• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7083 Courses delivered Live Online

Check Point Software - Check Point Certified Security Admin R80.20 (CCSA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog

Check Point Software - Check Point Certified Security Admin R80.20 (CCSA)
Delivered OnlineFlexible Dates
Price on Enquiry

Dare to Lead

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Team leaders, managers, executives, and other business and IT professionals who lead others as well as Individual contributors ready for transformational self-development as a leader. Overview Recognize vulnerability as the emotion we feel during times of uncertainty, risk, and emotional exposure. Explain why courage requires vulnerability. Establish a link between what I learned and behaviors I want to change. Recognize the critical role that self-awareness plays in daring leadership. Give examples to support how armor - not fear -is the greatest obstacle to daring leadership. Identify the four skill sets that make up courage: rumbling with vulnerability, living into our values, BRAVING trust, and learning to rise. Recognize that courage is a collection of four skill sets that are measurable, observable, and teachable. Recognize that vulnerability is the birthplace of many of the behaviors that define daring leadership, including creativity, accountability, and difficult conversations. Give examples of why daring leadership requires showing up for hard conversations and rumbles, including giving and receiving feedback. This workshop is all about your own leadership self-awareness, identifying your call to courage as a leader and the learning, practice and integration of the four courage skills sets so you can show up authentically in life and leadership. Dare to Lead? is the ultimate playbook for developing brave leaders and courageous cultures. The greatest barrier to daring leadership is not fear; the greatest obstacle is armor ? how we self-protect when we feel uncertainty, risk and emotional exposure. Learn the skills to move from armored leadership to daring leadership. Daring leaders are self-aware, know how to have hard conversations, hold themselves and others accountable, build trust, lead with empathy and connection, take smart risks that lead to innovation, reset quickly after disappointments and setbacks, and give and receive feedback. This interactive curriculum is delivered in five, half-day sessions and is based on the research by Bren‚ Brown. This course comes with a PDF workbook and an Amazon gift card to purchase the Dare to Lead? book in the version of your choice. You also have access to a series of leadership and personal development assessments and exclusive training videos led by Dr. Bren‚ Brown. At the end of the event, a digital badge is awarded to those who complete 24 hours of course content. The Heart of Daring Leadership Permission Slips Container Building Armored Leadership versus Daring Leadership Call to Courage Assembling Our Armor Building Grounded Confidence to Replace our Armor Aplying the 5Cs Self-Awareness & Emotional Literacy Developing Emotional Literacy Getting Curious About Emotions Exploring the Iceberg The Myths of Vulnerability Rumbling with Vulnerability The Six Myths of Vulnerability Exploring Your Arena Shame Resilience Shame 101 Defining Shame The Physiology of Shame Shame Shields How Shame Shows Up in Organizations How Shame Shows up at Work Empathy and Self-Compassion Attributes of Empathy What Does Empathy Look Like? Empathy Misses Comparative Suffering Self-Compassion Talk to Yourself the Way You Talk to Someone You Love Empathy & Self-Compassion Commitment Supplemental Exercise: Kristin Neff?s Self-Compassion Scale Supplemental Exercise: Putting Empathy, Curiosity, and Rumble Tools in Action Living Into Our Values Living Into Our Values Values Clarification Taking Values from Professing Words to Practicing Behaviors Grounded Confidence and Rumbling Skills Grounded Confidence and Rumbling Skills Rumble Starters The 5Cs of Strategic Thinking, Decision Making, and Delegation Using the 5Cs Supplemental Exercise ? Gritty Faith & Gritty Facts Supplemental Exercise ? Horizon Conflict Engaged Feedback Giving Engaged Feedback Recognizing Defensiveness in Feedback Conversations BRAVING Trust BRAVING Trust Square Squad Rumbling with Self-Trust Trust with Others Trust on Teams Rumbling with Living BIG Learning to Rise: The Reckoning Learning to Rise: The Rising Strong Process The Rising Strong Process Getting Emotionally Hooked Offloading Hurt: Barriers to Reckoning with Emotion Strategies for Reckoning with Emotion The Rumble and The Revolution Writing My SFD The Delta The Revolution: When the Process Becomes a Daily Practice Supplemental Exercise ? Reset and Resilience Practices Integration Dare to Lead Integration Plan

