• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

119 Shell courses delivered Live Online

CompTIA Linux+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals whose primary job responsibility is the management of servers and other devices running the Linux operating system. A typical student in this course should have at least nine months of hands-on Linux experience and at least one and a half years of IT experience in other computing environments. The target student should wish to expand their skillset to support their career in Linux system administration and operation. This course is also designed for students who are seeking the CompTIA Linux+ certification and who want to prepare for Exam XK0-005. The Linux+ certification can validate the student's understanding and skill in configuring, monitoring, and supporting Linux systems. Overview In this course, you will configure, operate, and troubleshoot Linux systems. You will: - Perform basic Linux tasks. - Manage users and groups. - Manage permissions and ownership. - Manage storage. - Manage files and directories. - Manage kernel modules. - Manage the Linux boot process. - Manage system components. - Manage devices. - Manage networking. - Manage packages and software. - Secure Linux systems. - Write and execute Bash shell scripts. - Automate tasks. - Plan and perform a Linux installation. The Official CompTIA© Linux+© courseware builds on your existing experience with systems operations and administration to provide you with the knowledge and skills required to configure, manage, operate, and troubleshoot a Linux environment by using security best practices, scripting, and automation. This course will also prepare you for the Exam XKO-005. 1 - PERFORMING BASIC LINUX TASKS * Identify the History and Development of Linux * Enter Shell Commands * Get Help Using Linux 2 - MANAGING USERS AND GROUPS * Assume Superuser Privileges * Create, Modify, and Delete Users * Create, Modify, and Delete Groups * Query Users and Groups * Configure Account Profiles 3 - MANAGING PERMISSIONS AND OWNERSHIP * Modify File and Directory Permissions * Modify File and Directory Ownership * Configure Special Permissions and Attributes * Troubleshoot Permissions Issues 4 - MANAGING STORAGE * Create Partitions * Manage Logical Volumes * Mount File Systems * Manage File Systems * Navigate the Linux Directory Structure * Troubleshoot Storage Issues 5 - MANAGING FILES AND DIRECTORIES * Create and Edit Text Files * Search for Files * Perform Operations on Files and Directories * Process Text Files * Manipulate File Output 6 - MANAGING KERNEL MODULES * Explore the Linux Kernel * Install and Configure Kernel Modules * Monitor Kernel Modules 7 - MANAGING THE LINUX BOOT PROCESS * Configure Linux Boot Components * Configure GRUB 2 8 - MANAGING SYSTEM COMPONENTS * Configure Localization Options * Configure GUIs * Manage Services * Troubleshoot Process Issues * Troubleshoot CPU and Memory Issues 9 - MANAGING DEVICES * Identify the Types of Linux Devices * Configure Devices * Monitor Devices * Troubleshoot Hardware Issues 10 - MANAGING NETWORKING * Identify TCP/IP Fundamentals * Identify Linux Server Roles * Connect to a Network * Configure DHCP and DNS Client Services * Configure Cloud and Virtualization Technologies * Troubleshoot Networking Issues 11 - MANAGING PACKAGES AND SOFTWARE * Identify Package Managers * Manage RPM Packages with YUM * Manage Debian Packages with APT * Configure Repositories * Acquire Software * Build Software from Source Code * Troubleshoot Software Dependency Issues 12 - SECURING LINUX SYSTEMS * Implement Cybersecurity Best Practices * Implement Identity and Access Management Methods * Configure SELinux or AppArmor * Configure Firewalls * Implement Logging Services * Back Up, Restore, and Verify Data 13 - WORKING WITH BASH SCRIPTS * Customize the Bash Shell Environment * Identify Scripting and Programming Fundamentals * Write and Execute a Simple Bash Script * Incorporate Control Statements in Bash Scripts 14 - AUTOMATING TASKS * Schedule Jobs * Implement Version Control Using Git * Identify Orchestration Concepts 15 - INSTALLING LINUX * Prepare for Linux Installation * Perform the Installation ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Linux Plus Certification (Exam XK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Linux Plus Certification (Exam XK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Linux+
Delivered Online6 days, Jun 17th, 13:00 + 3 more
£2475

