RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Bluetooth training course description Bluetooth is used by many kids these days but is probably under-utilised in business environments. This hands on training course provides an overview of what Bluetooth is, how it works, what it can be used for and how to configure it on different devices. What will you learn Explain what Bluetooth is. Describe the Bluetooth protocol stack. Recognise the applications of Bluetooth. Configure Bluetooth. Bluetooth training course details Who will benefit: Anyone who needs to know more about Bluetooth. Prerequisites: None. Duration 2 days Bluetooth training course contents Classic Bluetooth Bluetooth overview Basics, standards, competing technologies. Bluetooth radio RF bands, power losses, frequency hopping. Bluetooth modulation PSK, DPSK, DPQSK. Bluetooth data transfer FH, TDD, FDMA, ACL, SCO, Bluetooth packets. Making connections Piconets, Scatternets, Pairing The protocol stack Baseband, Link Manager, L2CAP, SDP, GAP, RFCOMM. Profiles FTP, DUN, LAN, Synch, HDP, GOEP/OBEX etc. Security Authentication, authorisation, encryption, risks. Bluetooth Low Energy Introduction Bluetooth Smart and Bluetooth Smart Ready. BLE device types Design goals, terminology and core concepts. BLE usage models Presence detection, data broadcasting connectionless models, gateways. BLE architecture Controller, host, applications and stack splits. BLE protocol stack Link layer, HCI, L2CAP. BLE profiles GAP roles, models, procedures, security modes, data advertising. BLE security Pairing, bonding, data signing BLE applications Devices, services, profiles, peripherals
Employee Assistance Programme Training
Critical Thinking and Creative Problem Solving: In-House Training Two critical skillsets for the future of work are critical thinking and creative problem solving. These modes of working and thinking intersect and overlap; both are necessary and both can be taught. Having the ability to exercise creativity while at the same time applying structure and discipline to the thinking process is a key competency in the twenty-first century workplace. This course explores the interplay between critical and creative thinking, and the necessity of each to effective problem solving and decision making. Participants will learn a variety of techniques to apply critical thinking to real-life scenarios. They will experiment with different problem-solving approaches and will learn about cognitive influences on our decisions and choices. The course delves into the business value of creativity and involves participants in actively integrating criticality, creativity, and problem solving. What you will Learn At the end of this program, you will be able to: Explain basic concepts of problem solving Infer types of cognitive biases that impact decision making Utilize types of root cause analysis Differentiate among obstacles to sound decision making Apply a variety of problem-solving approaches / processes to existing challenges Evaluate alternative solution methods using various techniques Analyze real world problem scenarios to determine the lateral thinking type needed to address them Foundation Concepts Definitions Thinking modes and cognitive bias Basic problem-solving framework Problem Definition and Solution Generation Root cause analysis Basic problem-solving obstacles Generating alternative solutions Evaluating Alternatives Critical thinking guidelines Obstacles to sound decision making Tools for evaluating alternatives Exploring Lateral Thinking Problem-solving challenge Workplace application
This course will provide an opportunity to begin to understand what commercial and financial awareness means and the importance of everyone in thinking commercially.
DASA DevOps Fundamentals: In-House Training The DASA DevOps Fundamentals™ certification provides the core education necessary to build your DevOps vocabulary and understand its principles and practices. It's the ideal starting point for DevOps journeys, whether you're already familiar with working with Agile and/or DevOps teams or not. Faster software deployment, increased deployment frequency, and higher change success rate are only some of the visible outcomes of practicing DevOps. Organizations such as Netflix, Spotify, and Facebook are transforming IT by successfully implementing DevOps principles. But you don't have to be big to be a DevOps leader. Companies large and small, young and old, have smoothly made the transition and have the proof of success in their pockets. This course will inspire you to serve as a change champion by sharing and using what you learned, and continue to learn, about DevOps to lead and mentor others. A solid understanding of DevOps Fundamentals has helped numerous professionals and organizations how to approach a DevOps journey, not only from a tool and automation perspective but also looking in-depth at the softer side of things. This course provides learners with an extensive introduction to the core Agile DevOps principles. It covers all 12 key knowledge and skill competencies defined by DASA to ensure you acquire a solid knowledge of DevOps concepts and terminology. Multiple cases or scenarios, group discussions, and examples are included in the course to enhance your learning experience. What you will Learn DASA DevOps Fundamentals-certified professionals are able to: Explain the drivers responsible for the emergence of DevOps. Define and discuss the key concepts and principles of DevOps. List and explain the business benefits of DevOps and continuous delivery. Know how teams can translate DevOps principles into tangible practices. Learn about modern operations in a DevOps context. Explain the concepts of test automation, infrastructure automation, and build and deployment automation. Describe how DevOps relates to Lean and Agile methodologies. Get insight into the various organizational DevOps models and architectures. Identify how Cloud and Delivery pipeline automation optimizes and accelerates the ways of working. Discuss the critical success factors for DevOps transformation. Introducing DASA DevOps Fundamentals DASA DevOps Fundamentals An Introduction Case Study - Easy Journey Airways Building the DevOps Context DevOps Evolution Business Benefits of DevOps DASA DevOps Principles Goals and Measurements Knowing DevOps for Individuals T-Shape Profiles DevOps Capabilities by DASA DASA DevOps Certifications Getting Acquainted with DevOps Culture and Behavior Embracing a DevOps Culture Core Elements of a DevOps Culture Implementation of a DevOps Culture Understanding the Value of DevOps for Teams and Organizations Organizational Models Team Autonomy DevOps at Scale Getting Familiar with DevOps Management Practices ITSM Lean Agile Getting Familiar with DevOps Technical Practices Architecture Modern Infrastructure and Cloud Operations Enabling DevOps Team Performance Through Continuous Delivery and Automation Software Delivery Automation Concepts Continuous Delivery Core Concepts Continuous Delivery Automation Concepts Continuous Delivery Automation Focus Topics Measuring the Performance - The Next Steps Analyze the Current Situation Improve Incrementally