Dare to Lead
Delivered OnlineFlexible Dates
Price on Enquiry

Developing iOS Mobile Apps for Business

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for a programmer or web developer who is new to mobile app development in iOS. The student has experience using a computer running Mac OS X and developing applications or websites using object-oriented programming languages and tools, but may not have experience using the languages and tools specific to the iOS development environment. Overview In this course, you will develop, test, and package applications for devices that run the iOS operating system, including iPad and iPhone. You will: •Use Xcode to create and run an iOS application. •Write Objective-C code to enable iOS app user interface elements to interact with users. •Identify and describe common iOS design patterns and user interface standards. •Lay out and program apps to provide navigation among multiple views. •Access data from various locations, including app resources, user preferences, private app storage, and web services. •Enable an app to present graphics and multimedia. •Enable an app to interact well with other apps, the iOS system, and the mobile device it runs on. •Debug an app and implement runtime error handling. •Prepare an app for release, including configuration to support internationalization, and to run on multiple devices and different screen dimensions. This Logical Operations courseware is no longer available on the LO Store, but can be purchased by phone orderIn this course, students will learn how to develop and publish iOS apps, focusing on developing business apps for iPhones and iPads. Using Xcode to Develop an iOS App Set Up and Configure Xcode Create an App Project Create a User Interface Run an App in Simulator Programming in the iOS Development Environment Write Code to Handle User Interaction Organize and Maintain Code Use Predefined Classes Identifying Design Requirements for iOS Apps Design an App to Meet User Expectations iOS Design Patterns and Templates Implementing Multiple View Navigation Create an iOS App with Multiple Views Add a Custom View Controller Class Show Temporary Views Working with Data Select an Appropriate Data Storage Approach Load App Data from Property Lists Access Web Data and Services Store and Retrieve Preferences Working with Graphics and Media Load Graphic Images Draw Graphics Through Code Add Animation Effects Integrating with the App Ecosystem Manage App State Changes Map a Location Support Multiple Devices and Orientations Making Code More Robust and Maintainable Debug an App in Xcode Write Code to Handle Runtime Errors Finalizing an App Enable an App to Support Multiple Languages Prepare an App for Release

Developing iOS Mobile Apps for Business
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft PowerPoint for Office 365 (Desktop or Online) - Part 1 ( v1.1)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who wish to gain a foundational understanding of PowerPoint that is necessary to create and develop engaging multimedia presentations. Overview In this course, you will create and deliver an engaging PowerPoint presentation. You will: Identify the basic features and functions of PowerPoint. Develop a PowerPoint presentation. Perform text formatting. Add and arrange graphical elements. Modify graphical elements. Prepare to deliver your presentation. How do you grab and maintain an audience's focus when you're asked to present important information? By being clear, organized, and engaging. And, that is exactly what Microsoft© PowerPoint© can help you do.Today's audiences are tech savvy, accustomed to high-impact multimedia content, and stretched for time. By learning how to use the vast array of features and functionality contained within PowerPoint, you will gain the ability to organize your content, enhance it with high-impact visuals, and deliver it with a punch. In this course, you will use PowerPoint to begin creating engaging, dynamic multimedia presentations.Note: Most Office users perform the majority of their daily tasks using the desktop version of the Office software, so that is the focus of this training. The course material will also enable you to access and effectively utilize many web-based resources provided with your Microsoft 365 subscription. This includes brief coverage of key skills for using PowerPoint for the Web and OneDrive. Helpful notes throughout the material alert you to cases where the online version of the application may function differently from the primary, desktop version.This course may be a useful component in your preparation for the Microsoft PowerPoint (Microsoft 365 Apps and Office 2019): Exam MO-300 certification exam. Lesson 1: Getting Started with PowerPoint Topic A: Navigate the PowerPoint Environment Topic B: View and Navigate a Presentation Topic C: Create and Save a Basic Presentation Topic D: Navigate in PowerPoint for the Web Topic E: Use PowerPoint Help Lesson 2: Developing a PowerPoint Presentation Topic A: Create Presentations Topic B: Edit Text Topic C: Work with Slides Topic D: Design a Presentation Lesson 3: Formatting Text Topic A: Format Characters Topic B: Format Paragraphs Lesson 4: Adding and Arranging Graphical Elements Topic A: Insert Images Topic B: Insert Shapes Topic C: Create SmartArt Topic D: Insert Stock Media, Icons, and 3D Models Topic E: Size, Group, and Arrange Objects Lesson 5: Modifying Graphical Elements Topic A: Format Images Topic B: Format Shapes Topic C: Customize SmartArt Topic D: Format Icons Topic E: Format 3D Models Topic F: Animate Objects Lesson 6: Preparing to Deliver Your Presentation Topic A: Review Your Presentation Topic B: Apply Transitions Topic C: Print or Export a Presentation Topic D: Deliver Your Presentation Additional course details: Nexus Humans Microsoft PowerPoint for Office 365 (Desktop or Online) - Part 1 ( v1.1) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft PowerPoint for Office 365 (Desktop or Online) - Part 1 ( v1.1) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft PowerPoint for Office 365 (Desktop or Online) - Part 1 ( v1.1)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration

By Nexus Human

Duration 5 Days 30 CPD hours Overview How to implement advanced administration concepts such as backups, disaster recovery, scalability and redundancy for a Citrix Virtual Apps and Desktop 7 Site. Advanced troubleshooting techniques to troubleshoot Citrix Virtual Apps and Desktop 7. Security considerations and configurations for Citrix Apps and Desktop 7 site including multi-site management using zones. Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations. You will learn to build to implement Workspace Environment Management to improve logon times, centralize user settings management, and optimize the performance of machines. In the advanced troubleshooting section, you will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively. You will leave this course with a good understanding of how to manage more complex solutions such as multi-location environments with configurations around StoreFront, the Delivery Controllers, Cloud Connectors, and HDX. Module 1: Introduction to Citrix Virtual Apps and Desktops 7 Advanced Configuration Citrix Virtual Apps and Desktops Deployments - Advanced Configuration Module 2: Planning: Redundancy and Scalability Citrix Virtual Apps and Desktops Redundancy and Scalability StoreFront and Citrix Gateway Redundancy and Scalability Site Infrastructure Redundancy and Scalability Machines Running the Virtual Delivery Agent Module 3: Planning: Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones StoreFront Resource Aggregation Managing StoreFront Store Subscriptions in a Multi-Location Environment Module 4: Planning: Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Module 5: Planning: Advanced Authentication Methods Multi-factor Authentication - RADIUS and One Time Passwords (OTP) Multi-factor Authentication ? Smart Card Authentication Federated Authentication Module 6: Planning: App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Module 7: Planning: Virtual Delivery Agent Security Transport Layer Security (TLS) Virtual Delivery Agent (VDA) Encryption Microsoft Group Policy Objects (GPOs) and Citrix Policies Image Management Module 8: Introduction to Troubleshooting Troubleshooting Methodology Resource Tools and Utilities Introduction to PowerShell Module 9: Troubleshoot Access Issues Troubleshooting StoreFront Citrix ADC and Citrix Gateway ? Workflow and Troubleshooting Overview Citrix ADC and Citrix Gateway - Troubleshooting Access and Authentication Citrix ADC and Citrix Gateway - Troubleshooting App/Desktop Launch Module 10: Troubleshoot Delivery Controller Issues Validating FlexCast Management Architecture (FMA) Services Module 11: Troubleshoot Virtual Delivery Agent (VDA) Registration Issues Troubleshooting Virtual Delivery Agent (VDA) Registration Module 12: Troubleshoot HDX Connection Issues Troubleshooting HDX Connections Module 13: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 14: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 15: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 16: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 17: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 18: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 19: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 20: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 21: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 22: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 23: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 24: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Access for Office 365: Part 3