AZ-040T00 Automating Administration with Powershell

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: * -Experience with Windows networking technologies and implementation. * - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - REVIEW WINDOWS POWERSHELL * Learn about Windows PowerShell * Get familiar with Windows PowerShell applications * Identify factors to install and use Windows PowerShell * Configure the Windows PowerShell console * Configure the Windows PowerShell Integrated Scripting Environment (ISE) * Use Visual Studio Code with PowerShell 2 - UNDERSTAND THE COMMAND SYNTAX IN WINDOWS POWERSHELL * Discover the structure of PowerShell cmdlets * Discover the parameters for using PowerShell cmdlets * Review the tab completion feature in PowerShell * Display the About files content in PowerShell 3 - FIND COMMANDS AND GET-HELP IN WINDOWS POWERSHELL * Define modules in PowerShell * Find cmdlets in PowerShell * Use command aliases in PowerShell * Use Show-Command and Get-Help in PowerShell * Interpret the help file contents and update the local help content in PowerShell 4 - MANAGE ACTIVE DIRECTORY DOMAIN SERVICES USING POWERSHELL CMDLETS * Manage user accounts in PowerShell * Manage groups and group memberships in PowerShell * Manage computer accounts in PowerShell * Manage organizational units and Active Directory objects in PowerShell 5 - MANAGE NETWORK SERVICE SETTINGS FOR WINDOWS DEVICES USING POWERSHELL CMDLETS * Manage IP addresses in PowerShell * Manage IP routing in PowerShell * Manage DNS clients in PowerShell * Manage Windows Firewall settings in PowerShell 6 - MANAGE WINDOWS SERVER SETTINGS USING POWERSHELL CMDLETS * Automate management tasks using the Group Policy management cmdlets * Manage server roles and services using PowerShell cmdlets * Manage Hyper-V Virtual Machines using PowerShell cmdlets * Manage Internet Information Services using PowerShell cmdlets 7 - MANAGE SETTINGS FOR A LOCAL WINDOWS MACHINE USING POWERSHELL CMDLETS * Manage Windows 10 using PowerShell * Manage permissions with PowerShell 8 - UNDERSTAND THE WINDOWS POWERSHELL PIPELINE * Review Windows PowerShell pipeline and its output * Discover object members in PowerShell * Control the formatting of pipeline output 9 - SELECT, SORT, AND MEASURE OBJECTS USING THE PIPELINE * Sort and group objects by property in the pipeline * Measure objects in the pipeline * Select a set of objects in the pipeline * Select object properties in the pipeline * Create and format calculated properties in the pipeline 10 - FILTER OBJECTS OUT OF THE PIPELINE * Learn about the comparison operators in PowerShell * Review basic filter syntax in the pipeline * Review advanced filter syntax in the pipeline * Optimize the filter performance in the pipeline 11 - ENUMERATE OBJECTS IN THE PIPELINE * Learn about enumerations in the pipeline * Review basic syntax to enumerate objects in the pipeline * Review advanced syntax to enumerate objects in the pipeline 12 - SEND AND PASS DATA AS OUTPUT FROM THE PIPELINE * Write pipeline data to a file * Convert pipeline objects to other forms of data representation in PowerShell * Control additional output options in PowerShell 13 - PASS PIPELINE OBJECTS * Pipeline parameter binding * Identify ByValue parameters * Pass data by using ByValue * Pass data by using ByPropertyName * Identify ByPropertyName parameters * Use manual parameters to override the pipeline * Use parenthetical commands * Expand property values 14 - CONNECT WITH DATA STORES USING POWERSHELL PROVIDERS * Define Windows PowerShell providers * Review the built-in providers in PowerShell * Access provider help in PowerShell 15 - USE POWERSHELL DRIVES IN POWERSHELL * Explain PowerShell drives in PowerShell * Use PowerShell drive cmdlets in PowerShell * Manage the file system in PowerShell * Manage the registry in PowerShell * Work with certificates in PowerShell * Work with other PowerShell drives in PowerShell 16 - REVIEW CIM AND WMI * Review architecture of CIM and WMI * Review repositories in CIM and WMI * Locate online class documentation by using CIM and WMI cmdlets 17 - QUERY CONFIGURATION INFORMATION BY USING CIM AND WMI * List local repository namespaces and classes by using CIM and WMI * Query instances by using commands and WMI Query Language * Connect to remote computers by using CIM and WMI cmdlets * Query repository classes from remote computers by using CIMSession objects 18 - QUERY AND MANIPULATE REPOSITORY OBJECTS BY USING CIM AND WMI METHODS * Discover methods of repository objects by using CIM and WMI * Locate class methods and documentation by using CIM and WMI * Invoke methods of repository objects by using CIM and WMI 19 - MANAGE VARIABLES IN WINDOWS POWERSHELL SCRIPTS * Define variables in Windows PowerShell scripts * Create variable names in Windows PowerShell scripts * Assign values and types to variables in Windows PowerShell scripts * Identify the methods and properties of variables in Windows PowerShell scripts * Use string variables and methods in Windows PowerShell scripts * Use date variables and methods in Windows PowerShell scripts 20 - WORK WITH ARRAYS AND HASH TABLES IN WINDOWS POWERSHELL SCRIPTS * Define an array in Windows PowerShell scripts * Work with array lists in Windows PowerShell scripts * Define hash tables in Windows PowerShell Scripts * Work with hash tables in Windows PowerShell scripts 21 - CREATE AND RUN SCRIPTS BY USING WINDOWS POWERSHELL * Review Windows PowerShell scripts * Modify scripts in the PowerShell Gallery * Create scripts using Windows PowerShell * Review the PowerShellGet module in Windows PowerShell * Run scripts