SAFe® Lean Portfolio Management: Virtual In-House Training Create a culture of innovation, flexibility, and speed where all people in the portfolio can effectively execute as one unified team. In this course, you will gain the practical tools and techniques necessary to implement the Lean Portfolio Management functions of Strategy and Investment Funding, Agile Portfolio Operations, and Lean Governance. You will have the opportunity to capture the current and future state of the portfolio with the Portfolio Canvas tool and identify important business initiatives for achieving the future state. You'll be able to establish portfolio flow with the Portfolio Kanban and prioritize initiatives for maximum economic benefit. The course also provides insights on how to establish Value Stream Budgets and Lean Budget Guardrails and measure the Lean portfolio performance. What you will Learn Describe the importance of LPM Connect the portfolio to enterprise strategy Implement Lean budgeting and guardrails Establish portfolio flow with the Portfolio Kanban Support operational excellence with APMO and CoPs Coordinate Value Streams Measure the LPM performance Build a plan for LPM implementation Introducing Lean Portfolio Management (LPM) Establishing Strategy and Investment Funding Applying Agile Portfolio Operations Applying Lean Governance Implementing the LPM function
Duration 1 Days 6 CPD hours This course is intended for Looking for a way to extend your business operations? Look no further than the App in a Day workshop! In this one day course you will learn to build a custom, secure business application that you can share across your organise and will run across multiple platforms including tablets and mobile devices. Power Platform is a secure and scalable platform for building your own applications. In this course, you will learn how to build an application from the ground up by building the required UX, Backend, and frontend. All this without writing any code. Overview Some of the applications of the Power Platform you will learn to build will allow you to potentially: A) Share information with trusted colleagues and associates B) Monitor and manage your business operations C) Monitor and manage your customers D) Share business news on social media E) Share business photos and footage This course will teach you how to build your own application that is completely secure and private. Power Apps Canvas App Connect to data sources and filter results based on specified criteria Work with screens and navigation Use controls, properties, formulas, and actions to customize the user experience Display the logged in user?s name Configure app settings Save and share an app Run an app on a mobile device Microsoft Dataverse Create and customize a custom table Use the Form control Save data into the Microsoft Dataverse using the Form control Microsoft Dataverse Create a standalone Model-driven app. Customize forms for the Model-driven app Use a Business Process Flow to guide users through a process Microsoft Dataverse Create a flow that is triggered when a new Microsoft Dataverse row is created Automate sending approval requests Customize the approval based on the Microsoft Dataverse row Use the Approval centre
Managers at all levels have to be able to introduce, lead and manage change to ensure the organisational objectives of change are met.
Duration 2 Days 12 CPD hours This course is intended for First-time QuickBooks users will learn the basic features of the software. Experienced QuickBooks users will quickly learn the new features and functionality of QuickBooks 2015, 2016 or 2018. Overview Upon completion of this course, students will be able to identify the types of information often tracked in business, understand common business terms, enter information into forms and lists, work with the Chart of Accounts, work with inventory and service items, and work with invoices, payments, bills, and bank accounts. This course is an introduction to QuickBooks. Getting Started Starting QuickBooks Setting QuickBooks Preferences Identifying Components of the QuickBooks Operating Environment Using QuickBooks Help Identifying Common Business Terms Exiting QuickBooks Setting Up a Company Creating a QuickBooks Company Using the Chart of Accounts Working with Lists Creating Company Lists Working with the Customers & Jobs List Working with the Employees List Working with the Vendors List Working with the Item List Working with Other Lists Managing Lists Setting Up Inventory Entering Inventory Ordering Inventory Receiving Inventory Paying for Inventory Manually Adjusting Inventory Selling Your Product Creating Product Invoices Applying Credit to Invoices Emailing Invoices Setting Price Levels Creating Sales Receipts Invoicing for Services Setting Up a Service Item Changing the Invoice Format Creating a Service Invoice Editing an Invoice Voiding an Invoice Deleting an Invoice Entering Statement Charges Creating Billing Statements Processing Payments Displaying the Open Invoices Report Using the Income Tracker Receiving Payments for Invoices Making Deposits Handling Bounced Checks Working with Bank Accounts Writing a QuickBooks Check Voiding a QuickBooks Check Using Bank Account Registers Entering a Handwritten Check Transferring Funds Between Accounts Reconciling Checking Accounts Entering and Paying Bills Handling Expenses Using QuickBooks for Accounts Payable Entering Bills Paying Bills Entering Vendor Credit Using the EasyStep Interview Using the EasyStep Interview Additional course details: Nexus Humans Get Going with QuickBooks training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Get Going with QuickBooks course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
