• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1049 BA courses in Liverpool

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Trauma Risk Managment - TRiM Practitioner

5.0(1)

By Strongmind Resiliency Training Ltd

Trauma Risk Management is an evidence based, peer delivered risk assessment and ongoing support system, designed specifically to help in the management of traumatic events.

Trauma Risk Managment - TRiM Practitioner
Delivered in-person, on-requestDelivered In-Person in Internationally
£4800

The Fundamentals of Ultra-Low Emission Road Transport

By Cenex (Centre of Excellence for Low Carbon & Fuel Cell Technologies)

In-house training courses on electric and hydrogen vehicle technologies, charging infrastructure and how they work.

The Fundamentals of Ultra-Low Emission Road Transport
Delivered in-person, on-requestDelivered In-Person in Internationally
Price on Enquiry

Basin Analysis and Petroleum Systems

By Asia Edge

ABOUT THIS TRAINING COURSE This 5 full-day course will focus on geological fundamentals: how different basin types differ in subsidence mechanisms, basin cycles, heat flow through time, depositional systems, structural styles and their type of petroleum systems. This will allow participants to make realistic interpretations in new areas; interpretations that are consistent with the specific basin type and to be expected depositional systems and structural styles. In addition, through simple paper-based exercises, the course will provide background and understanding of how some of the typical PBE products are made: creaming curves, Field-size plots and Yet-to-find. Finally, the essentials of commercial assessments will be covered. Training Objectives * To provide participants with a sound understanding how, and under which conditions different basin types develop, and what the impact of their development is on the typical petroleum systems of these different basin types. * To teach evaluation techniques that assist in the regional understanding and illustration of sedimentary basins and their development. While some of these techniques can be done using computers, in the course these will be done 'by hand' for maximum understanding. Target Audience This course is designed in the first place for geoscientists working in exploration and their direct supervisors. The course is also very instructive for specialist staff working closely with exploration staff such as (bio)stratigraphers, geochemists, basin modelers, structural geologists, geophysicists, reservoir engineers and petrophysicists. Course Level * Intermediate Training Methods Each topic is introduced by a lecture, and leaning is re-enforced by practical exercises (on paper). There is ample time for discussions of general issues and any specific questions participants may have. For several exercises participants will be invited to do exercises on a basin of their choice, which will make the course more impactful for the participants. Participants will be provided with the following pre-read material: * Concepts of Conventional Petroleum Systems. De Jager, J. (2020). Invited contribution for Regional Geology and Tectonics Volume 1: Global Concepts, Techniques and Methodology (eds: Adam, J., Chiarelly, D. & Scarselli, N. * Play-Based Exploration of the petroleum potential of the Tremp-Graus, Ainsa and eastern Jaca Sub-basins in the southern De Jager, J & van Winden, M. (2020). invited contribution for Digital Learning - Multi-scale analysis of depositional systems and their subsurface workflows (eds: Grötsch, J. & Pöppelreiter, M.), EAGE. Trainer Your expert course leader has a PhD in Geology from the University of Utrecht. He worked for 31 years (1979 -2010) with Shell as an exploration geologist in a variety of functions across the globe. As Principle Technical Expert, he was responsible for ensuring that Risk & Volume assessments were carried out consistently and correctly in all of Shell's exploration units. In this capacity, he led and participated in countless prospect review sessions and developed and conducted a successful in-house course on Risks & Volume assessment. As manager of the Exploration Excellence Team, he performed in depth analysis of basins and plays and provided advice on exploration opportunities to senior management. Together with his team, he visited most of Shell's exploration offices, working hands-on with Shell's local exploration teams to generate new play and prospect ideas and to suggest evaluation techniques and technologies to apply. In 2010, he was appointed as extraordinary professor Regional and Petroleum Geology at the VU university of Amsterdam and in 2012 also at the University of Utrecht. He was visiting professor at the University of Malaya (Malaysia). Through his own consultancy, as of 2010, he provides advice on exploration activities to several companies and is regularly invited to carry out technical reviews. Activities cover all continents and include Portfolio Reviews, Prospect assessment, Play-based Exploration, and Geothermal activities. He conducts courses on several topics including Risk & Volume Assessment, Prospect Maturation, Basin Analysis, Play-based Exploration, Trap & Seal Analysis, Petroleum Geology for Non-geologists. Some of his recent publications include: * De Jager, J. & van Winden, M. (2020): Play-Based Exploration of the petroleum potential of the Tremp-Graus, Aínsa and eastern Jaca Sub-basins in the southern Pyrenees. Invited contribution for Digital Geology, EAGE special publication (eds: Grötsch, J. & Pöppelreiter, M.) * De Jager, J. (2020). Concepts of Conventional Petroleum Systems. Invited contribution for Regional Geology and Tectonics Volume 1: Global Concepts, Techniques and Methodology (eds: Adam, J., Chiarelly, D. & Scarselli, N.) * De Jager, J. (2021): Handbook Risk & Volume Assessment. Self-published * De Jager, J., Van Ojik, K & Smit, R. (2023 - in preparation): Geological Development of The Netherlands. In: Geology of The Netherlands (eds: Ten Veen, J., Vis, G-J., De Jager, J. @ Wong, T.) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Basin Analysis and Petroleum Systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3439 to £3999

Promoting Best Practice in Basic Life Support Instruction

By Guardian Angels Training

Learn to teach basic life support effectively with our "Promoting Best Practice in Basic Life Support Instruction" course. Ideal for healthcare professionals, educators, and individuals interested in life-saving interventions.

