• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

243 Engineering courses

CITB Temp Wks Sup'visor (1 Day)(On-Site)

4.9(182)

By You Can Do It .Training

This course is designed to provide training for those undertaking the role of temporary works...

CITB Temp Wks Sup'visor (1 Day)(On-Site)
Delivered in-person, on-requestDelivered In-Person in Stoke on Trent
Price on Enquiry

Building services and maintenance - best-practice (In-House)

By The In House Training Company

The importance of building services to the success of an organisation has never been greater and continues to grow. Developers and occupiers are becoming more aware of the contribution that building services make to the well being of occupants and hence their perception of the quality of the working environment. Those involved with the design, construction, maintenance and operation will increasingly be required to deliver building services that demonstrable contribution to the occupier's business. Energy efficiency, carbon management and occupant satisfaction depend substantially on the way building services are designed, managed and operated. To optimise these aspects, an informed strategic approach is essential. Tried and tested techniques and processes are available that, when applied holistically, will deliver substantial benefits. This course reviews best practice in the area and inspires participants to ensure that building services perform at their optimal level. To provide a better understanding of how building services can be designed, managed and operated to: * Maximise occupant comfort, satisfaction and wellbeing * Add value and contribute to the success of the business of the occupier * Improve health safety * Reduce operating cost, energy use, carbon emissions and environmental impact * Optimise cost and value * Provide strategies for continuous improvement and sustainable operation 1 BUILDING SERVICES FUNDAMENTALS * The function of services in commercial buildings and their importance to the core business 2 TECHNIQUES AND PROCESSES FOR OPTIMISING COST AND VALUE * Programmed operation evaluation * Continuous commissioning * Lifetime product management * Performance-based service * Energy efficiency and the scope for environmental improvement 3 MAKING THE BUSINESS CASE AND PREPARING THE STRATEGY * Motivating decision-makers * Empowering those who have to deliver the results * Managing business risk 4 STRATEGY IMPLEMENTATION AND MONITORING RESULTS * Ensuring that rich and robust feedback is available to support continuous improvement and strategy enhancement * When to get feedback * Why * How * What to do with it 5 CASE HISTORIES AND 'AIR TIME' * Sharing experience and addressing specific issues of interest to participants * Course review * Close

Building services and maintenance - best-practice (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry

Building services and maintenance - introduction (In-House)

By The In House Training Company

To provide a fundamental understanding of building services in the context of: * The working environment * The success of the core business * The health and safety of the occupants * Operating cost and environmental impact * The optimisation of cost and value * Strategies for continuous improvement DAY ONE 1 BUILDING SERVICES FUNDAMENTALS * The function of services in commercial buildings and their importance to the core business * Electrical services * Lighting * Heating * Ventilation and air conditioning * Lifts * Water * Understanding IT and communication systems * Practical exercises 2 THE PROVISION OF COMFORT AND SAFETY * Statutory requirements * Health and safety legislation * Control of contractors * Risk assessment * Fire precautions * Legionella, sick building and other risks * Business requirements * Understanding user requirements * Matching systems to business needs * Practical exercises 3 GETTING THE DESIGN RIGHT * What the FM needs to know about design and its procurement * Successful space planning * Relationship between services, space planning and design * Getting the brief right * Supplier selection and management * Practical exercises DAY TWO 4 OPERATION AND MAINTENANCE * Why maintain? * Maintenance contracts * Input and output specifications * Resource options * Contracts - principal elements * Tendering - key steps * Selection criteria * Operational criteria * Maintenance trends * Performance-based service provision * Input and output specifications * KPIs and thresholds * Risk containment * Value-add opportunities * Performance contract strategy * Practical exercises 5 CONTINGENCY PLANNING * Being ready for the unexpected * Identifying and reducing risk * Internal risks * External risks * Identifying threats at your site * Managing risk * Protective systems * Occupier obligations * Fire management * Testing * Practical exercises 6 COMMISSIONING SERVICES SYSTEMS * Physical commissioning * Common problems * Typical costs * Commissioning stages * Continuous commissioning * Energy efficiency and the scope for environmental improvement * Practical exercises 7 SATISFYING THE OCCUPANTS * Obtaining and responding to feedback * When to get feedback * Why * How * What to do with it * Practical exercises 8 'AIR TIME' * Sharing experience and addressing specific issues of interest to participants * Course review * Close