At HFX Training, we are passionate about business simulations because they bring learning to life through hands-on experience. This Level 1 Certification Program is the first step in our Instructor Training Certification Pathway, equipping you to confidently use the Healthcare Hero simulation in your teaching environment. In this program, you will experience the simulation as a student, navigating its complexities and dynamics. Upon successfully completing Level 1, you’ll be ready to advance to Level 2 Training, where you will deepen your expertise in simulation facilitation and administration. The program is cohort-based, and the timetable is coordinated in advance through discussions with the HFX team to ensure maximum participation. For more information on the program structure, instructional materials, and certification requirements, please read on. What to Expect: The Healthcare Hero simulation places you in charge of a fictional hospital. Over eight simulation rounds - each representing one quarter of business operations - you will make strategic decisions to optimize patient care while managing staffing, capacity, quality, and finances. Throughout the simulation, you’ll navigate challenges like healthcare and economic crises, all while balancing the needs of multiple stakeholders. Your ultimate goal is to outperform competing hospitals managed by other participants in the program. Program and Certification Requirements This program equips you to confidently lead the simulation by requiring more than attendance or participation. To earn certification, you must: Thoroughly Prepare: Review all instructional materials and the scenario manual before the course begins. Fully Participate: Attend all Zoom sessions and complete each simulation round with focus and effort. Demonstrate Mastery: Show a comprehensive understanding of the simulation’s dynamics, decision-making processes, and strategies during practice and live rounds. Engage in Reflection: Actively participate in debrief sessions, assess your performance, and identify strategies for improvement. This certification ensures you are equipped to facilitate this complex simulation with confidence. Auditing the course is an option, but participants who choose to audit will not receive certification. Program Format The program is delivered intensively over one or more Zoom sessions, totaling six hours. This compressed format demands your full attention and focus to successfully navigate the simulation’s complexities. Eligibility Requirements: By registering for this training program, you acknowledge the following: You have discussed your needs with the HFX team and confirmed that the simulation aligns with your class or program objectives. You are an instructor at an academic institution. You agree to the confidentiality terms and commit not to distribute, disclose, or replicate any program content for purposes outside of this training. This program is offered in goodwill to academic instructors as a resource to enhance their teaching. As part of this agreement, you understand that all materials, including the simulation itself, are proprietary to HFX and its partners. Any use of these materials for purposes beyond this program, such as developing similar tools or simulations, is strictly prohibited. Course Structure: After registering, you will gain immediate access to the simulation’s instructional materials. This includes: The Scenario Manual: Your guide to understanding the game. The Capacity Planner Worksheet and Financial Planning Worksheet: Tools to help you strategize. The Strategy Planning Exercise: Designed to align your decisions with overall objectives. The Portal Guide: A walkthrough of the simulation platform. The program unfolds in four key phases: Phase 1: Pre Zoom Call / Study / Set Up Register using the button at the bottom of this page. Review the instructional materials thoroughly. Once the cohort is finalized, you will be sent your login credentials for the simulation itself. Try to submit decisions for the first practice round using the simulation portal at www.simulationportal.com. Phase 2: Play We run two practice rounds over the first 2 hours of the zoom call. This allows you to familiarize yourself with the platform and decision-making process, and think through what your strategy might be in the live game. The simulation resets ("zeroed") after the practice rounds. A brief session will clarify lessons learned and expectations for the live rounds. Over eight rounds, you’ll compete against other participants while refining your strategic decisions. Phase 3: Feedback Reflect on your performance during a structured debrief, including: Strengths and areas for improvement. Insights into competitors’ strategies. Strategic lessons learned, and applicability to local healthcare organizations. Phase 4: Implementation Planning Work with the HFX team to plan your first application of the simulation in a teaching environment. Certification Outcome Upon completing this program, you will earn the HFX Instructor Training Certification: Level One, signifying your expertise in conducting impactful simulation-based training using Healthcare Hero.