Promoting Best Practice in Basic Life Support Instruction
Delivered in-person, on-requestDelivered In-Person in Internationally
£1895

SFTA Hypnotherapy Training Liverpool

5.0(11)

By SFTA Hypnotherapy Training Academy

Solution Focused Hypnotherapy Training Academy in Liverpool and Merseyside

SFTA Hypnotherapy Training Liverpool
Delivered Online & In-Person
Dates arranged on request
£3480

Advanced Body Shape Package

By Harley Elite Academy

Expert Body Shape Fillers Package includes: * Fat-Dissolving injections – Fillers * BBL (Brazilian Buttocks Lift ) with Filler – Non Surgical * Threads lift injectables for body ENTRY REQUIREMENTS * Registered Medical professional * Level – Beauty Therapist * Dental Nurse * Physiotherapist * Holds at least 6 months experience with needles (micro-needling, microblading, tattooing, vaccinations, phlebotomy and more) -------------------------------------------------------------------------------- NOTE! After booking we will contact you for scheduling the exact course date! Courses dates are subject to change due to mentors availability. We will inform you via email if a date becomes available! -------------------------------------------------------------------------------- ADDITIONAL INFORMATION ATTENDANCE ONLINE (Theory), IN CLINIC (Practice) -------------------------------------------------------------------------------- EXPERT LEVEL * Fat-Dissolving injections – Fillers * BBL (Brazilian Buttocks Lift ) with Filler – Non Surgical * PDO Threads lift injectables for body * PRP/ Mesotherapy Training Course Choose Online Theory or In-Clinic with practice 4 Days Intensive Courses  (1 Week)

Advanced Body Shape Package
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
£4550 to £6500

Battery Energy Storage Systems (BESS) in Electricity Markets and Trading

By Asia Edge

ABOUT THIS COURSE Batteries are going to play an increasingly important role in the energy grid. An increasing number of developers are looking to add battery storage systems (BESS) into their existing projects. However future cash flows are highly uncertain and they are often unsure exactly how battery technology can be monetised. A strong revenue model requires stacking of different revenue sources. As the share of variable renewable sources in electricity systems further increase, battery systems are expected to play a growing role by providing frequency control and operational reserves as well as for wholesale arbitrage, while helping reduce grid integration costs. The more volatile electricity prices are, the greater the earning potential of batteries trading electricity on various electricity markets. BESS can generate revenue streams in several different ways; through a frequency response contract with the TSO, by providing grid services in other ways or by arbitrage through buying cheap power and selling power for a higher price in a liquid wholesale market. Because batteries are efficient, the round trip efficiency is also high. They can spread arbitrage trading much better than other storage types and in many cases, other asset classes. For companies that combine a battery with other tasks, for example to store power from their own panels, or to avoid a costly heavy power connection, the investment is less risky than for those that purely focus on arbitrage trading. It is uncertain whether electricity prices will fluctuate more violently in the coming years, or whether the peaks will actually level off. During this highly interactive training, the trainer will provide you with the latest insights and best practices on how to obtain the maximum economic benefits when participating with BESS in the electricity market. Training Objectives By the end of this course, the participants will be able to: * Discover the different BESS battery technologies and their impact on the grid * Understand the role of storage in providing flexibility to the power system * Examine the potential revenue streams from BESS models * Learn how profit can generated with BESS trading strategies * Determine how to optimize the value from BESS projects * Find out how to combine BESS with renewable PPAs Target Audience Professionals and executives from Power Utilities, Energy Companies, Financial & Investment Banks, Renewable Power Project Developers, Transmission System Operators and Energy Industry Regulators will find this training course useful. * Electricity Marketing and Traders * New Venture or Business Development Executives * Corporate Finance and Treasury Executives * Audit and Risk Management Executives * Power or Utility Market Research Analysts * Investment Managers for Renewable Power Projects * Origination Professionals * Regulation, Compliance and Documentation Officers * Lawyers and Accountants * Power Transmission and Distributions Engineers Trainer Our key expert is a skilled and accomplished professional with over 25 years' of extensive senior management / board level experience in the energy markets worldwide. Next to advising energy companies, banks, consultants and regulators regarding PPAs, our key expert has also conducted several highly successful training courses about Power Purchase Agreements, Power Project Finance, IPPs, and Project Risk Management to over 1,000 high level participants from Asia, Africa, Europe and Middle East. He was a member of the expert commission of the Dutch Government for 2 offshore wind parks, Hollandse Kust (zuid) Wind Farm Zone Sites 3 and 4 that advised on which of the 5 applicants did provide the best security and solutions associated with the electricity and green certificate prices, the construction and operational risks of the project. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Battery Energy Storage Systems (BESS) in Electricity Markets and Trading
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2837 to £3299