and set the execution policy in Windows PowerShell * Review Windows PowerShell and AppLocker * Sign the scripts digitally in Windows PowerShell 22 - WORK WITH SCRIPTING CONSTRUCTS IN WINDOWS POWERSHELL * Review and use the ForEach loop in Windows PowerShell scripts * Review and use the If construct in Windows PowerShell scripts * Review and use the Switch construct in Windows PowerShell scripts * Review the For construct in Windows PowerShell scripts * Review other loop constructs in Windows PowerShell scripts * Review Break and Continue in Windows PowerShell scripts 23 - IMPORT DATA IN DIFFERENT FORMATS FOR USE IN SCRIPTS BY USING WINDOWS POWERSHELL CMDLETS * Use the Get-Content command in Windows PowerShell scripts * Use the Import-Csv cmdlet in Windows PowerShell scripts * Use the Import-Clixml cmdlet in Windows PowerShell scripts * Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - USE METHODS TO ACCEPT USER INPUTS IN WINDOWS POWERSHELL SCRIPTS * Identify values that might change in Windows PowerShell scripts * Use the Read-Host cmdlet in Windows PowerShell scripts * Use the Get-Credential cmdlet in Windows PowerShell scripts * Use the Out-GridView cmdlet in Windows PowerShell scripts * Pass parameters to a Windows PowerShell script 25 - TROUBLESHOOT SCRIPTS AND HANDLE ERRORS IN WINDOWS POWERSHELL * Interpret error messages generated for Windows PowerShell commands * Add output to Windows PowerShell scripts * Use breakpoints in Windows PowerShell scripts * Interpret error actions for Windows PowerShell commands 26 - USE FUNCTIONS AND MODULES IN WINDOWS POWERSHELL SCRIPTS * Review functions in Windows PowerShell scripts * Use variable scope in Windows PowerShell scripts * Create modules in Windows PowerShell scripts * Use the dot sourcing feature in Windows PowerShell 27 - MANAGE SINGLE AND MULTIPLE COMPUTERS BY USING WINDOWS POWERSHELL REMOTING * Review the remoting feature of Windows PowerShell * Compare remoting with remote connectivity * Review the remoting security feature of Windows PowerShell * Enable remoting by using Windows PowerShell * Use one-to-one remoting by using Windows PowerShell * Use one-to-many remoting by using Windows PowerShell * Compare remoting output with local output 28 - USE ADVANCED WINDOWS POWERSHELL REMOTING TECHNIQUES * Review common remoting techniques of Windows PowerShell * Send parameters to remote computers in Windows PowerShell * Set access protection to variables, aliases, and functions by using the scope modifier * Enable multi-hop remoting in Windows PowerShell 29 - MANAGE PERSISTENT CONNECTIONS TO REMOTE COMPUTERS BY USING WINDOWS POWERSHELL SESSIONS * Review persistent connections in Windows PowerShell * Create and manage persistent PSSessions by using Windows PowerShell * Disconnect PSSessions by using Windows PowerShell * Review the feature of implicit remoting in Windows PowerShell 30 - REVIEW AZURE POWERSHELL MODULE * Review Azure PowerShell * Review the benefits of the Azure PowerShell module * Install the Azure PowerShell module * Migrate Azure PowerShell from AzureRM to Azure * Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - REVIEW THE FEATURES AND TOOLS FOR AZURE CLOUD SHELL * Review the characteristics of Azure Cloud Shell * Review the features and tools of Azure Cloud Shell * Configure and experiment with Azure Cloud Shell 32 - MANAGE AZURE RESOURCES WITH WINDOWS POWERSHELL * Create a new Azure virtual machine by using Windows PowerShell commands * Manage Azure virtual machines by using Windows PowerShell commands * Manage Azure related storage by using Azure PowerShell * Manage Azure subscriptions by using Azure PowerShell 33 - MANAGE USERS, GROUPS, AND LICENSES IN MICROSOFT ENTRA ID BY USING WINDOWS POWERSHELL * Review benefits to manage Microsoft 365 services by using Windows PowerShell * Connect to the Microsoft 365 tenant by using Windows PowerShell * Manage users in Microsoft 365 by using Windows PowerShell * Manage groups in Microsoft 365 by using Windows PowerShell * Manage roles in Microsoft 365 by using Windows PowerShell * Manage licenses in Microsoft 365 by using Windows PowerShell 34 - MANAGE EXCHANGE ONLINE BY USING WINDOWS POWERSHELL * Connect to Exchange Online by using Windows PowerShell * Manage mailboxes in Exchange Online by using Windows PowerShell * Manage resources in Exchange Online by using Windows PowerShell * Manage admin roles in Exchange Online by using Windows PowerShell 35 - MANAGE SHAREPOINT ONLINE BY USING WINDOWS POWERSHELL * Install and connect to SharePoint Online Management Shell by using Windows PowerShell * Manage SharePoint Online users and groups by using Windows PowerShell * Manage SharePoint sites by using Windows PowerShell * Manage SharePoint Online external user sharing by using Windows PowerShell 36 - MANAGE MICROSOFT TEAMS BY USING WINDOWS POWERSHELL * Review Microsoft Teams PowerShell module * Install the Microsoft Teams PowerShell module * Manage teams with Microsoft Teams PowerShell module 37 - CREATE AND MANAGE BACKGROUND JOBS USING WINDOWS POWERSHELL * Define the types of background jobs in Windows PowerShell * Start remote jobs and CIM/WMI jobs in Windows PowerShell * Monitor jobs in Windows PowerShell * Retrieve results for running jobs in Windows PowerShell 38 - CREATE AND MANAGE SCHEDULED JOBS USING WINDOWS POWERSHELL * Create and run Windows PowerShell scripts as scheduled tasks * Define scheduled jobs in Windows PowerShell * Create job option and job trigger objects in Windows PowerShell * Create and register a scheduled job in Windows PowerShell * Retrieve the results from a scheduled job in Windows PowerShell

