Printing (2 hours) Basics of 3D printing technology Understanding file formats and requirements Module 2: Preparing 3D Models (2 hours) Model optimization for 3D printing Creating supports and rafts Ensuring successful prints Option B: AutoCAD, 3ds Max, Vray, Photoshop, 3D Printing (Total: 38 hours) AutoCAD (12 hours): Module 1: Introduction to AutoCAD (2 hours) Overview of AutoCAD interface and tools Creating, opening, and saving drawings Basic drawing and editing commands Module 2: Drawing and Editing (3 hours) Lines, circles, and arcs Polylines and polygons Modifying objects: Move, Copy, Rotate, and Scale Module 3: Precision Drawing (3 hours) Using coordinate systems Dimensioning and text Hatching and gradients Module 4: Advanced Tools (4 hours) Blocks and attributes Layers and object properties Creating layouts and plotting 3ds Max (16 hours): Module 1: Introduction to 3ds Max (2 hours) Exploring the 3ds Max interface Navigating viewports and objects Basic modeling techniques Module 2: 3D Modeling (6 hours) Creating and editing 3D objects Modifiers and deformations Working with shapes and splines Module 3: Visualization with Vray (4 hours) Setting up lights and cameras Rendering settings and options Post-production and compositing Photoshop (4 hours): Module 1: Introduction to Photoshop (2 hours) Navigating Photoshop interface Image resolution and size Basic image editing tools Module 2: Image Editing and Enhancement (2 hours) Adjusting colors and tones Using layers and masks Retouching and image manipulation 3D Printing (4 hours): Module 1: Introduction to 3D Printing (2 hours) Basics of 3D printing technology Understanding file formats and requirements Module 2: Preparing 3D Models (2 hours) Model optimization for 3D printing Creating supports and rafts Ensuring successful prints Training Duration: 40 hours Flexible Timings: Students can choose their preferred time slots based on our availability, operating from 9:00 am to 7:00 pm (Monday to Saturday). Pricing Details: Company Rate: £1200 (Plus 20% VAT) = £1440 inc VAT. Student, Self-Financed, and Live Online Rate: £1000 (Plus 20% VAT) = £1200 inc VAT. Who Should Enroll: This course caters to a wide range of individuals, including: Novices: Perfect for beginners unfamiliar with AutoCAD, 3ds Max, Adobe Photoshop, Rhino, Vray, and 3D printing, providing a solid foundational understanding. Architects and Interior Designers: Tailored insights for professionals seeking precision in enhancing their design skills, valuable for design firms. Industry Professionals: Establishes industry benchmarks, offering adaptable education applicable across sectors like interior design, architecture, and civil engineering. Learning Approach: Hands-On Practicality: Emphasizes practical, real-world skills through personalized one-on-one training, available in face-to-face or live online sessions. Step-by-Step Instruction: Experienced instructors guide you systematically through techniques using AutoDesk AutoCAD, Autodesk 3ds Max, Adobe Photoshop, and Trimble Sketchup. What You'll Receive: Certificate of Achievement: Upon completion, receive a certificate validating your expertise. Comprehensive Training Guide: Access an extensive PDF guide compatible with both Windows and MAC. Live Feedback: Connect with your tutor for real-time feedback during sessions and the option to record each session for future reference. Our Benefits: Price Assurance: Guaranteeing exceptional value for your career investment. Personalized Training: Tailored one-on-one sessions, adjusting to your learning pace and style. Flexible Scheduling: Choose your preferred training time and day, available Monday to Sunday, from 9 am to 8 pm. Lifetime Support: Ongoing email and phone support beyond the course completion. Computer Setup Assistance: We assist in configuring your computer for seamless software installation. Referral Benefits: Recommend a friend and enjoy discounts, including significant savings on group training courses. Advantages of Option A: Diverse Skill Enhancement: Acquire proficiency in AutoCAD, Rhino, Vray, Photoshop, and 3D Printing, expanding your skill repertoire. Career Opportunities: Access a wide range of career paths in design, architecture, and 3D printing fields, enhancing your professional prospects. Compelling Visualizations: Craft realistic and visually appealing 3D renderings using Vray, elevating the quality of your design presentations. Image Editing Expertise: Master the art of enhancing design projects with Photoshop, adding finesse to your creative work. Prototyping Prowess: Develop essential skills in 3D Printing, enabling you to create physical design prototypes for various applications. Advantages of Option B: Versatile Skill Mastery: Excel in AutoCAD, 3ds Max, Vray, Photoshop, and 3D Printing, gaining expertise in diverse areas of design and visualization. Career Advancement: Unlock opportunities in architecture, animation, and visualization fields, broadening your career horizons. High-Quality Renderings: Showcase your designs impressively with high-quality renderings generated through Vray, leaving a lasting impact on viewers. Image Editing Mastery: Polish your design concepts and presentations using advanced Photoshop techniques, ensuring your visuals are refined and professional. 3D Printing Expertise: Bring your digital designs to life across various industries, mastering the intricate art of 3D printing. Our training courses cater to both Mac and Windows operating systems and provide: Price Assurance: Ensuring the best value for your investment. Personalized Attention: Benefit from one-on-one training sessions tailored to your learning pace and style. Flexible Scheduling: Choose your preferred time and day for training sessions, available seven days a week from 9 am to 8 pm. Ongoing Support: Enjoy lifetime email and phone support, ensuring you're never alone on your learning journey. Technical Assistance: Receive guidance in configuring your computer for software installation, ensuring a seamless learning experience. Special Benefits: Avail special discounts when you refer a friend and significant savings on group training courses, maximizing the value of your training investment.

