This half-day workshop delivered face-to-face or online is designed for anyone in your organisation that wants to become a Neurodiversity Champion - someone who wants to educate and change the way that Neurodiversity is viewed in the workplace.
This half-day Suicide First Aid Lite training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.
PMI-PBA® Exam Prep: In-House Training The course provides targeted exam preparation support for PMI®'s Professional in Business Analysis exam candidates, including a content review of The PMI Guide to Business Analysis, a review of the PMI-PBA® reference books, and an exam preparation tutorial. You will be given a Study Guide that you can re-use to assess your knowledge gaps as part of your Personal Action Plan. Your score on this for each Knowledge Area can be compared to your results on the quiz at the end of each course module to guide your study efforts. What you will Learn Upon completion, participants will be able to: Demonstrate familiarity with the structure, content and framework of The PMI Guide to Business Analysis Explain the six Knowledge Areas of The PMI Guide to Business Analysis, as well as, their inter-relationships with each other and the six Process Groups Differentiate among the five business analysis domains in the project life cycle Create a personal action plan to study and prepare for the PMI-PBA® Exam Getting Started PMI-PBA Examination Certification Process The Credential Examination Foundation Concepts for PMI-PBA® Prep Business analysis terminology and definitions Business analysis project, program, and portfolio management Product and project life cycles Skills and qualities of a business analyst Introduction to Business Analysis in Projects Business analysis overview How organizations implement business analysis Business analyst and project manager relationships Requirements definitions and types Practice quiz On-Demand Segment A: Define the Business Problem (Pre-work for Needs Assessment) Needs Assessment Review Needs Assessment knowledge area Identify problem or opportunity Assess current and future state Determine options and provide recommendations Facilitate product roadmap development Assemble business case Practice quiz Stakeholder Engagement Review Stakeholder Engagement knowledge area Identify Stakeholders and conduct analysis Determine Stakeholder engagement and communication approach Conduct business analysis planning Practice quiz On-Demand Segment B: The Elicitation Plan (Pre-work for Elicitation) Elicitation Review Elicitation knowledge area Determine Elicitation approach Preparing for Elicitation Conducting Elicitation Confirming Elicitation results Practice quiz On-Demand Segment C: Overview of Requirements Analysis (Pre-work for Analysis) Analysis Review Analysis knowledge area Determine Analysis approach Create and analyze models Define requirements and acceptance criteria Verify, validate, and prioritize requirements Identify and analyze product risks Assess product design options Practice quiz Traceability and Monitoring Review Traceability and Monitoring knowledge area Determine Traceability and Monitoring approach Establish relationships and dependencies Select and approve requirements Make changes to requirements and other product information Practice quiz Solution Evaluation Review Solution Evaluation knowledge area Evaluate solution performance Determine solution evaluation approach Evaluate acceptance results and address defects Obtain solution acceptance for release Practice quiz Exam Application and Preparation Process Applying for the Exam Studying for the Exam Sitting for the Exam Reviewing your Knowledge Gap Practice Exam Study Guide - a reliable learning aid Summary and Next Steps Crystallizing the Business Analysis Domains Developing a Personal Action Plan for Exam Study
SAFe® Agile Software Engineering: In-House Training The introduction of Lean-Agile and DevOps principles and practices into software engineering has sparked new skills and approaches that help organizations deliver higher-quality, software-centric solutions faster and more predictably. This workshop-oriented course explores foundational principles and practices and how continuous flow of value delivery and built-in quality are enabled by XP technical practices, Behavioral-Driven Development (BDD), and Test-Driven Development (TDD). Attendees will learn proven practices to detail, model, design, implement, verify, and validate stories in the SAFe® Continuous Delivery Pipeline, as well as the practices that build quality into code and designs. Attendees will also explore how software engineering fits into the larger solution context and understand their role in collaborating on intentional architecture and DevOps. What you will Learn To perform the role of a SAFe® Agile Software Engineer, you should be able to: Define