• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5826 Computing courses in Bushey delivered Online

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered OnlineFlexible Dates
£2,037

SAFe Scrum Master: In-House Training

By IIL Europe Ltd

SAFe® Scrum Master: In-House Training Build your skills as a high-performing team member of an Agile Release Train (ART) and prepare to support the facilitation of team and program events when you become a SAFe® 5 Scrum Master (SSM). In this course, you'll gain an understanding of the role of Scrum Master in a SAFe® enterprise. Unlike traditional Scrum Master training that focuses on the fundamentals of team-level Scrum, the SAFe® Scrum Master course explores the role of the Scrum Master in the context of the entire enterprise and prepares you to successfully plan and execute the Program Increment (PI), the primary enabler of alignment throughout all levels of a SAFe® organization. What you will Learn To perform the role of a SAFe® Scrum Master, attendees should be able to: Describe Scrum in a SAFe® enterprise Facilitate Scrum events Facilitate effective Iteration execution Support effective Program Increment execution Support relentless improvement Coach Agile teams for maximum business results Support DevOps implementation Build a high-performing ART by becoming a servant leader and coach Develop an action plan to continue your learning journey Introducing Scrum in SAFe® Characterizing the role of the Scrum Master Experiencing Program Increment planning Facilitating Iteration execution Finishing the Program Increment Coaching the Agile team

SAFe Scrum Master: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,795

SAFe Advanced Scrum Master: In-House Training

By IIL Europe Ltd

SAFe® Advanced Scrum Master: In-House Training Prepare to step into a SAFe® leadership role and learn how to facilitate Agile team, program, and enterprise success by becoming a SAFe® 5 Advanced Scrum Master (SASM). This course prepares current Scrum Masters for their leadership role in facilitating Agile team, program, and enterprise success in a SAFe® implementation. Explore facilitation of cross-team interactions in support of program execution and relentless improvement. Expand the Scrum paradigm with an introduction to scalable engineering and DevOps practices, the application of Kanban to facilitate the flow of value, and supporting interactions with architects, product management, and other critical stakeholders. Learn actionable tools for building high-performing teams and explore practical ways of addressing Agile and Scrum anti-patterns in the enterprise. What you will Learn To perform the role of a SAFe® Advanced Scrum Master, you should be able to: Apply SAFe® principles to facilitation, enablement, and coaching in a multi-team environment Build a high-performing team and foster relentless improvement at scale Address Agile and Scrum anti-patterns Support the adoption of engineering practices, DevOps, and Agile architecture Learn to apply Kanban and Extreme Programming (XP) frameworks to optimize flow and improve the team's work Facilitate program planning, execution, and delivery of end-to-end systems value Support learning through participation in communities of practice and innovation cycles Exploring the Scrum Master role in the SAFe® enterprise Applying SAFe® Principles: A Scrum Master's perspective Exploring Agile and Scrum anti-patterns Facilitating program execution Improving flow with Kanban and XP Building high-performing teams Improving program performance with Inspect and Adapt

SAFe Advanced Scrum Master: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,795

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered OnlineFlexible Dates
£1,995

DP-601T00 Implementing a Lakehouse with Microsoft Fabric

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is data professionals who are familiar with data modeling, extraction, and analytics. It is designed for professionals who are interested in gaining knowledge about Lakehouse architecture, the Microsoft Fabric platform, and how to enable end-to-end analytics using these technologies. Job role: Data Analyst, Data Engineer, Data Scientist Overview Describe end-to-end analytics in Microsoft Fabric Describe core features and capabilities of lakehouses in Microsoft Fabric Create a lakehouse Ingest data into files and tables in a lakehouse Query lakehouse tables with SQL Configure Spark in a Microsoft Fabric workspace Identify suitable scenarios for Spark notebooks and Spark jobs Use Spark dataframes to analyze and transform data Use Spark SQL to query data in tables and views Visualize data in a Spark notebook Understand Delta Lake and delta tables in Microsoft Fabric Create and manage delta tables using Spark Use Spark to query and transform data in delta tables Use delta tables with Spark structured streaming Describe Dataflow (Gen2) capabilities in Microsoft Fabric Create Dataflow (Gen2) solutions to ingest and transform data Include a Dataflow (Gen2) in a pipeline This course is designed to build your foundational skills in data engineering on Microsoft Fabric, focusing on the Lakehouse concept. This course will explore the powerful capabilities of Apache Spark for distributed data processing and the essential techniques for efficient data management, versioning, and reliability by working with Delta Lake tables. This course will also explore data ingestion and orchestration using Dataflows Gen2 and Data Factory pipelines. This course includes a combination of lectures and hands-on exercises that will prepare you to work with lakehouses in Microsoft Fabric. Introduction to end-to-end analytics using Microsoft Fabric Explore end-to-end analytics with Microsoft Fabric Data teams and Microsoft Fabric Enable and use Microsoft Fabric Knowledge Check Get started with lakehouses in Microsoft Fabric Explore the Microsoft Fabric Lakehouse Work with Microsoft Fabric Lakehouses Exercise - Create and ingest data with a Microsoft Fabric Lakehouse Use Apache Spark in Microsoft Fabric Prepare to use Apache Spark Run Spark code Work with data in a Spark dataframe Work with data using Spark SQL Visualize data in a Spark notebook Exercise - Analyze data with Apache Spark Work with Delta Lake Tables in Microsoft Fabric Understand Delta Lake Create delta tables Work with delta tables in Spark Use delta tables with streaming data Exercise - Use delta tables in Apache Spark Ingest Data with DataFlows Gen2 in Microsoft Fabric Understand Dataflows (Gen2) in Microsoft Fabric Explore Dataflows (Gen2) in Microsoft Fabric Integrate Dataflows (Gen2) and Pipelines in Microsoft Fabric Exercise - Create and use a Dataflow (Gen2) in Microsoft Fabric

