• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3864 Courses in Cardiff delivered Live Online

Selling with NLP (In-House)

By The In House Training Company

Take your sales people from average to high performance. Motivate and develop experienced sales professionals with some new insights and learning. Applying NLP principles, techniques and models, this workshop will introduce the core attitudes and behaviours that differentiate the excellent sales person from the average one. The programme will help participants: Understand and adopt the mindset and beliefs needed for sales excellence Build rapport and connect with buyers at a deeper and more personal level Recognise some of the thinking and language patterns that make each individual unique Ask powerful questions to further understand the unique world of the individual and how they make decisions Apply tools and techniques to empathise with clients - seeing things from their perspectives Tailor their sales approach to the individual buyer's style, and talk in their language Influence with integrity and sell to organisations and individuals successfully 1 Introduction Aims and objectives of the programme Personal introductions and objectives Workshop overview 2 An introduction to NLP and sales excellence with NLP An overview of NLP and applying it to selling The pillars of NLP The NLP model of communication The difference that makes the difference 3 Building enhanced rapport Defining rapport and why it is important when selling Going beyond the initial small talk Building relationships with individual decision-makers Matching and mirroring Levels of rapport 4 Understanding the buyer's personal buying map How we take in, filter and process information How we judge others based on our own experiences of the world The different ways in which we communicate when selling Recognising and understanding the language and thinking patterns of others Adapting your sales communication style to different buyers 5 Making sense of the buying process How we filter information through our senses Understanding how we see, hear and experience the world Visual, auditory and kinaesthetic buyers Listening for key insights What different buyers want from you to help them to buy Applying sensory awareness to the sales process 6 Successful sales mindset The connection between thoughts and actions The sales beliefs of excellence Identifying negative thoughts and beliefs that are holding you back How to change your mindset Adopting the sales beliefs of excellence 7 Powerful questions Reviewing and honing your questioning skills Understanding the questions that great sales people ask Avoiding assumptions Clean language questions Getting to the bottom of it - precision questions Turbo-charging how you qualify 8 Influencing with integrity Understanding empathy Stepping into the buyer's shoes Speaking the buyer's language Tailoring your sales approach to the individual Match, pace, lead - how to take your buyer with you 9 Putting it all together Personal learning summary and action plans

Selling with NLP (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Free Your Mind! Are You Really Running Your Own Brain?

5.0(12)

By ANLP International CIC

One of the most powerful ways to tap into intrinsic motivation is by cleaning up your mindset. The way you talk to yourself, visualise and manage your emotions is directly related to your ability to stay motivated and focused. This session will introduce you to a menu of mind hacks to help you Free your Mind?

Free Your Mind! Are You Really Running Your Own Brain?
Delivered OnlineFlexible Dates
FREE

Juniper - Introduction to the Junos Operating System (IJOS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Course Outline COURSE INTRODUCTION Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options: The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options: The J-Web Interface User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Routing Policy Routing Policy Overview Case Study: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper Networks? Security Focus A IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration Additional course details: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Juniper - Introduction to the Junos Operating System (IJOS)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. Introducing the Cloud and Cloud Security Describe the Evolution of Cloud Computing Explain the Cloud Service Models Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model Explore the Security Responsibilities Within the SaaS Service Model Describe Cloud Deployment Models Describe Cloud Security Basics Implementing the Cisco Security Solution for SaaS Access Control Explore Security Challenges for Customers Using SaaS Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall Describe Cloud Access Security Broker (CASB) Describe Cisco CloudLock as the CASB Describe OAuth and OAuth Attacks Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security Describe Cisco Cloud Security Solutions for Endpoints Describe AMP for Endpoints Architecture Describe Cisco Umbrella Describe Cisco Cloud Email Security Design Comprehensive Endpoint Security Introducing Cisco Security Solutions for Cloud Protection and Visibility Describe Network Function Virtualization (NFV) Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) Describe Cisco NGFWv/Cisco Firepower Management Center Virtual Describe Cisco ASAv Describe Cisco Services Router 1000V Describe Cisco Stealthwatch Cloud Describe Cisco Tetration Cloud Zero-Trust Model Describing the Network as the Sensor and Enforcer Describe Cisco Stealthwatch Enterprise Describe Cisco ISE Functions and Personas Describe Cisco TrustSec Describe Cisco Stealthwatch and Cisco ISE Integration Describe Cisco Encrypted Traffic Analytics (ETA) Implementing Cisco Security Solutions in AWS Explain AWS Security Offerings Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Discover Cisco Security Solutions in AWS Explain Cisco Stealthwatch Cloud in AWS Describing Cloud Security Management Describe Cloud Management and APIs Explain API Protection Illustrate an API Example: Integrate to ISE Using pxGrid Identify SecDevOps Best Practices Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? Describe Cisco Application Centric Infrastructure (ACI) Describe AWS Reporting Tools Additional course details: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)
Delivered OnlineFlexible Dates
Price on Enquiry