Building services and maintenance - introduction (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry

Online Options

Show all 2769

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, Jun 17th, 13:00 + 8 more
£3395

CompTIA Cybersecurity Analyst (CySA+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK * Identify the Importance of Risk Management * Assess Risk * Mitigate Risk * Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS * Assess the Impact of Reconnaissance Incidents * Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS * Assess the Impact of System Hacking Attacks * Assess the Impact of Web-Based Attacks * Assess the Impact of Malware * Assess the Impact of Hijacking and Impersonation Attacks * Assess the Impact of DoS Incidents * Assess the Impact of Threats to Mobile Security * Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES * Assess Command and Control Techniques * Assess Persistence Techniques * Assess Lateral Movement and Pivoting Techniques * Assess Data Exfiltration Techniques * Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION * Implement a Vulnerability Management Plan * Assess Common Vulnerabilities * Conduct Vulnerability Scans * Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE * Deploy a Security Intelligence Collection and Analysis Platform * Collect Data from Network-Based Intelligence Sources * Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA * Use Common Tools to Analyze Logs * Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS * Analyze Incidents with Windows-Based Tools * Analyze Incidents with Linux-Based Tools * Analyze Malware * Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS * Deploy an Incident Handling and Response Architecture * Mitigate Incidents * Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS * Apply a Forensic Investigation Plan * Securely Collect and Analyze Electronic Evidence * Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES * Remediate Identity and Access Management Issues * Implement Security During the SDLC ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cybersecurity Analyst (CySA+)
Delivered Online6 days, Jun 17th, 13:00 + 6 more
£2475

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online5 days, Jun 17th, 15:00 + 23 more
£2475

Behavioural Science: Designing for Persuasion, Emotion and Trust

By Bunnyfoot

This one-day course introduces the field of user experience and provides an excellent entry point to our other specialised training courses. UX processes and practices have become a central component of product design, service design and web design.

Behavioural Science: Designing for Persuasion, Emotion and Trust
Delivered OnlineFull day, Jun 18th, 08:30 + 1 more
£595