3D Printing Training Course for Product Designers
Delivered in London or OnlineFlexible Dates
£1,440

This Coaching Program is unlike any other Coaching certification in the Market, It gives you the exclusive opportunity to be qualified as an Executive & Life Coach, as well as learn the NLP tools and the business building aspect.

Success Coaching Diploma
Delivered OnlineFlexible Dates
£1,500

Advanced Load Forecasting & Methodology

By EnergyEdge - Training for a Sustainable Energy Future

About this Course This 5 full-day course presents the most modern statistical and mathematical forecasting frameworks used by practitioners to tackle the load forecasting problem across short time and long time scales. The course presents practical applications to solving forecasting challenges, supported by real life examples from large control areas. It presents the weather impacts on the load forecasts and the methodologies employed to quantify the weather effect and building a repository of weather normal data. A good load forecast methodology must improve its forecasting accuracy and support a consistent load forecasting process. The load forecasting widely used in the power industry has evolved significantly with the advancement and adoption of Artificial Intelligence techniques such as Machine Learning. With the increased penetration of inverter-based resources, the operation of electric grids grew in complexity, leading to load forecasts that are updated more frequently than once a day. Furthermore, several jurisdictions adopted a smaller granularity than the hourly load forecasts in the effort to reduce the forecasting uncertainties. On the generation side, fuel forecasting professionals must meet energy requirements while making allowance for the uncertainty on both the demand and the supply side. This training course will also feature a guest speaker, who is a Ph.D candidate to provide insights into the most modern aspects of Artificial Intelligence in the context of load forecasting. Training Objectives This course offers a comprehensive approach to all aspects of load forecasting: Gain a perspective of load forecasting from both operators in the generating plant and system operators. Understand and review the advanced load forecasting concepts and forecasting methodologies Learn the application of Artificial Neural Networks and Probabilistic Forecasting methods to manage forecasting uncertainties in short time frames Appreciate market segmentation and econometric framework for long term forecasts Find out the most recent practical application of load forecasting as examples from large power companies Get access to recent industry reports and developments Target Audience Energy load forecasting professionals from power plant and system operators Energy planners and energy outlook forecasters and plant operators Fuel procurement professionals Planners and schedulers of thermal generating units Course Level Intermediate Trainer Your expert course instructor is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Our Key expert delivered over 60 specialized seminars to executives and engineers from Canada, Europe, South and North America, Middle East, South East Asia and Japan. Few examples are: Modern Power System in Digital Utilities - The Energy Commission, Malaysia and utilities in the Middle East, GCCIA, June 2020 Assessment of OETC Control Centre, Oman, December 2019 Demand Side management, Load Forecasting in a Smart Grid, Oman, 2019 Renewable Resources in a Smart Grid (Malaysia, Thailand, Indonesia, GCCIA, Saudi Arabia) The Modern Power System: Impact of the Power Electronics on the Power System The Digital Utility, AI and Blockchain Smart Grid and Reliability of Distribution Systems, Cyme, Montreal, Canada Economic Dispatch in the context of an Energy Market (TNB, Sarawak Energy, Malaysia) Energy Markets, Risk Assessment and Financial Management, PES, IEEE: Chicago, San Francisco, New York, Portugal, South Africa, Japan. Provided training at CEO and CRO level. Enterprise Risk methodology, EDP, Portugal Energy Markets: Saudi Electricity Company, Tenaga National Berhad, Malaysia Reliability Centre Maintenance (South East Asia, Saudi Electricity Company, KSA) EUSN, ENERGY & UTILITIES SECTOR NETWORK, Government of Canada, 2016 Connected+, IOT, Toronto, Canada September 2016 and 2015 Smart Grid, Smart Home HomeConnect, Toronto, Canada November 2014 Wind Power: a Cautionary Tale, Ontario Centre for Public Policy, 2010 POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Advanced Load Forecasting & Methodology
Delivered in Internationally or OnlineFlexible Dates
£3,568 to £4,149

