Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is anyone who works in and around IT, facilities or data centre operations and needs to understand and improve the daily operations including important processes such as lock-out/tag-out, the right process for installing/de-installing equipment, safety procedures, capacity management and much more. Overview The old believe that a fully redundant data centre facility will save the day is no longer true as many research outcomes have revealed that the majority of downtime is caused by the human factor. Policies, processes, procedures and work instructions should be carefully developed, ideally following relevant standards, to ensure an effcient and effective data centre operations which are also compliant to the required regulations. The CDFOS© (Certified Data Centre Facilities Operations Specialist) course is a three-day course which will enable participants to fully understand the requirements of running the day-to-day operations of a mission critical data centre. Participants will gain all the required competences for running the daily operations, understand which processes should be in place, and the critical elements of those processes and how to execute them. The course is fully aligned with the DCOS© (Data Centre Operations Standard). Data centre facilities operations management have proven to be the key differentiator between a data centre that is performing well or badly. Service Level Management Service Level Management Needs analysis Capability assessment Service portfolio and catalogue Service Level Agreements Reporting - Complaint procedure Customer satisfaction Service Improvement Process (SIP) Safety and Crisis Management Most common type of accidents and why they often happen The roles and responsibilities of appointed safety staff The importance of the OH&S or WHS manual Calibration of measurement and test equipment Proper lock-out/tag-out procedures Emergency response plan requirement for various potential emergencies The importance of Permit To Work Physical Security Standard Operating Procedures (SOP) for security Security risk assessment Security zones Physical inspections / security patrols Delivery of goods / holding area Entry control of individuals Badges and key management Security monitoring Security incident reporting Facilities Maintenance The importance of maintenance Maintenance definitions Maintenance operations procedures (MOP) Service reports Spare management Tools Housekeeping Data Centre Operations Shift handover Walk around duties Service management Release management Configuration management Floor management Equipment life cycle management Monitoring/Reporting/Control Monitoring requirements Facilities monitoring matrix Sensor / alarm point testing and calibration Notification matrix Escalation requirements Reporting Project Management Project management Project organization Project manager Initiation Planning Execution Monitor and control Closing Evaluation / lessons learnt Environmental Sustainability The importance of sustainability Environmental standards Power efficiency indicators Energy saving best practises Water management Sustainable energy usage Governance and Compliance The importance of document management The siz sub-processes of document management Asset management Requirements or asset recording Exam: Certified Data Centre Facilities Operations Specialist (CDFOS©) Certification exams are administered at the end of the course. The exam is a 90-minute closed book exam, with 60 multiple-choice questions. The candidate requires a minimum of 42 correct answers to pass the exam. Online exam results are known immediately and paper-based exam results will be known within one week. Additional course details: Nexus Humans Certified Data Centre Facilities Operations Specialist (CDFOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Facilities Operations Specialist (CDFOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Inclusion Facilitation (IF) is an approach to enhancing the inclusion, in a mainstream community of any child or young person who is experiencing difficulties in the world because of disability, personal crisis or because of their challenging behaviour towards others. The IF approach works by mobilising the young person’s natural supports to provide support and engage with the person in difficulty. Inclusion Facilitation is designed to create a better life for an individual by the provision of an intense input designed to being about social change. This usually entails a series of visits focused on getting the person out and about to increase confidence, social skills and presence in their local community and to pursue goals and dreams. Uniquely, the work is carried out under the close clinical supervision of a practicing psychologist. What is Inclusion Facilitation Work? ‘We do whatever it takes!’ Usually a Person Centred Planning event would be carried out using the PATHor MAP process – majoring on dreams and goal setting leading to precise action planning. An experienced psychologist alongside the inclusion facilitator would carry out a PATH. A large graphic will be one of the outcomes of the meetings this is a great visual record and a shared memory of the event. This will also inform the priorities for the inclusion facilitation work Optionally following the PATH event a ‘scoping report’ is created outlining what Inclusion Facilitation could offer and highlighting what dreams and goals the individual has. The PATH is also provides a good opportunity for the Facilitator to meet the focus person in a comfortable positive environment. 