The NCSP® ISO 27001 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the ISO 27001 controls in the context of a NIST Cybersecurity Framework program.This course looks at the impact of adapting a principled approach to an enterprise risk management framework to better support cybersecurity decisions within the context of the selected informative reference. It guides participants on the best approach to adapt, implement, and operate (AIO) a comprehensive cybersecurity program that integrates into existing organizational capabilities and incorporates the selected Informative Reference. NCSP® ISO 27001 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the perspective of the selected cybersecurity informative reference. The overall approach places these activities into systems thinking context by introducing the Service Value Management System composed of three aspects, governance, assurance, and the Z-X Model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ presented in the NCSP Practitioner. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.
Duration 3 Days 18 CPD hours This three-day instructor-led course is aimed at modern device management professionals looking to manage their enterprise devices using Microsoft Intune. This course will cover Enrolment, Application Management, Endpoint Security and Windows Autopilot as well as Azure Active Directory Conditional Access and Identity Protection. The delegates will learn how to enroll devices, deploy applications and manage them to maximize user productivity and device security. 1: Introduction to Microsoft Intune Mobile Device Management Microsoft Intune Azure Active Directory AAD Identity Protection AAD Conditional Access 2: Microsoft Intune Device Management Enrolling Devices Device Compliance Device Profiles Device Updates 3: Microsoft Intune Application Management Application Management Deploying Applications Application Configuration Managing Applications Policy Sets and Guided Scenarios 4: Microsoft Intune Endpoint Security Security Baselines and tasks Antivirus Disk Encryption Firewall Atack Surface reduction Endpoint detection and response Account Protection 5: Deploying Windows with Windows Autopilot Windows Autopilot overview Preparing for Windows Autopilot deployment Deploying Windows 11 using Windows Autopilot 6: Microsoft Intune Additional and Premium Features Remote Help Tunnel for Mobile Application Management Endpoint Privilege Management Advanced Endpoint Analytics Additional course details: Nexus Humans 55399 Implementing and Managing Microsoft Intune training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55399 Implementing and Managing Microsoft Intune course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of Reconnaissance Incidents Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of System Hacking Attacks Assess the Impact of Web-Based Attacks Assess the Impact of Malware Assess the Impact of Hijacking and Impersonation Attacks Assess the Impact of DoS Incidents Assess the Impact of Threats to Mobile Security Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES Assess Command and Control Techniques Assess Persistence Techniques Assess Lateral Movement and Pivoting Techniques Assess Data Exfiltration Techniques Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION Implement a Vulnerability Management Plan Assess Common Vulnerabilities Conduct Vulnerability Scans Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE Deploy a Security Intelligence Collection and Analysis Platform Collect Data from Network-Based Intelligence Sources Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA Use Common Tools to Analyze Logs Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS Analyze Incidents with Windows-Based Tools Analyze Incidents with Linux-Based Tools Analyze Malware Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS Deploy an Incident Handling and Response Architecture Mitigate Incidents Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS Apply a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES Remediate Identity and Access Management Issues Implement Security During the SDLC Additional course details: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The NCSP® 800-171 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the 800-171 controls in the context of a NIST Cybersecurity Framework program. This course looks at the impact of adapting a principled approach to the enterprise risk management (ERM) framework to better support cybersecurity decisions, establishing the context for the selected informative reference (IR). It guides participants on the best approach to adapting, implementing, and operating (AIO) a comprehensive cybersecurity program that can be integrated into the existing organizational capabilities and incorporates the selected IR. NCSP® 800-171 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the selected cybersecurity IR perspective. The overall approach places these activities into a systems-thinking context by introducing the service value management system (SVMS), including governance, assurance, and the Z-X model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ concept presented in the NCSP Practitioner course. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.
