Duration 3 Days 18 CPD hours This course is intended for The target audience for the SRE Practitioner course are professionals including: Anyone focused on large-scale service scalability and reliability Anyone interested in modern IT leadership and organizational change approaches Business Managers Business Stakeholders Change Agents Consultants DevOps Practitioners IT Directors IT Managers IT Team Leaders Product Owners Scrum Masters Software Engineers Site Reliability Engineers System Integrators Tool Providers Overview After completing this course, students will have learned: Practical view of how to successfully implement a flourishing SRE culture in your organization. The underlying principles of SRE and an understanding of what it is not in terms of anti-patterns, and how you become aware of them to avoid them. The organizational impact of introducing SRE. Acing the art of SLIs and SLOs in a distributed ecosystem and extending the usage of Error Budgets beyond the normal to innovate and avoid risks. Building security and resilience by design in a distributed, zero-trust environment. How do you implement full stack observability, distributed tracing and bring about an Observability-driven development culture? Curating data using AI to move from reactive to proactive and predictive incident management. Also, how you use DataOps to build clean data lineage. Why is Platform Engineering so important in building consistency and predictability of SRE culture? Implementing practical Chaos Engineering. Major incident response responsibilities for a SRE based on incident command framework, and examples of anatomy of unmanaged incidents. Perspective of why SRE can be considered as the purest implementation of DevOps SRE Execution model Understanding the SRE role and understanding why reliability is everyone's problem. SRE success story learnings This course introduces a range of practices for advancing service reliability engineering through a mixture of automation, organizational ways of working and business alignment. Tailored for those focused on large-scale service scalability and reliability. SRE Anti-patterns Rebranding Ops or DevOps or Dev as SRE Users notice an issue before you do Measuring until my Edge False positives are worse than no alerts Configuration management trap for snowflakes The Dogpile: Mob incident response Point fixing Production Readiness Gatekeeper Fail-Safe really? SLO is a Proxy for Customer Happiness Define SLIs that meaningfully measure the reliability of a service from a user?s perspective Defining System boundaries in a distributed ecosystem for defining correct SLIs Use error budgets to help your team have better discussions and make better data-driven decisions Overall, Reliability is only as good as the weakest link on your service graph Error thresholds when 3rd party services are used Building Secure and Reliable Systems SRE and their role in Building Secure and Reliable systems Design for Changing Architecture Fault tolerant Design Design for Security Design for Resiliency Design for Scalability Design for Performance Design for Reliability Ensuring Data Security and Privacy Full-Stack Observability Modern Apps are Complex & Unpredictable Slow is the new down Pillars of Observability Implementing Synthetic and End user monitoring Observability driven development Distributed Tracing What happens to Monitoring? Instrumenting using Libraries an Agents Platform Engineering and AIOPs Taking a Platform Centric View solves Organizational scalability challenges such as fragmentation, inconsistency and unpredictability. How do you use AIOps to improve Resiliency How can DataOps help you in the journey A simple recipe to implement AIOps Indicative measurement of AIOps SRE & Incident Response Management SRE Key Responsibilities towards incident response DevOps & SRE and ITIL OODA and SRE Incident Response Closed Loop Remediation and the Advantages Swarming ? Food for Thought AI/ML for better incident management Chaos Engineering Navigating Complexity Chaos Engineering Defined Quick Facts about Chaos Engineering Chaos Monkey Origin Story Who is adopting Chaos Engineering Myths of Chaos Chaos Engineering Experiments GameDay Exercises Security Chaos Engineering Chaos Engineering Resources SRE is the Purest form of DevOps Key Principles of SRE SREs help increase Reliability across the product spectrum Metrics for Success Selection of Target areas SRE Execution Model Culture and Behavioral Skills are key SRE Case study Post-class assignments/exercises Non-abstract Large Scale Design (after Day 1) Engineering Instrumentation- Instrumenting Gremlin (after Day 2)
Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study