AZ-040T00 Automating Administration with Powershell
Delivered Online5 days, Jun 17th, 15:00 + 8 more
£2975

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

AZ-104T00 Microsoft Azure Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. Prerequisites Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of Active Directory concepts, including users, groups, and role-based access control. Understanding of resilience and disaster recovery, including backup and restore operations. 1 - CONFIGURE MICROSOFT ENTRA ID * Describe Microsoft Entra ID benefits and features * Describe Microsoft Entra concepts * Compare Active Directory Domain Services to Microsoft Entra ID * Select Microsoft Entra editions * Implement Microsoft Entra join * Implement Microsoft Entra self-service password reset 2 - CONFIGURE USER AND GROUP ACCOUNTS * Create user accounts * Manage user accounts * Create bulk user accounts * Create group accounts * Create administrative units 3 - CONFIGURE SUBSCRIPTIONS * Identify Azure regions * Implement Azure subscriptions * Obtain an Azure subscription * Identify Azure subscription usage * Implement Microsoft Cost Management * Apply resource tagging * Apply cost savings 4 - CONFIGURE AZURE POLICY * Create management groups * Implement Azure policies * Create Azure policies * Create policy definitions * Create an initiative definition * Scope the initiative definition * Determine compliance 5 - CONFIGURE ROLE-BASED ACCESS CONTROL * Implement role-based access control * Create a role definition * Create a role assignment * Compare Azure roles to Microsoft Entra roles * Apply role-based access control * Review fundamental Azure RBAC roles 6 - CONFIGURE AZURE RESOURCES WITH TOOLS * Use the Azure portal * Use Azure Cloud Shell * Use Azure PowerShell * Use Azure CLI 7 - USE AZURE RESOURCE MANAGER * Review Azure Resource Manager benefits * Review Azure resource terminology * Create resource groups * Create Azure Resource Manager locks * Reorganize Azure resources * Remove resources and resource groups * Determine resource limits 8 - CONFIGURE RESOURCES WITH AZURE RESOURCE MANAGER TEMPLATES * Review Azure Resource Manager template advantages * Explore the Azure Resource Manager template schema * Explore the Azure Resource Manager template parameters * Consider Bicep templates * Review QuickStart templates 9 - CONFIGURE VIRTUAL NETWORKS * Plan virtual networks * Create subnets * Create virtual networks * Plan IP addressing * Create public IP addressing * Associate public IP addresses * Allocate or assign private IP addresses 10 - CONFIGURE NETWORK SECURITY GROUPS * Implement network security groups * Determine network security group rules * Determine network security group effective rules * Create network security group rules * Implement application security groups 11 - CONFIGURE AZURE DNS * Identify domains and custom domains * Verify custom domain names * Create Azure DNS zones * Delegate DNS domains * Add DNS record sets * Plan for Azure Private DNS zones * Review Azure Private DNS zone scenarios 12 - CONFIGURE AZURE VIRTUAL NETWORK PEERING * Determine Azure Virtual Network peering uses * Determine gateway transit and connectivity * Create virtual network peering * Extend peering with user-defined routes and service chaining 13 - CONFIGURE NETWORK ROUTING AND ENDPOINTS * Review system routes * Identify user-defined routes * Determine service endpoint uses * Determine service endpoint services * Identify private link uses 14 - CONFIGURE AZURE LOAD BALANCER * Determine Azure Load Balancer uses * Implement a public load balancer * Implement an internal load balancer * Determine load balancer SKUs * Create back-end pools * Create health probes * Create load balancer rules 15 - CONFIGURE AZURE APPLICATION GATEWAY * Implement Azure Application Gateway * Determine Azure Application Gateway routing * Configure Azure Application Gateway components 16 - CONFIGURE STORAGE ACCOUNTS * Implement Azure Storage * Explore Azure Storage services * Determine storage account types * Determine replication strategies * Access storage * Secure storage endpoints 17 - CONFIGURE AZURE BLOB STORAGE * Implement Azure Blob Storage * Create blob containers * Assign blob access tiers * Add blob lifecycle management rules * Determine blob object replication * Upload blobs * Determine Blob Storage pricing 18 - CONFIGURE AZURE STORAGE SECURITY * Review Azure Storage security strategies * Create shared access signatures * Identify URI and SAS parameters * Determine Azure Storage encryption * Create customer-managed keys * Apply Azure Storage security best practices 19 - CONFIGURE AZURE FILES AND AZURE FILE SYNC * Compare storage for file shares and blob data * Manage Azure file shares * Create file share snapshots * Implement Azure File Sync * Identify Azure File Sync components * Deploy Azure File Sync 20 - CONFIGURE AZURE STORAGE WITH TOOLS * Use Azure Storage Explorer * Use the Azure Import/Export service * Use the WAImportExport tool * Use the AzCopy tool 21 - CONFIGURE VIRTUAL MACHINES * Review cloud services responsibilities * Plan virtual machines * Determine virtual machine sizing * Determine virtual machine storage * Create virtual machines in the Azure portal * Connect to virtual machines 22 - CONFIGURE VIRTUAL MACHINE AVAILABILITY * Plan for maintenance and downtime * Create availability sets * Review update domains and fault domains * Review availability zones * Compare vertical and horizontal scaling * Implement Azure Virtual Machine Scale Sets * Create Virtual Machine Scale Sets * Implement autoscale * Configure autoscale 23 - CONFIGURE AZURE APP SERVICE PLANS * Implement Azure App Service plans * Determine Azure App Service plan pricing * Scale up and scale out Azure App Service * Configure Azure App Service autoscale 24 - CONFIGURE AZURE APP SERVICE * Implement Azure App Service * Create an app with App Service * Explore continuous integration and deployment * Create deployment slots * Add deployment slots * Secure your App Service app * Create custom domain names * Back up and restore your App Service app * Use Azure Application Insights 25 - CONFIGURE AZURE CONTAINER INSTANCES * Compare containers to virtual machines * Review Azure Container Instances * Implement container groups * Review the Docker platform 26 - CONFIGURE FILE AND FOLDER BACKUPS * Describe Azure Backup benefits * Implement Backup Center for Azure Backup * Configure Azure Recovery Services vault backup options * Use the Microsoft Azure Recovery Services (MARS) agent * Configure on-premises file and folder backups 27 - CONFIGURE VIRTUAL MACHINE BACKUPS * Explore options to protect virtual machine data * Create virtual machine snapshots in Azure Backup * Set up Azure Recovery Services vault backup options * Back up your virtual machines * Restore your virtual machines * Implement System Center DPM and Azure Backup Server * Compare the MARS agent and Azure Backup Server * Implement soft delete for your virtual machines * Implement Azure Site Recovery 28 - CONFIGURE AZURE MONITOR * Describe Azure Monitor key capabilities * Describe Azure Monitor components * Define metrics and logs * Identify monitoring data and tiers * Describe activity log events * Query the activity log 29 - CONFIGURE AZURE ALERTS * Describe Azure Monitor alerts * Manage Azure Monitor alerts * Create alert rules * Create action groups 30 - CONFIGURE LOG ANALYTICS * Determine Log Analytics uses * Create a Log Analytics workspace * Create Kusto (KQL) queries * Structure Log Analytics queries 31 - CONFIGURE NETWORK WATCHER * Describe Azure Network Watcher features * Review IP flow verify diagnostics * Review next hop diagnostics * Visualize the network topology

AZ-104T00 Microsoft Azure Administrator
Delivered Online5 days, Jun 24th, 13:00 + 21 more
£2380

Linux shell scripting

5.0(3)

By Systems & Network Training

LINUX SHELL SCRIPTING TRAINING COURSE DESCRIPTION A practical introduction to writing scripts using the Bourne shell under any Linux operating system. Applicable for those using the Korn shell as well. WHAT WILL YOU LEARN * Read shell scripts. * Write shell scripts. * Use different types of quotes. * Recognise the role of shell scripts within the Linux system. LINUX SHELL SCRIPTING TRAINING COURSE DETAILS * Who will benefit: Programmers developing programs under UNIX. Administrators / support personnel who wish to find out more about the workings of Linux or write simple utility programs. * Prerequisites: Linux Fundamentals * Duration 2 days LINUX SHELL SCRIPTING TRAINING COURSE CONTENTS * Review of Linux fundamentals * Basic shell scripts What does the shell do? How are commands executed? Different shells. what is a shell script? Comments, creating shell scripts. * Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. * Positional parameters $0 to $9, $#, $* and others. shift parameter substitution. * Control statements The test command The if statement while loops for loops The case statement. * Special characters Redirection of errors, here documents, quoting. * Arithmetic in shell scripts The expr command. * System shell scripts * Screen handling The terminfo database, The tput command. * Advanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. * Optimising shell scripts The time command, performance tips.