Decision Making and Problem Solving (Virtual) We may live in an era of fast technology and increasing reliance upon automation, but our human abilities to think critically, make careful decisions, and solve nuanced problems are more important than ever. Our personal lives depend on those things, and so do the lives of our organizations. Since business is now conducted at remarkable speeds, we put our organizations at great risk daily when we have weak competencies with decision-making and problem-solving. Decisions and solutions that are executed impulsively and without structured approaches can create more problems or make existing ones worse! This course aims to help participants improve their skills so they can execute well and add value to the workplace. Learners will experience multiple decision-making and problem-solving models, tools, and techniques meant for the real world. They will learn how to align their growing toolboxes with the right situational contexts so that they can transfer that skill to the workplace. They will also discover how indecision, cognitive bias, and default thought processes can create obstacles to effective decision-making and problem-solving. What you will Learn Recognize the importance of making a sound decision in a timely manner Infer types of cognitive biases and obstacles that impact decision-making Separate facts, requirements, ideas, and perceptions when making a decision or solving problems Apply structured decision-making and problem-solving approaches Conduct cause and effect and Force Field analyses Evaluate alternative solution methods using various techniques Analyze real world situations to determine the best aligned decision-making and problem-solving models, tools, and techniques Implement decision-making and problem-solving models, tools, and techniques Getting Started Foundation Concepts Contextualizing decisiveness and problem-solving Discriminating between decisiveness and problem-solving Understanding Decision-Making Decision-making challenges and impacts Key drivers of good decision-making Thought processes and obstacles Knowledge, skills, and abilities (KSAs) Decision-Making Models and Supporting Tools Decision-making models, tools, and guidelines Tools to evaluate alternatives Translating requirements into action Problem-Solving Defining the problem Problem-solving models Cause and effect analysis Quick hit vs. innovative problem-solving Summary and Next Steps Course summary Personal action plan
QA Level 1 Award In Health And Safety In The Workplace (RQF) Face to Face: Half-day course Virtual Classroom: Spread over 2 sessions of 2½ hr duration A basic course to train your workers in basic health and safety Teaches workers how to keep themselves and others safe at work Course Contents: Roles and responsibilities of employers and employees The importance of health and safety in the workplace Workplace hazards and Risks, including:Slips, Trips and FallsManual HandlingFireWorking from HeightElectricityHazardous SubstancesMachinery and Vehicles Workplace conditions that can affect health and safety Health and Safety Signage Personal Protective Equipment and its uses Importance of Personal hygiene The Purpose of First Aid Provision The need for Reporting Incidents and ill Health Benefits of this course: In 2023/24, 1.7 million people suffered from a work-related illness 600,000 sustained a non-fatal injury 138 People lost their lives 776,000 Workers suffered from work-related stress, depression or anxiety The estimated cost of injuries and ill health last year was £21.6 billion 33.7 million working days, or 140,417 working years, were lost due to work-related illnesses and injuries It is an employer's duty to protect the health, safety and welfare of their employees and other people who might be affected by their business. This includes providing sufficient information, instruction and training of employees, so they can work in a way that does not put themselves or others at risk Our QA Level 1 Award in Health and Safety in the Workplace (RQF) course helps employs gain a bit more understanding of health and safety issues and their own role within that. Accredited, Ofqual regulated qualification: Our Health and Safety Training Course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards. This means that you can be rest assured that your Health and Safety Certificate fulfils the legal requirements and is a very good way to make sure you and your employees are trained in Health and Safety. The Ofqual Register number for this course is 603/0774/2
Bluetooth training course description Bluetooth is used by many kids these days but is probably under-utilised in business environments. This hands on training course provides an overview of what Bluetooth is, how it works, what it can be used for and how to configure it on different devices. What will you learn Explain what Bluetooth is. Describe the Bluetooth protocol stack. Recognise the applications of Bluetooth. Configure Bluetooth. Bluetooth training course details Who will benefit: Anyone who needs to know more about Bluetooth. Prerequisites: None. Duration 2 days Bluetooth training course contents Classic Bluetooth Bluetooth overview Basics, standards, competing technologies. Bluetooth radio RF bands, power losses, frequency hopping. Bluetooth modulation PSK, DPSK, DPQSK. Bluetooth data transfer FH, TDD, FDMA, ACL, SCO, Bluetooth packets. Making connections Piconets, Scatternets, Pairing The protocol stack Baseband, Link Manager, L2CAP, SDP, GAP, RFCOMM. Profiles FTP, DUN, LAN, Synch, HDP, GOEP/OBEX etc. Security Authentication, authorisation, encryption, risks. Bluetooth Low Energy Introduction Bluetooth Smart and Bluetooth Smart Ready. BLE device types Design goals, terminology and core concepts. BLE usage models Presence detection, data broadcasting connectionless models, gateways. BLE architecture Controller, host, applications and stack splits. BLE protocol stack Link layer, HCI, L2CAP. BLE profiles GAP roles, models, procedures, security modes, data advertising. BLE security Pairing, bonding, data signing BLE applications Devices, services, profiles, peripherals
Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security