The leadership role of the project manager is increasingly recognised as a key determinant in delivering success. These skills can often be critical in project situations, where tight budgets and deadlines demand the highest levels of team performance and where the working environment presents fresh challenges on a daily basis. This programme focuses on the leadership skills required of project managers and will benefit anyone involved in managing projects large or small wishing to extend or enhance those skills. The objectives of this programme are to help the participants: Understand the significance of leadership skills to the project manager and the impact of these skills on project performance Review the key skills needed to be an effective 'multi-dimensional' project leader and learn how to develop, adapt and apply them in practice Learn how to identify the preferred leadership style for the context and organisational culture of a project and how to develop personal style versatility Understand the role of the project leader in building an effective team and the skills required to promote and sustain team performance Gain a better understanding of the interpersonal skills needed to motivate individual team members and harness the full potential of the team DAY ONE 1 Introduction Aims and objectives Personal objectives 2 Project management and leadership What is a leader? How much can leadership be learned? The project environment and the impact of leadership skills The characteristics of high performance project teams and their leaders 3 Principles of effective leadership Some useful models and theories of leadership explored Types of leadership; choosing how to use leadership power Evaluating personal leadership style; how to develop style flexibility 4 Syndicate case study: Leadership in action Review of the role of leadership in a contemporary project Feedback and plenary discussion: effective project leadership 5 Team exercise: Leadership skills of the project manager Teams compete in performing a project simulation Project review and feedback Discussion of the outcome: role and skills of the project leader 6 Leadership skills for project managers The 3 dimensions of project leadership: inwards, outwards, and upwards The vital role of communication skills and how to develop them Developing a 'project vision': strategic thinking skills Understanding others; emotional intelligence skills Being a visible leader; behavioural and influencing skills Building effective relationships; the importance of trust and respect DAY TWO 7 Leading the project team The role of leadership in developing team performance Understanding individual strengths; recognising team role preferences Managing conflict and promoting positive team dynamics Setting standards, maintaining discipline and rewarding performance Harnessing team potential: building motivation within the team Promoting team learning; the team leader as coach / mentor 8 Leading through the organisation Gaining the support others; developing effective influencing skills Getting empowerment from key stakeholders Knowing when and how to take the initiative and lead Building and maintaining rapport with key partners Becoming an effective team player in leadership teams Becoming a business leader; leading colleagues and co-workers 9 Team exercise: Leadership and negotiation Teams engage in a negotiation exercise Exercise review and feedback Discussion of the outcome: negotiation skills of the project leader 10 Negotiation skills for project leaders Characteristics of effective negotiators Classic problem behaviours and mind-sets to avoid Getting to win-win; building partnership and trust 11 Leading more senior stakeholders The challenges and skills of leading and managing upwards Communicating with more senior stakeholders; building credibility Negotiating upwards: knowing when and how The role of networking skills; building and maintaining rapport Handling disagreements; the art of diplomacy Handling personality and style conflicts with more senior people
Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline The Process of Auditing Information Systems Risk-Based Auditing Audit Planning and Performance IS Systems Auditor reports IT Governance and Management Systems Acquisition, Development and Implementation Systems Development Models Types of Specialized Business Applications Application Controls Information Systems Operations, Maintenance, and Support System and Communications Hardware Additional course details: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based Microsoft Office productivity suite, and who are now extending Microsoft Office to a collaborative cloud-based Office 365 environment. Overview In this course, you will build upon your knowledge of the Microsoft Office desktop application suite to work productively in the cloud-based Microsoft Office 365 environment. You will: Sign in, navigate, and identify components of the Office 365 environment. Create, edit, and share documents with team members using the Office Online apps, SharePoint, OneDrive for Business, and Teams Collaborate using Teams. Configure Teams. This course introduces several productivity apps including SharePoint, OneDrive and Teams that can be used in combination by teams for communication and collaboration. Outline for Teams About What is Microsoft Teams? Overview How to Access Microsoft Teams Etiquette for using teams Integration Capabilities SharePoint OneDrive Interface Storage ? OneDrive & SharePoint Permissions & Access Owner, Member & Guest Communication and Collaboration Team Conversations Private conversations Mentions Inviting people Search Settings and Customization Use the search tool to find specific messages, files or people Working with Files Create new files Upload files Attaching or sharing Files Edit and Collaborate on files Open files in SharePoint OneDrive for personal files Administration (Champions) Add members to a Team Access administrator settings Meetings and calls Initiate a meeting on demand Schedule a meeting and invite attendees Meetings and Outlook Introduction to SharePoint What is SharePoint Understanding your permissions Logging into SharePoint Working with SharePoint sites Working with SharePoint sites Navigate, browse and search in a site Follow a site Working with documents Navigate a library Open and edit a document Upload or create a document in a library Share a file Set alerts for files Use checkout and check-in Team collaboration Versioning Getting Started (OneDrive Outline) Sign in, access and navigate Working with files and folders Upload files Organize files and folders Rename. Copy and download files Delete and recover files Search Use OneDrive with Office Save an office file online to OneDrive Use OneDrive with desktop office Versioning Share files Co-authoring
Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce System Architect credential, for consultants or technical experts working to earn their individual Architect Designer credential, and for Salesforce Developers and Administrators looking to expand their overall capabilities with the Salesforce Platform. Overview Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes) to address integration requirements. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, canvas, Workflow outbound, Apex, and Salesforce Connect) to address integration requirements. Recommend the appropriate SSO Flow or OAuth flow to address identity and access management requirements. Dive into the two cornerstone domains of being a System Architect: Integration Architecture, and Identity and Access Management. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing integration and identity solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Integration Capabilities Create, Retrieve, Update, or Delete Records with SOAP API Integrate with Salesforce Using REST API Insert, Update, Upsert, or Delete Large Volumes of Data with BULK API Push Relevant Data to Users in Real Time with Streaming API Send Information to a Designated Endpoint with Outbound Message Integrate Your Apex with an External Service Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Connect Business Processes in Salesforce with Platform Events Publish Change Events with Change Data Capture Integration Patterns Invoke Remote Call-In Patterns Invoke Request and Reply Patterns Invoke Fire and Forget Patterns Synchronize Batch Data Update UI Based on Data Changes Visualize Data Identity Management Review SSO Fundamentals Review Identity Management Review Identity Management Concepts Understand Salesforce as an Identity Provider Accept Third-Party Identity in Salesforce Understand Social Sign-On and Open ID Connect Enable Users to Authenticate with SSO Flows Initiate Flows with IDP Initiate Flows with SP Troubleshoot Identity Issues Authentication Grant Client Application Access with OAuth Flow Generate Access Tokens with Username Password Flow Initiate Web Server Flow Grant Application Access with User Agent Flow Connect to Salesforce Using JWT Flow
Digital Marketing - Growth Hacking Techniques - Online Course Course Overview: This course provides an in-depth exploration of growth hacking techniques within the context of digital marketing. Learners will gain a comprehensive understanding of the fundamental principles of digital marketing, coupled with strategic insights into growth tactics. The course is designed to help professionals leverage innovative marketing strategies to drive business growth, enhance customer acquisition, and optimise digital presence. By the end of this course, learners will have the skills to implement growth hacking techniques that can rapidly scale businesses while maintaining a sustainable growth trajectory. Course Description: "Digital Marketing - Growth Hacking Techniques" delves into key topics like customer journey mapping, content marketing, and SEO, alongside exploring niche areas such as mobile, email, and social media marketing strategies. Learners will study effective methods for increasing brand visibility, generating leads, and retaining customers across various digital platforms. Emphasis is placed on understanding how to employ data-driven insights to optimise marketing efforts. By the end of the course, participants will be equipped to implement digital marketing strategies that yield measurable business growth in highly competitive online environments. The course content ensures that learners develop the skills necessary to handle dynamic marketing challenges and grow a business in an increasingly digital world. Digital Marketing - Growth Hacking Techniques - Online Course Curriculum: Module 01: Fundamentals of Digital Marketing Module 02: Growth Hacking Module 03: Customer Journey Module 04: Content Marketing Module 05: SEO Module 06: E-Mail Marketing Module 07: Facebook Marketing Module 08: Instagram Marketing Module 09: Twitter Marketing Module 10: YouTube Marketing Module 11: Mobile Marketing (See full curriculum) Who is this course for? Individuals seeking to expand their digital marketing expertise. Professionals aiming to enhance their marketing strategies and career prospects. Beginners with an interest in growth hacking and digital marketing. Entrepreneurs looking to scale their businesses using effective digital techniques. Career Path: Digital Marketing Manager Growth Hacker Social Media Manager Content Strategist SEO Specialist Email Marketing Specialist Brand Manager
Course Overview This course on "Capital Budgeting & Investment Decision Rules" provides a comprehensive foundation in the key concepts and techniques used in evaluating long-term investments. Covering fundamental methods such as Net Present Value (NPV), Payback Period, and Internal Rate of Return (IRR), the course explores how businesses make critical decisions on capital allocation. Learners will gain a deep understanding of the tools used to assess the financial viability of projects, ensuring they can apply these methods in real-world situations. This course is designed to equip professionals with the knowledge to evaluate investment opportunities effectively and contribute to strategic decision-making. Course Description The "Capital Budgeting & Investment Decision Rules" course delves into essential financial decision-making techniques used by organisations to evaluate potential investments. Topics include the NPV method, Payback Period, IRR, and how to assess projects with varying timelines. Learners will explore the advantages and limitations of each method and understand their applications in different business contexts. The course also covers the evaluation of projects with different durations and how to select the best investment strategies to achieve organisational goals. Through this learning experience, participants will acquire the analytical skills necessary to make informed capital budgeting decisions, ultimately strengthening their financial decision-making acumen. Course Modules Module 01: Introduction Module 02: NPV Method Module 03: Payback Period Method Module 04: Internal Rate of Return (IRR) Module 05: Evaluating Projects in Different Lives Module 06: Conclusion (See full curriculum) Who is this course for? Individuals seeking to understand capital budgeting methods. Professionals aiming to enhance their financial analysis skills. Beginners with an interest in finance and investment decision-making. Anyone looking to develop their knowledge in investment evaluation techniques. Career Path Financial Analyst Investment Analyst Corporate Finance Professional Project Manager Risk Manager Business Consultant
It's a fact of life that costs generally increase and as a result prices must go up too. Implementing an increase without losing customers is challenging. Talking about a price increase with customers never makes for an easy conversation. Your customers will generally decide whether to accept the increase based upon value, as well as the hassle cost of switching and going elsewhere. Even the most experienced salesperson who has implemented price increases before will be fighting back the nerves when faced with the task of 'selling' the increase. In this flexible programme, we will support your internal preparations at whichever stage you and your colleagues are at. From making the decision to increase prices, right through to those on the frontline already dealing with any push-back. This programme will help participants: Understand the business case for increasing prices Take steps to research the market Consider their customers' motivations Use the six principles of influence Identify and adapt for different personality styles Assess their level of trust with customers Build rapport rapidly with their customers and prospects 1 Raising prices - keys to success Understanding the business case Researching the market Assessing the value of your offering 2 Understanding your customer base Assessing your key accounts What is your 'target' customer range? Creating consistency in pricing approach 3 Planning the increase Timing your implementation Communication strategy Elements of a good price increase letter 4 Developing influencing skills The Trust Equation The six principles of influence Discovering your customer's buying decisions 5 Emotional intelligence and price increases The part emotion plays Developing strategies for keeping calm Handling your customer's responses 6 Understanding different customer styles Discover your own style Recognising behaviour traits in others Adapting your approach to their style 7 Preparing for customer contact Preparing for specific customers Anticipating their response Dealing with challenging customers 8 Following through Maintaining a consistent approach Resisting requests for discounts Confirming the increase in writing