Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices
Duration 2 Days 12 CPD hours This course is intended for This course is designed for people who know how to create basic list and group reports and need to create reports that include subreports, cross-tabs, advanced formulas, and charts based on more than one data series. They may also need to build tools that make it easier for other people to create reports. They may or may not have programming and/or SQL experience. Overview In this course, you will create complex reports using tools in Crystal Reports 2016. You will: Create automatic and manual running totals. Work with cross-tab reports. Add subreports. Create drill-downs in a report. Use SQL statements in report processing. Create complex formulas. Add charts to reports. Enhance report functionality. In this course, students will create complex reports & data sources using the tools in Crystal Reports 2016. Students will not only create more complex reports including sub-reports and cross-tabs, but will also increase their speed and efficiency. 1 - CREATING RUNNING TOTALS Topic A: Create a Running Total Field Topic B: Modify a Running Total Field Topic C: Create a Manual Running Total 2 - WORKING WITH CROSS-TABS Topic A: Create a Cross-Tab Report Topic B: Format a Cross-Tab Report Topic C: Create Groups in Cross-Tab Reports 3 - ADDING SUBREPORTS Topic A: Insert a Subreport Topic B: Edit a Subreport Topic C: Share Variables 4 - CREATING DRILL-DOWNS IN A REPORT Topic A: Create a Drill-Down Topic B: Create Headings for Drill-Down Data 5 - USING SQL STATEMENTS IN REPORT PROCESSING Topic A: Create a Report Using SQL Queries Topic B: Summarize Report Data Topic C: Create Joins Using SQL Topic D: Create Subqueries Topic E: Create an SQL Expression Field 6 - CREATING COMPLEX FORMULAS Topic A: Work with Loops Topic B: Work with Arrays 7 - ADDING CHARTS TO REPORTS Topic A: Create Charts Topic B: Create a Chart with Drill-Down Topic C: Create a Top N Chart Topic D: Create a Cross-Tab Chart Topic E: Create Charts for Grouped Data Topic F: Format a Chart Topic G: Create a Chart Template 8 - ENHANCING REPORT FUNCTIONALITY Topic A: Organize Data Based on a Hierarchy Topic B: Create a Dynamic Image Topic C: Create a Report Alert Topic D: Create a Geographic Map 9 - APPENDIX Appendix A: Managing Reports Appendix B: Processing Data on the Server Appendix C: Detecting and Fixing Problems
Agile Practices for All Projects: Virtual In-House Training Agile methods are becoming increasingly prevalent, and have facilitated projects in reducing time to market, being adaptive to changing customer requirements, and increasing value to customers and organizations. These benefits have been implemented in both IT and non-IT environments to help all types of projects. This course will present key Agile techniques and processes that can be readily incorporated into your projects to enable greater flexibility and higher productivity, while maintaining the traditional project lifecycle framework. The overall goal of the course is for learners to be able to integrate appropriate Agile elements and/or techniques into any project in any environment. What you will Learn Course participants will understand the basic Agile approach, and the various methods for achieving agility and will be able to: Recall project management principles and methodologies Explain Agile practices and compare several Agile methods Apply Agile software development techniques in a project lifecycle framework Employ Agile processes in a project management framework Foundation Concepts Project Lifecycles What is Agile? Agile Benefits Agile Methods Agile Roles Agile Requirement Techniques Agile Requirements User Stories Just in Time (JIT) Requirements Agile Software Development Techniques Agile Design Agile Development Agile Testing Agile Deployment Agile Initiating & Planning Processes Agile Initiating Agile Planning Agile Delivery Processes Agile Execution Agile Monitoring & Control Agile Closing Implementing Agile Practices Agile Approaches Outside of Software Development Dispelling Agile Myths Applying Agile Techniques & Processes Summary and Next Steps What did we learn, and how can we implement this in our work environments?