Migrating to AWS

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Solutions architects, Software engineers, Operations leads, and IT project managers. Overview Recognize the common business and technical drivers for migrating to the cloud Summarize the three phases of a migration and associated objectives, tasks, and stakeholders for each Describe AWS architecture, tools, and migration best practices Distinguish between the various cloud migration strategies and when each is most appropriate Determine an organization?s application migration readiness Discover a portfolio and gather data necessary for migration Plan and design an application migration strategy Perform and validate application migration to the cloud Optimize applications and operations after migrating to the cloud This course is for individuals who seek an understanding of how to plan and migrate existing workloads to the AWS Cloud. You will learn about various cloud migration strategies and how to apply each step of the migration process, including portfolio discovery, application migration planning and design, conducting a migration, and post-migration validation and application optimization. Hands-on labs reinforce learning, and each lab is designed to provide you with the understanding and foundation necessary to complete migration tasks in your organization. Prerequisites We recommend that attendees of this course have: Familiarity with enterprise IT infrastructure (hardware and software) Completed the AWS Technical Essentials or Architecting on AWS training 1 - What Is a Cloud Migration? Summarize the drivers and desired outcomes of a cloud migration Identify the elements of a successful migration journey Describe the three-phase AWS migration process 2 - Assessing Migration Readiness Summarize the activities and goals of the assess phase Evaluate tools for assessing your organization?s cloud readiness Describe Migration Readiness Assessments (MRAs) and their importance 3 - Preparing for a Migration and Understanding Related Workstreams Summarize the mobilize phase of the process Discuss the eight unique migration-related workstreams 4 - Discovering Landing Zones and Their Benefits Explain the function of a landing zone Discuss best practices for creating a custom landing zone Describe how you would use AWS Control Tower to create a landing zone 5 - Building a Landing Zone Summarize the process of building a landing zone Determine the best multi-account structure, governance policies, and connectivity plan for a landing zone 6 - Discovering the Portfolio and Understanding Migration Strategies Explain the activities of the detailed portfolio discovery workstream Describe how to assess an application?s migration readiness Summarize the seven migration strategies 7 - Understanding and Choosing Portfolio Discovery Tools Summarize the various discovery tools available Distinguish which tools are best to use based on scenario 8 - Planning and Designing a Migration Describe the planning and design process Summarize how to set up a migration factory Choose and finalize an application migration strategy 9 - Performing the Migration to AWS Explain the server migration process Discuss the various migration automation and governance tools available Evaluate server migration tools for compatibility with your environment 10 - Understanding Database and Data Migration Services Summarize the significance of database and data migration Discuss the various data migration tools available 11 - Understanding Additional Migration Support Options Discuss additional migration support options Summarize AWS Managed Services and AWS Marketplace Describe SAP on AWS and services offered for Windows 12 - Integrating, Validating, and Cutting Over Applications Discuss the process and benefits of integrating, validating, and cutting over applications 13 - Modernizing and Optimizing an Application Migration Identify post-migration opportunities for modernization and optimization Understand cost and security optimization processes Explore tools available to support these processes 14 - Understanding Operations Tools, Integration Testing, and Automation Summarize operations in the cloud Discuss four functions of operations and their domains Review operations automation and relevant support tools 15 - Migration Best Practices Course review and key takeaways Summarize and reinforce AWS best practices for migrating Additional course details: Nexus Humans Migrating to AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Migrating to AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Migrating to AWS
Delivered OnlineFlexible Dates
Price on Enquiry

