Online Asset Management course. This IAM Certificate course will be hosted online, December 2023.
Preparing for Digital Transformation: Virtual In-House Training Organizations today must keep pace with changing technology to stay abreast of the market demand. Keeping pace means a transformation of the entire organization into the digital age. This workshop presents the challenges, benefits, and pitfalls of digital transformation and how it will affect you, and how you can be better prepared and positioned for the upcoming digital transformation. The goal of this course is to enable you to become knowledgeable about the technologies behind a digital transformation in your organization and the driving forces compelling such a transformation. You will learn how to become engaged in the processes of transforming your organization digitally to meet with the growing demands of customers and clients What you will Learn Describe the impact that digital is making on the economy and on customer expectations Examine the nature and drivers of the digital transformation Evaluate new technologies such as Blockchain, Big Data, Artificial Intelligence, and other technologies and see how they work to bring about digital transformation Assess the impact of digital technologies on the current roles and positions in the organization Discuss both the demand that customers have for digital technologies and the impact the digital technologies have on the customer and its relationship with the organization Recognize the new technology trends in the digital transformation and what they mean to the future of the organization Identify how digital transformation will affect all roles and how to be prepared for the upcoming and continuing digital transformation Foundation Concepts Digital transformation versus automation Driving forces behind the digital transformation Learning from digital transformation successes Digital Transformation and Customer Orientation The Digital Customer Customer touch points and the customer journey Omnichannel concept Transform to the customer Digital Technologies and the Organization Relationship Management Big Data: The Basis for it All The Human Factor in Digital Transformations Risks of Digital Transformation Technology Trends Data and Business Analytics Other Major Trends Preview of Coming Attractions Pathway to Digital Transformation
Duration 1 Days 6 CPD hours This course is intended for Business decision-makers: directors (managers of managers), managers of individual contributors (ICs) or ICs working in non-IT functions/divisions (such as finance, marketing, sales, HR, product design) interested in understanding the applications of Google?s cloud technology for business improvement opportunities and transformational project(s). Through this interactive training, you?ll learn about core cloud business drivers?specifically Google?s cloud?and gain the knowledge/skills to determine if business transformation is right for you and your team, and build short and long-term projects using the ?superpowers? of cloud accordingly. You?ll also find several templates, guides, and resource links through the supplementary student workbook to help you build a custom briefing document to share with your leadership, technical teams or partners. Why cloud technology is revolutionizing business This module introduces cloud technology as a paradigm shift and explains how it?s irrevocably transforming business globally. It defines the fundamental building blocks of cloud technology?compute power and data?and what they mean for you and your business. And finally, it reveals how these building blocks help to create five superpowers using concrete use cases of their transformative abilities for business, education, and government sectors. Foster an innovation culture Cloud is not just about a technological transformation; it's a business and cultural transformation, too. This module explores how the superpowers of the cloud are brought to life through people. It looks specifically at how to organically create and scale innovation through culture and business practices. It offers key principles, drawing examples from Google?s success and real world scenarios, that you can apply in your day-to-day operations. Define the ideal business transformation challenge Previous modules describe the journey with cloud technology to include business and cultural changes as well. This module sets the groundwork to build a transformational solution using cloud technology for your role or your business. This process starts with distinguishing between scaled improvements and transformations. Next, the module demonstrates how to write an ideal challenge question and use insights generated from a data ecosystem to address the challenge. Finally, it introduces a framework that you can use to assess and refine your challenge ideas, preparing you to build a business case in a later module. Build trust with availability, security, and compliance This module addresses common concerns about data privacy and security when migrating to the cloud. It defines key terms - privacy, security, compliance, and reliability - and reveals today?s top cybersecurity challenges and threats. It discusses how data security and compliance can be maintained when data is in the cloud, as illustrated by the Shared Responsibility Model. And finally, it uses a concrete example to explain how learners can build a high-level security program in their own organization. Build a business case for your transformation challenge This module explains how to identify the most transformative solution for your business challenge. It then breaks down steps to achieve the transformational solution through creating smaller projects and plotting them onto a transformation roadmap. It describes how to use the data ecosystem you mapped in a previous module to support your overall project. Finally, it explains step by step how to build a business case and gives tips to help you pitch your project idea to gain buy-in from leadership, teams, and technical partners. Additional course details: Nexus Humans Business Transformation with Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Transformation with Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
QA Level 2 Award In Food Safety In Catering (RQF) Face to Face: Full day course Virtual Classroom: Spread over 3 sessions of 2½ hr duration Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely Recommended by HSE and Environmental Health Officers (EHO's) Course Contents: The Importance of Food Safety Food Safety Laws Legal Responsibilities of Food Handlers Types of Contamination and the Associated Risks Bacteriology Food Poisoning Foodborne Illnesses An Introduction to Hazard Analysis and Critical Control Points (HACCP) Personal Hygiene Work Flow, Work Surfaces and Equipment Cleaning and Disinfection Waste Disposal Pest Control Safe Food Handling Practices including Time and Temperature Controls Preparation Cooking and Reheating Chilling Cooling Thawing Hot holding Displaying food Core temperatures Food Preservation Storage Stock Control Procedures Benefits of this course: Businesses have a duty to their customers to produce food that is safe for consumption. There are one million cases of food poisoning in the UK each year. More than 6,000 are admitted to hospital. In 2014/2015, businesses in Chesterfield were issued 344 written enforcement notices. Derby received 1,116. Doing our Ofqual regulated, nationally accredited course ensures that nothing of importance is left out. EU and UK regulations state that all food handlers must receive appropriate training in food safety practices relevant to their duties. The Food Standards Agency says that 'Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely’. Our QA Level 2 Award in Food Safety in Catering (RQF) is a nationally accredited qualification especially suitable for people working in, or planning to work in, the food retail industry, and complies with the training regulations. Accredited, Ofqual regulated qualification Our Food Safety in Catering training course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards. This means that you can be rest assured that your Food safety in Catering certificate fulfils the legal requirements and is a very good way to make sure your employees are trained in Food Safety. The Ofqual Register number for this course is 603/2594/X
Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score
Duration 2 Days 12 CPD hours This course is intended for System administrators Overview Prepare you to perform key administrative tasks in SAP BusinessObjects Business Intelligence platform to manage users, groups, and objects, and to distribute contents to users. In this course, students perform key administrative tasks in SAP BusinessObjects Business Intelligence platform to manage users, groups, and objects, and to distribute contents to users. SAP BusinessObjects Business Intelligence (BI) Platform Identifying the Components of the SAP BusinessObjects Business Intelligence BI Platform Content and Objects in the SAP BusinessObjects Business Intelligence (BI) Platform Viewing and Modifying Objects in the BI Platform Organizing Objects in the BI Platform Searching for Content in the BI Platform User and User Group Security in the SAP BusinessObjects Business Intelligence (BI) Platform Setting Up Users and Groups Administering Rights Application Security in the SAP BusinessObjects Business Intelligence (BI) Platform Managing Access to Applications Securing Applications Content Distribution Using Scheduling and Alerting Scheduling Objects Managing Instances Managing Calendars Managing Events Configuring Alerts and Alerting Publications and Publishing Designing Publications Additional course details: Nexus Humans BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for CxO?s IT Managers/ Directors Senior Project Officers Project & Program Coordinator/Managers Operations Managers Quality Managers Business Analysts Engineering Managers IT Infrastructure Managers Internal Consultants Professional Consultants Overview The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation. A successful Practitioner candidate should, with suitable direction, be able to start applying the Change Management approaches and techniques to a real change initiative - but may not be sufficiently skilled to do this appropriately for all situations. Their individual Change Management expertise, complexity of the change initiative and the support provided for the use of Change Management approaches in their work environment will all be factors that impact what the Practitioner can achieve. Successful candidates will have fulfilled the knowledge requirements for Change Management Institute accreditation. Dealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ?body of knowledge? for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG?s refreshed Change Management certification is fully aligned with the change management body of knowledge. Prerequisites The change management foundation certificate is required to sit the practitioner level exam. 1 - Change Impact Levers for change Levels of adoptions and critical mass Reinforcing systems 2 - Exam Preparation Change Management Practitioner exam preparation Change Management Practitioner exam
This course will let you develop the skillsets needed to guide the delivery of value in a Lean enterprise—and learn about the activities, tools, and mechanics used to manage backlogs and programs. Attending the class prepares you to take the exam and become a certified SAFe® 6 Product Owner/Product Manager (POPM). SAFe Product Owner/Product Manager 6 training course is provided under Scaled Agile, Inc. Partner Program Agreement.
About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: Introduction to Risk Assessments (RA) Threat Actors and Their Motivations Threat and Risk Assessment Critical Controls Identification Maturity Assessment Treated Cyber Risk Profile Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations