Explore ITIL4 Foundation, a comprehensive course delving into modern IT service management practices. Learn key concepts, principles, and processes to enhance organisational efficiency and align IT services with business goals. About this course £519.00 153 lessons Accredited training Certificate of completion included Exam included Course curriculum Module 1 - Introduction1.1 Tutor Introduction1.2 Certifications1.3 Course Features1.4 Why ITIL? Module 2 - Key Concepts2.1 What is a Service?2.2 What is Utility?2.3 What is Warranty?2.4 What are Customers, Users and Sponsors?2.5 What is Service Management?2.6 Creating value with Services2.7 Value & Value Co-creation2.8 What is Value?2.9 Organisations and Stakeholders2.10 Service Providers2.11 Other Stakeholders2.12 Value: Outcome, Cost and Risk2.13 Figure, Balance, Outcomes, Costs, Risks2.14 Outputs and Outcomes2.15 Cost2.16 Risk - Part 12.17 Risk - Part 22.18 Utility & Warranty - Part 12.19 Utility & Warranty - Part 22.20 Services Offerings2.21 Services Relationship2.22 Service Provisions2.23 Services Relationship Model2.24 Goods, Resources & Actions2.25 Products & ServicesTest Your Knowledge Quiz Module 3 - Guiding Principals3.1 Guiding Principles - Introduction Part 13.2 Guiding Principles - Introduction Part 23.3 Guiding Principles - The Key Message is Discussed!3.4 Guiding Principles - Nature, Use & Interaction of the Guiding Principles3.5 Focus on Value - The Key Message Discussed!3.6 Focus on Value - The Service Consumer & What is their Perspective of Value3.7 Focus on Value - The Customer Experience3.8 Focus on Value - How to Apply the Principle!3.9 Start Where You Are - Key Message Discussed!3.10 Start Where Your Are - Assess Where You Are3.11 Start Where You Are - The Role of Measurement3.12 Start Where You Are - How to Apply the Principle!3.13 Progress Iteratively with Feedback - Key Message Discussed!3.14 Progress Iteratively with Feedback - The Role of Feedback3.15 Progress Iteratively with Feedback - Iteration & Feedback Together3.16 Progress Iteratively with Feedback - How to Apply the Principle3.17 Collaborate & Promote Visibility - Key Message Discussed! (Part 1)3.18 Collaborate & Promote Visibility - Key Message Discussed! (Part 2)3.19 Collaborate & Promote Visibility - Key Message Discussed! (Part 3)3.20 Collaborate & Promote Visibility - Whom to Collaborate with (Part 1)3.21 Collaborate & Promote Visibility - Whom to Collaborate with (Part 2)3.22 Collaborate & Promote Visibility - Communication for Improvement3.23 Collaborate & Promote Visibility - Increasing Urgency Through Visibility (Part 1)3.24 Collaborate & Promote Visibility - Increasing Urgency Through Visibility (Part 2)3.25 Collaborate & Promote Visibility - Increasing Urgency Through Visibility (Part 3)3.26 Collaborate & Promote Visibility - How to Apply3.27 Think & Work Holistically - Key Message Discussed! (Part 1)3.28 Think & Work Holistically - Key Message Discussed! (Part 2)3.29 Think & Work Holistically - Key Message Discussed! (Part 3)3.30 Think & Work Holistically - How to Apply the Principle3.31 Optimise & Automate - Key Message Discussed! (Part 1)3.32 Optimise & Automate - The Key Message Discussed! (Part 2)3.33 Optimise & Automate - The Road to Optimisation (Part 1)3.34 Optimise & Automate - The Road to Optimisation (Part 2)3.35 Optimise & Automate - How to Apply the Principle3.36 Keep it Simple and Practical - Key Message Discussed!3.37 Keep it Simple & Practical - How to Apply the Principle3.38 Principle InteractionTest Your Knowledge Quiz Module 4 - 4 Dimensions of Service Management4.1 Introduction4.2 The 4 Dimensions of Service Management4.3 Organisation & People (Part 1)4.4 Organisations & People (Part 2)4.5 Organisation & People (Part 3)4.6 Information & Technology (Part 1)4.7 Information & Technology (Part 2)4.8 Information & Technology (Part 3)4.9 Information & Technology (Part 4)4.10 Partners & Suppliers (Part 1)4.11 Partners & Suppliers (Part 2)4.12 Partners & Suppliers (Part 3)4.13 Partners & Suppliers (Part 4)4.14 Partners & Suppliers (Part 5)4.15 Partners & Suppliers (Part 6)4.16 Value Streams & Processes (Part 1)4.17 Value Streams & Processes (Part 2)4.18 Value Streams & Processes (Part 3)4.19 Value Streams & Processes (Part 4)Test Your Knowledge Quiz Module 5 - The Service Value System5.1 Introduction5.2 Describe the ITIL Service Value System (Part 1)5.3 Describe the ITIL Service Value System (Part 2)5.4 Describe the ITIL Service Value System (Part 3)5.5 Describe the ITIL Service Value System (Part 4)Test Your Knowledge Quiz Module 6 - Service Value Chain and the Service Value Stream 6.1 Learning Objectives 6.2 Service Value Chain Model 6.3 The Interconnected Service Value Chain "elements" 6.4 The Interconnected Service Value Chain "more" 6.5 The Interconnected Service Value Chain "Value Streams" 6.6 The Interconnected Service Value Chain "Steps" 6.7 Plan 6.8 Improve 6.9 Engage 6.10 Design & Transition 6.11 Obtain/Build 6.12 Deliver & Support Test Your Knowledge Quiz ITIL® is a registered trademark of AXELOS Limited, used under permission of AXELOS Limited. The swirl logo ™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.
