Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment
IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
SDH training course description Our SDH training course is designed for those with a basic knowledge of the principles of telecommunication digital transmission techniques. An overview of the existing transmission hierarchies and their limitations is provided with an introduction to the Synchronous Digital Hierarchy (SDH). The advantages of SDH are explained fully. What will you learn Identify the major limitations of the PDH network. Outline the advantages of using the SDH. Illustrate the various SDH equipment and network topologies. Describe the principles of the SDH multiplexing structure. SDH training course details Who will benefit: Anyone working with SDH. Prerequisites: It should be noted that this course will assume some basic telecommunication transmission knowledge from the delegates attending. This may be accomplished by attending the Introduction to Telecommunications course. Duration 2 days SDH training course contents Introduction to SDH Timing and synchronisation of digital signals, the plesiochronous digital hierarchy (PDH), the synchronous digital hierarchy (SDH), service protection with SDH SDH Multiplexing Techniques The multiplexing principles of SDH, mapping and aligning a 2Mbit/s tributary into a TU-12, aligning the VC-12 in a TU-12, multiplexing TU-12's into a TUG-2, multiplexing TUG-2's into a TUG-3, multiplexing TUG-3's into a VC-4, the VC-4 path overhead, the STM-1 frame, the AU-4 pointer, the STM-1 section overheads, multiplexer section protection, transmission at rates higher than STM-1, concatenation line transmission functions in SDH SONET Multiplexing Techniques Mapping a DS1 tributary into a virtual tributary, aligning the VT-SPE into a VT frame, mapping the VTGs into a STS-1 SPE, the STS-1 synchronous payload envelope, the STS-1 frame SONET network sections and lines transmissions at higher rates than STS-1 SDH Functions and Facilities SDH network topologies, structure of SDH equipment, synchronisation of SDH networks, protection switching in SDH networks, SDH alarm structure, SDH performance monitoring, testing of SDH, equipment and systems, network management and SDH, asynchronous transfer mode (ATM), future services and technologies OSI Telecommunications Network Management Definition of network management, managing telecom equipment, the managed object library, the management information base, the telecommunications management network (TMN), the Q3 protocol.
Wireshark 101 training course description Wireshark is a free network protocol analyser. This hands-on course focuses on troubleshooting networks using the Wireshark protocol analyser. The course concentrates on the product and students will gain from the most from this course only if they already have a sound knowledge of the TCP/IP protocols What will you learn Download and install Wireshark. Capture and analyse packets with Wireshark. Configure capture and display filters. Customise Wireshark. Troubleshoot networks using Wireshark. Wireshark 101 training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 2 days Wireshark 101 training course contents What is Wireshark? Protocol analysers, Wireshark features, versions, troubleshooting techniques with Wireshark. Installing Wireshark Downloading Wireshark, UNIX issues, Microsoft issues, the role of winpcap, promiscuous mode, installing Wireshark. Wireshark documentation and help. Hands on Downloading and installing Wireshark. Capturing traffic Starting and stopping basic packet captures, the packet list pane, packet details pane, packet bytes pane, interfaces, using Wireshark in a switched architecture. Hands on Capturing packets with Wireshark. Troubleshooting networks with Wireshark Common packet flows. Hands on Analysing a variety of problems with Wireshark. Capture filters Capture filter expressions, capture filter examples (host, port, network, protocol), primitives, combining primitives, payload matching. Hands on Configuring capture filters. Working with captured packets Live packet capture, saving to a file, capture file formats, reading capture files from other analysers, merging capture files, finding packets, going to a specific packet, display filters, display filter expressions. Hands on Saving captured data, configuring display filters. Analysis and statistics with Wireshark Enabling/disabling protocols, user specified decodes, following TCP streams, protocol statistics, conversation lists, endpoint lists, I/O graphs, protocol specific statistics. Hands on Using the analysis and statistics menus. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, idl2eth. Hands on Using tshark. Advanced issues 802.11 issues, management frames, monitor mode, packet reassembling, name resolution, customising Wireshark. Hands on Customising name resolution.