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered OnlineFlexible Dates
£2,380

VMWare Telco Cloud Service Assurance: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Customers, cloud architects, systems engineers, data center administrators Network administrators with experience in managed services or managing a Telco Cloud environment Overview By the end of the course, you should be able to meet the following objectives: Deploy VMware Telco Cloud Service Assurance Manage VMware Telco Cloud Service Assurance to satisfy Telco cloud provider needs Discuss configurable options for VMware Telco Cloud Service Assurance Identify and configure different data sources which are used with VMware Telco Cloud Service Assurance Configure different collectors in VMware Telco Cloud Service Assurance Identify the Root Cause Analysis options with VMware Telco Cloud Service Assurance Discuss data collection in VMware Telco Cloud Service Assurance Explain root cause analysis in VMware Telco Cloud Service Assurance Navigate through the logs for troubleshooting This three-day, hands-on training course provides the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Telco Cloud Service Assurance environment. In this course, you are introduced to the installation methods of VMware Telco Cloud Service Assurance? across various supported platforms and troubleshooting tools that help you install, manage, and troubleshoot your VMware Telco Cloud Service Assurance environment. In addition, you are presented with various types of configuration options, which you will identify, analyze, and navigate through as you explore the UI and configurable options of the product. Course Introduction Introduction and course logistics Course objectives Introduction to VMware Telco Cloud Service Assurance Describe the features of VMware Telco Cloud Service Assurance List the capabilities of VMware Telco Cloud Service Assurance Discuss the use cases of VMware Telco Cloud Service Assurance Describe the role played by VMware Telco Cloud Service Assurance components in delivering service assurance Deploying VMware Telco Cloud Service Assurance Explain different deployment options of VMware Telco Cloud Service Assurance Identify different deployment methods of VMware Telco Cloud Service Assurance Discuss different phases in deploying VMware Telco Cloud Service Assurance Identify different footprints available for HA based and non-HA based installation of VMware Telco Cloud Service Assurance Describe the SMARTs components of VMware Telco Cloud Service Assurance Deploy VMware Telco Cloud Service Assurance User Access Control Describe the features Role-based Access Control (RBAC) Outline the role of Keycloak in implementing RBAC in VMware Telco Cloud Service Assurance Configure user federation in Keycloak Use the VMware Telco Cloud Service Assurance UI to manage RBAC Create policies in VMware Telco Cloud Service Assurance that align with job roles Services and User Interface Configurations Describe the architecture of logical switching Describe the core services on a TCSA cluster Discuss the Global Manager or Service Assurance Manager (SAM), IP Domain Manager, Server Manager (ESM) Discuss VMware Telco Cloud Service Assurance UI Overview Explain Working with Notifications Elaborate Configuring Summary's Describe Accessing Notification Details Explain Viewing and configuring Topologies List Customizing Topologies Describe Topology Explorer Explain Collecting Troubleshooting Information Discuss Custom models Describe how compute resources are provided to VMware Telco Cloud Service Assurance Describe how storage is provided to VMware Telco Cloud Service Assurance Configure and manage VMware Telco Cloud Service Assurance Discuss configurable options for VMware Telco Cloud Service Assurance Day 1 and Day 2 Operations Review the architecture of logical routing and NSX Edge nodes Identify different data sources to be used with VMware Telco Cloud Service Assurance Configure different collectors with VMware Telco Cloud Service Assurance Describe Alarms and Thresholds Demonstrate how to configure alarms with VMware Telco Cloud Service Assurance Explain how to setup thresholds and timelines in VMware Telco Cloud Service Assurance Define Catalog management and sharing catalogs inside and between organizations. Identify the steps to import or upload data into catalogs. Explain the purpose of catalogs and How to Create a catalog organization. Describe the Purpose and Usage of Open Virtualization Format (OVA) and Custom vApp or VM Properties. Discuss vApp Templates Logs and Troubleshooting Review the architecture of the Distributed Firewall Discuss VMware Telco Cloud Service Assurance installations logs List Smarts installation logs Explain backup and restore options of VMware Telco Cloud Service Assurance Identify the approach for troubleshooting containerized services Discuss monitoring services

