• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3 FMS courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Carbonate Reservoir Geology

By Asia Edge

ABOUT THIS TRAINING COURSE This 5 full-day course has been designed to develop skills in understanding the geometry and petrophysical characteristics of carbonate reservoirs. Depositional fabric, grain type and size and subsequent diagenetic modifications are the major controls on carbonate reservoir behaviour. The complex inter-relationship of the depositional and burial history can be unravelled to allow prediction of reservoir facies and reconstruction of three-dimensional reservoir models. This course will demonstrate the value of the reservoir model in volumetric assessment and development of carbonate reservoirs. *Previous knowledge of carbonate sedimentology is not required. Course Content in Summary: 1. Carbonate reservoirs: Basic principles; depositional concepts; grain types; textures and fabrics; environmental reconstruction. 2. The reservoir model - depositional and diagenetic characteristics: Sabkha/tidal flat; lagoon; shelf; reef (rudist and coral/algal); barrier/shoal; slope and redeposited; aeolian and lacustrine; karst plays. 3. Carbonate diagenesis: Primary and secondary porosity; compaction; pressure solution; cementation; dolomitisation; porosity generation and destruction; fractures. 4. Carbonate sequence stratigraphy 5. Log response in carbonate rocks: Gamma; sonic; neutron; density; FMS. 6. Reservoir assessment: Fracture reservoirs; reservoir modelling; volumetric assessment in correlation and mapping; effects of capillary pressure; interface with engineering. Training Objectives By attending this course, participants will be able to: * Understand carbonate depositional systems and controls. * Recognise and model controls on reservoir quality and pore systems, including diagenesis and fracturing. * Understand and apply carbonate seismic stratigraphy and sequence stratigraphy. * Interpret log responses. Target Audience This course is intended for petroleum geologists, explorationists, petrophysicists, geophysicists and engineers involved with exploration of carbonate plays and development of carbonate reservoirs. Trainer Your expert course leader is a Director and Senior Consultant Geologist who has worked on various carbonate consultancy projects, conducted detailed sedimentological, sequence stratigraphic and diagenetic technical studies and delivered training programmes. He was formerly Managing Director of Robertson UK Limited and was responsible for the integration between different disciplines, recognition, and encouragement of technical innovation and research and development programmes across all oil and gas divisions in the company. He was also responsible for all aspects of the performance of the main Geological, Geophysical and Reservoir Engineering Services in the company. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Carbonate Reservoir Geology
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2493 to £2899

F5 Networks Configuring BIG-IP AFM : Advanced Firewall Manager

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for network operators, network administrators, network engineers, network architects, security administrators, and security architects responsible for installation, setup, configuration, and administration of the BIG-IP AFM system. This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP Advanced Firewall Manager (AFM) system. Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed. MODULE 1: SETTING UP THE BIG-IP SYSTEM * Introducing the BIG-IP System * Initially Setting Up the BIG-IP System * Archiving the BIG-IP System Configuration * Leveraging F5 Support Resources and Tools MODULE 2: AFM OVERVIEW * AFM Overview * AFM Availability * AFM and the BIG-IP Security Menu * Packet Processing * Rules and Direction * Rules Contexts and Processing * Inline Rule Editor MODULE 3: NETWORK FIREWALL * AFM Firewalls * Contexts * Modes * Packet Processing * Rules and Direction * Rules Contexts and Processing * Inline Rule Editor * Configuring Network Firewall * Network Firewall Rules and Policies * Network Firewall Rule Creation * Identifying Traffic by Region with Geolocation * Identifying Redundant and Conflicting Rules * Identifying Stale Rules * Prebuilding Firewall Rules with Lists and Schedules * Rule Lists * Address Lists * Port Lists * Schedules * Network Firewall Policies * Policy Status and Management * Other Rule Actions * Redirecting Traffic with Send to Virtual * Checking Rule Processing with Packet Tester * Examining Connections with Flow Inspector MODULE 4: LOGS * Event Logs * Logging Profiles * Limiting Log Messages with Log Throttling * Enabling Logging in Firewall Rules * BIG-IP Logging Mechanisms * Log Publisher * Log Destination * Filtering Logs with the Custom Search Facility * Logging Global Rule Events * Log Configuration Changes * QKView and Log Files * SNMP MIB * SNMP Traps MODULE 5: IP INTELLIGENCE * Overview * Feature 1 Dynamic White and Black Lists * Black List Categories * Feed Lists * IP Intelligence Policies * IP Intelligence Log Profile * IP Intelligence Reporting * Troubleshooting IP Intelligence Lists * Feature 2 IP Intelligence Database * Licensing * Installation * Configuration * Troubleshooting * IP Intelligence iRule MODULE 6: DOS PROTECTION * Denial of Service and DoS Protection Overview * Device DoS Protection * Configuring Device DoS Protection * Variant 1 DoS Vectors * Variant 2 DoS Vectors * Automatic Threshold Configuration * Variant 3 DoS Vectors * Device DoS Profiles * DoS Protection Profile * Dynamic Signatures * Dynamic Signatures Configuration * DoS iRules MODULE 7: REPORTS * AFM Reporting Facilities Overview * Examining the Status of Particular AFM Features * Exporting the Data * Managing the Reporting Settings * Scheduling Reports * Examining AFM Status at High Level * Mini Reporting Windows (Widgets) * Building Custom Widgets * Deleting and Restoring Widgets * Dashboards MODULE 8: DOS WHITE LISTS * Bypassing DoS Checks with White Lists * Configuring DoS White Lists * tmsh options * Per Profile Whitelist Address List MODULE 9: DOS SWEEP FLOOD PROTECTION * Isolating Bad Clients with Sweep Flood * Configuring Sweep Flood MODULE 10: IP INTELLIGENCE SHUN * Overview * Manual Configuration * Dynamic Configuration * IP Intelligence Policy * tmsh options * Extending the Shun Feature * Route this Traffic to Nowhere - Remotely Triggered Black Hole * Route this Traffic for Further Processing - Scrubber MODULE 11: DNS FIREWALL * Filtering DNS Traffic with DNS Firewall * Configuring DNS Firewall * DNS Query Types * DNS Opcode Types * Logging DNS Firewall Events * Troubleshooting MODULE 12: DNS DOS * Overview * DNS DoS * Configuring DNS DoS * DoS Protection Profile * Device DoS and DNS MODULE 13: SIP DOS * Session Initiation Protocol (SIP) * Transactions and Dialogs * SIP DoS Configuration * DoS Protection Profile * Device DoS and SIP MODULE 14: PORT MISUSE * Overview * Port Misuse and Service Policies * Building a Port Misuse Policy * Attaching a Service Policy * Creating a Log Profile MODULE 15: NETWORK FIREWALL IRULES * Overview * iRule Events * Configuration * When to use iRules * More Information MODULE 16: RECAP * BIG-IP Architecture and Traffic Flow * AFM Packet Processing Overview