Linux shell scripting
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1497

UNIX shell programming

5.0(3)

By Systems & Network Training

UNIX SHELL PROGRAMMING TRAINING COURSE DESCRIPTION This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. WHAT WILL YOU LEARN * Read shell scripts. * Write shell scripts. * Use different types of quotes. * Recognise the role of shell scripts within the UNIX system. UNIX SHELL PROGRAMMING TRAINING COURSE DETAILS * Who will benefit: Programmers developing programs under UNIX. Anyone working with XML. Administrators Support personnel who wish to find out more about the workings of UNIX or write simple utility programs. * Prerequisites: UNIX fundamentals Some programming experience would be useful although not essential. * Duration 2 days UNIX SHELL PROGRAMMING TRAINING COURSE CONTENTS * Review of UNIX fundamentals * Basic shell scripts What does the shell do? How are commands executed? Different shells. What is a shell script? Comments, creating shell scripts. * Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. * Positional parameters 0 to $9, $#, $* and others. shift parameter substitution. * Control statements The test command, The if statement, while loops, for loops, The case statement, Special characters, Redirection of errors, here documents, quoting. * Arithmetic in shell scripts The expr command. * System shell scripts * Screen handling The terminfo database The tput comand * Avanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. * Optimising shell scripts The time command, performance tips.

UNIX shell programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1497

Advanced UNIX shell programming

5.0(3)

By Systems & Network Training

ADVANCED UNIX SHELL SCRIPTING TRAINING COURSE DESCRIPTION A follow on hands on course from the Introduction to shell programming course covering the powerful sed and awk tools along with the extra Korn shell programming features. WHAT WILL YOU LEARN * Use regular expressions within grep, ed and many other utilities. * Use awk and sed. * Integrate sed and awk into shell scripts. * Recognise the role of shell scripts within the UNIX system. * Write shell scripts using new Korn shell features including: * The select construct * Arrays * Arithmetic evaluation ADVANCED UNIX SHELL SCRIPTING TRAINING COURSE DETAILS * Who will benefit: Programmers developing applications under UNIX. Administrators who need time saving utilities. Technical personnel who wish to make the most out of the Korn Shell. * Prerequisites: UNIX shell scripting * Duration 3 days ADVANCED UNIX SHELL SCRIPTING TRAINING COURSE CONTENTS * Regular Expressions What are REs? How can they be used? How to write REs * More REs e REs Tagging, matching words, repetitions. * The sed editor Basic usage: Saving output, options. sed script files, sed commands, Specifying lines to edit, Hold space and pattern space, advanced commands * Awk Basic usage, nawk script files, Patterns, Records and fields, Actions if, while, do, for... System variables NF, NR, RS... Arrays Functions length, printf, cos, user defined... Using nawk in shell scripts * Korn shell scripts Review of Bourne shell scripts functions... Variables typeset, manipulating strings Arrays Arithmetic evaluation the let command, (( )), typeset -i The select construct Syntax, workings, REPLY, PS3 Miscellaneous Enhanced I/O, ${10}

Advanced UNIX shell programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1697

AN202 IBM Korn and Bash Shell Programming

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for support staff for AIX on POWER systems Overview After completing this course, you should be able to: - Distinguish Korn and bash shell specific features - Use utilities such as sed and awk to manipulate data - Understand system shell scripts such as /etc/shutdown - Write useful shell scripts to aid system administration This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems. BASIC SHELL CONCEPTS FLOW CONTROL IN A SHELL SCRIPT FUNCTIONS AND TYPESET SHELL FEATURES SUCH AS ARITHMETIC AND STRING HANDLING USING REGULAR EXPRESSIONS USING SED, AWK AND OTHER AIX UTILITIES

AN202 IBM Korn and Bash Shell Programming
Delivered on-request, onlineDelivered Online
Price on Enquiry