Developing the Business Case: Virtual In-House Training Business analysts must be able to create business case documents that highlight project benefits, costs, and risks. The business case is based on the real business need to be solved. These become parts of proposals, feasibility studies, and other decision support documents. This course teaches the purpose, structure, and content of a business case. It presents the basic techniques for determining financial ROI, non-tangible benefits, and the probability of meeting expectations. What you will Learn At the end of this program, you will be able to: Perform feasibility studies Justify the business investment to solve the business problem Prepare an effective business case document Plan and implement a business case approval process Foundation Concepts The role of the BA An introduction to the BABOK® Guide The business analyst and the product / project life cycle (PLC) The business case deliverable Introducing the Business Case Process The BA and strategy analysis The BA and the business case process (BCP) The BA during the business case process (BCP) The BA after the business case process (BCP) Importance of defining solution performance metrics Defining the Business Need Overview of defining the business need Business needs: problem / opportunity statement Product vision Objectives and constraints Exploring Business Case Solutions Overview of exploring solutions Solution identification for feasibility Solution definition for analysis Assessing project risks Justifying the Business Case Overview of justifying the business case Qualitative justification Quantitative justification Approving the Business Case Overview of business case approval Developing recommendations Preparing the decision package - documents Preparing the decision package - presentations
Microsoft Project Blue Belt® 2013: In-House Training This course introduces Project Server 2013 features that expedite scheduling projects and simplify managing tasks within an enterprise environment. Learn different aspects of Project Server and their benefits to varying roles in the enterprise, and gain hands-on experience and insights on best practices from SMEs around the world. This course introduces Project Server 2013 features that expedite scheduling projects and simplify managing tasks within an enterprise environment. Learn different aspects of Project Server and their benefits to varying roles in the enterprise, and gain hands-on experience and insights on best practices from SMEs around the world. What you Will Learn You'll learn how to: Identify the project's life cycle Understand the Enterprise Project Management (EPM) environment Apply the basic project management principles to selecting, initiating, planning, executing, monitoring and controlling, and closing your Project 2013 schedules Take advantage of new features Explain Project Server 2013 views and project sites Meet deadlines and budget restrictions Keep the workloads of your resources within their available limits Efficiently update your schedule Take advantage of the standard reports, custom views, and visual reports for your projects Take a brief look at the Business Intelligence potential Efficiently and effectively manage your project(s) and programs Work comfortably within Project Server 2013 or Project Online Getting Started with Microsoft® Project Server 2013 Describing the EPM context Discovering Project Server 2013 and Project Online Differentiating the users of Project Server 2013 Working with Project Professional 2013 and Project Server 2013 Recognizing the Life Cycle within EPM Projects and Portfolio Management Portfolio management and governance Originating new initiatives within EPTs and workflows Prioritizing initiatives, analyzing scenarios, optimizing, and selecting the portfolio Initiating Projects Initiating processes with Project Professional, SharePoint lists, Enterprise Projects, and Resource Plans Importing projects and managing project owner and permissions Planning Projects - Scope and Schedule Management Planning context and framework Scheduling in PWA Using the Deliverables feature Planning Projects - Staffing Management Plan Building a project team Managing resource availability Reviewing the assignment cycle Resolving resource overallocation Planning Projects - Cost Components, Baseline, and Consolidated Schedules Developing components of the Cost Management Planning processes Working with the baseline in projects and programs or master schedules Improving the Collaboration in the Project Sites Creating the Project Sites Developing components of the Risk Management Plan and Issues Tracking Linking planning documents Additional apps and customization Executing Projects Understanding executing processes Managing resources using Build Team and other features Working with timesheets Reporting administrative time Configuring personal settings Monitoring and Controlling Projects - Tracking Task and Project Progress Understanding the Monitoring and Controlling processes Task progress and updates in PWA including considerations for different tracking methods Task progress and updates in Project Professional 2013 Monitor and Control Projects - Measuring Performance and Reporting Progress Understanding status reports Reviewing performance metrics and progress reports Taking advantage of preloaded reports at the Business Intelligence Center Considerations for defining custom reports Closing Projects Reviewing the closing processes and closing tasks to updates Supporting the closing process
ISO 37001 Foundation training enables you to learn the basic elements to implement and manage an Anti-bribery Management System (ABMS) as specified in ISO 37001. About This Course During this training course, you will be able to understand the different modules of an ABMS, including ABMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement. After completing this course, you can sit for the exam and gain "Certified ISO 37001 Foundation' credential. An IECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach. Learning objectives Understand the elements and operations of an Anti-bribery Management System and its principal processes Acknowledge the correlation between ISO 37001 and other standards and regulatory frameworks Understand the approaches, methods and techniques used for the implementation and management of an ABMS Educational approach Lecture sessions are illustrated with practical questions and examples Practical exercises include examples and discussions Practice tests are similar to the Certification Exam Prerequisites There are no prerequisites for this course. What's Included? Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides The Exam fees Who Should Attend? Individuals concerned about Anti-bribery Management Individuals seeking to gain knowledge about the main processes of Anti-bribery Management Systems (ABMS) Individuals interested to pursue a career in Anti-bribery Management Accreditation Assessment The examination consists of 40 multiple choice questions stemming from the course materials. The exam should be completed within 60 minutes, with a 70% pass mark. Exam results are provided within 24 hours. Provided by This course is accredited by NACS and Administered by the IECB