F5 Networks Configuring BIG-IP AFM : Advanced Firewall Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

SS84 IBM DFSMS Implementation

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques. Overview Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage. COURSE INTRODUCTION AND DFSMS OVERVIEW * Specify the storage administration functions that can be automatically performed by the system * Identify the types of data set services that need to be established by negotiating service level agreements * Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines * ACTIVATING SMS * Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS * Create SMS control data sets * Code SYS1.PARMLIB operands necessary to bring up SMS * Create a minimal configuration * Activate a configuration * WRITING ACS ROUTINES * Identify the purpose of the ACS routines * Develop an understanding of the statements * Differentiate between literals and masks * Describe the read variables available in the ACS routines MANAGING TEMPORARY DATA SETS * Create/alter storage classes and storage groups * Identify steps to install and use the starter set * Write ACS routines to handle temporary data sets * Activate a system to manage temporary data sets * Code commands to change volume/group SMS status * Issue operator commands to display current status * EXPLOITING DFSMS * Describe the purpose of the data class * Identify the features that the data class can exploit * Create data sets using the space parameter * Define Virtual Storage Access Method (VSAM) and volume attributes for data class * Identify special data sets and their exploitation through the data class * MANAGING PERMANENT DATA SETS * Create/alter data classes, storage classes, management classes, and storage groups * Translate current (DFSMShsm) service level agreements to management class parameters * Identify alternatives and concerns for standard naming conventions * Establish the controls for automatic backup of data sets * Establish the controls for automatic volume dump * Write ACS routines to manage permanent data * Create a configuration that manages permanent data sets * Create a new managed data set * Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records USING NAVIQUEST * Create test cases using Naviquest * Perform storage administration tasks in batch * Create online DFSMS reports * Create model commands using Naviquest * Use the COPYFILT macro DEVICE PREPARATION AND DATA MOVEMENT * Initialize volumes as system-managed * Move data into/out from system-managed control * Convert volumes to/from system-managed * Move data to utilize new hardware capabilities CONTROLLING DFSMS * Code commands to change SMS volume/group status * Issue commands to save configurations and use alternate Active Control Data Set (ACDS) * Issue command to use alternate Communication Data Set (COMMDS) * Issue VARY SMS commands * Communicate with the security administrator about storage management requirements ADDITIONAL CONSIDERATIONS * Establish a plan for implementing SMS * Locate sources of implementation planning checklists * Identify the tools available to document the current system * Identify multiple site considerations for recovery and exploitation ADDITIONAL COURSE DETAILS: Nexus Humans SS84 IBM DFSMS Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SS84 IBM DFSMS Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SS84 IBM DFSMS Implementation
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "FMS"

Show all 11