Agile Software Engineering and the underlying values, principles, and practices Apply the Test-First principle to create alignment between tests and requirements Create shared understanding with Behavior-Driven Development (BDD) Communicate with Agile modeling Design from context for testability Build applications with code and design quality Utilize the test infrastructure for automated testing Collaborate on intentional architecture and emergent design Apply Lean-Agile principles to optimize the flow of value Create an Agile Software Engineering plan Introduction to Agile Software Engineering Connecting Principles and Practices to Built-in Quality Accelerating Flow Applying Intentional Architecture Thinking Test-First Discovering Story Details Creating a Shared Understanding with Behavior-Driven Development (BDD) Communicating with Models Building Systems with Code Quality Building Systems with Design Quality Implementing with Quality
ITIL® 4 Leader: Digital and IT Strategy: In-House Training The ITIL® 4 Leader: Digital and IT Strategy (DITS) is one of the two modules in the ITIL® 4 Strategic Leader (SL) certification scheme. The other module in the SL designation is the ITIL® 4 Strategist: Direct, Plan & Improve. Accredited training for the ITIL® 4 Strategic Leader modules is mandatory to enable full understanding of the core material. The ITIL ® 4 Digital and IT Strategy certification focuses on enabling business success through the creation of digital and IT strategies. The IT and Digital Strategy certification adds a new perspective to the ITIL suite and elevates the discussion around ITIL concepts to a strategic level among business leaders and aspiring leaders. The ITIL® 4 Digital and IT Strategy course is based on the ITIL® 4 Digital and IT Strategy exam specification from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, you will acquire relevant knowledge to pass the certification exam. The core learning material in the course is supported by interactive case study, discussions and activities. What You Will Learn The ITIL ® 4 Digital and IT Strategy course covers the content in relation to the following learning outcomes of the exam specification for ITIL ® 4 Digital and IT Strategy: Demonstrate the use of the ITIL guiding principles in Digital and IT Strategy decisions and activities Understand how to leverage digital strategy to react to digital disruption Understand the relationship between the concepts of Digital and IT Strategy, the service value system and the service value chain, and explain how to utilize them to create value Understand how an organization uses Digital and IT Strategy to remain viable in environments disrupted by digital technology Understand strategic approaches made possible by digital and information technology to achieve customer/market relevance and operational excellence Understand the risks and opportunities of Digital and IT Strategy Understand the steps and techniques involved in defining and advocating for a Digital and IT Strategy Understand how to implement a Digital and IT Strategy Key Concepts of Digital and IT Strategy Digital, Information, and Communication Technology Digital Transformation Services, Products, and Competitive Advantage Tiers of Strategy Business Models Operating Models Strategy and the Service Value System Opportunity and Demand Value Governance ITIL® Guiding Principles Continual Improvement ITIL® Practices What is Vision? Disruptions Vision Digital Disruptions Balanced Strategic Focus Positioning Tools for Digital Organizations Assignment 1: Digital Disruption and Digital Positioning Where Are We Now? Environmental Analysis Opportunity Analysis Digital Readiness Assessment How Do We Get There (Strategic Planning) Strategy Planning Financial Aspects of Digital and IT Strategy Business Models for Strategy Planning Portfolio Optimization How Do We Get There (Strategic Approaches) Strategic Approaches for Digital Organizations Strategic Approaches for Operational Excellence Strategic Approaches to Evolution Strategic Approaches to Social Responsibility and Sustainability Assignment 2: Strategic Approaches for Digital Organizations Take Action (Managing Strategic Initiatives) How Strategies are Implemented Coordinating Strategy and Strategic Initiatives Leading Digital Transformation Digital Leadership Assignment 3: Strategy Planning and Communication Did We Get There? (Measuring Strategy) Key Facts About Measurement Measuring a Strategy Instrumenting Strategy How Do We Keep the Momentum Going Long-Term Momentum: Ensuring Organizational Viability Short-Term Momentum: Parallel Operation Assignment: Digital Strategy in VUCA Environment Managing Innovation and Emerging Technologies Managing Innovation Formal Approach to Innovation Management Culture that Supports Innovation Approaches to Innovation Evaluating and Adopting Emerging Technology Managing Strategic Risk Risk Management Risk Identification Risk Posture Risk Treatment
