Project Management Fundamentals: In-House Training Many projects are performed by highly competent and effective people who have little or no project management training. They perform projects like process improvement, marketing campaign development, new product development, event planning and production, and other 'tasks' which are projects. Project Management Fundamentals (PMF) is designed to support those people who need a solid foundation in project management, without being unnecessarily burdened to learn it while on the job. The course offers practical skills, concepts, and principles that can be taken back to the workplace, along with insights needed to adapt them to specific project environments. In today's environment, that means possibly adapting to Agile / Iterative methods. So, we have recently added key Agile concepts to provide a basic understanding of shifting towards agility. Since PMF's course goal is to achieve quality performance by learning effective planning and control, the focus is on a process orientation and an analytical, systems-oriented approach. Together, these frameworks promote project-related problem solving and decision-making skills necessary for real world projects. They honor project needs for collaboration, clear communications among people, and interpersonal and relationship skills. Recognition of these needs are woven throughout PMF, but are highlighted in two specific areas: Module 2 - People and Projects Module 8 - Executing, Communicating, and Developing the Team What You Will Learn At the end of this program, you will be able to: Describe the value of strong project management Identify characteristics of a successful project and project manager Recognize how current agile / adaptive practices fit within project management Explore project management processes, including Initiating, Planning, Execution, Monitoring & Controlling, and Closing Utilize project management processes and tools, based on case studies and real-world situations Create an initial project plan Use standard project management terminology Foundation Concepts Project management and definitions Value and focus of PM Competing constraints and project success Project life cycles People and Projects People and projects overview The project manager The project team People and projects in organizations Initiating and Defining Requirements Initiating the project Developing the project charter Conducting stakeholder assessments Defining requirements Using the Work Breakdown Structure Defining the Work Breakdown Structure (WBS) Developing a usable WBS Using the WBS Managing Project Risk Making the case for risk management Overview to planning for risk Identifying risks Analyzing risks Planning responses to risks Implementing response and monitoring risks Considerations for adaptive environments Estimating Defining an estimate Estimating approaches Estimating practices Estimating cost Validating an estimate Scheduling Defining the scheduling process and related terminology Sequencing and defining dependencies Determining the critical path Considering schedule risks and optimizing the schedule Executing, Communicating, and Developing the Team From baseline to execution Project communications and stakeholder relationships High-performing teams Monitoring and Controlling Defining monitoring and controlling Viewing control through the competing demands lens Variance Analysis and corrective action (Earned Value) Considerations in adaptive environments Closing the Project Closing projects Focusing on project transition Focusing on post-project evaluations
Scrum Product Owner Exam Prep: In-House Training This workshop prepares you for the Scrum.org PSPO™ I certification. A voucher for the exam and the access information you will need to take the exam will be provided to you via email after you have completed the course. NOTE: If you have participated in any of IIL's other Scrum workshops, you can bypass this program and focus on reading/studying the Scrum Guide and taking practice exams from Scrum.org The Product Owner is responsible for maximizing the value of the product and the work of the Development Team. The Product Owner must be knowledgeable, available, and empowered to make decisions quickly in order for an Agile project to be successful. The Product Owner's key accountability is the Product Backlog. Managing, maintaining, and evolving the Product Backlog involves: Establishing a clear vision that engages the Development Team and stakeholders Clearly expressing Product Backlog items Ordering the items in the Product Backlog to best achieve the vision and goals Ensuring that the Product Backlog is visible, transparent, and clear to all Working with the Development Team throughout the project to create a product that fits the customer's need The Professional Scrum Product Owner™ I (PSPO I) certificate is a Scrum.org credential that enables successful candidates to demonstrate a fundamental level of Scrum mastery. PSPO I credential holders demonstrate an intermediate understanding of the Scrum framework, and how to apply it to maximize the value delivered with a product. They will exhibit a dedication to continued professional development, and a high level of commitment to their field of practice. Scrum.org does not require that you take their own sponsored or any preparatory training. However, training can facilitate your preparation for this credential. And this course is based on IIL's Scrum Product Owner Workshop, which is aligned with The Scrum Guide™. It will provide you with the information you need to pass the exam and IIL will make the arrangements for your online exam. You will be provided with an exam code and instructions, so that you can take the exam at your convenience, any time you are ready after the course. Passwords have no expiration date, but they are valid for one attempt only. See additional exam details on the next page. What you will Learn You'll learn how to: Successfully prepare for the Scrum.org PSPO I exam Identify the characteristics of a successful Product Owner Create a powerful vision statement Apply techniques to understand your customers and the market Manage and engage stakeholders Write effective user stories with acceptance criteria Utilize techniques to visualize and prioritize the Product Backlog Participate in the 5 Scrum events as the Product Owner Understand the Product Owner's role in closing a Scrum project Getting Started Introductions Workshop orientation Exam prep preview Fundamentals Recap Agile Manifesto, values, and mindset Product Owner characteristics Good vs. great Product Owner Product Ownership Product ownership Project vision Understand your customers and market Personas Stakeholder management and engagement The Product Backlog User Stories and Acceptance Criteria Preparing User Stories for a Sprint The Product Backlog Visualizing the Product Backlog Product Backlog Prioritization Technical Debt Sprint Planning and Daily Standups Sprint Planning Planning Poker Team Engagement Daily Standups Sprint Review, Retrospectives, and Closing Sprint Reviews Key Agile Patterns Retrospectives Closing the Project Summary and Next Steps Review of course goals, objectives, and content Exam prep next steps
Project Management Fundamentals for IT Projects: In-House Training A number of factors impact the new project manager's role within IT - for instance, the need to fully integrate IT into the business improvement process and the advent of distributed technology and Business Process Reengineering. As a result, the range of activities required of a new project manager has greatly increased, as well as the range of people with whom he or she interacts. This workshop enables you to minimize the problems inherent in managing a systems development project. What You Will Learn You'll learn how to: Articulate the benefit of using a project management methodology, processes, and various life cycles for IT projects Articulate on various standards and maturity models that provide benefits to performing organizations that manage IT projects Describe governance, gating, and the processes required for project origination Conduct a stakeholder analysis and describe its benefits throughout the project life cycle Gather good requirements, develop a work breakdown structure (WBS), and establish a baseline project plan Execute against the baseline project plan while managing change and configuration items Monitor and control the project activities using the baseline project plan and earned value management concepts Close the project by conducting scope verification, procurement audits, gathering lessons learned, archiving project records, and releasing resources Getting Started Course goal Course structure Course goals and objectives Foundation Concepts Key definitions and concepts Methodologies, processes, and project life cycles Project success factors and the benefits of standards and models Project Originating and Initiating Originating projects Initiating projects Planning Stakeholder Engagement and Resource Management Planning stakeholder engagement Planning human resources management Developing effective leadership skills Planning Scope and Quality Management Planning project scope Planning project quality Planning Schedule Management Planning project time Identifying schedule activities Sequencing schedule activities Estimating activity resources and time Developing project schedule Optimizing the project schedule Planning Risk and Cost Management Planning for project risks Planning project costs Estimating project costs Developing a project budget Planning Communication and Procurement Management Planning project communications Planning project procurements Project Executing, Monitoring and Controlling, and Closing Project executing Project monitoring and controlling Project closing
The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles. Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you. The CIPT certification also holds accreditation under ISO 17024: 2012 About This Course What will you learn? Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to pre-empt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal. This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice. MODULE 1: Fundamentals of Information Privacy Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. MODULE 2: Privacy in Technology Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments. Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams. Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle. Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them. Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data. Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection. Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use. Prerequisites There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. What's Included? 1 years membership of the IAPP Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees Who Should Attend? The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialists Accreditation Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.
In this course you will understand what mentoring is about, understand your roles in the process. Gain self-insight into your own interpersonal style and way of relating to others that may affect mentoring interactions.
Scrum Product Owner Workshop: In-House Training The Product Owner is responsible for maximizing the value of the product and the work of the Development Team. The Product Owner must be knowledgeable, available, and empowered to make decisions quickly in order for an Agile project to be successful. The Product Owner's key accountability is the Product Backlog. Managing, maintaining, and evolving the Product Backlog involves: Establishing a clear Vision that engages the Development Team and stakeholders Clearly expressing Product Backlog items Ordering the items in the Product Backlog to best achieve the Vision and goals Ensuring that the Product Backlog is visible, transparent, and clear to all Working with the Development Team throughout the project to create a product that fits the customer's needs The overall course goal is to support you in becoming an effective Product Owner. What you will Learn You'll learn how to: Differentiate between poor, good, and great Product Owner attributes, and their impact on the team, product, stakeholders, and the organization Engage your stakeholders by knowing your customers and market Develop an effective and value-driven Product Backlog Evaluate the Product Owner's role in Scrum's 5 events and team engagement Foundation Concepts Agile foundation Product owner role Product Ownership Product ownership Project vision Understanding your customers and market Personas Stakeholder management and engagement The Product Backlog Epics and user stories Preparing user stories for a sprint The product backlog Visualizing the product backlog Product backlog prioritization Technical debt Sprint Planning and Delivery Sprint planning The sprint Sprint Reviews, Retrospectives, and Closing Sprint reviews Key agile patterns Retrospectives Closing the project
Start your career as a Cyber Security Manager/ Engineer and earn upto £35,000/ Month Are you ready to be the first line of defence in the digital world? Ever dreamed of becoming the unsung hero who safeguards the virtual corridors of data and privacy? Welcome to our Cyber Security Job Placement course, a cutting-edge, comprehensive program designed not only to equip you with the crucial skills required in the fast-paced realm of cybersecurity but also to give you that much-needed edge in today's competitive job market. Our course promises more than just theoretical knowledge. By merging an industry-driven curriculum with real-world scenarios, we prepare you to tackle the most formidable security challenges. Our robust Career Support guarantees individualised mentorship and networking opportunities with the industry's top professionals. But the cherry on top? Our Job Ready Program - we don't just teach you how to fish; we ensure you catch your big one! So, are you ready to take the plunge into the exciting world of cybersecurity? Secure your future with us today because in our world, opportunity doesn't knock twice! Our mission is simple - to be your trusted partner every step of the way, from training to employment. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring IT Network Cyber Security, so we can help you get your foot in the door. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our IT Network Cyber Security Training Program today and start your journey to becoming a successful IT Network Cyber Security Manager/ Engineer! If you have any questions, you can contact us. We will be happy to provide you with all the information you need. Why Choose Our Cyber Security Engineer Job Placement Program? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our IT Network Cyber Security Training: One-On-One Consultation Sessions with Industry Experts: Gain invaluable insights and guidance from seasoned professionals who have thrived in the IT Network Cyber Security field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking Cyber Specialists. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Our aim is to maximise your employment prospects and provide you with a range of exciting opportunities to choose from. Interview Preparation: We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Money-Back Guarantee: Your satisfaction is our top priority. We are confident in the quality of our training and support, which is why we offer a 14-day money-back guarantee. Continuous Career Support: Our commitment doesn't end when you secure a job. We'll be there for you throughout your career journey, offering continued support and guidance. Whether you need advice on career advancement, assistance with new projects, or simply a friendly ear to share your achievements, we'll be your trusted partner for long-term success. Here are the courses we will provide once you enrol in the Cyber Security Engineer program: Course 01: Cyber Security Incident Handling and Incident Response Course 02: Cyber Security Advanced Training Course 03: Linux File System Course 04: IT Support Technician Course 05: Functional Skills IT Course 06: CompTIA Security+ (SY0-601) Course 07: CompTIA A+ (220-1001) Course 08: CompTIA A+ (220-1002) Course 09: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 10: Learning Computers and Internet Course 11: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 12: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 13: CompTIA Network (N10-007) Course 14: CompTIA PenTest+ (Ethical Hacking) Course 15: Cryptography These courses will help you to develop your knowledge and skills to become a successful Cyber Security Expert. Cyber Security Engineer Job Placement Program The Cyber Security Engineer Job Placement Program is completed in 9 easy steps: Step 1: Enrol in the Cyber Security Engineer Job Placement Programme Begin your exciting journey with us by enrolling in the IT Network Cyber Security program. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 15 premium courses related to IT Network Cyber Security. These courses will teach you the knowledge and skills required to become a successful Cyber Security expert. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3: Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the Cyber Security - IT industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in IT Network Cyber Security, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful career in IT Network Cyber Security begins with us. So enrol now in thisCyber Security Engineer Job Placement Program to kickstart or uplift your career! CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Cyber Security Engineer Job Placement Program Cyber Security Engineer Job Placement Program This Cyber Security Engineer Job Placement Program course is for individuals who are: IT professionals looking to specialise in cybersecurity. Graduates in computer science or related fields seeking entry into the cybersecurity domain. Career changers who are intrigued by the prospect of a career in the ever-evolving IT security field. Anyone interested in understanding how to protect systems and data from cyber threats. Requirements Cyber Security Engineer Job Placement Program No experience is required to enrol in Cyber Security Engineer Job Placement Program. Just enrol in the Cyber Security Engineer Job Placement Program & start learning. Career path Cyber Security Engineer Job Placement Program Cybersecurity Analyst: £30,000 - £50,000 Information Security Specialist: £45,000 - £65,000 Cybersecurity Engineer: £55,000 - £80,000 Cybersecurity Manager: £65,000 - £95,000 Cyber Security Manager £45,000 - £90,000 Cyber Security Trainee £24,000 - £35,000 Cyber Security Analyst £60,000 - £95,000 Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional, consultant and/or those who work in network cabling system design, implementation and operation. Overview With few exceptions, enterprises today rely on IT for the delivery of business-critical services - often directly to the end consumer. It is therefore vital that the mission-critical data centre is designed, maintained and operated with high-availability and efficiency in mind. Among all the facilities, network cabling is the foundation for the network and one of the major contributors to the availability of the data center.CNCDP© is a 2-day course designed to expose participants to in-depth knowledge in designing and installing the data network cabling system which includes key subject matters such as; technical standards, designing of different cabling sub-systems, calculation of material requirements, architecture, installation, testing and acceptance. Introduction to Structured Cabling System (SCS) Brief history of SCS Basic copper and fibre transmission Copper and fibre cabling Single and multimode fibre Step/graded index multimode fibre Difference between Commercial Wiring and data centre cabling Development of standards Role of standards ANSI/TIA 568 standard Common standards The new usage of cabling to support Smart building Horizontal and Administration - Commercial Building Standard diagram recap: ANSI/TIA-568 Functional elements and example Scenario A: Determine the number of work areas Scenario B: Determine the number of user locations Zone wiring Administration: Interconnect and cross-connect Angled and flat panels Creating a cabling schematic design Convert schematic into physical layout Calculating the material list Horizontal and Administration - Data Centre Standard diagram recap: TIA-942 Basic/Reduced/Typical data centre setup Traditional 3 layers network design/ Spine and Leaf network design Select termination hardware Administration design ToR/EoR/Spine & Leaf cabling design Network and cabling resiliency Create cabling schematic design for ToR/EoR Convert into patch panel/rack layout Calculate the material list for ToR/EoR Building Backbone - Commercial Building Backbone diagram Calculate the copper backbone requirements per Telecom Room (TR) Calculate the fibre backbone requirements per Telecom Room Summarize the building backbone requirements Recognised cables Backbone Patch panels The maximum backbone distances Create cabling schematic design Converting the schematic design into patch panel/ rack layout Building Backbone - Data Centre TIA-942 based backbone topology TIA-942 backbone requirements Recognised backbone cable ToR/EoR/Spine and Leaf Backbone distance estimation Resiliency of backbone cable routes Creating cabling schematic design Converting the schematic design into patch panel/ rack layout Field and Fusion Termination for fibre connectors Pre-terminated fibre trunk and copper cables Architectural Considerations ANSI/TIA569-D Cable pathway and spaces Common requirements for the rooms Definition of the rooms Entrance Room/Demarcation Ceiling and floor pathways types Cable trays/basket/ladder/conduit Inner duct/sleeve/slot Calculating of pathway size Cable run best practices Cable management/AIM Grounding and bonding Separation distance requirements for copper cabling to power cabling Fire stopping Fire rated barrier Fire rated jacket cable Campus / Outdoor Backbone Common campus cable installation and cable types : Aerial cable / Direct-buried / Underground in-conduit Outdoor cable installation planning Lightning / surge protection Approved ground for surge protector Creating a schematic diagram Converting a schematic into a physical layout Site Inspection and Testing Visual site inspection notes Installation common issues Copper testing standard Permanent link / Channel / Patch cord / MPTL testing configuration Fibre connectors Fibre testing standard Tier 1 & 2 certification Fibre link definition Fibre testing steps Fibre inspection and cleaning Calibrating the test sets - 3 methods Setting up mandrel for testing Fibre loss budget calculation G.657 Bend insensitive fibre Optical Time-Domain Reflectometer (OTDR) Exam - Certified Network Cabling Design Professional (CNCDP©) The exam is a 60-minute closed book exam, with 40 multiple-choice questions. The candidate requires a minimum of 27 correct answers to pass the exam. Additional course details: Nexus Humans Certified Network Cabling Design Professional (CNCDP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Network Cabling Design Professional (CNCDP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is suitable for IT personnel who are just beginning to work with Azure. This audience wants to learn about our offerings and get hands-on experience with the product. This course primarily uses the Azure portal and command line interface to create resources and does not require scripting skills. Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator. This course combines lecture, demonstrations, and hands-on labs. This course will also help prepare someone for the AZ-900 exam. This course will provide foundational level knowledge on cloud concepts; core Azure services; and Azure management and governance features and tools. Prerequisites There are no prerequisites for taking this course. Familiarity with cloud computing is helpful, but isn't necessary. 1 - Describe cloud computing What is cloud computing Describe the shared responsibility model Define cloud models Describe the consumption-based model 2 - Describe the benefits of using cloud services Describe the benefits of high availability and scalability in the cloud Describe the benefits of reliability and predictability in the cloud Describe the benefits of security and governance in the cloud Describe the benefits of manageability in the cloud 3 - Describe cloud service types Describe Infrastructure as a Service Describe Platform as a Service Describe Software as a Service 4 - Describe the core architectural components of Azure What is Microsoft Azure Get started with Azure accounts Describe Azure physical infrastructure Describe Azure management infrastructure 5 - Describe Azure compute and networking services Describe Azure Virtual Machines Describe Azure Virtual Desktop Describe Azure Containers Describe Azure Functions Describe application hosting options Describe Azure Virtual Networking Describe Azure Virtual Private Networks Describe Azure ExpressRoute Describe Azure DNS 6 - Describe Azure storage services Describe Azure storage accounts Describe Azure storage redundancy Describe Azure storage services Identify Azure data migration options Identify Azure file movement options 7 - Describe Azure identity, access, and security Describe Azure directory services Describe Azure authentication methods Describe Azure external identities Describe Azure conditional access Describe Azure role-based access control Describe zero trust model Describe defense-in-depth Describe Microsoft Defender for Cloud 8 - Describe cost management in Azure Describe factors that can affect costs in Azure Compare the Pricing and Total Cost of Ownership calculators Describe the Microsoft Cost Management tool Describe the purpose of tags 9 - Describe features and tools in Azure for governance and compliance Describe the purpose of Microsoft Purview Describe the purpose of Azure Policy Describe the purpose of resource locks Describe the purpose of the Service Trust portal 10 - Describe features and tools for managing and deploying Azure resources Describe tools for interacting with Azure Describe the purpose of Azure Arc Describe Azure Resource Manager and Azure ARM templates 11 - Describe monitoring tools in Azure Describe the purpose of Azure Advisor Describe Azure Service Health Describe Azure Monitor Additional course details: Nexus Humans AZ-900T00 Microsoft Azure Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-900T00 Microsoft Azure Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
During this training course, delegates will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. Based on practical exercises, you will learn audit techniques and become competent to manage an audit program, audit team, communication with customers, and understand reporting requirements. After acquiring the necessary expertise to perform this audit, you can sit for the exam and gain the "Certified ISO 13485 Lead Auditor' Certificate. By holding this Certificate, delegates can demonstrate that they have the competencies to audit organizations based on best practices. About This Course Learning Outcomes Review a Medical Devices Quality Management System based on ISO 13485 Acknowledge the correlation between ISO 13485 and other standards and regulatory frameworks Understand an auditor's role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011 Learn how to lead an audit and audit team Learn how to interpret the requirements of ISO 13485 in the context of a MDQMS audit Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011 Course Agenda Day 1: Introduction to Medical Devices Quality Management Systems (MDQMS) and ISO 13485 Day 2: Audit principles, preparation and launching of an audit Day 3: On-site audit activities Day 4: Closing the audit and final exam. Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final essay style exam, consisting of 12 questions, on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Prerequisites An understanding of ISO 13485 requirements and knowledge of audit principles. What's Included? Certification fees are included on the exam price Training material containing over 500 pages of information and practical examples will be distributed An attestation of course completion worth 32 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course. Who Should Attend? Auditors seeking to perform Medical Devices Quality Management System (MDQMS) certification audits Managers or consultants seeking to understand the Medical Devices Quality Management System audit requirements Individuals responsible for maintaining conformance with Medical Devices Quality Management System requirements Accreditation Provided by This course is Accredited by NACS and Administered by the IECB