DP-601T00 Implementing a Lakehouse with Microsoft Fabric
Delivered OnlineFlexible Dates
£595

DP-900T00 Microsoft Azure Data Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is individuals who want to learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build their foundational knowledge of cloud data services within Microsoft Azure. Overview Describe core data concepts Identify considerations for relational data on Azure Describe considerations for working with non-relational data on Azure Describe an analytics workload on Azure In this course, students will gain foundational knowledge of core data concepts and related Microsoft Azure data services. Students will learn about core data concepts such as relational, non-relational, big data, and analytics, and build their foundational knowledge of cloud data services within Microsoft Azure. Students will explore fundamental relational data concepts and relational database services in Azure. They will explore Azure storage for non-relational data and the fundamentals of Azure Cosmos DB. Students will learn about large-scale data warehousing, real-time analytics, and data visualization. 1 - Explore core data concepts Identify data formats Explore file storage Explore databases Explore transactional data processing Explore analytical data processing 2 - Explore data roles and services Explore job roles in the world of data Identify data services 3 - Explore fundamental relational data concepts Understand relational data Understand normalization Explore SQL Describe database objects 4 - Explore relational database services in Azure Describe Azure SQL services and capabilities Describe Azure services for open-source databases 5 - Explore Azure Storage for non-relational data Explore Azure blob storage Explore Azure DataLake Storage Gen2 Explore Azure Files Explore Azure Tables 6 - Explore fundamentals of Azure Cosmos DB Describe Azure Cosmos DB Identify Azure Cosmos DB APIs 7 - Explore fundamentals of large-scale data warehousing Describe data warehousing architecture Explore data ingestion pipelines Explore analytical data stores 8 - Explore fundamentals of real-time analytics Understand batch and stream processing Explore common elements of stream processing architecture Explore Azure Stream Analytics Explore Apache Spark on Microsoft Azure 9 - Explore fundamentals of data visualization Describe Power BI tools and workflow Describe core concepts of data modeling Describe considerations for data visualization

DP-900T00 Microsoft Azure Data Fundamentals
Delivered OnlineFlexible Dates
£595

SAFe for Teams: Virtual In-House Training

By IIL Europe Ltd

SAFe® for Teams: Virtual In-House Training Build the skills needed to become a high-performing team member of an Agile Release Train (ART) and learn how to collaborate effectively with other teams by becoming a SAFe® 5 Practitioner (SP). During this course, you will gain an in-depth understanding of the ART, how it delivers value, and what you can do to effectively perform the role using Scrum, Kanban, and Extreme Programming (XP). You will also learn how to write stories and break down features, plan and execute iterations, and plan Program Increments. Finally, you'll learn about the continuous delivery pipeline and DevOps culture, how to effectively integrate with other teams in the program, and what it takes to continuously improve the train. What you will Learn To perform the role of a SAFe® Practitioner, you should be able to: Apply SAFe® to scale Lean and Agile development in their enterprise Know their team and its role on the Agile Release Train Know all other teams on the train, their roles, and the dependencies between the teams Plan Iterations Execute Iterations and demonstrate value Plan Program Increments Integrate and work with other teams on the train Introducing the Scaled Agile Framework® (SAFe®) Building an Agile Team Planning the Iteration Executing the Iteration Executing the Program Increment Practicing SAFe®