SS84 IBM DFSMS Implementation

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques. Overview Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage. Course introduction and DFSMS overview Specify the storage administration functions that can be automatically performed by the system Identify the types of data set services that need to be established by negotiating service level agreements Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines Activating SMS Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS Create SMS control data sets Code SYS1.PARMLIB operands necessary to bring up SMS Create a minimal configuration Activate a configuration Writing ACS routines Identify the purpose of the ACS routines Develop an understanding of the statements Differentiate between literals and masks Describe the read variables available in the ACS routines Managing temporary data sets Create/alter storage classes and storage groups Identify steps to install and use the starter set Write ACS routines to handle temporary data sets Activate a system to manage temporary data sets Code commands to change volume/group SMS status Issue operator commands to display current status Exploiting DFSMS Describe the purpose of the data class Identify the features that the data class can exploit Create data sets using the space parameter Define Virtual Storage Access Method (VSAM) and volume attributes for data class Identify special data sets and their exploitation through the data class Managing permanent data sets Create/alter data classes, storage classes, management classes, and storage groups Translate current (DFSMShsm) service level agreements to management class parameters Identify alternatives and concerns for standard naming conventions Establish the controls for automatic backup of data sets Establish the controls for automatic volume dump Write ACS routines to manage permanent data Create a configuration that manages permanent data sets Create a new managed data set Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records Using Naviquest Create test cases using Naviquest Perform storage administration tasks in batch Create online DFSMS reports Create model commands using Naviquest Use the COPYFILT macro Device preparation and data movement Initialize volumes as system-managed Move data into/out from system-managed control Convert volumes to/from system-managed Move data to utilize new hardware capabilities Controlling DFSMS Code commands to change SMS volume/group status Issue commands to save configurations and use alternate Active Control Data Set (ACDS) Issue command to use alternate Communication Data Set (COMMDS) Issue VARY SMS commands Communicate with the security administrator about storage management requirements Additional considerations Establish a plan for implementing SMS Locate sources of implementation planning checklists Identify the tools available to document the current system Identify multiple site considerations for recovery and exploitation Additional course details: Nexus Humans SS84 IBM DFSMS Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SS84 IBM DFSMS Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SS84 IBM DFSMS Implementation
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to GitLab (TTDV7553)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The introductory-level course is geared for software developers, project managers, and IT professionals seeking to enhance their understanding and practical skills in version control and collaboration using GitLab. It's also well-suited for those transitioning from another version control system to GitLab, or those responsible for software development lifecycle within their organization. Whether you are an individual looking to boost your proficiency or a team leader aiming to drive productivity and collaboration, this course will provide the necessary expertise to make the most of GitLab's capabilities. Overview This course combines engaging instructor-led presentations and useful demonstrations with valuable hands-on labs and engaging group activities. Throughout the course you'll: Gain a firm understanding of the fundamentals of Git and GitLab, setting a solid foundation for advanced concepts. Learn to effectively manage and track changes in your code, ensuring a clean and reliable codebase. Discover ways to streamline your daily tasks