When managers have too many decisions to make, it can have a serious impact on the speed and efficiency of the organisation. When those decisions are commercial ones, the results can wreak havoc with the bottom line. Often the problem arises when those below them or in operational areas of the organisation aren't equipped or allowed to make a decision for themselves. Issues get passed back up and that wastes time. This programme provides a solution, giving your entire team the skills to: And most importantly, they'll be able to do this in line with the broader aims and commercial objectives of the business. By the end of the programme participants will be able to: Fully appreciate the importance of effective decision-making in business Use the five-step 'Stop, Think, Act!' decision-making process Stop leaping to conclusions Really understand the situations and decisions they are dealing with Identify good options Evaluate those options Make decisions and then put them into action Apply these tools and techniques to all their decisions in future 1 Understanding the business we work in What are the critical factors in our business? What is the SWOT analysis for our business? 2 Understanding what decision-making is 3 Background Culture of 'having to be doing' To change things we have to think about it! We are paid to make decisions! 4 Recognise the opportunity to make a decision 5 The 'Stop, Think, Act!' technique 6 STOP! Recognise the opportunity to make a decision Don't leap to conclusions Get ready to think Initial questions:Is this my decision? (Do I have the authority?)Who is this going to affect? (Do they need to be included?)When do I need to make the decision? (What's the timeline?) 7 THINK! The 3 Cs - making sure we understand the decisions we have to make What is the context of this decision?What is the overall situation?Why is this decision important?What do we need to achieve?What will success look like? Do I have clarity about the decision I need to make?Can I write it down?Can I express it clearly in two sentences? What are the criteria?What are the critical commercial factors that we will use to select our options?What will we use to measure the business success? 8 ACT! Identifying options What data do I need to collect?Issues with today's overloadIdentifying what will help you Select optionsHow many options?Must match your criteriaMust achieve success'Decision compass' exercise Analyse optionsTabular methodRisk analysis (likelihood v effect)Head, heart and gut (is there any organisational history/bias that we are up against?) Making your decision Taking it to actionFirst actionsPlanning how to make it happen
Duration 4 Days 24 CPD hours This course is intended for This course is designed for data analysts, business intelligence specialists, developers, system architects, and database administrators. Overview Skills gained in this training include:The features that Pig, Hive, and Impala offer for data acquisition, storage, and analysisThe fundamentals of Apache Hadoop and data ETL (extract, transform, load), ingestion, and processing with HadoopHow Pig, Hive, and Impala improve productivity for typical analysis tasksJoining diverse datasets to gain valuable business insightPerforming real-time, complex queries on datasets Cloudera University?s four-day data analyst training course focusing on Apache Pig and Hive and Cloudera Impala will teach you to apply traditional data analytics and business intelligence skills to big data. Hadoop Fundamentals The Motivation for Hadoop Hadoop Overview Data Storage: HDFS Distributed Data Processing: YARN, MapReduce, and Spark Data Processing and Analysis: Pig, Hive, and Impala Data Integration: Sqoop Other Hadoop Data Tools Exercise Scenarios Explanation Introduction to Pig What Is Pig? Pig?s Features Pig Use Cases Interacting with Pig Basic Data Analysis with Pig Pig Latin Syntax Loading Data Simple Data Types Field Definitions Data Output Viewing the Schema Filtering and Sorting Data Commonly-Used Functions Processing Complex Data with Pig Storage Formats Complex/Nested Data Types Grouping Built-In Functions for Complex Data Iterating Grouped Data Multi-Dataset Operations with Pig Techniques for Combining Data Sets Joining Data Sets in Pig Set Operations Splitting Data Sets Pig Troubleshoot & Optimization Troubleshooting Pig Logging Using Hadoop?s Web UI Data Sampling and Debugging Performance Overview Understanding the Execution Plan Tips for Improving the Performance of Your Pig Jobs Introduction to Hive & Impala What Is Hive? What Is Impala? Schema and Data Storage Comparing Hive to Traditional Databases Hive Use Cases Querying with Hive & Impala Databases and Tables Basic Hive and Impala Query Language Syntax Data Types Differences Between Hive and Impala Query Syntax Using Hue to Execute Queries Using the Impala Shell Data Management Data Storage Creating Databases and Tables Loading Data Altering Databases and Tables Simplifying Queries with Views Storing Query Results Data Storage & Performance Partitioning Tables Choosing a File Format Managing Metadata Controlling Access to Data Relational Data Analysis with Hive & Impala Joining Datasets Common Built-In Functions Aggregation and Windowing Working with Impala How Impala Executes Queries Extending Impala with User-Defined Functions Improving Impala Performance Analyzing Text and Complex Data with Hive Complex Values in Hive Using Regular Expressions in Hive Sentiment Analysis and N-Grams Conclusion Hive Optimization Understanding Query Performance Controlling Job Execution Plan Bucketing Indexing Data Extending Hive SerDes Data Transformation with Custom Scripts User-Defined Functions Parameterized Queries Choosing the Best Tool for the Job Comparing MapReduce, Pig, Hive, Impala, and Relational Databases Which to Choose?
Participants gain a foundational understanding of the UX design process, tools and techniques through an engaging mix of theory and practical application exercises.
Welcome to the Women's Voice Medicine Journey. This is a female-designed, step-by-step programe, to teach you how you can truly activate and integrate some of the most essential Embodied Voicework tools to Free Your Voice and unleash your Creative Feminine Power.
Course Overview The Personal Trainer / Fitness Instructor Training Course offers a comprehensive introduction to the principles of fitness, exercise science, and client support. Learners will gain in-depth knowledge of muscle groups, workout design, and nutrition fundamentals essential for building tailored fitness programmes. The course provides a structured understanding of how to assess clients, create effective training plans, and guide individuals towards their health and fitness goals. It also introduces learners to dietary strategies, the role of supplements, and recovery techniques to support overall wellbeing. By completing this course, participants will be better equipped to inspire, educate, and support others in achieving physical fitness. Whether learners are starting a new career or seeking to enhance their existing expertise, this course offers valuable insights and a solid foundation to pursue opportunities within the health and fitness sector. Course Description The Personal Trainer / Fitness Instructor Training Course is designed to build a strong theoretical foundation in fitness instruction and personal training. Covering essential topics such as anatomy, muscle growth, client assessment, and exercise programming, the course ensures learners develop a thorough understanding of the fitness landscape. Through detailed modules, participants explore how to structure effective workouts, integrate bodybuilding diets, and utilise recovery strategies for optimal results. Video demonstrations of exercises provide visual clarity, supporting knowledge of both compound and isolation movements. Learners will also receive guidance on supplements, rest, and overall programme design. This course promotes professional development by blending current industry knowledge with an emphasis on safe and structured fitness practices. Upon completion, learners will possess the skills and confidence to assist clients in achieving personalised fitness objectives and be better positioned to pursue roles in the expanding fitness and wellbeing industries. Course Modules Module 01: Introduction Module 02: The Major Muscle Groups Explained Module 03: Muscle Growth Fundamentals Module 04: Client Assessment Module 05: Workout Design Module 06: Sample Workouts Module 07: Exercise Videos Module 08: Exercise Videos: Isolation Exercises Module 09: Setting Up A Bodybuilding Diet Module 10: Supplements Module 11: Rest & Recovery Module 12: FAQ & Miscellaneous (See full curriculum) Who is this course for? Individuals seeking to start a career as a personal trainer or fitness instructor. Professionals aiming to expand their knowledge and offer structured fitness services. Beginners with an interest in health, fitness, and exercise science. Enthusiasts looking to deepen their understanding of bodybuilding, nutrition, and training principles. Career Path Personal Trainer Fitness Instructor Gym Instructor Wellness Coach Group Fitness Coach Health and Wellbeing Advisor Fitness Consultant
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
Duration 2 Days 12 CPD hours This course is intended for #NAME? Overview The learning objectives for CDA include a practical understanding of: Goals, history, terminology, and pipeline The importance, practices, and transformation of a DevOps collaborative culture Design practices, such as modular design and microservices Continuous Integration (Cl), such as version control, builds, and remediation Tenets and best practices of Continuous Testing (CT) Continuous Delivery and Deployment (CD): packaging, containers, and release Continuous Monitoring (CM): monitoring and analysis infrastructure, process, and apps Infrastructure and tools: frameworks, tools, and infrastructure as code Security Assurance: DevSecOps The opportunity to hear and share real-life scenarios This course is designed for participants who are engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and potentially Continuous Deployment. The course highlights underpinning processes, metrics, APls and cultural considerations with Continuous Delivery. Key benefits of Continuous Delivery will be covered including increased velocity to assist organizations to respond to market changes rapidly, thus being able to outmaneuver competition, reduce risk and lower costs while releasing higher quality solutions. Increased productivity and employee morale by having more activities performed by pipelines instead of humans so teams can focus on vision while pipelines do the execution.This course prepares you for the Continuous Delivery Ecosystem Foundation(CDEF) certification. Course Introduction Course goals Course agenda CDA Concepts Continuous delivery (CD) definition Architecting for continuous delivery Continuous delivery and DevOps Relationships between CD, Waterfall, Agile, ITIL, and DevOps Benefits of continuous delivery CDA Culture Importance of culture to the CD Architect What a CD Architect can do about culture How to maintain culture Assignment: DevOps culture and practices to create flow Design Practices for Continuous Delivery Why design is important to continuous delivery CD Architect?s role in design Key design principles CD best practices Microservices and containers Continuous Integration Continuous integration (CI) defined CD Architect?s role in CI Importance of CI Benefits of CI CI best practices Assignment: Optimizing CI workflows Continuous Testing Continuous testing (CT) defined Importance of CT Benefits of CT CD Architect?s role in CT Five tenets of CT CT best practices Assignment: Handling environment inconsistencies Continuous Delivery and Deployment Continuous delivery defined Continuous deployment defined Benefits of continuous delivery and deployment CD Architect?s role in continuous delivery and deployment Continuous delivery and deployment best practices Assignment: Distinguishing continuous delivery and deployment Continuous Monitoring Continuous monitoring defined Importance of continuous monitoring CD Architect?s role in continuous monitoring Continuous monitoring best practices Assignment: Monitoring build progress Infrastructure and Tools Importance of infrastructure and tools CD Architect?s role in infrastructure and tools Building a DevOps toolchain Infrastructure/tools best practices Assignment: identifying common infrastructure/tool components Security Assurance Importance of security assurance DevSecOps and Rugged DevOps defined CD Architect?s role in security Security best practices Assignment: Applying security practices Capstone exercise Identifying toolchain and workflow improvements Summary Additional Sources of Information Exam Preparations Exam requirements Sample exam review
The main aim of this workshop is to encourage and enable delegates to present their sales messages stylishly and persuasively to expert buying audiences and improve their conversion rates. The focus is placed firmly on performance and creativity in top level presenting. It is aimed at experienced sales professionals who are expert at selling but need to be able to present and pitch for business at high skill levels in order to land major accounts. Delegate numbers will be restricted to 4 people. Delegates should be willing and be prepared to give video-recorded presentations as part of the course. Course Syllabus The syllabus of the Sales Presenting course is comprised of two modules, covering the following: Module One Components of Top Presenting Preparation and performance in presenting Being stylish and compelling Differentiation, risk-taking and presenting Connecting with your audience Achieving impact and drama Creating a buying emotion Getting out of a comfort zone First delegate presentations Module Two Pitching in Teams Getting your act together - the plan Looking and sounding like a team The buyer's perspective Getting your moves right - choreography Dealing successfully with questions Rehearsing to succeed Second delegate presentations Dragon's Den Exercise The delegation is split into two groups, each with a specific product or service to win the Dragons' investment. They have to also present to the Dragon's Den their business case for feedback and negotiate with the Dragons to gain either an "I'm in" or an "I'm out" reply. A full debrief is then conducted covering: Planning Commercial consequences Putting forward a business case Critical thinking Negotiating Selling skills Presentation skills Profile building Scheduled Courses This course is not one that is currently scheduled as an open course, and is only available on an in-house basis. For more information please contact us.
An effective Access Control System can form an integral part of an effective security system. At Hi-Tech Training our course is designed to give participants a practical knowledge of the operation and installation of Access Control Systems. Our experience has taught us that in order to gain the required skills an installer needs to learn through as much practical training as possible. This course involves 50% “Hands-On” training which involves building, setting up, testing and troubleshooting faults using core elements of modern Access Control Systems. At the end of the course, an interested and hardworking participant will have a good solid foundation of knowledge of what access control is all about.
Duration 4.5 Days 27 CPD hours This course is intended for This course is intended for individuals who have basic knowledge on cloud computing; on-premise system administrators; IT specialists, interested in AWS and Cloud Technologies. Overview Upon successful completion of this course, students will know how to design and deploy scalable, highly accessible and fault-tolerant systems in AWS. In this course, students will learn the main 'Managed Service' offered by AWS; How to design and deploy scalable, highly accessible and fault-tolerant systems in AWS; How to choose the most appropriate AWS service. Introduction Course overview Exam Blue Print Public clouds & cloud economics AWS Overview & Whitepapers Setting up AWS Account Identity and Access Management (IAM) Local users, groups & roles SAML providers Policies Cross Account Access Best practices & Examples Lab Exam highlights Sample questions Simple Storage Service (S3) & Glacier Buckets Objects Lifecycle Configurations and permissions Custom bucket policies Best Practices & Examples Lab Exam highlights Sample questions Virtual Private Cloud (VPC) VPC Internet gateway vs NAT Gateway Elastic IPs Subnets & Routing tables Security Groups & Network Access Lists VPC Peering & Endpoints Managed VPN Connections Best Practices & Examples Lab Exam highlights Sample questions Elastic Compute Cloud (EC2) Instances Amazon Machine Images(AMIs) Elastic Block Store (EBS) Network & Security Load Balancers (ELB) Auto Scaling Groups (ASG) Instance Management Best Practices & Examples Lab Exam highlights Sample questions Route 53 Hosted Zones Health checks Traffic flow Best Practices & Examples Lab Exam highlights Sample questions Relational Database Service (RDS) Engine types Performance & Resilience Subnet groups Best Practices & Examples Lab Exam highlights Sample questions CloudWatch Dashboard and Metrics CloudWatch logs CloudWatch rules Best Practices & Examples Lab Exam highlights Sample questions Other AWS Services Simple Overview CloudFront DynamoDB Elasticache Redshift SQS SWF SNS Elastic Transcoder API Gateway Kenesis CloudFormation Exam highlights Sample questions Multiple AWS Services exercise Lab 1 - Architecting multi-tier environment Lab 2 - Configure backup and monitoring Practice Exam Additional course details: Nexus Humans AWS Certified Solutions Architect - Associate training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Certified Solutions Architect - Associate course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.