The Electronics Equipment Repair 1 equips participants with practical “Hands-On” skills relevant to the workplace and the theory required for certification. Participants on successful completion of the course will have the skills and knowledge to: Demonstrate the operation of a wide range of electronic components and circuits and their applications in modern electronic-based equipment such as amplifiers, Hi-Fi systems, stereos, and control systems Construct, test and fault-find the following popular basic circuits: Power supplies, amplifiers, timers, etc. Become competent in the correct use of electronic test and measurement equipment such as Analogue and Digital Multimeter and Oscilloscopes.
About this training course This 5 full-day course provides a comprehensive understanding of all the commissioning and start-up activities of all electrical equipment including transformers, switchgear, induction and synchronous motors, generators and auxiliaries. All commissioning activities are covered in detail in this course. This includes all the commissioning procedures and documents, purpose of commissioning, responsibilities, system description, documentation, testing and commissioning schedules, test reports, safety, certification, and plant completion report. The course provides also a thorough understanding of all the commissioning requirements for transformers, switchgear, induction and synchronous motors and, generator and auxiliaries including its switchgear equipment, switchgear, and transformers. All the stages of the commissioning procedure are covered in-depth in this course. This includes preparation - planning various activities, pre-commissioning checks and tests, typical commissioning schedule, detailed tests and commissioning procedures for every type of transformers, switchgear, induction and synchronous motors, and generators and auxiliary systems, instrumentation, trial run of the equipment, safety and precautions, commissioning of electrical systems, Safety Rules Clearance Certificates, procedure for the control and handling of defects, Commissioning Reports. This course is a MUST for anyone who is involved in the pre-commissioning or commissioning of any electrical equipment because it provides detailed pre-commissioning checks and tests and detailed tests and commissioning procedures for every electrical equipment. In addition, the course provides in-depth coverage of all preparation, planning activities, commissioning schedules, trial run of each electrical equipment, safety and precautions, Safety Rules Clearance Certificates, Procedures for handling defects, and Commissioning Reports. Training Objectives Pre-Commissioning Checks and Tests, Detailed Tests and Commissioning Procedures and Instructions for all Electrical Equipment: Gain a thorough understanding of all pre-commissioning checks and tests, and all commissioning procedures and instructions for all electrical equipment Commissioning Procedures, Documents, and Certification of Electrical Equipment: Discover the benefits of the Commissioning Management System of electrical equipment including all commissioning procedures and documents, purpose of commissioning, responsibilities, system description, documentation, testing and commissioning schedules, test reports, safety, equipment certification, and commissioning completion report Commissioning Procedures for Transformers: Learn about the commissioning procedures for transformers including functional checks, pre-commissioning tests, commissioning tests, and records. Commissioning Procedures for Switchgear Assemblies: Gain a thorough understanding of all the commissioning procedures for switchgear assemblies including substation commissioning, electrical testing, code requirements, safety rules, grounding and shorting, high power testing, NETA acceptance testing procedures, test values analysis, and commissioning forms Commissioning Procedures for Generator and Auxiliaries: Discover all the commissioning procedures for generator and auxiliaries including generator, seal oil system, hydrogen gas system, stator water system, rolling and payment of generator Commissioning Procedures and Instructions for Generator Electrical Equipment: Learn about all the commissioning procedures and instructions for generator electrical equipment including switchyard equipment, switchgear, transformers, and motors Code Requirements for Commissioning Electrical Equipment and Systems: Learn about the code requirements for commissioning transformers, switchgear, inductions and synchronous motors, and generators and auxiliaries Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: 'ELECTRICAL EQUIPMENT HANDBOOK' published by McGraw-Hill in 2003 (600 pages) ELECTRICAL EQUIPMENT COMMISSIONING MANUAL (includes practical information about all pre-commissioning checks and tests, typical commissioning schedule, detailed tests and commissioning procedures and instructions for all electrical equipment - 500 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
CISSP certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security. Through the Information Systems Security Professional Certification - (CISSP) Course you will gain the foundational knowledge to fully prepare for the exam, including a comprehensive understanding of the CISSP CBK 8 domains. The course will teach you to protect resources using access control methods and cryptography, to plan a secure environment aligned with organizational objectives, compliance requirements, and industry-standard architectures. You will learn to develop operational security and continuity through preventive and recovery mechanisms. You will understand security architecture and models, how to handle security management practices, understand telecommunications and networking security. Why choose this course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. Who is this course for? Information Systems Security Professional Certification - (CISSP) Course is suitable for anyone who want to gain extensive knowledge, potential experience and professional skills in the related field. This is a great opportunity for all student from any academic backgrounds to learn more on this subject.