Management of Portfolios (MoP®) Practitioner: In-House Training In this MoP® Practitioner course, participants will have sufficient knowledge and understanding of how to apply and tailor the MoP guidance and to analyze portfolio data, documentation, and roles in relation to a given situation. MoP helps organizations ensure if the investments are done in the right, change initiatives, and implementing them correctly. This is achieved by: Prioritizing the programs and projects in terms of their contribution to the organization's strategic objectives and overall level of risk Managing the programs and projects consistently to ensure efficient and effective delivery Maximizing the benefit by providing the greatest return from the investment made What you will Learn Define the business case to get senior management approval for portfolio management Plan the implementation of portfolio management Select and adapt MoP principles, practices, and techniques to suit different organizational environments Evaluate examples of MoP information including documents and role descriptions Analyze the solutions adopted in relation to a given scenario Introduction Overview MoP Portfolio Definition Portfolio Management Roles Portfolio Management Documents MoP Practitioner Assignments Portfolio Management Documents Portfolio Delivery How to Implement Practice Exam MoP Practitioner Exam (taken online, after the class has ended)
Management of Portfolios (MoP®) Foundation: In-House Training In this MoP® Foundation course, participants will acquire the sufficient knowledge and understanding of the principles, cycles, practices, techniques, roles, responsibilities, documents, and organizational context within which portfolio management operates. MoP helps organizations ensure if the investments are done in the right change initiatives and implementing them correctly. This is achieved by: Prioritizing the programs and projects in terms of their contribution to the organization's strategic objectives and overall level of risk Managing the programs and projects consistently to ensure efficient and effective delivery Maximizing the benefit by providing the greatest return from the investment made What You Will Learn Individuals certified at the MoP Foundation level will be able to: Define the scope and objectives of portfolio management and how it differs from program and project management List the benefits of applying portfolio management Explain the context it operates in List the principles upon which successful portfolio management is based on List the different approaches to implement MoP List the factors required to maintain the progress and assess the success of portfolio management State the purpose and key content of the major portfolio documents Define the scope of key portfolio management roles Introduction: MoP Scenario Background of the Methodology The MoP Principles Senior Management Commitment Governance Alignment Strategy Alignment Portfolio Office Energized Change Culture The MoP Definition Cycle Roles and Responsibilities The MoP Delivery Cycle Management control Benefits management Financial management Risk management Stakeholder engagement Organizational governance Resource management The MoP Framework Recap
APM Project Fundamentals Qualification (PFQ): In-House Training This practical course gives Participants a solid introduction to the fundamentals of project management and to prepare them for the one-hour, multiple-choice exam held at the end of the course. The APM Project Fundamentals Qualification (PFQ) is an entry-level qualification suitable for those who are new to project management and working in a project team, and who wish to understand the standard terminology. The goal of this course is to prepare you to successfully pass the exam. What you will Learn You'll learn how to: Identify project management terminology and context Identify project management processes Identify the roles involved in project management Describe project success criteria and benefits Prepare project documentation Acquire the level of understanding needed to pass the APM PFQ examination Getting Started Introductions Course structure Course goals and objective Project Context Project characteristics Project management processes Business and project context Organizational roles Project Lifecycle Programme and portfolio management Project Concept Phase Stakeholder management Project success and benefits management Business case Benefits People in Projects Leadership and teamwork Communication Project Definition Phase Project management plan Quality management Risk management Scope management Scheduling Resource management Estimating Procurement Project Implementation Phase Change control and configuration management Issue management Information management Project Hand-over and Close-out Phase Hand-over and close-out Post-project review Revision and Exam Revision and practice questions APM PFQ examination
Portfolio, Programme, and Project Offices (P3O®) Practitioner: In-House Training P3O® is the AXELOS standard for the design of decision-making processes regarding changes in organizations. P3O provides a guideline for the design of portfolio, programme, and project offices in organizations. The P3O Practitioner Course is an interactive learning experience. The P3O Practitioner-level content provides you with sufficient knowledge and understanding of the P3O guidance to design, implement, manage or work within any component office of a P3O model. It enables participants to successfully complete the associated P30 Practitioner exam and achieve the qualification. In this course, you will be prepared to successfully attempt the P3O Practitioner exam and learn how to implement or re-energize a P3O model in their own organization. What you will Learn At the end of the P3O Practitioner course, you will be able to: Define a business case to get senior management approval for P3O Build a right P3O model to adapt to the organization's needs, taking account of the organization's size and portfolio, programme and project management maturity Identify the elements, roles, and functions deployed in a generalized P3O model Use tools and techniques in running the P3O and advising those who shape the portfolio of programmes and projects Introduction to P3O What is the purpose of P3O? Definitions What are P3Os? Portfolio, programme, and project lifecycles Governance and the P3O Designing a P3O Model Factors that affect the design Design considerations What functions and services should the P3O offer? Roles and responsibilities Sizing and tailoring of the P3O model Why have a P3O? How a P3O adds value Maximizing that value Getting investment for the P3O Overcoming common barriers Timescales Why have a P3O (Extension)? The P3O Business Case The P3O Model Blueprint Vision Statement Demonstrating the Value KPIs The Benefits of Claimed Capabilities Benefit Realisation and Strategic Objectives Benefit Profile How to Implement or Re-Energize a P3O Implementation lifecycle for a permanent P3O Identify Define Deliver Close Implementation lifecycle for a temporary programme or project office Organizational context Definition and implementation Running Closing Recycling How to operate a P3O Overview of tools and techniques Benefits of using standard tools and techniques Critical success factors P3O tools P3O techniques
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Are you looking to create the perfect business strategy to put you higher than your competitors? Are you tired of not hitting your strategic objectives? If your answers to above questions are 'yes', this course helps you a lot. What you will learn: To build your own ‘blue ocean strategy’ to avoid fierce competition & price wars. To understand strategy process and strategy mapping. To appropriately position your company in the marketplace. To make the competition irrelevant. How you will benefit from this workshop: You will gain key insights into the strategy articulation process. We help you develop your leadership skills with some practice. You will learn how to use the Balanced scorecard to map your strategy. You will learn how effective your current differentiation is and how to improve that.