VMWare Telco Cloud Service Assurance: Install, Configure, Manage [V2.0]
Delivered OnlineFlexible Dates
Price on Enquiry

Gas Lift Design & Optimization using NODAL Analysis

By EnergyEdge - Training for a Sustainable Energy Future

About this training course Gas-lift is one of the predominant forms of artificial lift used for lifting liquids from conventional, unconventional, onshore and offshore assets. Gas-lift and its various forms (intermittent lift, gas-assisted plunger lift) allows life of well lift-possibilities when selected and applied properly. This 5-day training course is designed to give participants a thorough understanding of gas-lift technology and related application concepts. This training course covers main components such as application envelope, relative strengths and weaknesses of gas-lift and its different forms like intermittent lift, gas-assisted plunger lift. Participants solve examples and class problems throughout the course. Animations and videos reinforce the concepts under discussion. Unique Features: Hands-on usage of SNAP Software to solve gas-lift exercises Discussion on digital oil field Machine learning applications in gas-lift optimization Training Objectives After the completion of this training course, participants will be able to: Understand the fundamental theories and procedures related to Gas-Lift operations Easily recognize the different components of the gas-lift system and their basic structural and operational features Be able to design a gas-lift installation Comprehend how digital oilfield tools help address ESP challenges Examine recent advances in real-time approaches to the production monitoring and lift management Target Audience This training course is suitable and will greatly benefit the following specific groups: Production, reservoir, completion, drilling and facilities engineers, analysts, and operators Anyone interested in learning about implications of gas-lift systems for their fields and reservoirs Course Level Intermediate Advanced Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 5 days in total (35 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 20. This course is also available through our Virtual Instructor Led Training (VILT) format. Prerequisites: Understanding of petroleum production concepts. Each participant needs a laptop/PC for solving class examples using software to be provided during class. Laptop/PC needs to have a current Windows operating system and at least 500 MB free disk space. Participants should have administrator rights to install software. Trainer Your expert course leader has over 35 years' work-experience in multiphase flow, artificial lift, real-time production optimization and software development/management. His current work is focused on a variety of use cases like failure prediction, virtual flow rate determination, wellhead integrity surveillance, corrosion, equipment maintenance, DTS/DAS interpretation. He has worked for national oil companies, majors, independents, and service providers globally. He has multiple patents and has delivered a multitude of industry presentations. Twice selected as an SPE distinguished lecturer, he also volunteers on SPE committees. He holds a Bachelor's and Master's in chemical engineering from the Gujarat University and IIT-Kanpur, India; and a Ph.D. in Petroleum Engineering from the University of Tulsa, USA. Highlighted Work Experience: At Weatherford, consulted with clients as well as directed teams on digital oilfield solutions including LOWIS - a solution that was underneath the production operations of Chevron and Occidental Petroleum across the globe. Worked with and consulted on equipment's like field controllers, VSDs, downhole permanent gauges, multiphase flow meters, fibre optics-based measurements. Shepherded an enterprise-class solution that is being deployed at a major oil and gas producer for production management including artificial lift optimization using real time data and deep-learning data analytics. Developed a workshop on digital oilfield approaches for production engineers. Patents: Principal inventor: 'Smarter Slug Flow Conditioning and Control' Co-inventor: 'Technique for Production Enhancement with Downhole Monitoring of Artificially Lifted Wells' Co-inventor: 'Wellbore real-time monitoring and analysis of fracture contribution' Worldwide Experience in Training / Seminar / Workshop Deliveries: Besides delivering several SPE webinars, ALRDC and SPE trainings globally, he has taught artificial lift at Texas Tech, Missouri S&T, Louisiana State, U of Southern California, and U of Houston. He has conducted seminars, bespoke trainings / workshops globally for practicing professionals: Companies: Basra Oil Company, ConocoPhillips, Chevron, EcoPetrol, Equinor, KOC, ONGC, LukOil, PDO, PDVSA, PEMEX, Petronas, Repsol, , Saudi Aramco, Shell, Sonatrech, QP, Tatneft, YPF, and others. Countries: USA, Algeria, Argentina, Bahrain, Brazil, Canada, China, Croatia, Congo, Ghana, India, Indonesia, Iraq, Kazakhstan, Kenya, Kuwait, Libya, Malaysia, Oman, Mexico, Norway, Qatar, Romania, Russia, Serbia, Saudi Arabia, S Korea, Tanzania, Thailand, Tunisia, Turkmenistan, UAE, Ukraine, Uzbekistan, Venezuela. Virtual training provided for PetroEdge, ALRDC, School of Mines, Repsol, UEP-Pakistan, and others since pandemic. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Gas Lift Design & Optimization using NODAL Analysis
Delivered in Internationally or OnlineFlexible Dates
£3,749 to £4,360