About this Training Course This intermediate to advanced level 3 full-day training course has been designed to provide participants with a detailed and up-to-date overview of the fluid mechanic fundamentals and operating practice of pumps, compressors and gas and steam turbines. Upon the successful completion of this course, participants will have acquired the practical knowledge to enable them not only to choose the correct device for a particular application but also be in a position to resolve many commonly occurring operating problems. Troubleshooting is an important part of this course and will cover the important topics of Machinery Root Cause Failure Analysis (RCFA) together with Vibration Analysis. This course is ideal for those personnel in the oil, gas, petrochemical, chemical, power and other process industries who require a wider and deeper appreciation of pumps, compressors and turbines, including their design, performance and operation. The participants will be taken through an intensive primer of turbo-machinery principles, using the minimum of mathematics, and will learn how to solve the many and varied practical industrial problems that are encountered. The course makes use of an extensive collection of VIDEO material together with case studies and numerical exercises. Training Objectives Upon the successful completion of this course, each participant will be able to: Apply a comprehensive knowledge of pumps, compressors & turbines and troubleshoot rotating equipment in a professional manner Identify the different types of turbomachinery including basic design aspects and highlighted problem areas Minimise compressor work by understanding the processes involved and identifying their efficiency Understand the flow through turbomachines and the corresponding velocity triangles including torque and power calculations Analyse the different types of centrifugal machines including their design, installation, operation, maintenance, re-rate/retrofit, troubleshooting and control Recognise the various beneficial design aspects of turbomachines and understand the crucial process of cavitation Carry out proper methods of device installation, operation, maintenance and troubleshooting Understand and apply the powerful methods of Machinery Root Cause Failure Analysis Understand the various methods of vibration analysis applied to device diagnostics Target Audience This course provides an overview of all significant aspects and considerations of pumps, compressors and turbines for those who are involved in the design, selection, maintenance or troubleshooting of such equipment. This includes maintenance, reliability, integrity, engineering, production and operations managers, engineers and other technical staff. Course Level Intermediate Advanced Trainer Your expert course leader is a Senior Mechanical & Instrumentation Engineer (UK, B. Sc., M.Eng., Ph D) with over 45 years of industrial experience in Process Control & Instrumentation, Pumps, Compressors, Turbines and Control Valve Technology. He is currently a Senior Independent Consultant to various petrochemical industries in the UK, USA, Oman, Kuwait and KSA where he provides consultancy services on both the application and operational constraints of process equipment in the oil & gas industries. During his early career, he held key positions in Rolls Royce (UK) where he was involved in the design of turbine blading for jet engines, subject to pre-specified distributions of pressure. During this period and since, he has also been closely involved in various aspects of Turbomachinery, Thermodynamics and Fluid Mechanics where he has become a recognised authority in these areas. Later, he joined the academic staff of University of Liverpool in the UK as a Professor in Mechanical Engineering Courses. A substantial part of his work has been concerned with detailed aspects of Flowmetering - both of single & multiphase flows. He has supervised doctoral research students in this area in collaboration with various European flowmeter manufacturers. He joined Haward Technology Middle East in 2002 and was later appointed as European Manager (a post which has since lapsed) and has delivered over 150 training courses in Flowmeasurement (single- and multi-phase), Control, Heat Exchangers, Pumps, Turbines, Compressors, Valve and Valve Selection as well as other topics throughout the UK, USA, Oman and Kuwait. During the last two years, he has delivered courses with other training companies operating in the Far and Middle East. He has published about 150 papers in various Engineering Journals and International Conferences and has contributed to textbooks on the topics listed above. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Training Course The LNG market is developing from a fully based market on long-term contracts, to a more flexible market based on a portfolio of contracts of different durations. The increase of LNG demand, fuelled by South Korea, Japan and several other emerging economies, are creating a base for a more flexible market, where the LNG spot market will be playing a key role. Changes in the LNG market can be identified in the following areas: development of terminals and plant sizes, increased integration throughout the supply chain, diversification of supply sources, increased contractual flexibility and increased geographical distance. This is creating the foundation for the development of the LNG spot market right here in Asia today. This 3 full-day intensive intermediate level course will give you cutting-edge knowledge needed in today's complex LNG market. Increase your knowledge and understanding of the LNG market and spot trading aspects by attending this course. Training Objectives By the end of this course, participants will be able to: Leverage on the current and global drivers of the world Natural gas and LNG markets Understand regional LNG pricing effects and who the key buyers and new sellers are