12 weekly visits from the Inclusion Facilitator followed by 5 monthly visits is our preferred model but we can be flexible with the delivery of this input. This is just a guideline, however we have received good results using this time frame. After this intensive input the Inclusion Facilitator will hand over to the existing family, carers and PA team to carry on where he or she has left off. This transition time is planned from the outset. An experienced psychologist is there to support the facilitator at all times and will guide all work done by the inclusion facilitator. Is this just Support work? No! This is proactive engagement – doing whatever is required. We are not just passively or reactively providing what is asked for – we are actively pursuing a good life for the individual. Our work is built on careful research around a person’s interests and what opportunities exist locally. We carry out community mapping. We actively work to tackle an individual’s own resistance and reluctance to engage more socially. We actively engage with people in social settings that the individual attends to build bridges and connections – we are bridge builders. We build circles around a person. We create the conditions in which friendships can flourish. We have direct psychological supervision and support throughout. This work is short term and intense. Enjoy participating in a multimedia workshop that will challenge, entertain and reach for your emotions. Learning Objectives 1.To be able to understand the values and wider context of inclusion. 2.To be able to set up and run an ‘Inclusion Facilitation project to improve the life chances and connections of a child or young person. 3.To understand and be able to maximise the power of the peer group in supporting relationships, achievement and behaviour. Course Content The course answers the questions: What do you do with the child who is isolated by their aggression and anger, through being different, disabled or new to the school or community? Practically how do we go about including high profile children or young people? How can we help some children be friends? We will cover: Inclusion values underpinning this work The Intentional Building of Relationships –‘Inclusion Facilitation’ work as an example Not doing it alone – The Importance of Teams in developing inclusive practice Practical setting up and running of IF work Lessons learned Stories of IF work
Peer mediation is an approach to impacting on conflict resolution and bullying in primary and secondary schools by training pupils to be mediators or ‘counsellors’. This well proven, highly effective method of impacting on school based bullying is still viewed by some as radical. In this workshop participants are introduced to the key components of successful schemes. Our trainers have first hand experience of setting up school based schemes and sustaining these over time. Peer Mediation Training Guide Online Course now available via Teachable Platform – Peer Mediation Learn at your own pace… lots of text and video support Course Category Peer Support Description Peer mediation or peer counselling is an approach to impacting on bullying in primary and secondary schools by training pupils to be ‘Peer Mediators’ or ‘counsellors’. This well proven, highly effective method of impacting on school based bullying is still viewed by some as radical. We can provide training for staff or direct training with students across the age range – typically delivered over 6 short high impact, interactive learning workshops. For staff training, participants are introduced to the key components of successful schemes. Our trainers have first hand experience of setting up school based schemes and sustaining these over time. Enjoy participating in a multi media workshop that will challenge, entertain and reach for your emotions. Watch young people doing their stuff! Testimonials Thank you for the course – I really enjoyed it Learning Objectives To be able to understand the values and wider context of peer support To be able to set up and run a peer counselling scheme to reduce bullying To understand and be able to maximise the power of the peer group in supporting relationships, achievement and behaviour change Who Is It For ? Year 5 or Year 10 pupils Primary and secondary teachers Heads and Deputies SENCOs Learning Support and Guidance staff Advanced Skills Teachers Parents Local Authority Support Services Community Development workers Early Years and School based Practitioners Course Content The course answers the questions : What do you do with major bullying problems in school? Practically how do we go about recruiting and training pupils as counsellors? Will pupils be hurt if we involve them with bullies? Key Themes covered within the direct student training as well as in the staff development sessions- include: Issues of Confidentiality Welcoming your ‘client’ Using active listening skills Using Open and Closed Questions to enable your client to tell you his or her story How to reflect back feelings and how to check you have understood what the client has told you Exploring options for resolving the bullying issue with your client This video gives a brief taster of the work in a Nottingham Primary school. If you liked this course you may well like: PEER SUPPORT AS AN ANTI-BULLYING STRATEGY AT LOCAL AUTHORITY LEVEL
In this practical and engaging workshop there is input on team building, problem solving as a team, improving communication and handling conflict. This is participatory day of paper, pens, graphics, music and activity. There are no PowerPoint slides or even a projector and screen! Course Category Team Building and Leadership Early Years Inclusion Description Want a really creative, effective, inclusive team? In this practical and engaging workshop there is input on team building, problem solving as a team, improving communication and handling conflict. This is participatory day of paper, pens, graphics, music and activity. There are no PowerPoint slides or even a projector and screen! We keep the focus on interpersonal processes for getting the best out of the team. Making teams both creative and inclusive is fully explored and processes for maximising this examined. Effective leadership and management, which can transform teamwork through collaboration and consensus-building processes is covered. We refocus the team on its capacities and gifts as well as give insights into what to do when individuals are off track. The