ISO 37301 Lead Auditor

By Training Centre

  Many organizations seek competent auditors to determine whether their policies, procedures, and controls adhere to ISO 37301 requirements. This training course aims to help you complete these tasks successfully and intends to reflect the importance of effective CMS audits. In addition, this training course aims to strengthen your knowledge and skills to plan and carry out CMS audits based on the guidelines for auditing management systems provided in ISO 19011 and the certification process described in ISO/IEC 17021-1.  This training course can potentially qualify you to conduct audits on behalf of conformity assessment bodies. The exercises, quizzes, and case studies provided in this training course are designed to help you practice the most important aspects of a CMS audit: ISO 37301 requirements, auditing principles, tools and techniques used to obtain evidence, leading a team of auditors, conducting interviews with auditee, reviewing documented information, drafting nonconformity reports, and preparing the final audit report. After successfully completing the training course, you can sit for the exam and gain the "Certified ISO 37301 Lead Auditor' credential. This credential validates your professional capabilities and demonstrates that you have the knowledge and skills to audit a CMS based on ISO 37301. About This Course   This training course enables you to: Understand the main concepts of a compliance management system (CMS) and its processes based on ISO 37301 Acknowledge the relationship between ISO 37301 and other standards and regulatory frameworks Understand the auditor's role in planning, leading, and following up on a CMS audit in accordance with ISO 19011 Interpret the requirements of ISO 37301 in the context of a CMS audit Plan an audit, lead a team of auditors, draft nonconformity reports, and follow up on an audit Act with due professional care during an audit Course Agenda Day 1: Introduction to the compliance management system (CMS) and ISO 37301 Day 2: Audit principles and the preparation for and initiation of an audit Day 3: On-site audit activities Day 4: Closing of the audit and the Exam. Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success.       Prerequisites   A fundamental understanding of ISO 37301 requirements (or ISO 19600 guidelines) for a CMS and a comprehensive knowledge of audit principles. What's Included?   Certification fees are included in the exam price. Training material of over 450 pages of information and practical examples. An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to participants who have attended the training course. In case of exam failure, the candidate can retake the exam once for free within 12 months following the initial exam date. Who Should Attend?   The ISO 37301 Lead Auditor training course is intended for: Auditors seeking to perform and lead CMS audits Managers or consultants seeking to master the CMS audit process Individuals responsible for maintaining conformity to ISO 37301 requirements in an organization Technical experts seeking to prepare for a CMS audit Expert advisors and compliance officers Accreditation Provided by   This course is Accredited by NACS and Administered by the IECB.

ISO 37301 Lead Auditor
Delivered OnlineFlexible Dates
£1,450