Appreciate the trading structures of LNG and how to structure its risk management Understand the workings and future outlook of the Asian LNG Spot market Discover and exploit the arbitrage trading opportunities between the different markets Learn what LNG derivatives are and how it will become available for hedging and proprietary trading purposes Target Audience This course will benefit: LNG market development executives are drawn from both technical and non-technical (commercial, finance and legal) backgrounds. Participants in an LNG market development team, perhaps with expertise in one area of gas development, will benefit from the course by obtaining a good grounding of all other areas. The course is pitched at an intermediate level, although those with a basic knowledge will be able to grasp most of the concepts covered. Course Level Intermediate Trainer Your course leader is a skilled and accomplished professional with over 25 years of extensive C-level experience in the energy markets worldwide. He has strong expertise in all the aspects of (energy) commodity markets, international sales, marketing of services, derivatives trading, staff training and risk management within dynamic and high-pressure environments. He received a Master's degree in Law from the University of Utrecht in 1987. He started his career at the NLKKAS, the Clearing House of the Commodity Futures Exchange in Amsterdam. After working for the NLKKAS for five years, he was appointed as Member of the Management Board of the Agricultural Futures Exchange (ATA) in Amsterdam at the age of 31. While working for the Clearing House and exchange, he became an expert in all the aspects of trading and risk management of commodities. In 1997, he founded his own specialist-consulting firm that provides strategic advice about (energy) commodity markets, trading and risk management. He has advised government agencies such as the European Commission, investment banks, major utilities, and commodity trading companies and various energy exchanges and market places in Europe, CEE countries, North America and Asia. Some of the issues he has advised on are the development and implementation of a Risk Management Framework, investment strategies, trading and hedging strategies, initiation of Power Exchanges (APX) and other trading platforms, the set-up of (OTC) Clearing facilities, and feasibility and market studies like for the Oil, LNG and the Carbon Market. The latest additions are (Corporate) PPAs and Artificial Intelligence for energy firms. He has given numerous seminars, workshops and (in-house) training sessions about both the physical and financial trading and risk management of commodity and carbon products. The courses have been given to companies all over the world, in countries like Japan, Singapore, Thailand, United Kingdom, Germany, Poland, Slovenia, Czech Republic, Malaysia, China, India, Belgium and the Netherlands. He has published several articles in specialist magazines such as Commodities Now and Energy Risk and he is the co-author of a book called A Guide to Emissions Trading: Risk Management and Business Implications published by Risk Books in 2004. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Jamf training, Jamf 240 course, Jamf course
Global Project Management: In-House Training: In-House Training In this course, you will dig deeper-and differently-into project management processes, tools, and techniques, developing the ability to see them through the lens of global and cultural project impacts. In today's increasingly global environment, managing a project with customers and support organizations spread across multiple countries and continents is a major challenge. From identifying stakeholders and gathering requirements, to planning, controlling, and executing the project, the basic logistics of a global project present their own standard challenges. However, with additional cultural, language-based, and regional elements, global projects involve more complexities than teams often realize. There are unique communication needs, cultural awareness elements, varying customs and work expectations, and critical legal differences to consider. In this course, you will dig deeper-and differently-into project management processes, tools, and techniques, developing the ability to see them through the lens of global and cultural project impacts. This will leverage you to problem solve differently on global projects, prevent problems, and ensure success. The goal is for you to effectively navigate the challenges of leading projects with multi-regional footprints and globally diverse sets of stakeholders. What you Will Learn At the end of this program, you will be able to: Determine when a project meets the criteria of being a true global one Articulate global project needs based on the project grid and framework Identify and analyze global project stakeholders Recognize cultural differences and articulate how they impact project work Determine global project estimating, scheduling, and staffing challenges Assess global project risks and develop problem-solving responses Analyze complex cultural situations and align optimal project communication and negotiation tools and techniques Apply best practices for conducting virtual team work and mitigating virtual challenges Evaluate ways to control for global project scope, cost, and procurement Align customer management best practices with global customer needs Implement key global project closing activities Foundation Concepts What is a global project? What makes a global project different? A global project management framework Initiating the Global Project Launching a global project Respecting cultural differences Identifying and analyzing stakeholders Developing the communications plan Defining the ideal global project manager Crafting a global project charter Planning the Global Project Gathering requirements for a global project Defining the scope, region by region Estimating and scheduling for global projects Staffing the global project Developing the global risk management plan Executing the Global Project Managing global stakeholder expectations Embracing cultural diversity Honing global negotiation techniques Procuring goods and services on a global basis Managing global legal and regulatory issues at the micro and macro level Monitoring and Controlling the Global Project Status reporting Virtual communication Cost control Schedule control Scope control Customer satisfaction Closing the Global Project Contract closure at the macro and micro levels Administrative closure with global reach Lessons learned