Arm yourself with a robust research toolkit that will help you uncover deep behavioural insights on user needs and motivations so you can design better experiences.
Design for persuasion is a powerful approach that is too often overlooked. Learn the principles that are critical in designing both engaging and usable experiences.
Duration 1 Days 6 CPD hours This course is intended for This course is best suited to IT business decision-makers and individuals who are new to working with AWS Overview Skills gained in this training include:Identify the value and benefits of the AWS cloudRecognize the valuable ways that the AWS platform can be usedUnderstand the robust security capabilities, controls, and assurances in place to maintain security and data protectionArticulate the financial impact the AWS cloud can have on an organization?s procurement cycle, cost management, and contracts, while minimizing risks associated with consumption-based pricing models AWS Business Essentials helps IT business decision makers understand the benefits of cloud computing and how a cloud strategy can help you meet your business objectives. Course Outline Benefits of Cloud Computing and Defining Your Cloud Strategy Introduction to the AWS Cloud Security and Compliance Cloud Financials Migrating to the Cloud: Next Steps Additional course details: Nexus Humans AWS Business Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Business Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Recruiting great people to our organisations is the key to high performance and sustainable business success.
Our unique 5 day workshop prepares you for a first time pass of your CISSP exam. Covering each of the famous 8 CBK's, cram the theory before testing your knowledge during exam simulations. Led by a multi-award winning InfoSec consultant, this workshop delivers everything you need to pass,
Introduction to Agile for Executives: Virtual In-House Training This session provides executives with an overview of Agile values and principles, the key benefits of an Agile approach, and its differences with the traditional Waterfall method. During the session, we compare and contrast the major Agile methods, with an emphasis on Scrum, as the most popular in the market. And most importantly, we present some criteria for Agile Transformation, possible certifications to pursue, and what is needed at the senior leadership level to achieve the best business results. What you will Learn At the end of this program, you will be able to: Explain the basics and benefits of using an Agile approach Describe the Scrum framework, its events, artifacts, and roles and responsibilities Illustrate an Agile approach outside of Software Development Define Scaled Agile Determine how to support an Agile transformation for your organization Getting Started Introduction Course structure Course goals and objectives Agile Introduction What is Agile? Agile benefits Agile myths and realities Overview of Agile Methods Overview of Agile methods Scrum method Lean and Kanban methods Criteria and certifications What Executives Need to Know About Agile Agile is not just for IT Agile can be scaled Agile transformation needs your support Summary and Next Steps Review Personal Action Plan
IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
Arm yourself with a robust research toolkit that will help you uncover deep behavioural insights on user needs and motivations so you can design better experiences.
This is a masterclass in managing emotions at work, leveraging the power of self-understanding along with effective conflict management strategies to achieve successful outcomes
This workshop will provide an opportunity to understand and apply a range of commercial analysis tools in a problem-solving environment.