A day of Data Governance, support, networking, and answering your questions. Join me for my 1 Day Data Governance Mastermind where you get allocated time to get specific advice on your current Data Governance challenges and get the chance to network with others in similar situations.
This programme has been specifically designed to help experienced trainers, facilitators and coaches use Everything DiSC and the Five Behaviours assessments, and deliver workshops, with their own clients and in-house teams.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for intermediate to advanced Business Analysts who are looking to improve their skills for eliciting, analyzing, documenting, validating, and communicating requirements. Overview Obtain a thorough understanding of the core responsibilities of the business analyst Understand the main professional associations and standards supporting business analysts in the industry Discuss and explore the components of each of the domains/knowledge areas that comprise the work of business analysis Recognize the importance of properly defining the business need prior to engaging in requirements activities Formulate a strong understanding of the concepts that comprise strategy analysis Obtain experience with identifying and analyzing stakeholders Decipher between project and product scope and successfully use models to communicate scope Thoroughly understand and identify the various requirements categories and be able to recognize requirements of various types Explore business rules analysis Understand the benefits of process modeling and the common modeling language of BPMN Discuss process models and how the techniques can capture details about the as-is/to-be environment Learn how to properly prepare and conduct interviews Explore the components of use cases Learn what it means to package requirements Obtain hands-on experience with a number of business analysis techniques and gain hands-on experience eliciting, defining, and writing requirements. This course provides students a clear understanding of all the facets of the business analysis role, including a thorough walkthrough of the various domain/knowledge areas that comprise the business analysis profession. Students are provided an opportunity to try their hand at several business analysis techniques to assist with improving their skills in stakeholder identification, scope definition, and analyzing, documenting, and modeling requirements. Introduction to Business Analysis What is business analysis Benefits and challenges of business analysis Project success factors A Closer Look at the Business Analyst Role Definition of a business analyst Responsibilities of a business analyst Importance of communication/collaboration BA role vs. PM role Project roles involved in requirements IIBA/PMI and the goals of a professional association Purpose for having a BA standard IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Business analysis beyond project work Business analysis core concepts Business analysis perspectives IIBA and PMI certifications for business analysts Workshop: Choose Your Project Supporting the Project Portfolio (Enterprise Analysis) Define Strategy Analysis When to perform Strategy Analysis Components of Strategy Analysis Defining the business need Envisioning the Product and Project Defining business requirements The importance of stakeholders Stakeholder identification Tips for analyzing stakeholders Techniques for managing stakeholder lists Discussion: Who is involved in strategy analysis? Workshops: Define the Business Need, Write Business Requirements, and Identify Stakeholders Understanding and Defining Solution Scope Defining solution scope Techniques for defining solution scope Applying the brainstorming technique Project scope vs. Product scope Finding solution boundaries The Context Diagram Actors and key information Workshop: Draw a Context Diagram Understanding Requirements What is a requirement? Requirement types Business, Stakeholder, Solution, and Transition requirements Assumptions and constraints Business rules Taxonomy of business rules Decision tables How to write simple calculations Requirements vs. business rules Document requirements Workshop ? Document Requirements Elicitation and Process Modeling Why do we model processes? What is Business Process Management? Using a modeling notation ?As Is? vs. ?To Be? modeling Why use BPMN? Basic BPM notation Business Process Modeling ? A case study Business Process Realignment ?As Is? vs. ?To Be? activity diagrams Workshop: Create a Business Process Model Planning & Eliciting Requirements Interviewing ? what and why? Preparing for an effective interview Types of questions to ask Sequencing questions Active listening techniques Planning for elicitation Conducting the interview Establishing rapport Active Listening Feedback techniques Types of elicitation techniques Workshops: Planning for Elicitation and Conducting an Elicitation Session Use Case & User Story Analysis What is an Actor? Types of Actors How to ?find? Use Cases? Diagramming Use Cases Tips on naming Use Cases Explaining scenarios The use case template Components of a use case Scenario examples Best practices for writing Use Cases Scenarios and flows Alternate and exception flows Exercises: Drawing a Use Case Diagram, Writing the Main Success Scenario, and Writing Alternate and Exception Scenarios Analyzing & Documenting Requirements Requirements and Use Cases Non-Functional requirements User Interface Requirements UI Data Table Reporting requirements Data requirements Data accessibility requirements Characteristics of good requirements The business requirements document (BRD) BRD vs. Functional Requirements Specification Preparing the requirements package Requirements traceability Workshops: Develop a User Interface, Analyzing Requirements, and Tracing requirements Additional Resources Useful books and links on writing effective requirements