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Students taking this course are database administrators or prospective database administrators who have experience working with Access for Microsoft 365 and need to learn advanced skills. Overview In this course, you will manage an Access database and add complex database features to improve its usability, efficiency, performance, and security. You will: Share data across applications. Use action, unmatched, and duplicate queries to manage data. Create complex reports and forms. Use macros to improve user interface design. Use VBA to extend database capabilities. Perform database management tasks such as backup, compacting, repairing, performance analysis, checking object dependencies, and documenting. Implement security strategies and distribute a database to multiple users. You've covered many of the basic functions of Microsoft© Access©, and now you're ready to learn advanced Access features such as database management, advanced form design, packaging a database, encrypting a database, preparing a database for multiple-user access, and more. Knowledge of these features separates database professionals from the casual database users or occasional designers.This course is the third part of a three-course series that covers the skills needed to perform basic database design and development in Access.Microsoft© Access© for Office 365?: Part 1 : Focuses on the design and construction of an Access database?viewing, navigating, searching, and entering data in a database, as well as basic relational database design and creating simple tables, queries, forms, and reports.Microsoft© Access© for Office 365?: Part 2 : Focuses on optimization of an Access database, including optimizing performance and normalizing data; data validation; usability; and advanced queries, forms, and reports.Microsoft© Access© for Office 365?: Part 3 (this course): Focuses on managing the database and supporting complex database designs, including import and export of data; using action queries to manage data; creating complex forms and reports; macros and Visual Basic for Applications (VBA); and tools and strategies to manage, distribute, and secure a database.This course may be a useful component in your preparation for the Microsoft Access Expert (Microsoft 365 Apps and Office 2019): Exam MO-500 certification exam. Lesson 1: Importing and Exporting Table Data Topic A: Import and Link Data Topic B: Export Data Topic C: Create a Mail Merge Lesson 2: Using Queries to Manage Data Topic A: Create Action Queries Topic B: Create Unmatched and Duplicate Queries Lesson 3: Creating Complex Reports and Forms Topic A: Create Subreports Topic B: Create a Navigation Form Topic C: Show Details in Subforms and Popup Forms Lesson 4: Creating Access Macros Topic A: Create a Standalone Macro to Automate Repetitive Tasks Topic B: Create a Macro to Program a User Interface Component Topic C: Filter Records by Using a Condition Topic D: Create a Data Macro Lesson 5: Using VBA to Extend Database Capabilities Topic A: Introduction to VBA Topic B: Use VBA with Form Controls Lesson 6: Managing a Database Topic A: Back Up a Database Topic B: Manage Performance Issues Topic C: Document a Database Lesson 7: Distributing and Securing a Database Topic A: Split a Database for Multiple-User Access Topic B: Implement Security Topic C: Convert an Access Database to an ACCDE File Topic D: Package a Database with a Digital Signature

Microsoft Access for Office 365: Part 3
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Jira for End Users | Jira Jump Start (TTDV7541)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Attending students should be new to Jira (this is NOT for experienced users), and are required to have a background in basic Enterprise application development Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment guided by our expert Jira practitioner, students will explore: Getting started with JIRA Using JIRA for Business Projects Using JIRA for Agile Projects Issue Management Field Management Screen Management Workflows and Business Process Searching and Filtering Tracking issues is a critical component of any project management strategy. JIRA provides a web based single repository for creating, tracking and reporting on feature requests, bugs reported, or managing workflow. JumpStart to Jira for End Users is a two-day, lab-intensive course for participants new to Jira, that provides them with a hands-on Jira instance to ?learn by doing?. This course provides essential understanding in the practical use of the Jira in an Agile context, with an emphasis on Best Practices and practical job-ready skills. Getting started with JIRA JIRA Overview Core concepts Terminology Infrastructure Users and Groups JIRA roles Using JIRA for Business Projects Overview of Projects Project types Project screens Tasks and task management Project Management Process Management Using JIRA for Agile Projects Overview of Agile with JIRA (very brief) Kanban overview Running a project with Kanban Configuring agile screen resolving an issue Issue Management Overview of Issues Working with issues Issue cloning Time tracking Issues and comments Tasks and subtasks Field Management Overview of Fields Built-in fields Custom fields Searching Configuring JIRA for fields Screen Management Overview of JIRA screens Working with screens Using screen tabs Issue type screens associating an issue type screen a with a project Customizing JIRA screens Workflow and Business Process Overview of Workflow Mapping business processes Managing workflows Authoring a workflow Updating an existing workflow Workflow schemes Applying a workflow to a project Searching and Reporting Overview of Searching Search screens Basic search Advanced search with JQL Working with search results Reports Dashboards Filters Gadgets Charts Summary and Best Practices Looking back at the ?Big Picture? JIRA Administration Overview Where JIRA fits into the Agile perspective JIRA End-User best practices

Introduction to Jira for End Users | Jira Jump Start (TTDV7541)
Delivered OnlineFlexible Dates
Price on Enquiry