The Alternative Energy Technology Course is a practically based alternative energy course designed to give participants an understanding of alternative energy options and provide them with that practical knowledge and skills to build solar to electric and wind to electric systems at a foundation level. The course is designed to be of benefit to people either working or intending to work as:- Alternative Energy Installers or anyone just wishing to gain practical knowledge of Practical Alternative Energy Systems
Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces
SMTP training course description A hands on course focusing on the workings of email systems and the standard protocols that they use. The course is not specific to any particular implementation, but some vendor specifics are noted. Linux and Microsoft machines are used in hands on sessions to reinforce the theory of major sessions. The course concentrates on troubleshooting and interworking using network sniffing and protocol inspection rather than "which buttons to push". What will you learn Describe and explain SMTP MIME POP3 IMAP PGP, GPG, S/MIME SPF, DKIM, DMARC Configure mail routing Secure email systems SMTP training course details Who will benefit: Technical staff responsible for email systems. Prerequisites: TCP/IP foundation for engineers. Duration 3 days SMTP training course contents SMTP architecture What is SMTP, email before SMTP, SMTP history, the different protocols, clients, servers. Email composition, transmission, delivering emails, storing and reading emails. MUAs, MTAs, POP3, IMAP, SMTP, DNS, webmail. Hands on Setting up MTAs and MUAs and sending a simple email using telnet. The SMTP protocol SMTP protocol stack, SMTP headers, HELO, SMTP mail, MAIL FROM, RCPT TO, DATA, SMTPUTF8, 8BITMIME, TURN, EHLO, ETRN, 3 digit replies. Hands on Analysing SMTP packets on a network. DNS and SMTP SMTP forwarding, SMTP relays, interoperation, how SMTP uses DNS, MX records. Hands on Setting up mail relays. SMTP headers IMF data, From, to, cc, bcc, sender and recipient headers, message Ids, received trails, in-reply-to, received-SPF, mail list headers. Hands on Using clients to analyse details from mail headers, including true originators and path of emails. MIME Email attachments, MIME versions, content type headers, encoding, base 64, binary data, multi part headers, troubleshooting attachments. Hands on Analysing MIME headers and attachments. POP3 What is POP3, where to use POP3, authorisation, transactions, POP3 commands: USER, PASS, STAT, LIST, RETR, DELE. Hands on Setting up a POP3 server, analysing POP3 packets on a network. IMAP and IMAPS What is IMAP, where to use IMAP, authorisation, mailbox structure, IMAP commands: LOGIN, AUTHENTICATE, LIST, CREATE, Examine (message flags), SELECT, STORE. Hands on Setting up an IMAP server and analysing IMAP packets on a network. Interoperation Mail gateways, addressing, Exchange, sendmail. Email security Basics, Transport level: STARTTLS. Content: PGP/GPG, mail signing and encryption, S/MIME, digital certificates, secure email submission. Hands on Setting up and using a PGP key, configure MTAs to use TLS. Email authentication and spam prevention Mail relays, grey listing, block list & RBL, DNSBL (Real-time Black hole List), White list, SPF, Domain Keys Identified Mail (DKIM), Author Domain Signing Practices (ADSP), Abuse Report Format (ARF), Domain-based Message Authentication, Reporting and Conformance (DMARC). Hands on Relay spamming and the blocking spamming.
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is appropriate for experienced UNIX system administrators who want to support AIX running on POWER processor based systems in a mult-iuser POWER (System p) partitioned environment. Overview At course completion, you will be able to:- Install the AIX operating system, filesets, and RedHat Package Manager (RPM) packages - Perform system startup and shutdown - Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM systems director console for AIX - Manage physical and logical devices - Discuss the purpose of the logical volume manager - Perform logical volume and file system management - Perform and restore system backups - Use the AIX error log as a tool in problem determination - Configure TCP/IP networking Students will learn to install, customize and administer the AIX operating system in a multi-user POWER (System p) partitioned environment. Introduction to AIX and IBM Power systems AIX system management tools AIX software installation and maintenance System configuration and devices TCP/IP networking System startup and shutdown Basics of configuring logical partitions AIX installation Working with the Logical Volume Manager File systems administration The Object Data Manager LVM metadata Disk management procedures Backup and restore Error monitoring System initialization - I System initialization - II (00:35) Exercise 17 (00:25) Unit 18: The AIX system dump facility (00:15) Exercise 18 Advanced install techniques Alternate disk installation Alternate disk - part 1 (pre-clone) Using multibos Alternate disk - part 2 (post-clone) multibos Appendix A: Survey of additional AIX facilities