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is an IT, facilities or data centre operations professional working in and around the data centre and having the responsibility to achieve and improve high-availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Understand the design life cycle of data centres and the stages involved? Discuss the data centre requirements in great level of detail with vendors, suppliers and contractors to ensure that these requirements are met? Validate design plans, quotes and offers proposed by vendors/contractors? Understand redundancy levels for both the data centre design/setup and maintenance? Understand the various building considerations such as bullet proofing, mitigation of seismic activity, fire ratings and thermal stability? Understand how to install a raised floor that meets requirements, avoiding misalignment, level differences and leakage? Understand how to read a Single Line Electrical Diagram to identify and avoid the most common design issues? Choose the correct UPS and parallel configuration, learn and avoid classic parallel installation mistakes? Understand how to calculate battery banks, validate offered configurations to ensure they meet requirements? Understand what distance to keep to avoid EMF issues for human safety and equipment disturbances? Understand the fundamental cooling setup, CFM, Delta-T and other important factors? Understand contamination factors and limitations? Understand full details of fire suppression options, how to calculate gas content and verify installations? Understand how to measure data centre energy efficiency and how to improve it The course will bring participants to the level of a suitable sparring partner with suppliers. They will be able to verify offers provided by vendors for correctness, effectiveness and efficiency. Data Centre Design/Life Cycle Overview Overview of the phases of a data centre life cycle Planning, re-alignment and continuous improvement Standards and Rating Level Definitions Rating level history Difference between Uptime and TIA-942 Rating level definitions Redundancy options (N+1), 2N, 2(N+1) Concurrent Maintainability/Compartmentalisation Example configurations Substation and feed requirements Maintenance options Operational processes guidelines/standards Skill development Building Considerations Building location considerations Floor and hanging loads requirements Fire rating for walls and glass Blast protection Bullet proofing Forced entry protection Advanced Raised Floor & Suspended Ceiling Raised floor installation guidelines Techniques to install a proper and leveled raised access floor Common mistakes Choosing the right tiles and their locations Seismic-mitigating floor constructions Choosing the correct suspended ceiling Advanced Power Power infrastructure layout; Formulas which you should know for the data centre Single Line Electrical diagrams; how to read to ensure key components are present for protection Over current protection devices (MCB/MCCB/VCB/ACB/Fuses) definitions and what to use where Earth Leakage devices (RCB/RCD/ELCB/GFCI/ALCI/RCBO), definitions and what to use where Sizing of protective components Lightning strikes and surge protection devices (TVSS/SPD), how they operate, where to use and how to install Power cabling and cable run considerations PDU/DB setup and minimum requirements Generators; Generator types: Standy/Prime/Continuous Component make up and functions Fuel storage and calculation Paralleling of gen-sets Generator room/area requirements UPS Systems; Required specifications for UPS systems How to read data sheets and select the correct UPS Requirements for parallel configurations and avoid pitfalls such as single point of failures How parallel installation should be done, classic mistakes made by installers and how to avoid these Harmonic Filters; Active/Passive filters and their application Battery Banks; Battery bank terminology Designing battery banks, how to calculate, and double check the battery bank to be installed Battery charging pitfalls and ensuring the right charger is being installed and used Using parallel battery banks; how to properly install them, limitations and risks when using batteries in parallel How to test batteries correctly and make decisions on cell/block or string replacement Battery casing choices; ABS, V0, V1, V2 Alternative energy storage; flywheel, re-usable cell, compressed air UPS, etc. Advanced Electro Magnetic Fields Sources of EMF Difference between single, three phase and bus-bar EMF Options available to measure EMF and how to interpret the results from single-axes and composite measurements Guidance on safe distance for equipment and humans Calculation of EMF attenuation factor for shielding material permeability and saturation factors Advanced Cooling Important definitions; dry-bulb, wet-bulb, dew-point, RH, sensible and latent heat Psychometric chart and ASHRAE recommendations Environmental class definitions and thermal specifications Temperature/humidity measurements guideline Heat dissipation methods Altitude impact on temperature intake to ICT equipment Floor plan setup for effective cooling Differences in tile surface and supporting structure and the air-flow performance impact Rack door construction and the flow performance impact Equipment Delta-T and its impact Optimising air flow Thermal units conversions Calculations for air volume displacement (CFM/CMH) Cooling capacity calculations Air-conditioning selection De- / humidifying options Air conditioning efficiency SHR impact on cost saving Efficiency indicator New cooling principle and techniques (Submerged, VSD/VRF/ECF/water- and air side economisers) Redundancy guidelines for air-conditioners avoiding classic misconceptions and mistakes for meeting ANSI/TIA-942 compliant designs Installation requirements Connections to fire panel and EPO Commissioning of air conditioners Set points and calibration CFD (Computational Fluid Dynamics) Advanced Fire Protection The fire triangle and elements to stop a fire Detection systems in detail (VESDA, VIEW, smoke sensors) Considerations for installation of sensors Proper testing of smoke sensors Water based systems i.e. deluge, wet-pipe, dry-pipe, pre-action and why most of them don't work and how to detect this Details on Inert and Halocarbon systems and how to select the correct system for your data centre How to calculate the gas content ensuring the appropriate level is installed to suppress the fire including safety considerations Other requirements for gas systems such as release times, hold times, pipe install requirements and other important factors Requirements for the fire detection panel Installation verification, methods, what to check and how New advanced fire suppression technologies Design and Install Scalable Networking Cabling System ANSI/TIA942 cabling structure topology ToR, EoR Design Intelligent patching systems Installation best practice such as routing, bending radius, separation from power, containment fill ratio, fiber link loss calculator, bonding and grounding requirement Standard for telecommunications labeling and administration Environmental Specifications and Contamination Control Acoustic noise effects, regulations, specifications and limits Data centre contaminations and classifications Measurements, standards and limits Preventive measures and avoidance Data Centre Efficiency Business drivers to go Green High-availability or Green? Green guidelines and standards How to measure it and what are acceptable numbers compared to the general industry PUE classes defined by Green Grid and issues with PUE Techniques for saving energy in all parts of the data centre i.e. application/system level, cooling, power distribution Mock ExamEXAM: Certified Data Centre Specialist
This course will explain all aspects of the rules of origin and trade agreements and how to understand and comply with them to help companies be more competitive in export markets.