Project Risk Management

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for all project managers and project team leaders. Overview At course completion, students will be able to identify, analyze, respond to, and control project risks. This course focuses on improving the project manager?s risk management expertise, from initial planning through project closure. Participants will apply all course principles to a work-related case study taken directly from their work environment. Risk Management Overview Risk Management Benefit and Uses Project Risk Management Project Management Life Cycle Initiating Process Group Initiating Process Group Overview Develop Project Charter Identify Stakeholders Project Selection Criteria ROI Analysis ROI Methods Risk Complexity Index Project Selection Planning Process Group Planning Process Group Overview Scope Risks Schedule Risks Resource Risks Plan Risk Management Identify Risks Delphi Technique Subject Matter Expert Input Brainstorming Fishbone Diagrams Process Analysis Five Whys Influence Diagrams Risk Breakdown Structure (RBS) Risk Register Perform Qualitative Risk Analysis Probability and Impact Assessment Probability and Impact Chart Perform Quantitative Risk Analysis Three point estimates PERT Triangular Distributions Outlier Considerations Geometric Mean Normal Distributions Methods Tornado Diagrams Expected Monetary Value (EMV) Monte Carlo Plan Risk Responses Risk Response Strategies Overall Project Risk Checklists Executing, Monitoring and Controlling Process Groups Executing Process Group Overview Monitoring and Controlling Process Group Overview Control Risks Project Monitoring Longer Projects Closing Process Group Closing Process Group Overview Close Project or Phase Risk Activities During Closing Process Group Post-Project Risk Assessment

Project Risk Management
Delivered OnlineFlexible Dates
Price on Enquiry

Value Stream Management Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for People working in an organization aiming to improve performance, especially in response to digital transformation or disruption. Any roles involved in the creation and delivery of products or services: Leadership and CXO, especially CIO, CTO, CPO, and CVO Transformation and evolution leads and change agents Value stream architects, managers, engineers Scrum Masters, agile and DevOps coaches and facilitators Portfolio, product and project managers, and owners Business analysts Architects, developers, and engineers Release and environment managers IT Ops, service and support desk workers Customer experience and success professionals Overview After completing this course, students will be able to: Describe the origins of value stream management and key concepts such as flow, value, and delivery Describe what value stream management is, why it's needed and the business benefits of its practice Describe how lean, agile, DevOps, and ITSM principles contribute to value stream management Identify and describe value streams, where they start and end, and how they interconnect Identify value stream roles and responsibilities Express value streams visually using mapping techniques, define current and target states and hypothesis backlog Write value stream flow and realization optimization hypotheses and experiments Apply metrics such as touch/processing time, wait/idle time, and cycle time to value streams Understand flow metrics and how to access the data to support data-driven conversations and decisions Examine value realization metrics and aligning to business outcomes, and how to sense and respond to them (outcomes versus outputs) Architect a DevOps toolchain alongside a value stream and data connection points Design a continuous inspection and adaptation approach for organizational evolution The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, process, and technology aspects of this way of working and explores how optimizing value streams for flow and realization positively impacts organizational performance. History and Evolution of Value Stream Management and its Application Value stream management?s origins Definitions of value stream management Flow Lean and systems thinking and practices Agile, DevOps and other frameworks Research and analysis Identifying Value Streams What is a value stream? Identifying value streams Choosing a value stream Digital value streams Value stream thinking Mapping Value Streams Types of maps Value stream mapping The fuzzy front end Artifacts 10 steps to value stream mapping Mapping and management VSM investment case Limitations of value stream mapping Connecting DevOps Toolchains CICD and the DevOps toolchain Value stream management processes Value stream management platforms DevOps tool categories Building an end-to-end DevOps toolchain Common data model and tools integrations Value Stream Metrics The duality of VSM Downtime in technology Lean, DORA and Flow metrics Definition of Done Value metrics Benefits hypotheses Value streams as profit centers KPIs and OKRs Inspecting the Value Stream 3 Pillars of Empiricism Organizational performance Visibility When to inspect Data and discovery Insights and trends Organizing as Value Streams Value stream alignment Team types and topologies Project to product Hierarchy to autonomy Target Operating Model Value stream people Value stream roles Value stream funding Evolving Value Streams Why now? Transitions VSM capability matrix VSM culture iceberg Learning Making local discoveries global improvements Managing value stream interdependencies

Value Stream Management Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry