Learn everything you need to know to be fully competent with Mac iOS. This syllabus takes you around the basics and then on another deep dive into all the elements. Discover things you never knew and speed up your experience using Mac iOS. Module 1: Introduction to Mac iOS and Hardware • Understanding the Mac ecosystem • Overview of Mac hardware components • Navigating the Mac interface Module 2: Mac Operating System (macOS) • Exploring the macOS interface • Customizing system preferences • File management and organization on macOS Module 3: Essential Mac Apps • Using Safari for web browsing • Effective web searching using search engines • Email management with Apple Mail • Calendar and task management with Apple Calendar Module 4: Software Installation and Updates • Installing and updating software applications • Managing and uninstalling programs • App Store and app installations Module 5: Productivity and Collaboration • Using iCloud for cloud-based storage and collaboration • Working with Notes, Reminders, and Messages • Collaborative document editing with iWork Module 6: Multimedia and Creativity • Basic image editing with Photos and Preview • Music creation with GarageBand • Creating multimedia presentations with Keynote Module 7: Troubleshooting and Maintenance • Identifying and resolving common Mac issues • Using Activity Monitor for performance monitoring • Maintenance tasks for macOS Module 8: Mac Security and Privacy • Overview of Mac security features • Online safety and privacy best practices • Protecting personal data and devices Module 9: Advanced Mac Features • Customizing the Dock and Menu Bar • Using Siri for voice commands and search • Continuity features for seamless device integration Module 10: Using AI and Chat GPT • Introduction to AI and Chat GPT technology • Exploring AI-powered features on Mac • Using Chat GPT for productivity and assistance Module 11: Browsing and Search Engines • Effective use of web browsers on macOS • Utilizing search engines for research • Online safety and privacy while browsing Module 12: Cybersecurity • Understanding cybersecurity threats • Protecting against malware and phishing attacks • Secure online practices and password management Module 13: Software Installation and Factory Reset • Installing and updating software applications • Factory resetting a Mac device • Data backup and recovery during resets Module 14: Final Projects and Assessment • Culminating projects showcasing Mac iOS skills • Practical exams assessing Mac software knowledge and skills • Preparing for industry-recognized certifications (optional) Please note that the duration and depth of each module can vary depending on the level of expertise required and the specific needs of the learners. Additionally, it's important to adapt the curriculum to the learners' proficiency levels, whether they are A Level/GCSE students or adult learners with different experience levels.
Duration 5 Days 30 CPD hours This course is intended for Tier 1 Operators, administrators, and architects for VMware Horizon Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of VMware Horizon Define a use case for your virtual desktop and application infrastructure Use vSphere to create VMs to be used as desktops for VMware Horizon Create and optimize Windows VMs to create VMware Horizon desktops Install and Configure Horizon Agent on a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure and manage the VMware Horizon Client systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the VMware Horizon environment using the VMware Horizon Console Dashboard and Horizon Help Desk Tool Identify VMware Horizon Connection Server installation, architecture, and requirements Describe the authentication and certificate options for the VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access⢠and Horizon 8 Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in Horizon 8 Discuss scalability options available in Horizon 8 Describe different security options for the Horizon environment This five-day course gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon Introduction to Use Case Convert customer requirements to use-case attributes Define a use case for your virtual desktop and application infrastructure vSphere for VMware Horizon Explain basic virtualization concepts Use VMware vSphere© Client? to access your VMware vCenter System and VMware ESXi? hosts Create a Windows virtual machine using vSphere Create Windows Desktops Outline the steps to install Horizon Agent on Windows virtual machines Install Horizon Agent on a Windows virtual Machine Optimize and prepare Windows virtual machines to set up Horizon desktop VMs Create Linux Desktops Create a Linux VM for Horizon Install Horizon Agent on a Linux virtual machine Optimize and prepare Linux virtual machines to set up Horizon desktop VMs Creating and Managing Desktop Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access the Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of Remote Desktop Session Host farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Monitor the performance of the remote desktop using the Horizon Performance Tracker Horizon Connection Server Recognize the VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD LDS database as a critical {an important component?} component of the Horizon Connection Server installation Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe the BLAST Display Protocol Codecs Summarize the BLAST Codec options List the ideal applications for each BLAST codec Describe the BLAST and PCoIP ADMX GPO common configurations Graphics in Horizon Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a Horizon environment Securing Connections: Network Compare tunnels and direct connections for client access to desktops Discuss the benefits of using Unified Access Gateway List the Unified Access Gateway firewall rules Configure TLS certificates in Horizon Securing Connections: Authentication Compare the authentication options that Horizon Connection Server supports Restrict access to the Horizon remote desktops using restricted entitlements Describe the smart card authentication methods that Horizon Connection Server supports Explain the purpose of permissions, roles, and privileges in VMware Horizon Create custom roles Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a Horizon environment Configure a load balancer for use in a Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication. Explain Horizon Cloud Pod Architecture scalability options Horizon Cloud and Universal Broker Recognize the features and benefits of Horizon Cloud Service Use Universal broker to connect to a Horizon Cloud instance Configure and pair the Horizon Cloud Connector appliance with Horizon Connection Server Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the requirements to install and configure True SSO in a Horizon environment Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon: Deploy and Manage [V8.8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon: Deploy and Manage [V8.8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This is suitable for anyone managing teams or looking to manage teams in the future. Using the participants own experiences we will look at what drives team effectiveness and the traits of High Performing Teams.