This Level 3 Diploma in Cyber Security Management and Operations qualification (Accredited by Qualifi, UK) has been created to develop those learners who are looking to choose, or already have chosen, a career in a business-related sector. It is envisaged that this programme will encourage both academic and professional development so that your learners move forward to realise not just their own potential but also that of organisations across a broad range of sectors. The rationale of the programme is to provide a career path for learners who wish to develop their core capabilities within the cyber security sector. The outcome of the Level 3 Diploma in Cyber Security Management and Operations, which is a recognised UK qualification, is for learners to develop the skills required by organisations globally. This qualification is especially designed for organisational executives and leaders who are tasked with responsibility for cyber security, digital risk management, or the oversight thereof. The Level 3 Diploma in Cyber Security Management and Operations qualifications' primary focus is to prepare administrators and executives to manage and operate generic, nontechnical cyber security activities within a business, third sector or government organisation. This course is particularly suited for learners already in full-time work or those seeking to evolve their careers into cyber and information security fields. The qualification will identify and evaluate practical and lawful ways to safely and securely protect networks, information and assets from cyber-attacks and associated impacts. This Level 3 Diploma in Cyber Security Management and Operations qualification is about 'cyber security' as a holistic discipline. It examines both 'cyber' and 'security' domains which relate to IT security. It is therefore in most parts a non-technical qualification that looks at both cyber-technical and cyber-physical security threats, risks, responses and risk treatments. The Diploma is accredited at Level 3 with a total equivalence of 60 credits. It is envisaged that learners completing this Level 3 programme will progress to Level 4 Diplomas including the Level 4 Diploma in Cyber Security. Key Highlights of this Level 3 Diploma in Cyber Security Management and Operations qualification are: Program Duration: 9 Months (Fast track 6 months duration mode Available) Program Credits: 60 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Become eligible to gain direct entry into relevant Undergraduate degree programme. Alumni Status No Cost EMI Option Requirements This Level 3 Diploma in Cyber Security Management and Operations (Accredited by Qualifi, UK) qualifications has been designed to be accessible without artificial barriers that restrict access and progression. Entry to the qualification will be through centre interview and learners will be expected to hold the following: Qualifications at Level 2 OR A Level 3 qualification in another discipline and want to develop their careers in Cyber Security or Information Technology. Career path Learners after completing of this course progress to: Diploma in Accounting and Business level -4 and level - 5 , or BEng (Hons) in Software Engineering, or BSc (Hons) in Business Computing and Information Systems, or BA (Hons) Business Management, or BA (Hons) Tourism and Hospitality Managements, or The First Year of Undergraduate study, or Directly into employment in an associated profession. Certificates Certificate of Achievement Hard copy certificate - Included Qualifi courses: Once you complete the course, you would be receiving a Physical hard copy of your Diploma along with its Transcript which we would Courier to your address via DHL or Royal Mail without any additional charge
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles
This Level 3 Diploma in Cyber Security Management and Operations (Fast Track) qualification (Accredited by Qualifi, UK) has been created to develop those learners who are looking to choose, or already have chosen, a career in a business-related sector. It is envisaged that this programme will encourage both academic and professional development so that your learners move forward to realise not just their own potential but also that of organisations across a broad range of sectors. The rationale of the programme is to provide a career path for learners who wish to develop their core capabilities within the cyber security sector. The outcome of this fast track Level 3 Diploma in Cyber Security Management and Operations, which is a recognised UK qualification, is for learners to develop the skills required by organisations globally. This qualification is especially designed for organisational executives and leaders who are tasked with responsibility for cyber security, digital risk management, or the oversight thereof. The Level 3 Diploma in Cyber Security Management and Operations fast track qualifications' primary focus is to prepare administrators and executives to manage and operate generic, nontechnical cyber security activities within a business, third sector or government organisation. This course is particularly suited for learners already in full-time work or those seeking to evolve their careers into cyber and information security fields. The qualification will identify and evaluate practical and lawful ways to safely and securely protect networks, information and assets from cyber-attacks and associated impacts. This