Native American medicine wheel guides us through four quadrants of leadership, vision, community and management.Harrison Owen in his work on ‘Open Space Technology’ depicts the ancient Medicine Wheel (Owen, 2003). This is derived from centuries of tradition among First Nation Americans and has informed many cultures in different ways. We have found this an extremely powerful metaphor for understanding the process of team and organisational change and renewal. The wheel of change begins in the north with a leading idea, for us – there is a better way of creating a team for inclusion. Travelling clockwise to the east we develop a shared vision of what this could look like in our setting, school or community. Then moving south we ask who needs to come with us on the journey. We wish to take as many community members along with us as we can. In an Early Years setting , this would mean enrolling the support of manager, the wider staff group, parents and ultimately children. Finally, at the west, we manage and implement the idea. We take action and turn the inclusive team into reality. The cycle of this medicine wheel is an excellent way to view change processes for any team, organisation or community. When we contemplate change, the risk is always that we will jump prematurely from the big ideas (leadership) to practice (management) and ignore the other two important phases of creating vision and engaging the wider community. When the going gets tough and the inclusion of a child or young person is beginning to seem extremely difficult if not impossible many will conclude that the child should no longer be present. We would like to challenge this. Why do we move so quickly to assuming the child is in the wrong place? Surely the real question should not be ‘do they belong here?’ – but rather – ‘what team support is needed here for this to work?’ Or even more fundamental, ‘who needs a team around them at this time?’ Who needs the team? Who is struggling with the inclusion most? Is it the young person, their practitioner or teacher, their headteacher, setting manager, their parent or even a member of the local support services? Whatever the answer a team may need to be built, rallied or reformed. The nature of and number of that team will depend upon the situation. Diversity of membership will most surely be important to strengthen the quality of the support and of the ideas generated. Use radical rethinking when creating a new team or when revitalising an existing one. Creating effective teams for inclusion requires a courageous capacity for understanding and nurturing change both within the team and with those who the team work with. Testimonials ‘What a fun, enjoyable day its been. Motivating and made me laugh not fall asleep!’?? ‘This was everything a team building day was supposed to be. I have learned a lot about the people I work with and my role within the organisation’ ‘I had reservations about attending yet another team building day but this was executed by two great facilitators and they worked with us so we truly understood what we were thinking and feeling.’ ‘Innovative and refreshing’ Learning Objectives Empowerment of team players Deepened insights into team processes Practical strategies for team building learned Processes for enhancing creativity of team members explored Celebration and recognition of existing strengths and talents Who Is It For ? Any team Course Content This course answers the following questions: How can we re-energise our team? How can we make our team more inclusive? What tools can we use to work creatively in our team? We work around the ancient medicine wheel as it guides us through the four processes of leadership, vision, community and management. We place leading ideas in front of your team including ‘no kvetching’ and shared promises. We create a shared vision of how your team would love to be. We explore who the team is. When are they at their best? What happens when someone is off track? What do they really need? How do we take the community with us at a time of change? Finally we look at the management role of the team. Getting things done together. We use problem solving together as our focus for this. Finally your team will be asked to reflect. What has the training meant to them? If you liked this you may like: SUPPORT AND SUPERVISION FOR LEADERS
Certificate in Business and Commercial Law (CBCL) - Virtual Learning Why Attend This course is designed for professionals with little or no prior legal background but who are required to make organizational decisions involving legal matters. It will provide participants with the fundamental principles of commercial law, including commercial contracts and negotiation, sale of goods, intellectual property rights and employee relations. It also covers all the legal aspects of setting up a business, running a business and closing a business Participants will gain an in-depth understanding of international commercial law with emphasis on the common law system. Participants will have the opportunity to learn and analyze key legal issues regarding contracts and the business as a whole which they are likely to encounter within their organization. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises as well as regional and international case studies. Course Objectives By the end of the course, participants will be able to: Apply legal rules and principles to speciï¬c commercial situations through consideration of relevant case law Negotiate commercial contracts complying with commercial and legal requirements Increase proï¬tability within their organization by selecting appropriate methods of distribution of goods Recognize and analyze how intellectual property rights aï¬ect their organization Evaluate and modify organizational employment practices complying with labor law requirements Target Audience This course is suitable for those with little or no formal training in commercial law yet would be required to understand the fundamentals of commercial law as it may directly impact their work. It will particularly beneï¬t directors and executives who have direct responsibility for legal decisions within the organization. In-house council new to the region, and those working within a legal department, will also ï¬nd this course highly beneï¬cial. Target Competencies Drafting Contracts Contract Negotiation Understanding Commercial Terms Understanding Employment Law Implementing Organizational Employment Practices Understanding Intellectual Property Understanding corporate restructuring Understanding the effect of breach of commercial contract terms Note The Dubai Government Legal Aï¬airs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed ï¬rm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Aï¬airs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualiï¬es for 4 elective CLPD points. Overview of commercial & business law Areas of commercial and business law Types of commercial contracts Commercial contracts in the civil law and common law systems Sources of English law Civil law v Common law Civil law in the GCC Formalities for a binding contract Elements required for an enforceable contract Rules for contract interpretation implied terms v express terms identifying risks and how to minimise risks Structure of a commercial contract Preliminary documents in international transactions Memorandum of Understanding/ Heads of Terms. Are they legally binding? Commercial implications Boilerplate/ miscellaneous provisions- the important but forgotten clauses- beware! Force majeure v Frustration Notices Set oï¬ No waiver Entire Agreement/ non- reliance clause Times is of the essence Assignment v Novation Governing law Common mistakes in choice of law Jurisdiction clause Exclusive v Non-exclusive Factors in deciding the jurisdiction clause International dispute resolution Litigation Importance of Alternative Dispute Resolution (ADR) Arbitration Mediations Conciliation Negotiation Remedies for breach of contract Damages Specific performance Injunctions Advantages and disadvantages of different business forms Types of business vehicles Sole trader Partnerships Limited Liability Partnerships Companies Cross Border Transactions Distributorship Agency Joint Venture Acquisitions Share purchase v Business purchase Apportioning risks and liabilities through warranties and indemnities Negotiating warranties and indemnities Corporate insolvency Tests identifying insolvency Consequence for directors who fail to react to insolvency Types of insolvency Administration Receivership Creditor Voluntary Liquidation Compulsory Liquidation Commercial Tort Tort of negligence Defamation Libel Slander Recent case law on defamation Managing risk Prevention is better than cure: Eï¬ective risk management Intellectual Property Rights management Types of Intellectual Property copyright trademark patent design rights confidential information Assignment v Granting a license The law of passing off Intellectual Property in the GCC Employment law issues in the common law systems and the GCC Types of employment contracts Grounds for dismissal Wrongful dismissal Redundancy Unfair dismissal Commercial real estate in the GCC Leasehold Freehold
Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. Identifying the Need for Security in Your Software Projects Identify Security Requirements and Expectations Identify Factors That Undermine Software Security Find Vulnerabilities in Your Software Gather Intelligence on Vulnerabilities and Exploits Handling Vulnerabilities Handle Vulnerabilities Due to Software Defects and Misconfiguration Handle Vulnerabilities Due to Human Factors Handle Vulnerabilities Due to Process Shortcomings Designing for Security Apply General Principles for Secure Design Design Software to Counter Specific Threats Developing Secure Code Follow Best Practices for Secure Coding Prevent Platform Vulnerabilities Prevent Privacy Vulnerabilities Implementing Common Protections Limit Access Using Login and User Roles Protect Data in Transit and At Rest Implement Error Handling and Logging Protect Sensitive Data and Functions Protect Database Access Testing Software Security Perform Security Testing Analyze Code to find Security Problems Use Automated Testing Tools to Find Security Problems Maintaining Security in Deployed Software Monitor and Log Applications to Support Security Maintain Security after Deployment
Introduction to Virtualization course description A comprehensive tour of virtualization. The course concentrates on the actual technologies involved as opposed to any one vendor solution. What will you learn Explain the concepts of virtualization. Partition servers. Create Virtual Machines. Introduction to Virtualization course details Who will benefit: Anyone looking for an introduction to Virtualization. Prerequisites: None. Duration 2 days Introduction to Virtualization course contents Virtualization Concepts What is Virtualisation? What are virtual machines (VMs)? Virtualisation Landscape. Network Virtualisation. Suitability for Organisations. Advantages of deploying Virtualisation. Downsides of deploying Virtualisation. Overview of Virtualisation products. Hypervisors What is a hypervisor? Difference between type 1 and 2 hypervisors. Available hypervisors. Hypervisors and device drivers. Hands on: Installing Oracle VirtualBox on Windows. Creating/Importing/Configuring VMs. Virtualization Hosts Hardware and resource requirements. Installation of the hypervisor. Hands on: Installing Hyper-V role into Windows Server. Creating/Importing/Configuring VMs. Virtual Machines Creating virtual machines. Resource requirements. Settings. Installation of the guest OS. Additional tools/ extensions for hypervisor integration. VM files and their uses. Virtual hard disk and their formats. Hardware pass through. Hands on: Connecting to VMWare ESXi via WebGUI and using ESXi to create/import/configure VMs. VM Snapshots/Checkpoints What is a snapshot? How to use them and how they impact performance? Creating/deleting/merging of snapshots. Hands on: Using ESXi to create/manage snapshots. Command Line use on the Hypervisor Interacting with the hypervisor through the command line. Simple commands to configure the hypervisor and VMs. Simple scripts. Hands on: Connecting to VMWare ESXi via PowerCLI to manipulate VMs and snaphshots. Virtualization Storage Different types of storage: local vs remote. Local and remote storage technologies. Configuring storage. Hands on: Using ESXi to deploy VMs on remote NFS storage. Virtual Networking How is networking done in virtualization environments. What is a virtual switch and vNIC and what are their performance characteristics? NIC teaming and trunking in the virtual world. Port groups and isolation. Physical NICs and their use in virtual switches. Hands on: Using ESXi to create and configure vswitches and networking. Templates and clones What is a template? What is a clone? When to use templates and clones to optimize VM deployment. Migrating/Importing VMs What is migration? Migrating compute and storage. Importing VMs from files or physical machines. Hands on: Using VMWare vCenter Server to clone/ template/migrate VMs, tag resources, create local user accounts and assign permissions. VMs and Backups Taking backups of your VMs. Restoring your VMs from backups. Virtualization and Licensing Different licensing models and costs. Containerization Concepts What is a container and how is it different from a virtual machine. When to use containers. Docker and Kubernetes
Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies, are using AWS to lower costs, become more agile, and innovate faster.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is someone who works, or has ambition to work, in a leadership role in data center operations such as a data center facilities manager, data center operations manager, who has the responsibility to achieve and improve the high-availability and manageability of the data center operations. Overview After completion of the course the participant will be able to: Perform the needs analysis translating business requirements to data center services Set-up and manage the data center operations team Implement and monitor safety- and security practices Identify a suitable maintenance program for the data center facility and its equipment Select the appropriate policies and procedures required for data center operations Monitor the data center availability, capacity and capability Manage and implement basic data center projects Set-up and implement an environmental sustainability program Select an appropriate back-up site to support organizational resilience Identify and respond to risk in the data center Manage and support the document life cycle Create a basic budget proposal Select and manage vendors and measure their performance Manage data center assets Managing the facilities of today?s high-end and high-availability data centers is an extremely demanding and complex task which is often underestimated. There is often very little appreciation and understanding of the complexities of managing today's mission-critical data centers where downtime is not an option, especially since many of the data centers are operating at, or near, their design limits. Operations management at the facilities layer makes all the difference. Even a data center designed to the highest redundancy level as per the ANSI/TIA-942 standard could still experience many unscheduled downtime events due to poor planning, operations, maintenance and management processes. Service Level Management Service Level Management Needs analysis Capability assessment Service portfolio Service catalogue Service Level Agreements (SLAs) Availability measurement Data points in SLA Service reporting Complaint procedure Customer satisfaction measurement Service Improvement Process (SIP) SLA content The Data Center Organization Operational issues Organization chart Roles and responsibilities Skills matrix Contingency / backup roles Shift management Performance management Career development Training and assessment Job rotation Succession planning Disciplinary program Managing Safety & Statutory Requirements Safety policies and regulations Occupational Health and Safety (OH&S) Safety awareness training Permit to Work (PTW) Lock-out / Tag-out Personal Protective Equipment (PPE) Testing and tagging of equipment Emergency preparedness and response Reporting of safety issues Reviews / internal audit / external audit Managing Physical Security Security policies and procedures Security standards and guidelines Security staff Security awareness Security incident management Disciplinary program Reviews, internal and external audits Facilities Management Maintenance policies and procedures Various maintenance programs Outsourcing of maintenance activities Maintenance contract options Warranty Maintenance schedule Service situations Spart part management Contamination control Data Center Operations Policies and procedures for data center operations Service operations and the daily data center operations Monitoring / Reporting / Control Monitoring requirements Escalation procedures Reporting Trend analysis Reviews Project Management Project management Project organization Project manager Project phases Environment Sustainability The importance of sustainability Sustainability policies Environmental management Power efficiency indicators - Waste management - Water management ICT utilisation management Environmental performance measurements Renewable energy factor (REF) Organizational Resilience Business continuity Data center facility options Business Impact Analysis Type of facility Human resources Facility, equipment and consumables Governance, Risk and Compliance Management commitment Coordination, collaboration and integration Compliance Risk management Document management Financial management Vendor management Asset management Additional course details: Nexus Humans Certified Data Center Facilities Operations Manager (CDFOM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Center Facilities Operations Manager (CDFOM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.