Certified Business Analysis Professional™ (CBAP®) Boot Camp: In-House Training The course provides targeted exam preparation support for IIBA® Level 3 - CBAP® exam candidates, including both a BABOK® Guide Version 3.0 content review and exam preparation tutorial. The class is interactive, combining discussion, application of concepts, study tips, and a practice exam. Knowledge Check quizzes and self-assessments allow candidates to identify areas of weakness and create a custom study plan tailored to their individual needs as well as study aids to support their exam preparation after the course. The course materials include a copy of A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) Version 3.0. What you will Learn Upon completion, participants will be able to: Demonstrate familiarity with the structure and content of the IIBA® BABOK® Guide Improve their probability of passing the Level 3 - CBAP® Exam Identify their knowledge gaps through the use of module Knowledge Check quizzes Gauge their readiness for taking the exam by IIBA® BABOK® Guide Knowledge Are Foundation Concepts for IIBA® CBAP® Prep IIBA® - the Organization Business Analysis - the Profession Knowledge Check Terminology and Key Concepts IIBA®'s BABOK® Guide - the Standard Underlying Competencies BA Techniques Business Analysis Planning and Monitoring Knowledge Check Overview BAP&M Tasks BAP&M Techniques Elicitation and Collaboration Knowledge Check Overview E&C Tasks E&C Techniques Requirements Life Cycle Management Knowledge Check Overview RLCM Tasks RLCM Techniques Strategy Analysis Knowledge Check Overview SA Tasks SA Techniques Requirements Analysis and Design Definition Knowledge Check Overview RA&DD Tasks RA&DD Techniques Solution Evaluation Knowledge Check Overview SE Tasks SE Techniques Exam Preparation Practice Exam and debrief Exam Preparation Study Tips Manage Study Plan Exam Process Exam day
Microsoft Active Directory course description A thorough understanding of this system is essential for anyone managing enterprise MS networks. Essential theory is complimented with a high level of hands on practice allowing delegates to observe the idiosyncrasies of Active Directory and Group Policy at first hand. Delegates learn the fundamental theory of AD and progress onto building a multi-domain network in the classroom. The course includes troubleshooting methods, and essential maintenance procedures. This course is designed to teach you the skills needed for day to day management of these technologies. What will you learn Install AD on multiple PCs. Use the tools to create and manage objects. Create appropriate group policies to restrict selected user's desktops and network access. Install DNS to support Active Directory without loosing Internet Connectivity. Maintain and troubleshoot AD problems Backup Active Directory. Microsoft Active Directory course details Who will benefit: Technical staff working with AD based networks. Prerequisites: Supporting Windows server. Duration 3 days Microsoft Active Directory course contents Introduction to Active Directory Network authentication methods, Active Directory defined, AD naming conventions, network management with AD, AD structures: Domains, Organisational Units, Forests & Trees, Sites, The Global Catalogue. Windows 2003 new features, installing AD. Hands on Installing an AD network. Windows overview Management methods Server management tools, installing the additional tools, Terminal Server: Administration mode, Administrator accounts in AD, Local Security Policy. Hands on Install the management tools, Management using Terminal Services. Creating & Managing Objects (a quick look) AD management tools, AD users and computers, Creating & managing OUs, User Accounts and groups, controlling access to AD objects, moving objects, Publishing resources, locating objects in AD, delegating authority. Hands on Creating a control OU structure and delegating authority. Introduction to Group Policies What are Group Policies? Where Group Policy data is stored, security, Group Policy flow. Hands on Implementing Group Policies Working with Group Policies Local security templates, administrative templates, scripts, folder redirection, software deployment. Hands on Scripts, redirecting the start menu, creating a secure, robust desktop environment. Implementing DNS DNS basics, troubleshooting, implementing DNS zones. Hands on Building a unified DNS solution. Maintaining and managing the AD database AD support tools, database internal structure, replication, replication tools, Single Operations Masters, tools for maintenance, maintenance techniques, Backing up AD, Directory Services restore mode, NTDSUtil, Authoritative & non-authoritative restoration, rebuilding. Hands on NTDSUtil.
Satellite comms training course description A theory based course providing a foundation in how satellite communication systems work and the terminology used in the field. What will you learn Describe the satellite communications architecture. Recognise where to use satellite communication systems. Explain how satellite communications systems work. Satellite comms training course details Who will benefit: Anyone working with satellite systems. Prerequisites: None. Duration 2 days Satellite comms training course contents Satellite systems architecture Suppliers, bearers, teleports, subscribers, components, how satellite communications works. Terminals Antenna, VSAT, circulators, filters, LNA, HPA, up/ down converters, modems. Satellites Satellite components, payloads, satellite types: GEO and non-GEO. Satellite transmission Satellite C and Ku bands, Modulation, AM, FM, PSK, QPSK, FDMA, CDMA. Satellite services Regulatory issues; DVB and video distribution via satellite; how reporters uplink news, Internet services over DVB; broadband services; multicast internet services via satellite; multimedia meshed networking using VSATs; military small terminal satcoms. Satellite engineering Link budgets, Spectrum analysis, Power meter
Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. Identifying the Need for Security in Your Software Projects Identify Security Requirements and Expectations Identify Factors That Undermine Software Security Find Vulnerabilities in Your Software Gather Intelligence on Vulnerabilities and Exploits Handling Vulnerabilities Handle Vulnerabilities Due to Software Defects and Misconfiguration Handle Vulnerabilities Due to Human Factors Handle Vulnerabilities Due to Process Shortcomings Designing for Security Apply General Principles for Secure Design Design Software to Counter Specific Threats Developing Secure Code Follow Best Practices for Secure Coding Prevent Platform Vulnerabilities Prevent Privacy Vulnerabilities Implementing Common Protections Limit Access Using Login and User Roles Protect Data in Transit and At Rest Implement Error Handling and Logging Protect Sensitive Data and Functions Protect Database Access Testing Software Security Perform Security Testing Analyze Code to find Security Problems Use Automated Testing Tools to Find Security Problems Maintaining Security in Deployed Software Monitor and Log Applications to Support Security Maintain Security after Deployment
RF fundamentals training course description Radio Frequency engineering is an important yet often overlooked area in today's wireless world. This course provides a grounding in RF theory and practice for wireless, cellular and microwave systems. What will you learn Explain the basics of RF. Describe RF propagation and antenna principles. Calculate propagation losses and link budgets. Test RF systems. RF fundamentals training course details Who will benefit: Those working with wireless, cellular and microwave systems. Prerequisites: None. Duration 2 days RF fundamentals training course contents What is RF? Definition of RF, RF wave characteristics: Frequency, wavelength, power, phase, impedance, RF history, radio signals, frequency bands, safety issues, legal issues. RF systems Microwaves, cellular/mobile RF, WLANs, other fixed wireless networks, basic RF components. Hands on Building a basic WLAN network. RF system components Transmitters: Antennas: Isotropic, Dipole, how antennas achieve gain. Modulation Schemes, bandwidth, AM, FM, FSK, PSK, QAM, QPSK, interference, performance. Hands on Interference and performance. Multiple access schemes FDMA, CDMA, TDMA, CSMA/CA. Wireless systems Cellular (GSM, UMTS), Wifi, WiMax, others: GPS, DBS, RFID, radar, Bluetooth. Hands on cellular. Spread Spectrum technologies Spread spectrum benefits and disadvantages, how it works, Direct Sequence, Frequency Hopping, hybrids. RF propagation Models, link budget, Smith chart, RF matching with the Smith chart. cell capacity, tradeoffs: power vs. bandwidth, free space, reflection, diffraction, multipath cancellation, propagation prediction and measurement tools. Hands on Smith charts. RF testing Why power rather than voltage/current, units of power, dB and dBm power conversions. Test equipment: signal generators, power meters, network analysers, spectrum analysers. RF test setups: return loss, insertion loss. Hands on RF testing.