SAFe for Teams: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,650

COBIT 2019 Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The COBIT 2019 Foundation course would suit candidates working in the following IT professions or areas: IT Auditors IT Managers IT Quality professionals IT Leadership IT Developers Process practitioners Managers in IT service providing firms The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This COBIT 2019 Foundation course is designed as an introduction to COBIT 2019 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are: New framework introduction Key concepts and terminology Governance and Framework Principles Governance system and components Governance and management objectives Performance management Designing a tailored governance system COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained?the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance. 1 - COBIT 5 OVERVIEW AND INTRODUCTION Course Administration Course Objectives Exam Overview Certification Scheme History of COBIT COBIT 2019 Improvements Major differences with 2019 Misconceptions about COBIT COBIT and Other Standards 2 - KEY CONCEPTS AND TERMINOLOGY Introduction to Enterprise Governance of Information and Technology Benefits of Information and Technology Governance COBIT Information and Technology Governance Framework Distinction of Governance and Management Three Principles of a Governance Framework Six Principles for a Governance System 3 - GOVERNANCE SYSTEMS AND COMPONENTS Introduction to the Components of a Governance System Processes and Capability Levels Organizational Structures and Defined Roles Information Flows and Items People, Skills and Competencies Principles, Policies and Frameworks Culture, Ethics and Behavior Services, Infrastructure and Applications 4 - GOVERNANCE MANAGEMENT OBJECTIVES Governance and Management Objectives Publication Governance and Management Objectives Governance and Management Objectives Core Model Evaluate, Direct and Monitor Align, Plan and Organize Build, Acquire and Implement Deliver, Service and Support Monitor, Evaluate and Assess 5 - GOALS CASCADE Governance and Management Objective Relationships Governance and Management Objective Descriptions High-Level Information Example Introduction to the Goals Cascade Enterprise Goals Alignment Goals Mapping Tables ? Appendix A 6 - PERFORMANCE MANAGEMENT Introduction to Performance Management COBIT Performance Management Principles COBIT Performance Management (CPM) Overview Process Capability Levels Rating Process Activities Focus Area Maturity Levels Performance Management of Organizational Structures Performance Management of Information Items Performance Management of Culture and Behavior 7 - DESIGNING A TAILORED GOVERNANCE SYSTEM The Need for Tailoring Design Factors Enterprise Strategy Enterprise Goals Risk Profile I&T Related Issues Threat Landscape Compliance Requirements Role of IT Sourcing Model for IT IT Implementation Methods Technology Adoption Strategy Enterprise Size Focus Areas Designing a Tailored Governance System Management Objective Priority and Target Capability Levels Component Variations Specific Focus Areas Stages and Steps in the Design Process 8 - IMPLEMENTING ENTERPRISE GOVERNANCE OF IT The Business Case The COBIT Implementation Guide Purpose COBIT Implementation Approach Phase 1 ? What are the Drivers Phase 2 ? Where are we Now Phase 3 ? Where do we Want to be Phase 4 ? What Needs to be Done Phase 5 ? How do we get There Phase 6 ? Did we get There Phase 7 How do we Weep the Momentum Going? EGIT Implementation Program Challenges

COBIT 2019 Foundation
Delivered OnlineFlexible Dates
£1,330

Portfolio, Programs, and Project Offices Foundation: In-House

By IIL Europe Ltd

Portfolio, Programme, and Project Offices (P3O®) Foundation: In-House Training P3O® is the AXELOS standard for the design of decision-making processes regarding changes in organizations. P3O provides a guideline for the design of portfolio, programme, and project offices in organizations. The P3O Foundation course is an interactive learning experience. The P3O Foundation-level content provides you with sufficient knowledge and understanding of the P3O guidance to interact effectively with, or act as an informed member of, an office within a P3O model. It enables you to successfully complete the associated P30 Foundation exam and achieve the qualification. In this course, you will be prepared to successfully attempt the P3O Foundation exam and learn how to implement or re-energize a P3O model in their own organization. What you will Learn Individuals certified at the P3O Foundation level will be able to: Define a high-level P3O model and its component offices List the component offices in a P3O model Differentiate between Portfolio, Programme, and Project Management List the key functions and services of a P3O List the reasons for establishing a P3O model Compare different types of P3O models List the factors that influence selection of the most appropriate P3O model for an organization Define the processes to implement or re-energize a P3O Benefits: Fast-track programme for those who want to achieve P3O Foundation qualification Practical case study and scenarios Attractive slides and course book Introduction to P3O What is the purpose of P3O? Definitions What are P3Os? Portfolio, programme, and project lifecycles Governance and the P3O Designing a P3O Model Factors that affect the design Design considerations What functions and services should the P3O offer? Roles and responsibilities Sizing and tailoring of the P3O model Introduction to P3O What is the purpose of P3O? Definitions What are P3Os? Portfolio, programme, and project lifecycles Governance and the P3O Designing a P3O Model Factors that affect the design Design considerations What functions and services should the P3O offer? Roles and responsibilities Sizing and tailoring of the P3O model Why Have a P3O? How a P3O adds value Maximizing that value Getting investment for the P3O Overcoming common barriers Timescales How to Implement or Re-Energize a P3O Implementation lifecycle for a permanent P3O Identify Define Deliver Close Implementation lifecycle for a temporary programme or project office Organizational context Definition and implementation Running Closing Recycling How to Operate a P3O Overview of tools and techniques Benefits of using standard tools and techniques Critical success factors P3O tools P3O techniques

Portfolio, Programs, and Project Offices Foundation: In-House
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Data Analytics BootCamp, 12-weeks, Online Instructor-led

4.6(12)

By PCWorkshops

PYTHON BOOTCAMP: This 12-week Python Data Analytics Data Boot Camp is designed to give you a complete skill set required by data analysts . You will be fully fluent and confident as a Python data analyst, with full understanding of Python Programming. From Data, databases, datasets, importing, cleaning, transforming, analysing to visualisation and creating awesome dashboards The course is a practical, instructor-lead program.

Data Analytics BootCamp, 12-weeks, Online Instructor-led
Delivered OnlineFlexible Dates
£1,200