This course follows a hands-on, project-based approach to learning the Arduino platform catered to all levels of experience, including some projects such as building an Arduino car, an Arduino phone, a Universal Arduino Remote, an Arduino Online Weather Station, an Arduino game projects using light, sound, and joysticks, and more with no prior knowledge.
Learn to build a complete Arduino project using a keypad, LCD, ultrasonic sensor, LDR sensor, and a buzzer
In today's world, IT security is more important than ever. With the ever-increasing threat of cyberattacks, businesses need to be able to protect their data and systems. And that's where you come in. If you're interested in a career in IT security, our IT Security Training program can help you get started. We offer comprehensive training in all aspects of IT security, from network security to application security to incident response. We also provide one-on-one career counselling and help you build your resume and network. But we don't just stop there. We also help you to find a job within six months of completing our program. That's right, we'll work with you until you find a job in IT security. So what are you waiting for? Enrol in our program today and start your career in IT security. Our mission is simple: to be your trusted partner and assist you every step of the way until you land the job of your dreams. Why Choose Us Here's what makes our IT Security Training Program stand out from the crowd: Personalised Job Search Assistance: We're in this together! Our dedicated team will work tirelessly to support your entire job searching process. From crafting a standout resume to submitting it to top companies, we'll ensure you have a compelling application that gets noticed. Expertly Crafted CV: Your resume is your ticket to the interview room. Our professional resume writers will create a customised CV highlighting your unique skills and experiences. This will maximise your chances of standing out among the competition. Strategic Placement: We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. One-On-One Consultation Sessions with Industry Experts: Gain invaluable insights and guidance from seasoned professionals who have thrived in the IT Security field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and finesse. Comprehensive Skill Development: Our program is designed to equip you with the most sought-after skills in the IT Security sector. From mastering cutting-edge tools to honing your IT prowess, we'll ensure you have the knowledge and expertise to excel in any IT-driven environment. Ongoing Support: We understand that the journey to landing your dream job doesn't end with placement. That's why our commitment to your success extends well beyond your initial training. Our support team will be available to answer your questions, provide guidance, and assist you as you progress in your career. Here are the 6 courses we will provide once you enrol in the program: Linux Security and Hardening CompTIA CySA+ Cybersecurity Analyst (CS0-002) CompTIA Security+ (SY0-601) Web Application Penetration Testing Course Computer Networks Security from Scratch to Advanced Cyber Security Incident Handling and Incident Response These courses will help you to develop your knowledge and skills to become a successful IT Security specialist. The Program is completed in 5 easy steps: Step 1 - Enrol in the program and start learning from the courses we provide After you enrol in this IT Security Training Program, you will get lifetime access to 6 premium courses related to IT Security. These courses will teach you the knowledge and skills required to become a successful IT Security expert. Our customer service team will help you and keep in contact with you every step of the way. Step 2 - Complete your courses and get certifications After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks for the first course and 80% for the rest relevant courses. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 3 - Get a consultation session from a professional IT security expert Take your IT Security skills to new heights with a one-on-one consultation session led by a seasoned professional. Gain invaluable insights, expert tips, and tailored advice that will propel your career forward. Step 4 - Complete the CV and attend the interview Once you've successfully obtained the certifications, our team of professionals will build you a compelling CV and LinkedIn profile. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Kickstart your IT Security career with a starting salary ranging from •30,000 to •50,000 annually. Step into the IT Security industry with the assurance of a promising future. Step 5 - We will not leave you until you find a job Our commitment to your success goes above and beyond. We won't stop until you land that dream job. With personalised support, expert guidance, and unwavering dedication, we'll be by your side until you secure the perfect opportunity. Your job search becomes our mission, ensuring you have the best chance at a successful career in IT Security. Don't let your dream career as an IT Security specialist remain out of reach. You just have to learn and gain knowledge and skills. Finding a job is our task! We will remove most of your worries and help you focus on only developing your skills. So join our IT Security Training Program today, and let us be your trusted partner on your journey to success. CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This IT Security Training program is ideal for the following: Aspiring IT professionals seeking to specialise in the field of cybersecurity. Individuals looking to transition into a rewarding career in IT security. Recent graduates interested in gaining practical skills and industry guidance in the cybersecurity domain. IT professionals looking to enhance their knowledge and expertise in IT security. Career changers passionate about technology and eager to explore the exciting world of cybersecurity. Requirements No experience required. Just enrol & start learning. Career path Gain essential skills and knowledge in our IT Security Training program. Unlock job opportunities as a Cybersecurity Analyst, Network Security Engineer, Information Security Consultant, or Ethical Hacker. Secure your future in the dynamic field of IT security in the UK. Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included Student ID Card Digital certificate - Included
10 QLS Endorsed Courses for Pentest Programmer | 10 Endorsed Certificates Included | Life Time Access
This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT's NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy.
SAFe® for Architects: In-House Training Enable continuous value flow by aligning technical strategy with business goals, communicating that strategy to development teams, and applying Agile architecture practices. Attendees can improve collaboration and alignment in a SAFe® Lean-Agile enterprise when they become a SAFe® 5 Architect. The SAFe® for Architects course prepares System, Solution, and Enterprise Architects to engage across the organization as effective leaders and change agents who collaboratively deliver architectural solutions. During this course, attendees will explore the roles, responsibilities, and mindset of Agile Architects, and appreciate how to align architecture with business value and drive continuous flow to large systems of systems while supporting SAFe® program execution. What you will Learn To perform the role of a SAFe® Architect, you should be able to: Architect using SAFe® principles Align architecture with business value Develop and communicate architecture vision and intent Plan architectural runway to enable delivery success Architect for continuous delivery and Release on Demand Lead and coach architects and team members during Program Increment (PI) Planning and execution Provide leadership during a Lean-Agile transformation Exemplifying Lean-Agile architecture Architecting for DevOps and Release on Demand Aligning architecture with business value Developing Solution Vision, Solution Intent, and Roadmaps Preparing architecture for Program Increment (PI) Planning Coordinating architecture throughout PI Planning Supporting Continuous Delivery during PI execution Supporting new Strategic Themes and Value Streams Leading as an architect during a Lean-Agile transformation
Scrum Product Owner Exam Prep: In-House Training: Virtual In-House Training This workshop prepares you for the Scrum.org PSPO™ I certification. A voucher for the exam and the access information you will need to take the exam will be provided to you via email after you have completed the course. NOTE: If you have participated in any of IIL's other Scrum workshops, you can bypass this program and focus on reading/studying the Scrum Guide and taking practice exams from Scrum.org The Product Owner is responsible for maximizing the value of the product and the work of the Development Team. The Product Owner must be knowledgeable, available, and empowered to make decisions quickly in order for an Agile project to be successful. The Product Owner's key accountability is the Product Backlog. Managing, maintaining, and evolving the Product Backlog involves: Establishing a clear vision that engages the Development Team and stakeholders Clearly expressing Product Backlog items Ordering the items in the Product Backlog to best achieve the vision and goals Ensuring that the Product Backlog is visible, transparent, and clear to all Working with the Development Team throughout the project to create a product that fits the customer's need The Professional Scrum Product Owner™ I (PSPO I) certificate is a Scrum.org credential that enables successful candidates to demonstrate a fundamental level of Scrum mastery. PSPO I credential holders demonstrate an intermediate understanding of the Scrum framework, and how to apply it to maximize the value delivered with a product. They will exhibit a dedication to continued professional development, and a high level of commitment to their field of practice. Scrum.org does not require that you take their own sponsored or any preparatory training. However, training can facilitate your preparation for this credential. And this course is based on IIL's Scrum Product Owner Workshop, which is aligned with The Scrum Guide™. It will provide you with the information you need to pass the exam and IIL will make the arrangements for your online exam. You will be provided with an exam code and instructions, so that you can take the exam at your convenience, any time you are ready after the course. Passwords have no expiration date, but they are valid for one attempt only. See additional exam details on the next page. What you will Learn You'll learn how to: Successfully prepare for the Scrum.org PSPO I exam Identify the characteristics of a successful Product Owner Create a powerful vision statement Apply techniques to understand your customers and the market Manage and engage stakeholders Write effective user stories with acceptance criteria Utilize techniques to visualize and prioritize the Product Backlog Participate in the 5 Scrum events as the Product Owner Understand the Product Owner's role in closing a Scrum project Getting Started Introductions Workshop orientation Exam prep preview Fundamentals Recap Agile Manifesto, values, and mindset Product Owner characteristics Good vs. great Product Owner Product Ownership Product ownership Project vision Understand your customers and market Personas Stakeholder management and engagement The Product Backlog User Stories and Acceptance Criteria Preparing User Stories for a Sprint The Product Backlog Visualizing the Product Backlog Product Backlog Prioritization Technical Debt Sprint Planning and Daily Standups Sprint Planning Planning Poker Team Engagement Daily Standups Sprint Review, Retrospectives, and Closing Sprint Reviews Key Agile Patterns Retrospectives Closing the Project Summary and Next Steps Review of course goals, objectives, and content Exam prep next steps
Scrum Product Owner Exam Prep: Virtual In-House Training This workshop prepares you for the Scrum.org PSPO™ I certification. A voucher for the exam and the access information you will need to take the exam will be provided to you via email after you have completed the course. NOTE: If you have participated in any of IIL's other Scrum workshops, you can bypass this program and focus on reading/studying the Scrum Guide and taking practice exams from Scrum.org The Product Owner is responsible for maximizing the value of the product and the work of the Development Team. The Product Owner must be knowledgeable, available, and empowered to make decisions quickly in order for an Agile project to be successful. The Product Owner's key accountability is the Product Backlog. Managing, maintaining, and evolving the Product Backlog involves: Establishing a clear vision that engages the Development Team and stakeholders Clearly expressing Product Backlog items Ordering the items in the Product Backlog to best achieve the vision and goals Ensuring that the Product Backlog is visible, transparent, and clear to all Working with the Development Team throughout the project to create a product that fits the customer's need What you will Learn You'll learn how to: Successfully prepare for the Scrum.org PSPO I exam Identify the characteristics of a successful Product Owner Create a powerful vision statement Apply techniques to understand your customers and the market Manage and engage stakeholders Write effective user stories with acceptance criteria Utilize techniques to visualize and prioritize the Product Backlog Participate in the 5 Scrum events as the Product Owner Understand the Product Owner's role in closing a Scrum project Getting Started Introductions Workshop orientation Exam prep preview Fundamentals Recap Agile Manifesto, values, and mindset Product Owner characteristics Good vs. great Product Owner Product Ownership Product ownership Project vision Understand your customers and market Personas Stakeholder management and engagement The Product Backlog User Stories and Acceptance Criteria Preparing User Stories for a Sprint The Product Backlog Visualizing the Product Backlog Product Backlog Prioritization Technical Debt Sprint Planning and Daily Standups Sprint Planning Planning Poker Team Engagement Daily Standups Sprint Review, Retrospectives, and Closing Sprint Reviews Key Agile Patterns Retrospectives Closing the Project
This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, follow a methodical workflow to develop sound solutions, use open-source, off-the-shelf tools to develop, test, and deploy those solutions, and ensure that they protect the privacy of users. This course includes hands-on activities for each topic area.