PMI-ACP® Exam Prep: In-House Training This course builds on the candidates' practical experience of Agile in the workplace to equip them with the broad range of knowledge and skills required for the PMI® Agile Certification exam. It will follow the PMI® requirements and reference the suggested reading list, including the Agile Practice Guide, but will not be limited to those areas. Within the profession and discipline of project management, Agile continues to develop as a significant and important aspect of bringing change to an organization. Where the products of change must be delivered to the business 'on time,' Agile is often the chosen methodology. In addition to equipping candidates for the PMI® Agile Certification examination, this course will also support candidates in taking a more informed and effective role in Agile projects. It will also enable them to take a significant role in encouraging and enabling the organization to become or develop as an Agile environment. What you will Learn You will learn how to: Appreciate the wider aspects of Agile project management tools and techniques Integrate various disciplines within Agile Tailor / customize Agile to suit the needs of different projects Prepare yourself for the PMI® Agile Certification examination Getting Started Introductions Agenda Expectations Foundation Concepts Defining 'Traditional' Project Management Project management parameters The 'traditional' approach to the parameters Strengths and weaknesses of the traditional approach Defining 'Agile' Project Management Project management parameters revisited The 'agile' approach to the parameters Strengths and weaknesses of agile Managing projects with traditional and agile methods Can the two approaches co-exist? Leveraging the benefits of both methods Options for using both methods on a project Avoiding the elephant traps Key aspects of the PMI® Agile Certified Practitioner (PMI-ACP)® Handbook Overview Eligibility requirements Exam information Exam Blueprint Continuing certification requirements Key aspects of the PMI Agile Certification Examination Content Outline Introduction Agile exam content outline Tools and techniques Knowledge and skills Domains and tasks (not examined) An Introduction to Agile and Implementing Agile Definable work vs. high-uncertainty work Project factors that influence tailoring The Agile Manifesto and 12 Principles Agile mindset Agile domains and tasks Agile Tools and Techniques Related to PM 'Hard Skills' Planning, monitoring, and adapting The need for planning, monitoring, and adapting The Agile approach to planning and plans The Agile planning tools and techniques The Agile monitoring tools and techniques The Agile approach to adapting Product quality A definition of 'product quality' Setting the standard for product quality Agile tools and techniques for achieving product quality Risk management A definition of 'risk' What is 'at risk'? The acceptability of risks The Agile tools and techniques for managing risks Agile Tools and Techniques Related to PM 'Soft Skills' The difference between PM 'hard and soft' skills Communications The importance of communications Forms of agile communications Communications within the project Communications from the project Communications to the project Making communications the cultural norm Interpersonal Skills Defining and understanding management Defining and understanding leadership Defining and understanding servant leadership Delegating vs. empowering Playing to people's strengths Overcoming the roadblocks Core Agile Tools and Techniques The philosophy of core Agile tools and techniques Agile estimation Will traditional forms of estimating work for agile? The relationship between estimating and guessing The relationship between estimating and sizing The where, who, and how of agile estimating Agile analysis and design Product analysis and design from a user point of view Product analysis and design from a supplier point of view Product analysis and design from an agile project point of view Value-Based Agile Tools and Techniques The role of value-based tools and techniques in bridging traditional PM with Agile Value-based prioritization Value-based prioritization and agile projects Investment appraisal methods Regulatory driven Customer driven Ranking methods (MMF, MoSCoW) Metrics What should we measure / track? Methods of measuring / tracking Adding value with metrics Process Improvement Value-stream analysis Value-stream mapping Agile Knowledge and Skills Context of Agile Knowledge and Skills vis-Ã -vis Agile Tools and Techniques Agile Knowledge and Skills Process focused People focused Product focused Project focused Exam Preparation and Course Closure The application process - where are you now? The 'Exam-Focused Journal' - what you still have to do Further preparation - self-study schedule Exam topic review Practice exam Practice exam debrief Course closure
We can come to you and deliver Food Safety courses at your business premises. RSPH Level 4 Managing Food Safety and Hygiene Catering Course! This Level 4 course is perfect for those looking to enhance their knowledge and skills in food safety and hygiene in the catering industry. Throughout the course, you will learn about advanced food safety management, HACCP principles, and how to effectively implement food safety procedures. Special Offer: Book on this Level 4 Food Safety Training from July to August 2024 Contact us for a quote or to schedule training.
In today's dynamic business environment, Managers need to evaluate different courses of action and make decisive decisions.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.