Certified Data Centre Specialist (CDCS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is an IT, facilities or data centre operations professional working in and around the data centre and having the responsibility to achieve and improve high-availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Understand the design life cycle of data centres and the stages involved? Discuss the data centre requirements in great level of detail with vendors, suppliers and contractors to ensure that these requirements are met? Validate design plans, quotes and offers proposed by vendors/contractors? Understand redundancy levels for both the data centre design/setup and maintenance? Understand the various building considerations such as bullet proofing, mitigation of seismic activity, fire ratings and thermal stability? Understand how to install a raised floor that meets requirements, avoiding misalignment, level differences and leakage? Understand how to read a Single Line Electrical Diagram to identify and avoid the most common design issues? Choose the correct UPS and parallel configuration, learn and avoid classic parallel installation mistakes? Understand how to calculate battery banks, validate offered configurations to ensure they meet requirements? Understand what distance to keep to avoid EMF issues for human safety and equipment disturbances? Understand the fundamental cooling setup, CFM, Delta-T and other important factors? Understand contamination factors and limitations? Understand full details of fire suppression options, how to calculate gas content and verify installations? Understand how to measure data centre energy efficiency and how to improve it The course will bring participants to the level of a suitable sparring partner with suppliers. They will be able to verify offers provided by vendors for correctness, effectiveness and efficiency. DATA CENTRE DESIGN/LIFE CYCLE OVERVIEW * Overview of the phases of a data centre life cycle Planning, re-alignment and continuous improvement STANDARDS AND RATING LEVEL DEFINITIONS * Rating level history Difference between Uptime and TIA-942 Rating level definitions Redundancy options (N+1), 2N, 2(N+1) Concurrent Maintainability/Compartmentalisation Example configurations Substation and feed requirements Maintenance options Operational processes guidelines/standards Skill development BUILDING CONSIDERATIONS * Building location considerations Floor and hanging loads requirements Fire rating for walls and glass Blast protection Bullet proofing Forced entry protection ADVANCED RAISED FLOOR & SUSPENDED CEILING * Raised floor installation guidelines Techniques to install a proper and leveled raised access floor Common mistakes Choosing the right tiles and their locations Seismic-mitigating floor constructions Choosing the correct suspended ceiling ADVANCED POWER * Power infrastructure layout; Formulas which you should know for the data centre Single Line Electrical diagrams; how to read to ensure key components are present for protection Over current protection devices (MCB/MCCB/VCB/ACB/Fuses) definitions and what to use where Earth Leakage devices (RCB/RCD/ELCB/GFCI/ALCI/RCBO), definitions and what to use where Sizing of protective components Lightning strikes and surge protection devices (TVSS/SPD), how they operate, where to use and how to install Power cabling and cable run considerations PDU/DB setup and minimum requirements Generators; Generator types: Standy/Prime/Continuous Component make up and functions Fuel storage and calculation Paralleling of gen-sets Generator room/area requirements UPS Systems; Required specifications for UPS systems How to read data sheets and select the correct UPS Requirements for parallel configurations and avoid pitfalls such as single point of failures How parallel installation should be done, classic mistakes made by installers and how to avoid these Harmonic Filters; Active/Passive filters and