Being ISO 27701 Certified proves your Information Privacy Systems Audit experience, skills and knowledge, and demonstrates you are capable in the assessment of vulnerabilities, Compliance with GDPR and institutional controls within the enterprise. Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards Enhance your existing or learn with new skills in the field of Data Protection Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements Become a Technical expert on the preparation required for ISO 27701 Certification Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit About This Course ISO 27701 Internal Auditor Certification; Confirms your knowledge and experience Quantifies and markets your expertise Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise Is globally recognized as the mark of excellence for the Information Privacy Audit professional Increases your value to your organization Gives you a competitive advantage over peers when seeking a new role Is administered by the International Examination & Certification Board (IECB), based in Estonia, and fully aligned to the ISO/IEC 17024:2012 standard (Conformity assessment - General requirements for bodies operating certification of persons) Certified Individuals: Are highly qualified, experienced professionals in the field of Data Protection Systems Audit Provide the enterprise with a Certification route for Information Privacy Assurance that is recognized by multinational clients, lending credibility to the enterprise Are excellent indicators of proficiency in control requirements creation and monitoring Demonstrate competence in five domains, including standards and practices; organization and management; processes; integrity, confidentiality and availability; and software development, acquisition and maintenance Demonstrate a commitment to providing the enterprise with trust in and value from your Privacy Compliance Framework Maintain ongoing professional development for successful on -the -job performance The below job practice is organized by domains. Each domain is covered in the course. Domain 1-The Process of Auditing Information Privacy Systems and Solutions Provide audit services in accordance with ISO 19011 audit standards to assist the organization in protecting and controlling information privacy systems. Domain 2 - Governance and Management of Information Privacy Technology Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy. Domain 3-Information Systems Acquisition, Development and Implementation Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization's strategies and objectives. Domain 4-Information Systems Operations, Maintenance and Service Management Provide assurance that the processes for information systems operations, maintenance and service management meet the organization's strategies and objectives. Domain 5-Protection of Personally Identifiable Information (PII) Assets Provide assurance that the organization's policies, standards, procedures and controls ensure the confidentiality, integrity and availability of PII. Prerequisites A thorough understanding of current Data Protection legislation, Information Security & Risk Management knowledge as well as ISO 19011 Auditing Standards is required to successfully pass the examination. What's Included? Teas, Coffees, refreshments and a full Lunch* Course Slides Study Guide Exam Fees * For Classroom based Courses only Accreditation Who Should Attend? Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII) Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 3 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Our Guarantee We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and train for free. Provided by This course is Accredited by NACS and Administered by the IECB
Transmission demystified training course description Transmission is the process of sending information along a medium of, copper, fibre or wireless. This course looks at transmission techniques for both telecommunications and data communications with a particular focus on Microwave, SDH, DWDM transmission. The course aims to demystify these technologies by explaining all the buzzwords used in transmission. What will you learn Describe various transmission technologies such as multiplexing and demultiplexing. Explain how Microwave works. Explain how SDH works. Explain how DWDM works. Transmission demystified training course details Who will benefit: Anyone working in telecommunications. Prerequisites: None. Duration 2 days Transmission demystified training course contents Transmission basics Systems, media, signals. Signal degradation, noise, distortion, attenuation. Digital, analogue. Modulation, encoding. RF Frequency, wavelength. Distance / range issues, interference, Antenna, power, dB, RF propagation, testing. Microwave transmission What is microwave transmission, point to point communications, line of sight, parabolic antenna, relays, planning considerations, rain and other issues Wired transmissions Copper, Fibre, optical transmission, fibre characteristics, fibre component parts. Multi Mode Fibre (MMF). Single Mode Fibre (SMF). Fibre connections. Lasers. Attenuations, dispersion, optical signal noise ratios (OSNR) and their effects. Channel Spacing and Signal Direction. Limiting factors to single wavelength. Introduction to SDH Timing and synchronisation of digital signals, the plesiochronous digital hierarchy (PDH), the synchronous digital hierarchy (SDH), service protection with SDH. TDM. SDH6 Standards, basic units, frames, STM1 frame, bit rates, STM0, STM1, STM4, STM16, STM64, STM256, SDH architecture, rings, Add drop multiplexors. SDH network topologies, structure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. WDM overview Multiplexing, TDM, WDM benefits. WDM standards. CWDM vs. DWDM. Four Wave Mixing (FWM). Impact and countermeasures to FWM on WDM.tructure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. DWDM ITU G.694.1, channel and spacing. Optical Terminal Multiplexers (OTM). Optical Add/Drop Multiplexers (OADM). Adding versus dropping. Optical Amplifiers. Erbium Doped Fibre Amplifiers (EDFA). Transponders and Combiners. Optical and Electrical Cross Connects (OXCs/DXCs). Cross Connect types (Transparent/Opaque). Advantages and disadvantages of various Optical cross connects. IP transmission Telecommunications versus data communications, IP transmission, VoIP, MPLS.
Use the in-demand Linux skills you learn in this course to get promoted or start a new career as a Linux professional.