Reservoir Engineering for Geosciences Professionals and Other Disciplines

By Asia Edge

ABOUT THIS TRAINING COURSE Reservoir engineering methods, data and models are used in the E&P business to describe and optimise hydrocarbon recovery. This 5 full-day course addresses reservoir engineering concepts and methods to enable cross-disciplinary team work and the smooth exchange of ideas and experience. In this course, participants will gain an in-depth understanding of the fundamentals of reservoir engineering and a broad range of modern reservoir engineering principles and practices for reservoir development and production, including the estimation of oil and gas reserves. The topics covered in this course will be illustrated with practical and actual field cases. Some self-study or reading will be required from participants. Training Objectives By the end of this course, participants will be able to: * Describe use of permeability and fluid saturation in reservoir engineering. * Explain the assessment of hydrocarbon resources and recoverable reserves estimation. * Understand analysis and modelling of fluid behaviour. * Explain oil and gas reservoir performance. * Describe material balance methods in oil and gas reservoirs. * Understand design and analysis of well tests. * Understand analysis and production of producing wells and forecasting methods. * Describe fluid displacement at the pore and reservoir scale. * Explain reservoir simulation approaches. * Describe tools for handling the uncertainty in reservoir analysis. * Describe various recovery methods from primary to enhanced recovery. Target Audience This course is intended for professionals with prior technical or engineering exposure to exploration and production activities. Targeted participants include geoscientists, production engineers, petrophysicists and petroleum engineers involved with exploration and development of oil & gas reservoirs. The course will also benefit petroleum engineering team leaders as well as IT staff and support staff who work with reservoir engineering, development and production departments. Course Level * Basic or Foundation Trainer Your expert course leader is an independent Reservoir Engineering Consultant, providing project consultancy and reservoir engineering training for global customers. He retired from Shell in 2012 and during the last years of his Shell career, he held the Senior Reserves Consultant for the Middle East and Reservoir Engineering Discipline Lead positions. He is a seasoned Petroleum Engineering professional, with global experience in Shell companies and joint ventures (NAM, SSB, SCL, PDO, SKDBV). His technical expertise is in reserves and resource management, reservoir engineering quality assurance, and staff development as well as carbonate reservoirs, modelling and reservoir simulation.  PROFESSIONAL EXPERIENCE 2012 to date Independent Reservoir Engineering Consultant Petroleum and reservoir engineering advice, training and services. Reservoir engineering training for major oil companies, engineering firms and other global customers. Assurance of SPE and SEC reserves compliance. Participation in SPE reserves and resources estimation Advanced Technology Workshops both as an organising committee member and as session speaker.   2008 - 2012 Shell International E&P, the Hague, the Netherlands Senior Reserves Consultant for Shell business units and joint ventures in the Middle East Region Assurance of SEC and SPE compliance of reserves and resources. Industry publications and conference contributions a.o. SPE guidelines on probabilistic reserves estimation.   2006 - 2008 Shell E&P Technology Solutions, Rijswijk, the Netherlands Reservoir Engineering Discipline Lead Responsible for Reservoir Engineering in global projects and for staff planning and development (over 60 international Reservoir Engineers).   2001 - 2005 Centre for Carbonate Studies, SQU, Oman / Shell International E&P Applications and Research / Shell Representative Office Oman   Petroleum Engineering Manager PE Manager in the Carbonate Research Centre, a joint venture between Sultan Qaboos University in Oman and Shell International. Industrial research projects and teaching on recovery aspects of carbonate reservoir development.   1997 - 2000 Shell International E&P, Rijswijk, the Netherlands Principal Reservoir Engineer Coordination of the NOV subsurface team in Shell Kazakhstan Development BV in 2000. Leading role in Shell Gamechanger project on natural gas hydrates. Acting Shell Group Reserves Co-ordinator in 1997-1998. Facilitation of workshops with government shareholders, including discussions on sensitive reserves issues (BSP Petroleum Unit Brunei, PDO Oman, SPDC government Nigeria).   1992 - 1996 Shell Training Centre, Noordwijkerhout, the Netherlands Reservoir Engineering Programme Training Director Advanced PE training events, QA/QC, design and delivery of courses to Shell staff.   1985 - 1992 Shell International, SIPM, the Hague, The Netherlands Senior Reservoir Engineer Reservoir simulation, integrated reservoir modelling and gas field development and major contributor to the Shell internal Gas Field Planning Tool development. Full field reservoir simulation projects supporting Field Development Plans, operational strategies and unitisation negotiations for Shell Group Operating Companies in the United Kingdom, New Zealand and Egypt.   1984 - 1985 Geological Survey of the Netherlands, Ministry of Economic Affairs Reservoir Engineering Section Head Responsible for Petroleum Engineering advice on oil and gas licences to the Ministry of Economic Affairs. First-hand experience with a government view on resource management.   1976 - 1984 NAM, Assen, The Netherlands and SSB/SSPC, Miri, Malaysia Wellsite Operations Engineer / Operational Reservoir Engineer POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Reservoir Engineering for Geosciences Professionals and Other Disciplines
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697 to £4299