their application Battery Banks; Battery bank terminology Designing battery banks, how to calculate, and double check the battery bank to be installed Battery charging pitfalls and ensuring the right charger is being installed and used Using parallel battery banks; how to properly install them, limitations and risks when using batteries in parallel How to test batteries correctly and make decisions on cell/block or string replacement Battery casing choices; ABS, V0, V1, V2 Alternative energy storage; flywheel, re-usable cell, compressed air UPS, etc. ADVANCED ELECTRO MAGNETIC FIELDS * Sources of EMF Difference between single, three phase and bus-bar EMF Options available to measure EMF and how to interpret the results from single-axes and composite measurements Guidance on safe distance for equipment and humans Calculation of EMF attenuation factor for shielding material permeability and saturation factors ADVANCED COOLING * Important definitions; dry-bulb, wet-bulb, dew-point, RH, sensible and latent heat Psychometric chart and ASHRAE recommendations Environmental class definitions and thermal specifications Temperature/humidity measurements guideline Heat dissipation methods Altitude impact on temperature intake to ICT equipment Floor plan setup for effective cooling Differences in tile surface and supporting structure and the air-flow performance impact Rack door construction and the flow performance impact Equipment Delta-T and its impact Optimising air flow Thermal units conversions Calculations for air volume displacement (CFM/CMH) Cooling capacity calculations Air-conditioning selection De- / humidifying options Air conditioning efficiency SHR impact on cost saving Efficiency indicator New cooling principle and techniques (Submerged, VSD/VRF/ECF/water- and air side economisers) Redundancy guidelines for air-conditioners avoiding classic misconceptions and mistakes for meeting ANSI/TIA-942 compliant designs Installation requirements Connections to fire panel and EPO Commissioning of air conditioners Set points and calibration CFD (Computational Fluid Dynamics) ADVANCED FIRE PROTECTION * The fire triangle and elements to stop a fire Detection systems in detail (VESDA, VIEW, smoke sensors) Considerations for installation of sensors Proper testing of smoke sensors Water based systems i.e. deluge, wet-pipe, dry-pipe, pre-action and why most of them don't work and how to detect this Details on Inert and Halocarbon systems and how to select the correct system for your data centre How to calculate the gas content ensuring the appropriate level is installed to suppress the fire including safety considerations Other requirements for gas systems such as release times, hold times, pipe install requirements and other important factors Requirements for the fire detection panel Installation verification, methods, what to check and how New advanced fire suppression technologies DESIGN AND INSTALL SCALABLE NETWORKING CABLING SYSTEM * ANSI/TIA942 cabling structure topology ToR, EoR Design Intelligent patching systems Installation best practice such as routing, bending radius, separation from power, containment fill ratio, fiber link loss calculator, bonding and grounding requirement Standard for telecommunications labeling and administration ENVIRONMENTAL SPECIFICATIONS AND CONTAMINATION CONTROL * Acoustic noise effects, regulations, specifications and limits Data centre contaminations and classifications Measurements, standards and limits Preventive measures and avoidance DATA CENTRE EFFICIENCY * Business drivers to go Green High-availability or Green? Green guidelines and standards How to measure it and what are acceptable numbers compared to the general industry PUE classes defined by Green Grid and issues with PUE Techniques for saving energy in all parts of the data centre i.e. application/system level, cooling, power distribution MOCK EXAM EXAM: CERTIFIED DATA CENTRE SPECIALIST

Certified Data Centre Specialist (CDCS)
Delivered Online4 days, Jun 19th, 07:00 + 3 more
£2050

How to use Heat Engineer Software V2 (Selectable dates)

3.7(8)

By Heat Engineer

For new users and the curious. Hello, For new users and the curious. IMPORTANT: Firstly, once you are signed up, send us your requests on what you would like to see within the demonstration and learn on the course. We will then cater for your needs and answer them during the session. This is designed to be an introduction into how to start a room by room survey using the Heat Engineer app, then sending this survey to the online dashboard. We will then go through the different steps to complete this heat loss report. Optional pages will also be worked through and shown. Examples of how to select the flow temperature and the heat source (heat pumps and boilers) will be presented once the heat loss result is completed.

How to use Heat Engineer Software V2 (Selectable dates)
Delivered Online1 hour 30 minutes, Jun 19th, 18:00
£47.93

Finance for Non-Financial Entrepreneurs - North Essex

By Let’s Do Business Group

This course aims to demystify the accounting language so that you are in control of the financial performance of your business, helping you forecast for the future, evaluate your current efforts, and establish strategies to meet your goals.

Finance for Non-Financial Entrepreneurs - North Essex
Delivered Online3 hours, Jun 19th, 08:30
FREE

AI-050T00 Develop Generative AI Solutions with Azure OpenAI Service

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course includes software developers and data scientists who need to use large language models for generative AI. Some programming experience is recommended, but the course will be valuable to anyone seeking to understand how the Azure OpenAI service can be used to implement generative AI solutions. Note Generative AI is a fast-evolving field of artificial intelligence, and the Azure OpenAI service is subject to frequent changes. The course materials are maintained to reflect the latest version of the service at the time of writing. Azure OpenAI Service provides access to OpenAI's powerful large language models such as GPT; the model behind the popular ChatGPT service. These models enable various natural language processing (NLP) solutions to understand, converse, and generate content. Users can access the service through REST APIs, SDKs, and Azure OpenAI Studio. In this course, you'll learn how to provision Azure OpenAI service, deploy models, and use them in generative AI applications. Prerequisites * Familiarity with Azure and the Azure portal. * Experience programming with C# or Python. 1 - GET STARTED WITH AZURE OPENAI SERVICE * Access Azure OpenAI Service * Use Azure OpenAI Studio * Explore types of generative AI models * Deploy generative AI models * Use prompts to get completions from models * Test models in Azure OpenAI Studio's playgrounds 2 - BUILD NATURAL LANGUAGE SOLUTIONS WITH AZURE OPENAI SERVICE * Integrate Azure OpenAI into your app * Use Azure OpenAI REST API * Use Azure OpenAI SDK 3 - APPLY PROMPT ENGINEERING WITH AZURE OPENAI SERVICE * Understand prompt engineering * Write more effective prompts * Provide context to improve accuracy 4 - GENERATE CODE WITH AZURE OPENAI SERVICE * Construct code from natural language * Complete code and assist the development process * Fix bugs and improve your code 5 - GENERATE IMAGES WITH AZURE OPENAI SERVICE * What is DALL-E? * Explore DALL-E in Azure OpenAI Studio * Use the Azure OpenAI REST API to consume DALL-E models 6 - USE YOUR OWN DATA WITH AZURE OPENAI SERVICE * Understand how to use your own data * Add your own data source * Chat with your model using your own data ADDITIONAL COURSE DETAILS: Nexus Humans AI-050T00: Develop Generative AI Solutions with Azure OpenAI Service training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI-050T00: Develop Generative AI Solutions with Azure OpenAI Service course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AI-050T00 Develop Generative AI Solutions with Azure OpenAI Service
Delivered OnlineTwo days, Jun 21st, 13:00
£595

DP-203T00 Data Engineering on Microsoft Azure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is data professionals, data architects, and business intelligence professionals who want to learn about data engineering and building analytical solutions using data platform technologies that exist on Microsoft Azure. The secondary audience for this course includes data analysts and data scientists who work with analytical solutions built on Microsoft Azure. In this course, the student will learn how to implement and manage data engineering workloads on Microsoft Azure, using Azure services such as Azure Synapse Analytics, Azure Data Lake Storage Gen2, Azure Stream Analytics, Azure Databricks, and others. The course focuses on common data engineering tasks such as orchestrating data transfer and transformation pipelines, working with data files in a data lake, creating and loading relational data warehouses, capturing and aggregating streams of real-time data, and tracking data assets and lineage. Prerequisites Successful students start this course with knowledge of cloud computing and core data concepts and professional experience with data solutions. AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - INTRODUCTION TO DATA ENGINEERING ON AZURE * What is data engineering * Important data engineering concepts * Data engineering in Microsoft Azure 2 - INTRODUCTION TO AZURE DATA LAKE STORAGE GEN2 * Understand Azure Data Lake Storage Gen2 * Enable Azure Data Lake Storage Gen2 in Azure Storage * Compare Azure Data Lake Store to Azure Blob storage * Understand the stages for processing big data * Use Azure Data Lake Storage Gen2 in data analytics workloads 3 - INTRODUCTION TO AZURE SYNAPSE ANALYTICS * What is Azure Synapse Analytics * How Azure Synapse Analytics works * When to use Azure Synapse Analytics 4 - USE AZURE SYNAPSE SERVERLESS SQL POOL TO QUERY FILES IN A DATA LAKE * Understand Azure Synapse serverless SQL pool capabilities and use cases * Query files using a serverless SQL pool * Create external database objects 5 - USE AZURE SYNAPSE SERVERLESS SQL POOLS TO TRANSFORM DATA IN A DATA LAKE * Transform data files with the CREATE EXTERNAL TABLE AS SELECT statement * Encapsulate data transformations in a stored procedure * Include a data transformation stored procedure in a pipeline 6 - CREATE A LAKE DATABASE IN AZURE SYNAPSE ANALYTICS * Understand lake database concepts * Explore database templates * Create a lake database * Use a lake database 7 - ANALYZE DATA WITH APACHE SPARK IN AZURE SYNAPSE ANALYTICS * Get to know Apache Spark * Use Spark in Azure Synapse Analytics * Analyze data with Spark * Visualize data with Spark 8 - TRANSFORM DATA WITH SPARK IN AZURE SYNAPSE ANALYTICS * Modify and save dataframes * Partition data files * Transform data with SQL 9 - USE DELTA LAKE IN AZURE SYNAPSE ANALYTICS * Understand Delta Lake * Create Delta Lake tables * Create catalog tables * Use Delta Lake with streaming data * Use Delta Lake in a SQL pool 10 - ANALYZE DATA IN A RELATIONAL DATA WAREHOUSE * Design a data warehouse schema * Create data warehouse tables * Load data warehouse tables * Query a data warehouse 11 - LOAD DATA INTO A RELATIONAL DATA WAREHOUSE * Load staging tables * Load dimension tables * Load time dimension tables * Load slowly changing dimensions * Load fact tables * Perform post load optimization 12 - BUILD A DATA PIPELINE IN AZURE SYNAPSE ANALYTICS * Understand pipelines in Azure Synapse Analytics * Create a pipeline in Azure Synapse Studio * Define data flows * Run a pipeline 13 - USE SPARK NOTEBOOKS IN AN AZURE SYNAPSE PIPELINE * Understand Synapse Notebooks and Pipelines * Use a Synapse notebook activity in a pipeline * Use parameters in a notebook 14 - PLAN HYBRID TRANSACTIONAL AND ANALYTICAL PROCESSING USING AZURE SYNAPSE ANALYTICS * Understand hybrid transactional and analytical processing patterns * Describe Azure Synapse Link 15 - IMPLEMENT AZURE SYNAPSE LINK WITH AZURE COSMOS DB * Enable Cosmos DB account to use Azure Synapse Link * Create an analytical store enabled container * Create a linked service for Cosmos DB * Query Cosmos DB data with Spark * Query Cosmos DB with Synapse SQL 16 - IMPLEMENT AZURE SYNAPSE LINK FOR SQL * What is Azure Synapse Link for SQL? * Configure Azure Synapse Link for Azure SQL Database * Configure Azure Synapse Link for SQL Server 2022 17 - GET STARTED WITH AZURE STREAM ANALYTICS * Understand data streams * Understand event processing * Understand window functions 18 - INGEST STREAMING DATA USING AZURE STREAM ANALYTICS AND AZURE SYNAPSE ANALYTICS * Stream ingestion scenarios * Configure inputs and outputs * Define a query to select, filter, and aggregate data * Run a job to ingest data 19 - VISUALIZE REAL-TIME DATA WITH AZURE STREAM ANALYTICS AND POWER BI * Use a Power BI output in Azure Stream Analytics * Create a query for real-time visualization * Create real-time data visualizations in Power BI 20 - INTRODUCTION TO MICROSOFT PURVIEW * What is Microsoft Purview? * How Microsoft Purview works * When to use Microsoft Purview 21 - INTEGRATE MICROSOFT PURVIEW AND AZURE SYNAPSE ANALYTICS * Catalog Azure Synapse Analytics data assets in Microsoft Purview * Connect Microsoft Purview to an Azure Synapse Analytics workspace * Search a Purview catalog in Synapse Studio * Track data lineage in pipelines 22 - EXPLORE AZURE DATABRICKS * Get started with Azure Databricks * Identify Azure Databricks workloads * Understand key concepts 23 - USE APACHE SPARK IN AZURE DATABRICKS * Get to know Spark * Create a Spark cluster * Use Spark in notebooks * Use Spark to work with data files * Visualize data 24 - RUN AZURE DATABRICKS NOTEBOOKS WITH AZURE DATA FACTORY * Understand Azure Databricks notebooks and pipelines * Create a linked service for Azure Databricks * Use a Notebook activity in a pipeline * Use parameters in a notebook ADDITIONAL COURSE DETAILS: Nexus Humans DP-203T00 Data Engineering on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-203T00 Data Engineering on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-203T00 Data Engineering on Microsoft Azure
Delivered Online5 days, Jun 24th, 13:00 + 4 more
£2380

Educators matching "Engineering"

Show all 2314