Learn everything you need to know to be fully competent with Window OS. This syllabus takes you around the basics and then on another deep dive into all the elements. Discover things you never knew and speed up your experience using Windows OS. Module 1: Introduction to Windows OS • Understanding the Windows operating system • Navigating the Windows interface • Customizing system settings and preferences Module 2: File Management • Managing files and folders in Windows Explorer • Copying, moving, and renaming files • Using the Recycle Bin and data recovery Module 3: Windows Built-in Apps • Using Microsoft Edge for web browsing • Effective web searching using search engines • Email management with Windows Mail • Calendar and task management with Windows Calendar Module 4: Software Installation and Updates • Installing and updating software applications • Managing and uninstalling programs • Windows Store and app installations Module 5: Microsoft Office Basics • Introduction to Microsoft Office suite • Using Microsoft Word for document creation • Basic spreadsheet management with Microsoft Excel Module 6: Microsoft Office Intermediate Skills • Advanced features in Microsoft Word • Creating and formatting spreadsheets in Microsoft Excel • Creating dynamic presentations with PowerPoint Module 7: Multimedia and Graphics • Basic image editing with Paint • Using Windows Photo app for photo management • Creating graphics with Paint 3D Module 8: Productivity and Collaboration • Using OneDrive for cloud-based storage and collaboration • Working with Windows Sticky Notes and To-Do • Collaborative editing with Microsoft Office Online Module 9: Troubleshooting and Maintenance • Identifying and resolving common Windows issues • Using Task Manager for performance monitoring • Maintenance tasks for Windows OS Module 10: Windows Security and Privacy • Overview of Windows security features • Online safety and privacy best practices • Protecting personal data and devices Module 11: Advanced Windows Features • Customizing the Windows Start Menu and Taskbar • Using Cortana for voice commands and search • Virtual desktops and advanced multitasking Module 12: Using AI and Chat GPT • Introduction to AI and Chat GPT technology • Exploring AI-powered features in Windows • Using Chat GPT for productivity and assistance Module 13: Browsing and Search Engines • Effective use of web browsers • Utilizing search engines for research • Online safety and privacy while browsing Module 14: Cybersecurity • Understanding cybersecurity threats • Protecting against malware and phishing attacks • Secure online practices and password management Module 15: Software Installation and Factory Reset • Installing and updating software applications • Factory resetting a Windows device • Data backup and recovery during resets Module 16: Final Projects and Assessment • Culminating projects showcasing Windows OS skills • Practical exams assessing Windows software knowledge and skills • Preparing for industry-recognized certifications (optional) Please note that the duration and depth of each module can vary depending on the level of expertise required and the specific needs of the learners. Additionally, it's important to adapt the curriculum to the learners' proficiency levels, whether they are A Level/GCSE students or adult learners with different experience levels.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for Collaboration engineers and administration professionals in job roles such as: Network administrator Network architect Network designer Network engineer Network manager Overview After taking this course, you should be able to: Analyze and troubleshoot SIP, H.323, and media protocols Implement time-of-day routing, call park, call pickup, and meet-me conferences in Cisco Unified Communications Manager Implement call coverage in Cisco Unified Communications Manager Configure and troubleshoot Cisco Unified Communications Manager Device Mobility Configure and troubleshoot Cisco Unified Communications Manager Extension Mobility Configure and troubleshoot Cisco Unified Communications Manager Unified Mobility Implement Cisco Unified Communications Manager Express for SIP phones Implement globalized call routing within and between Cisco Unified Communications Manager clusters Implement Media Gateway Control Protocol (MGCP) fallback and Survivable Remote Site Telephony (SRST) in Cisco Unified Communications Manager and in Cisco IOS XE gateways Implement Call Admission Control and Automated Alternate Routing (AAR) in Cisco Unified Communications Manager Implement URI calling in Cisco Unified Communications Manager for calls within a cluster and between clusters Troubleshoot multisite Cisco Unified Communications Manager deployments Implement Intercluster Lookup Service (ILS) between Cisco Unified Communications Manager clusters and enable General Data Protection Regulation (GDPR) Configure and troubleshoot Cisco Unified Border Element In this course, you will learn how to use Cisco© Unified Communications Manager features to consolidate your communications infrastructure into a scalable, portable, and secure collaboration solution. This course prepares you for the 300-815 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) concentration exam and CCNP-Collaboration certification. Course Outline Analyzing and Troubleshooting Signaling and Media Protocols Implementing Cisco Unified Communications Manager Supplemental Services Implementing Call Coverage in Cisco Unified Communications Manager Configuring and Troubleshooting Cisco Unified Communications Manager Device Mobility Configuring and Troubleshooting Cisco Unified Communications Manager Extension Mobility Configuring and Troubleshooting Cisco Unified CM Unified Mobility Implementing Cisco Unified Communications Manager Express Implementing Globalized Call Routing Implementing Remote Site Survivability Implementing Call Admission Control in Cisco Unified Communications Manager Implementing URI Calling in Cisco Unified Communications Manager Troubleshooting Multisite Cisco Unified Communications Manager Deployments Examining Global Dial Plan Replication Configuring and Troubleshooting Cisco Unified Border Element Lab outline Analyze SIP, H.323, and Media Protocols Troubleshoot SIP and Media Protocols Implement Cisco Unified Communications Manager Supplemental Services Implement Call Hunting and Call Queueing in Cisco Unified Communications Manager Configure Device Mobility Troubleshoot Cisco Unified Communications Manager Device Mobility Configure Cisco Unified Communications Manager Extension Mobility Troubleshoot Cisco Unified Communications Manager Extension Mobility Configure Cisco Unified Mobility Troubleshoot Cisco Unified Mobility Implement Endpoints in Cisco Unified Communications Manager Express Implement Endpoint Addressing and Call Routing in Cisco Unified Communications Manager Express Implement Calling Privileges in Cisco Unified Communications Manager Express Implement Hunt Groups, Call Park, and Paging in Cisco United Communications Manager Express Implement Globalized Call Routing Implement TEHO, PSTN Backup, and CoS in a Globalized Call-Routing Deployment Implement MGCP Fallback and Survivable Remote Site Telephony Implement Call Admission Control Implement a URI-Based Dial Plan for Multisite Deployments Troubleshoot Globalized Call Routing Troubleshoot Call Admission Control Implement Global Dial Plan Replication Implement Cisco Unified Border Element Troubleshoot Cisco Unified Border Element
Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Introduction to Menopause (via Zoom)Course Focus:This comprehensive two-day course serves as an invaluable introduction to menopause care within the primary care setting. Understanding menopause, its effective management, and the ensuing implications for women's well-being are pivotal aspects for healthcare practitioners, particularly practice nurses who frequently engage with women facing menopausal transitions during their consultations.Course Highlights:Understanding Menopause:Dive into the core concepts of menopause, grasping its multifaceted aspects, and gaining a deep understanding of its physical, emotional, and psychological dimensions.Effective Menopause Management:Explore optimal strategies for managing menopause, equipping practitioners to provide well-informed guidance to women traversing this life phase.Short and Long-Term Implications:Delve into the implications of menopause for women's well-being, both in the short and long term, enabling practitioners to offer holistic care that addresses immediate concerns and promotes long-term health.Tailored Approach for Practice Nurses and AHP's:Recognize the pivotal role of practice nurses and AHP's in menopause care, understanding the specific challenges they encounter during consultations with menopausal patients.Competency Framework for Progression:Access a comprehensive competency framework that empowers nurses to work towards mastery in menopause care. This framework can be validated by experienced team members, fostering ongoing skill development.Dynamic Learning Environment:Through interactive sessions, case studies, and discussions, participants will engage in a dynamic learning environment that facilitates the absorption of knowledge and practical insights. The course encourages networking and collaboration, enabling practitioners to learn from both expert facilitators and fellow participants.Learning Outcomes:Upon completion of this two-day course, participants will be equipped to approach menopause care with heightened confidence and competence. Whether they occasionally encounter menopausal patients or engage with them more regularly, practitioners will leave with the tools and strategies to provide informed and supportive care, positively impacting women's well-being during this transitional phase.Target Audience:This course is tailored for a diverse range of primary care practitioners, including practice nurses, cervical sample takers, and those who regularly engage with menopausal patients without specialized training. All practitioners seeking to enhance their expertise in menopause care are welcome to attend.Day One09.15Coffee and registration09.30Introduction and course objectives09.40Physiology and definitions10.00Menopause symptoms10.45Coffee11.00What do we need to ask?13.00Lunch14.00Management Strategies: Hormonal and non-hormonal treatment of menopause symptoms14.30Diet, Lifestyle and Exercise14.30Complementary therapies15.00Case Studies 15.30Action plan, evaluation, and resources15.45CloseDAY 209.15Coffee and registration09.30Review of Day 1 and tasks09.45Women with special needs10.00Contraceptive options for peri-menopausal women10.45Coffee11.00What do we need to ask?13.00Lunch14.00Which HRT when and how14.30The older woman15.00Case Studies 15.30Action plan, evaluation, and resources15.45Close
About this course This practical course will help primary teachers to understand the purpose of assessment in history and consider current best practice. We will explore ways of continuing to improve the quality of teaching and learning in history through effective assessment strategies. We will go through practical ideas and resources to enliven teaching and learning in history and provide opportunities for assessment. This course will provide guidance and support to help develop the accuracy of teacher judgements. During the course, we will look at examples of writing and outcomes from different schools and consider how these outcomes demonstrate progress and attainment in history. Outcomes • understand the purpose of assessment in history • consider current best practice • explore ways of continuing to improve the quality of teaching and learning in history through effective assessment strategies • explore practical ideas and resources to enliven teaching and learning in history and provide opportunities for assessment • provide guidance and support to help develop the accuracy of teacher judgements Course leader The course is led by Steven Kenyon. Steven is a member of the Historical Association’s primary committee, having worked as a primary school teacher and then Deputy Head Teacher between 2004 and 2018. He joined Lancashire Professional Development Service in April 2018 as a Teaching and Learning Consultant for Primary History and English. He works closely with Lancashire Archives to promote and develop local history work in primary schools. This year he is a judge for the Historical Association's Young Quills Awards.
Our Team Leader Programme is designed specifically for new & existing Team Leads & Managers in Healthcare, such as General Practice, Primary & Secondary Care. This programme gives delegates the opportunity to spend time with peers, gain new tools & techniques that enable them to develop & support their team effectively. Building confidence to be able to have more proactive & challenging conversations with team members, supporting managers and reducing escalation.
Join the Scrum.org accredited Live Virtual Class - Professional Scrum Master 2 (PSM II). This is an advanced scrum master training course - designed for experienced Scrum Masters seeking professional growth. Course Description This advanced Professional Scrum Master (PSM II) qualification is designed to elevate you to a level of total Scrum mastery. Deepen your understanding of the Scrum framework and Agile practices while transforming your team into an Agile powerhouse. Gain the skills to teach Agile and support your organisation, regardless of your role. Whether you aim to lead Agile transformation within your organisation or progress your Agile career, this advanced Scrum mastery course is your ideal opportunity. Our Scrum.org certified advanced professional scrum master training course is delivered by industry experts with unrivalled interactivity. We combine real world experience with industry leading practicals that embed key principles. The PSM 2 course if focussed on developing practical skillsets and best practice implementation to achieve tangible results. Through these tried and tested learning techniques, Fractal Systems delivers a 98% first-time pass rate. Learn how to become an advanced Scrum Master: Understand how Scrum principles and values guide decision-making. Enhance servant-leadership abilities. Support Development Teams and Product Owners to improve effectiveness. Foster a conducive environment for successful Scrum Teams with greater agility. Gain tips and techniques for collaboration with the organisation. Improve overall organisational impact as a successful Scrum Master. Address team conflict and remove impediments. Communicate the significance of a "Done" Increment. Grasp how to support the Scrum Team and navigate middle management challenges. Why Train With Us? This immersive two day PSM II course prioritises your growth and success in the industry. We believe in hands-on learning experiences that deliver practical applications that are specific to your individual workplace challenges. This not only helps to frame key principles of an advanced Scrum Master but also enables you to have a more immediate impact in your role. The PSM II training course is led by our Scrum Trainers, all of which have real world industry experience. Gain a deep understanding of advanced Scrum theory, empower your Scrum teams with best practices and be supported by industry professionals throughout - from passing test to implementing learnings into your role. Who Should Attend This Course? The Professional Scrum Master II course is an advanced program tailored for experienced Scrum Masters with a deep understanding of the Scrum framework. We recommend this to individuals with at least one year of Scrum Master experience. Your Professional Scrum Trainer Meet Jay, the founder of Fractal Systems and an experienced Professional Scrum Trainer. With over 20 years in leadership and team roles, Jay excels in delivering practical value. He adopts an interactive teaching style, avoiding PowerPoint in favour of engaging, experience-based learning, using techniques from Liberating Structures and Neuro-Linguistic Programming. Jay specialises in business transformations, providing training, mentoring, coaching, and consulting to drive success through teamwork. For those pursuing the Professional Scrum Master II (PSM II) certification, Jay and the Fractal team are committed to supporting your learning journey with a range of valuable resources: Complimentary Scrum Resource Bundle Access to a PSM Exam Simulator Free PSM II Exam Coaching Sessions Personalised 1:1 Coaching At Fractal Systems, our goal is to ensure you have the support and resources needed for a successful PSM II learning experience. Our Clients Our Testimonials