MEF Carrier Ethernet 2.0 Certification

5.0(3)

By Systems & Network Training

MEF CARRIER ETHERNET TRAINING COURSE DESCRIPTION The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. WHAT WILL YOU LEARN * Discuss and understand key Carrier Ethernet Concepts. * Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. * Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. * Carry out informed discussions using industry Carrier Ethernet 'vocabulary. * Pass the MEF CECP 2.0 professional accreditation exam. MEF CARRIER ETHERNET TRAINING COURSE DETAILS * Who will benefit: Anyone working with Carrier Ethernet * Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. * Duration 5 days MEF CARRIER ETHERNET TRAINING COURSE CONTENTS * Section One: Introduction to Carrier Ethernet * Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. * How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. * The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. * Section Two: Carrier Ethernet Concepts in depth * Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . * Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. * Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching * Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. * Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. * Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle. Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. * SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. * LOAMs: Link discovery, link monitoring, etc. * Terminology and Concepts: MEG levels, MIPs. * Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies: Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. * Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. * Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. * Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. * Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services

MEF Carrier Ethernet 2.0 Certification
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Definitive Microsoft Lync for engineers

5.0(3)

By Systems & Network Training

MICROSOFT LYNC TRAINING COURSE DESCRIPTION This course teaches IT staff how to plan, design, deploy, configure, and administer a Microsoft Lync Server solution. The course emphasizes Lync Server Enterprise Unified Communications features focussing particularly on coexisting with and migrating from legacy communication services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat. This course helps prepare for Exam 70-336. WHAT WILL YOU LEARN * Describe the Lync Server architecture. * Install and deploy Lync Server. * Use Lync Server management interfaces. * Deploy and manage clients. * Manage and administer dial-in conferencing. * Design audio and video for web conferencing. * Plan for instant message and presence Federation. * Deploy and configure persistent chat in Lync. * Configure archiving and monitoring services. * Troubleshoot Lync Server. * Describe the required daily, weekly, and monthly maintenance tasks. * Use SIP commands and analyze SIP logs. * Configure high availability features in Lync. * Design load balancing in Lync Server. * Backup and restore Lync Server data. MICROSOFT LYNC TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Microsoft Lync. * Prerequisites: Supporting Windows 2008 or 2012. * Duration 5 days MICROSOFT LYNC TRAINING COURSE CONTENTS * Microsoft Lync Server architecture Lync Server architecture, Lync core capabilities, Lync design process, assessing infrastructure requirements and updating the design, planning for all Microsoft solutions framework phases. * Designing a Lync Server topology Infrastructure requirements for Lync Server, using the planning tool, using topology builder, server infrastructure, documentation. Hands on Environment preparation and Lync Server pools. * Users and rights in Microsoft Lync Server Managing Lync Server, role based access control. Hands on Using the management shell, configuring role-based access control. * Client/device deployment and management Deploy and manage clients, prepare for device deployment, IP phones. Hands on Clients. * Conferencing in Lync Server Introduction to conferencing in Lync Server, designing for audio\video and web conferencing, dial-in conferencing in Lync Server, managing and administering conferencing. Hands on Conferencing in Microsoft Lync. * Designing and deploying external access Conferencing and external capabilities of Lync Server, planning for IM and presence federation, designing edge services. Hands on Deploying Edge Server and Configuring Remote Access, Validating the Edge Server. * Deploying Lync Server persistent chat Overview of persistent chat architecture in Lync Server, designing persistent chat, deploying and persistent chat. Hands on persistent chat server. * Monitoring and archiving The archiving service, the monitoring service, configuring archiving and monitoring. Hands on Archiving and monitoring in Lync Server. * Administration and maintenance of Lync Lync Server troubleshooting tools, Lync Server operational tasks, Lync Server troubleshooting techniques. Hands on Lync administration tools, centralized logging service, analysing Lync Server logs and traces. * High Availability in Lync Server High availability in Lync Server, configuring high availability in Lync Server, planning for load balancing, designing load balancing. Hands on Configuring database mirroring, experiencing a scheduled SQL Server outage, experiencing an unscheduled SQL Server outage. * Disaster recovery in Lync Server Disaster recovery in Lync Server, tools for backing up and restoring Lync Server, critical Lync Server data to back up and restore, critical data to export and import, designing branch site resiliency. Hands on Configure pool pairing, experiencing a pool failure or outage. * Planning a migration to Lync Server Coexistence and migration, migration steps, planning for clients and devices. Designing a client migration and device migration strategy. Hands on Creating a migration plan, documenting the migration phases.

Definitive Microsoft Lync for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

PENETRATION TESTING TRAINING COURSE DESCRIPTION An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. WHAT WILL YOU LEARN * Perform penetration tests. * Explain the technical workings of various penetration tests. * Produce reports on results of penetration tests. * Defend against hackers. PENETRATION TESTING TRAINING COURSE DETAILS * Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. * Prerequisites: IP Security IP VPNs * Duration 5 days PENETRATION TESTING TRAINING COURSE CONTENTS * Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. * Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering * Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. * Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. * Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. * Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. * Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. * Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. * DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. * SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. * Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. * Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. * Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997