Define terms used in stand-alone systems Name common applications for stand-alone systems; describe basic component layouts Describe differences between AC and DC coupling State principle elements of a microgrid Define the importance of an accurate load analysis Review load analysis procedures; perform a load analysis based on daily data Review battery bank sizing for lead-acid and lithium-ion battery types Define array sizing variables and how they affect design for both MPPT and non-MPPT charge controllers Explain charge controller types and describe maximum power point tracking and voltage step-down Examine the calculations for PV array sizing Describe the difference between sizing for a non-MPPT and an MPPT charge controller Complete array configuration calculations for a system with a non-MPPT and an MPPT charge controller Summarize the parameters to check when selecting a charge controller Explain the purpose of DC load control and the three ways it can be implemented Identify design variables, advantages, and disadvantages of DC-only PV systems Describe how to size and integrate components for a recreational vehicle (RV) application Identify installation and maintenance considerations specific to mobile applications Identify applications and considerations for DC lighting systems Specify a battery-based inverter given electrical load and surge requirements Describe various configurations for stacking and clustering multiple inverters Examine inverter / charger size considerations Describe multiwire branch circuit wiring and concerns with single-phase supplies Describe the purpose and function of a generator Identify considerations that impact generator selection Solve for location-based performance degradation Specify a generator given electrical load, battery charging, and surge requirements Estimate approximate generator run time List generator maintenance Describe the National Electrical Code (NEC®) Articles that apply to the different parts of PV and energy storage systems (ESS) Identify NEC® requirements for workspace clearances, disconnects, and overcurrent protection devices (OCPD) that apply to PV systems Locate and apply specific requirements for storage batteries, stand-alone systems, and energy storage systems Identify labeling requirements List relevant building and fire codes Review installation considerations and best practices for stand-alone systems as related to batteries, design strategies, monitoring and metering, balance of system (BOS) equipment Review DC-coupled stand-alone residential system design Define operating modes of off-grid AC coupled PV systems Explain charge regulation of AC coupled PV inverters in a stand-alone system Discuss AC coupled PV system design strategies; evaluate equipment options for AC coupled off-grid applications Design a stand-alone microgrid system with PV (AC and DC coupled) and generator power sources Distinguish between isolated and non-isolated microgrids Compare concepts of centralized versus decentralized generation and controls Identify different types of microgrid analysis and planning software Review isolated microgrid use case examples Identify general PPE for battery system maintenance Develop a battery maintenance plan Identify methods to measure battery state of charge Identify common causes of battery problems and how to avoid them Identify PPE for lead-acid battery maintenance Develop a battery maintenance plan for lead-acid batteries Describe how to correctly add water to a flooded lead-acid (FLA) battery bank Identify methods to measure battery state of charge of FLA batteries Define when and why equalization is needed Identify common causes of battery problems and how to avoid them Note: SEI recommends working closely with a qualified person and/or taking PV 202 for more information on conductor sizing, electrical panel specification, and grounding systems. These topics will part of this course, but they are not the focus.
Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Students who complete PV203 will be able to: Recognize demand and PV production curves Identify the common types of PV systems and their major components Describe DC and AC coupled systems Discuss load profiles and modes of operation, including: peak load shaving, time-of-use, zero-sell, self-consumption prioritization, demand-side management Introduce utility-scale storage and microgrids Explain the relationship between real power, apparent power, and reactive power Complete a load estimate for different system types and for seasonal loads; evaluate electrical requirements of loads Identify phantom loads and efficiency upgrades Estimate starting surge and power factor requirements Describe the differences when sizing battery-based systems compared to grid-direct systems Choose a peak sun hour value based on design criteria for various systems Review battery basics and terminology Describe and compare different battery chemistries and technologies Find the capacity and voltage of different batteries; determine state of charge List safety precautions and hazards to be aware of when working with batteries; list appropriate personal protective equipment (PPE) Identify appropriate battery enclosures Calculate values for current, voltage, and energy for different battery bank configurations Review battery bank design parameters Complete a lithium-ion battery bank design example Review and compare different design example costs List features, options, and metering available for different types of battery chargers Explain basics of lithium battery charging Compare generator types and duty cycle ratings, including fuel options Identify specifications critical for choosing appropriate battery-based inverters Discuss different overcurrent protection devices and equipment disconnects and when/where they are required Define the maximum voltage drop slowed for the proper functioning of a battery-based PV system Identify safe installation procedures List basic commissioning tests which should be completed before and after a system is operating
Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode
Overview Governance is now acknowledged as a core business function. Governance is not simply about compliance - whether with the law, regulation or guidance. Compliance provides a company with its 'licence to operate, but high-quality systems of governance lead to better-run companies which create, grow and protect value for all their stakeholders Objective Learn the best strategies for building a high-quality governance framework Define the role of the board of directors and your role within Explore different governance models across the globe and identify which of them works best for your organisation Recognise and deliver your obligations as a director Learn the strategies for creating and protecting value for your organisation Explore the tools to protect your organisation's reputation and brand value Gain an understanding of governance as a business-critical function Manage governance function within different business contexts - listed, private, state-owned, family-owned businesses Master the strategies for improving board effectiveness
Master per unit analysis in electrical engineering with our comprehensive course. Learn single and three-phase system analysis techniques for real-world applications.