fast track Level 3 Diploma in Cyber Security Management and Operations qualification is about 'cyber security' as a holistic discipline. It examines both 'cyber' and 'security' domains which relate to IT security. It is therefore in most parts a non-technical qualification that looks at both cyber-technical and cyber-physical security threats, risks, responses and risk treatments. The Diploma is accredited at Level 3 with a total equivalence of 60 credits. It is envisaged that learners completing this Level 3 programme will progress to Level 4 Diplomas including the Level 4 Diploma in Cyber Security. Key Highlights of this Level 3 Diploma in Cyber Security Management and Operations (Fast Track) qualification are: Program Duration: Fast Track 6 months (Regular 9 months course also available) Program Credits: 60 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Become eligible to gain direct entry into relevant Undergraduate degree programme. Alumni Status No Cost EMI Option Requirements Level 3 Diploma in Cyber Security Management and Operations (Fast Track) This Level 3 Diploma in Cyber Security Management and Operations (Fast Track) (Accredited by Qualifi, UK) qualifications has been designed to be accessible without artificial barriers that restrict access and progression. Entry to the qualification will be through centre interview and learners will be expected to hold the following: Qualifications at Level 2 OR A Level 3 qualification in another discipline and want to develop their careers in Cyber Security or Information Technology. Career path Learners after completing this Fast Track course progress to: Diploma in Accounting and Business level -4 and level - 5, BEng (Hons) in Software Engineering, BSc (Hons) in Business Computing and Information Systems, BA (Hons) Business Management, BA (Hons) Tourism and Hospitality Managements, The First Year of Undergraduate study, Directly into employment in an associated profession. Certificates Certificate of Achievement Hard copy certificate - Included Qualifi courses: Once you complete the course, you would be receiving a Physical hard copy of your Diploma along with its Transcript which we would Courier to your address via DHL or Royal Mail without any additional charge
Bring your questions about our BA Filmmaking and BA Screenwriting courses to our exclusive, Ask Me Anything Undergraduate Event! We will be sitting down with BA Course Leaders, James Davis and Mike Peel to have your specific questions answered about the undergraduate courses, student life, and numerous opportunities available at Central Film School.
Become a certified UI designer Learn how to create beautiful, pixel-perfect user interfaces Accelerate your career with an in-demand skillset Get a professional qualification in just 12 weeks Manage your own schedule with our flexible, self-paced online course Expand your career options UI skills are needed worldwide, and demand is growing. With a globally recognised qualification, you’ll become a more valuable, sought-after professional. Design with confidence You’ll understand the ‘why’ of good UI design by knowing the principles behind it. You’ll be able to defend your decisions and design with confidence. Work in a creative, rewarding job UI designers add personality and visual appeal to user interfaces. It’s an enjoyable career that rewards creativity: the perfect entry into tech for visually-minded people. A flexible, university-backed curriculum Our curriculum is university credit-rated and approved by the industry. Over 12 weeks, you’ll learn the principles and skills you need to become a confident UI designer. Study method Online, self-paced Duration 12 weeks Access to content 12 months Qualification Professional Certificate in UI Design Awarded by Scottish Qualifications Authority trading as SQA Additional info Exam(s) / assessment(s) is included in price Tutor is available to students Description During this 12 week, online course you will learn: Introduction to UI Design Brand and Personality Layout Design Principles Interactivity Typography Colour, shapes and effects Iconography and imagery Design process Presenting ideas UI design tools You will also work on a project and your portfolio with access to weekly mentor sessions, an active student community, and support from our student success team. Who is this course for? Graphic designers and digital designers who want to upskill to UI design UI designers who want to strengthen their knowledge and craft UX professionals who want to become more rounded product designers Anybody with a design background looking for a creative job in tech Requirements You don’t need experience in design or technology to enrol in our courses, although having one or both is a definite bonus. Our students come from a diverse mix of backgrounds, including project management, development, graphic design, product management, business analysis and so on. You need to be motivated and committed. We set a high bar. Studying for one of our professional qualifications requires a certain amount of time, energy and focus. You need to be comfortable learning in English. All video lessons, course materials, webinars, correspondence and the final exam are delivered in English. Career path Students typically graduate into UI Designer jobs. The average UI Designer salary in the UK with 3-5 years experience is £62,500. This is based on data from Payscale, Totaljobs, Indeed, Talent, and Glassdoor