with aliases, stashing, and other GitLab workflow optimization techniques. Develop skills in creating, merging, and synchronizing branches, enabling seamless collaboration and version control. Equip yourself with the knowledge to use Git as a powerful debugging tool, saving time and effort when troubleshooting issues. Understand the basics of continuous integration and continuous deployment (CI/CD) in GitLab, helping you automate the software delivery process. Immerse yourself in the dynamic world of GitLab, a leading web-based platform for version control and collaboration, through our intensive two-day course, GitLab Quick Start. Version control systems, such as GitLab, are the backbone of modern software development, enabling teams to work cohesively and maintain a structured workflow. By mastering GitLab, you can improve efficiency, encourage collaboration, and ensure accuracy and reliability within your projects, adding significant value to your organization. Throughout the course you?ll explore various aspects of GitLab, starting from the fundamental principles of source code management to advanced concepts like rebasing and continuous integration/design. Key topics covered include Git and GitLab basics, reviewing and editing commit history, mastering GitFlow and GitLab Flow, branching and merging strategies, and understanding remote repositories. You'll also learn how to utilize Git as a debugging tool and explore the power of GitLab's built-in CI/CD capabilities. The core value of this course lies in its practical application. You'll learn how to effectively manage changes in code with GitLab, allowing you to maintain audit trails, create reproducible software, and seamlessly move from another version control system. Then you?ll learn how to enhance your workflow efficiency using aliases for common commands, saving changes for later use, and ignoring build artifacts. You?ll also explore GitLab's CI/CD, which will enable you to automate your software delivery process. These hands-on labs will walk you through creating, merging, and synchronizing remote branches, configuring Git, troubleshooting using Git as a debugging tool, and setting up GitLab Runner for CI/CD. Each lab is designed to simulate real-world projects, offering you a first-hand experience in managing and contributing to a version control system like GitLab. Introduction to Source Code Management The Core Principles of Change Management The Power to Undo Changes Audit Trails and Investigations Reproducible Software Changing code-hosting platform Moving from another version control system Git and GitLab Introduction and Basics Introduction to Git GitFlow GitLab Flow Trees and Commits Configuring Git Adding, Renaming, and Removing Files Reviewing and Editing the Commit History Reviewing the Commit History Revision Shortcuts Fixing Mistakes Improving Your Daily Workflow Simplifying Common Commands with Aliases Ignoring Build Artifacts Saving Changes for Later Use (Stashing) Branching Branching Basics Listing Differences Between Branches Visualizing Branches Deleting Branches Tagging Merging Merging Basics Merge Conflicts Merging Remote Branches Remote Repositories Remote Repositories Synchronizing Objects with Remotes Tracking Branches Centralizing and Controlling Access Introduction to GitLab Git Repositories on GitLab Daily Workflow Reviewing Branching and Merging Branch Review Merging Basics Rebasing Rebasing Basics Rebasing with Local Branches Rebasing with Remote Branches Interactive Rebasing Squashing Commits Getting Out of Trouble Git as a Debugging Tool Using the Blame Command to See File History Performing a Binary Search Continuous Integration / Continuous Design (CI/CD) How to install GitLab Runner Adding to our example project Breaking down .gitlab-ci.yml Adding .gitlab-ci.yml to our example project Deconstructing an advanced .gitlab-ci.yml file GitLab CI/CD web UI Optional: Resetting Trees Introduction to Resetting Resetting Branch Pointers Resetting Branches and the Index Resetting the Working Directory Making Good Use of the Reset Command Optional More on Improving Your Daily Workflow Interactively Staging Changes Optional: Including External Repositories Submodules Subtrees Choosing Between Submodules and Subtrees Workflow Management Branch Management

Introduction to GitLab (TTDV7553)
Delivered OnlineFlexible Dates
Price on Enquiry

BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Designed for individuals interested in obtaining information about the CBAP and CCBA exam process especially potential exam candidates interested in pursuing business analysis certification from IIBA in the next 3 to 6 months. Overview Review the 6 Knowledge Areas of the BABOK Guide and discuss the business analysis tasks performed in each. Understand the relationships between the business analysis processes and how each defines an important aspect of the business analysis discipline. Review key terms, business analysis techniques, and competencies important to business analysis. Discuss the 5 business analysis Perspectives presented in BABOK Guide, v3. Complete simulated exam questions to assess personal readiness for taking the exam. Obtain key tips and techniques for effectively preparing for and successfully completing the CBAP or CCBA exam. This course provides you with a clear and detailed understanding of the concepts covered within the CBAP© and CCBA© exams. You will gain valuable tips and techniques to help prepare, study, and assess your personal readiness. In addition, you will earn valuable professional development hours toward meeting the exam criteria. CBAP© and CCBA© Overview Discuss the benefits of professional certification Present the CBAP©/CCBA© eligibility requirements Explain the exam process Discuss the exam blueprints Understand the recertification process Introduction to BABOK© Guide v3 Define the purpose of A Guide to the Business Analysis Body of Knowledge© (BABOK© Guide) Present the structure/components of the BABOK© Guide Identify the six business analysis Knowledge Areas Discuss the supporting areas of the BABOK© Guide BABOK© Guide Key Concepts Define key concepts from the BABOK© Guide Present the Business Analysis Core Concept Model? Discuss the requirements classification scheme Explain Requirements and Designs Present the 5 Business Analysis Perspectives Business Analysis Planning and Monitoring Identify the 5 tasks in Business Analysis Planning and Monitoring Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Elicitation and Collaboration Identify the 5 tasks in Elicitation and Collaboration Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Life Cycle Management Identify the 5 tasks in Requirements Life Cycle Management Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Strategy Analysis Identify the 5 tasks in Strategy Analysis Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Analysis and Design Definition Identify the 6 tasks in Requirements Analysis and Design Definition Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Solution Evaluation Identify the 6 tasks in Solution Evaluation Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Underlying Competencies Describe and understand the importance of the underlying competencies (UCs) Understand how to prepare for questions about UCs on the exam Business Analysis Techniques More clearly understand the 50 techniques presented in the BABOK© Guide Understand how to study techniques for the exam Assess Your Readiness 1 hour mock-exam to assess personal readiness Strategies for Success Utilize 8 strategies for preparing for the CBAP© or CCBA© certification exams Develop study tools and a plan to assist you in preparing for the exams Understand the tools and resources available to help you be successful Wrap-up Take Your Questions Next Steps Additional course details: Nexus Humans BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Programming for Network Engineers v2.0 (PRNE)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for: Network administrators Network engineers with little or no programming or Python experience Network managers Systems engineers Overview After taking this course, you should be able to: Create a Python script Describe data types commonly used in Python coding Describe Python strings and their use cases Describe Python loops, conditionals, operators, and their purposes and use cases Describe Python classes, methods, functions, namespaces, and scopes Describe the options for Python data manipulation and storage Describe Python modules and packages, their uses, and their benefits Explain how to manipulate user input in Python Describe error and exception management in Python Describe Python code debugging methods The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts. Course Outline Introducing Programmability and Python for Network Engineers Scripting with Python Examining Python Data Types Manipulating Strings Describing Conditionals, Loops, and Operators Exploring Classes, Methods, Functions, Namespaces, and Scopes Exploring Data Storage Options Exploring Python Modules and Packages Gathering and Validating User Input Analyzing Exceptions and Error Management Examining Debugging Methods

Cisco Programming for Network Engineers v2.0 (PRNE)
Delivered OnlineFlexible Dates
Price on Enquiry

Sage 50 Training

By Osborne Training

Sage 50 Training: Overview Starting our Sage 50 Accounting courses will enhance your career potentials and give you the skills and knowledge you need to get started in Finance and Accountancy Industry. In Addition, our courses are designed to comply with AAT and Sage certification exams. Why wait, start a new direction to your career in Accountancy. According to statistics, the average salary for Accountants is over £50,000 (Source: Reed Salary Checker). In this sector, the employability rate is higher than in any other sector. Professional or Industry specific qualification

Sage 50 Training
Delivered OnlineFlexible Dates
Price on Enquiry