The COLP role goes beyond just ensuring your firm follows the rules in the SRA Standards and Regulations, it also comes with a personal accountability factor that demands your attention. Fear not! This 3 hour course will usher you through the intricacies of being a COLP, ensuring you not only meet but excel in your regulatory obligations. The course will cover: Navigating the Regulatory Landscape: Understanding the Framework for COLPs Dive into the intricate regulatory framework that Compliance Officers for Legal Practice (COLPs) operate under. Shouldering the Responsibility: Unpacking the Duties of a COLP Explore the multifaceted responsibilities that come with the role of a COLP. Choosing the Right Leader: Identifying the Ideal COLP Candidate Learn the criteria for selecting the most suitable individual to take on the crucial role of COLP. Cracking the Codes: Key Elements of Codes and SRA Principles Delve into the essential components of the Codes and SRA Principles that form the backbone of legal compliance. Building a Robust Foundation: Understanding Compliance Systems for All Firms Explore the concept of compliance systems, what they entail, and why every firm should have one in place. Reporting Matters: Recognising 'Serious' Issues, SRA Enforcement Strategy, and Reporting Protocols Uncover the definition of 'serious' matters, grasp the SRA Enforcement Strategy, and gain practical insights on making effective reports to the SRA. Paper Trails Matter: Effective Record Keeping, Including Non-material Breaches Master the art of comprehensive record-keeping, including strategies for recording non-material breaches, and understand why it's integral to compliance. Personal Liability: Understanding and Mitigating Risks Navigate the landscape of personal liability for COLPs and develop strategies to mitigate associated risks. Staying Ahead: Keeping Abreast of Regulatory Changes and Guidance Develop effective strategies for staying up to date with dynamic regulatory changes and evolving guidance. Planning for Compliance: Crafting a Robust Strategy, Assessing Risk, and File Reviewing Formulate a comprehensive plan for tackling compliance, including risk assessment, maintaining risk registers, and implementing effective file reviewing. Across the Board: Legal and Regulatory Compliance Areas Every COLP Must Master Gain a high-level overview of crucial legal and regulatory compliance areas, including AML, transparency rules, and other pivotal aspects that demand the attention of all COLPs. Target Audience This online course is suitable for those new to the COLP role, or those supporting the COLP and for those that would like a refresher of the role and their responsibilities. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Helen Torresi, Consultant, DG Legal Helen is a qualified solicitor with a diverse professional background spanning leadership roles in both the legal and tech/corporate sectors. Throughout her career, she has held key positions such as COLP, HOLP, MLCO, MLRO and DPO for law firms and various regulated businesses and services. Helen’s specialised areas encompass AML, complaint and firm negligence handling, DPA compliance, file review and auditing, law management, and operational effectiveness in law firms, particularly in conveyancing (CQS).
Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements. Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards. Enhance your existing or learn with new skills in the field of Data Protection; Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements; Become a Technical expert on the preparation required for ISO 27701 Certification About This Course Learning outcomes Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit Course Overview Domain 1-The Process of Auditing Information Privacy Systems & Solutions Domain 2-Governance & Management of Information Privacy Technology Domain 3-Information Systems Acquisition, Development & Implementation Domain 4-Information Systems Operations, Maintenance & Service Management Domain 5-Protection of Personally Identifiable Information (PII) Assets Course Agenda Day 1: Introduction to Privacy Information Management System (PIMS) and ISO/IEC 27701 Day 2: Audit principles, preparation, and launching of an audit Day 3: On-site audit activities and Closing the Audit Accreditation This course is Accredited by NAS and Administered by the IECB Assessment All candidates at official training courses will be tested throughout the course delivery, with quizzes and exercises. The final exam is a 10 question essay type exam, offered on the afternoon of the final day. This exam should be completed within 180 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. Prerequisites None, but candidates would benefit from having a fundamental understanding of Audit principles What's Included? Comprehensive course materials totalling some 450 pages Case Study Exam fees Exam pass guarantee Who Should Attend? Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)
Multimode system configurations Load analysis and battery bank sizing PV array sizing Specifying multimode inverters Advanced multimode functions Code compliance, best practices, and installation considerations Charge controllers for multimode systems DC coupled multimode battery backup design example AC coupled system design considerations AC coupled multimode battery backup design example Energy Storage Systems (ESS) overview ESS residential sizing example Large-scale multimode system design and use cases Note: SEI recommends working closely with a qualified person and/or taking PV 202 for more information on conductor sizing, electrical panel specification, and grounding systems. These topics will part of this course, but they are not the focus.