Advanced Reservoir Engineering

By Asia Edge

ABOUT THIS VIRTUAL INSTRUCTOR LED TRAINING (VILT)  The Advanced Reservoir Engineering VILT course will address modern practical aspects of reservoir engineering during 5 half-days packed with lectures, virtual exercises, discussions and literature reviews. The participants' understanding of fundamental concepts and modern practical reservoir engineering methods will be deepened and a wide range of topics will be addressed. Topics covered The VILT course will emphasise reservoir engineering applications and include topics such as: 1. Rock properties of clastic and carbonate reservoirs 2. Reservoir characterisation 3. Reservoir fluid behaviour 4. Identification of main production mechanisms 5. Design and analysis of well tests 6. Production forecasting 7. Application of Decline Curve Analysis in mature fields 8. Detailed modeling of wells and reservoirs 9. Water flooding 10. Application of EOR methods 11. Reserves and resource estimation 12. Reservoir simulation approaches, model construction and well, aquifer and fluid modelling 13. Development planning 14. Uncertainty handling and scenario methods Depending on the background and requirements of the participants, some topics may be given more emphasis.   Training Objectives In this VILT course, reservoir engineering methods will be addressed which are of use in the daily reservoir engineering practice. The focus will be on practical applicability. Use is made of practical and actual reservoir engineering problems and examples to illustrate relevant subjects. By attending this VILT course, participants will have a deeper knowledge of modern reservoir engineering practices for reservoir development and production, including the construction and use of reservoir models. Target Audience The VILT course is intended for experienced reservoir engineers with prior technical or engineering exposure to production activities. Petroleum engineers and geoscientists who require more than general knowledge of reservoir engineering will also find this course useful. Participants are invited but not obliged to bring a short presentation (max of 15 minutes) on a practical problem they encountered in their work. This will then be explained and discussed in the VILT class. A short test or quiz will be held at the end the VILT course. Training Methods This VILT course will be delivered online over 5 half-days. There will be 2 blocks of two hours per day, including lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be required. Two breaks of 10 minutes will be provided each day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your course leader is an independent Reservoir Engineering Consultant. He provides project consultancy, quality assurance and reservoir engineering training for major oil companies, governments, engineering firms and other global customers. Before he retired from Shell in 2012, he held positions as Senior Reserves Consultant for the Middle East and Reservoir Engineering Discipline Lead. He is a petroleum engineering professional, with global experience, mostly in Shell companies and joint ventures (NAM, SSB, SCL, PDO, SKDBV). He has been involved in reserves and resource management, has extensive reservoir modelling and reservoir simulation expertise, and wide experience in the design and delivery of training programmes for employee development. PROFESSIONAL EXPERIENCE 2012 - 2016 Independent Reservoir Engineering Consultant Project consultancy, quality assurance and reservoir engineering training for major oil companies, governments, engineering firms and other global customers. Delivering specialised and general Reservoir Engineering courses to a multitude of international companies. 2008 - 2012 Shell International E&P, the Hague, the Netherlands Senior Reserves Consultant for the Middle East Region Assurance of SEC and SPE compliance of reserves and resources in Shell Middle East region. Contributor to the 2012 SPE guidelines on reserves and resources assessment. 2006 - 2008 Shell E&P Technology Solutions, Rijswijk, the Netherlands Reservoir Engineering Discipline Lead Responsible for QA/QC of Reservoir Engineering in global E&P projects as well as for staff development. (over 60 international Reservoir Engineers) 2001 - 2005 Centre for Carbonate Studies, SQU, Oman / Shell International E&P Technology Applications and Research /Shell Representative Office Oman Petroleum Engineering Manager PE manager in the Carbonate Research centre, at Sultan Qaboos University in Oman. Industrial research projects and support to teaching on recovery aspects of carbonate reservoir development. Design and delivery of industrial courses on carbonate reservoirs 1997- 2000 Shell International E&P, Rijswijk, the Netherlands Principal Reservoir engineer. Acting Shell Group Reserves Co-ordinator in 1997-1998. Facilitation of workshops with government shareholders, including discussions on sensitive reserves issues (BSP Petroleum Unit Brunei, PDO Oman, SPDC government Nigeria). Co-ordination of the NOV subsurface team in Shell Kazakhstan Development BV in 2000. Leading role in Shell Gamechanger project on natural gas hydrates. 1992- 1996 Shell Training Centre, Noordwijkerhout, the Netherlands Reservoir Engineering Programme Training Director Directed Shell Group Reservoir Engineering Training. Introduced advanced PE training events, QA/QC and learning transfer measures, Design and delivery of reservoir engineering and multidiscipline courses to Shell staff from a wide range of nationalities. 1985- 1992 Shell International, SIPM, the Hague, The Netherlands Senior Reservoir Engineer Full field reservoir simulation projects supporting Field Development Plans, operational strategies and unitisation negotiations for Shell Group Operating Companies in the United Kingdom, New Zealand and Egypt. Major contributor to the Shell internal Gas Field Planning Tool development. 1984- 1985 Geological Survey of the Netherlands (RGD), Ministry of Economic Affairs Reservoir Engineering Section Head Responsible for Petroleum Engineering advice on oil and gas licences to the Ministry of Economic Affairs. First-hand experience with a government view on resource management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Advanced Reservoir Engineering
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1536 to £2899

Educators matching "Shell"

Show all 124