SAFe® Advanced Scrum Master: In-House Training Prepare to step into a SAFe® leadership role and learn how to facilitate Agile team, program, and enterprise success by becoming a SAFe® 5 Advanced Scrum Master (SASM). This course prepares current Scrum Masters for their leadership role in facilitating Agile team, program, and enterprise success in a SAFe® implementation. Explore facilitation of cross-team interactions in support of program execution and relentless improvement. Expand the Scrum paradigm with an introduction to scalable engineering and DevOps practices, the application of Kanban to facilitate the flow of value, and supporting interactions with architects, product management, and other critical stakeholders. Learn actionable tools for building high-performing teams and explore practical ways of addressing Agile and Scrum anti-patterns in the enterprise. What you will Learn To perform the role of a SAFe® Advanced Scrum Master, you should be able to: Apply SAFe® principles to facilitation, enablement, and coaching in a multi-team environment Build a high-performing team and foster relentless improvement at scale Address Agile and Scrum anti-patterns Support the adoption of engineering practices, DevOps, and Agile architecture Learn to apply Kanban and Extreme Programming (XP) frameworks to optimize flow and improve the team's work Facilitate program planning, execution, and delivery of end-to-end systems value Support learning through participation in communities of practice and innovation cycles Exploring the Scrum Master role in the SAFe® enterprise Applying SAFe® Principles: A Scrum Master's perspective Exploring Agile and Scrum anti-patterns Facilitating program execution Improving flow with Kanban and XP Building high-performing teams Improving program performance with Inspect and Adapt
Project Stakeholder Relationship Skills (Virtual) This course is designed to provide project managers with the ability to: Analyze the complexities of major stakeholder relationship categories Apply the most appropriate interpersonal relationship skills to the different categories of relationships Align the dynamic needs of the stakeholders with a project's objective throughout the project life cycle What You Will Learn At the end of this program, you will be able to: Gain a deep understanding of the Scrum Framework - the theory, practices, roles, rules, and values - as defined in The Scrum Guide Understand, in detail, the role of Scrum Master, and how the role interacts with different members of the Scrum Team and other stakeholders Master the Scrum principles to better understand their application when returning to the workplace Understand how to construct an effective development team with an appropriate mix of skills and experience Know how to act as a servant-leader for the Scrum Team, promoting and enabling self-organization to create high-value products. Learn how to facilitate Scrum Events and remove impediments to the Scrum Team's progress Help Scrum Product Owners shape and refine product backlogs to guide early and incremental delivery of valuable products Drive adoption of the Scrum framework for more effective product and solution development, working with stakeholders and other Scrum Masters to improve its effectiveness Foundation Concepts Stakeholders and project success Stakeholder management research Managing stakeholder relationships Identifying Stakeholders Stakeholder categories Stakeholder relationships across the project life cycle Tools and techniques for identifying stakeholders Assessing Stakeholders Assessing stakeholder relationships Recognizing stakeholder attitudes toward the project Analyzing stakeholders Using other types of stakeholder assessments Building Stakeholder Relationships The importance of psychological safety Building trust and getting results The anatomy of trust Navigating Challenging Situations Dynamics of conflict Responding to conflict Managing difficult conversations
Microsoft® Project White Belt® 2016: Virtual In-House Training This workshop serves as an introduction to the interface and features of Microsoft® Project. This workshop serves as an introduction to the interface and features of Microsoft® Project. It is kept up to date with the framework outlined by Project Management Institute's A Guide to the Project Management Body of Knowledge (PMBOK® Guide). This course will be led by an IIL-certified instructor who will outline the benefits of Microsoft Project, provide tips on using various features and common shortcuts, recommend guidelines, and discuss the application of scheduling concepts to manage project work. What you Will Learn You'll learn how to: Define key scheduling concepts and terms Effectively navigate the user interface and interpret common views Configure essential elements of a new schedule Enter and modify a task list Set dependencies between tasks Create a basic resource list and generate assignments Format targeted areas of the Gantt Chart view Prepare the schedule for printing Getting Started Introductions Course objectives Course outline Navigating the User Interface and Views The ribbon The Quick Access Toolbar General and display options Major elements on the Project screen The Gantt chart, calendar, and network diagram views The help Setting up a New Schedule New schedules from blank, templates or other files The project starting date and forward scheduling The project standard calendar and exception days Entering, Modifying, and Outlining Task Data Task entering options and edition Unscheduled tasks Duration estimates for a single task or multiple tasks Tasks organization Multi-level outline Notes to detail tasks Creating Dependencies by Setting Links The critical path Critical path calculation in Project Dynamic schedules and dependencies Link tasks in Project Displaying the critical path Entering and Assigning Resources Resource planning Resource list Resource assignments Formatting Gantt Chart View Format options for text and Gantt charts Print options
Scrum Master and Product Owner Workshop This workshop builds on the specific roles and responsibilities of the Product Owner and Scrum Master in a Scrum environment, and how they need to work together as part of the Scrum methodology. During these sessions, you will explore who does what before, during, and after the Scrum Sprint cycles, as well as how to make the process work best in your specific Agile environment. You will come away from this workshop with a much deeper understanding of the roles and responsibilities so that individual performance improves on the job. Improved target results include providing focused leadership, making effective decisions, guiding Agile teams, and delivering business value. Foundation Concepts Agile History, Values, and Mindset Introduction to Scrum Scrum Events Scrum Artifacts Scrum Roles and Responsibilities Scrum Roles Product Owner Responsibilities Scrum Master Responsibilities The Scrum Team Responsibilities Cross-functional Teams Product Ownership Product Ownership Vision Understand Your Customers and Market Stakeholder Management and Engagement Product Backlog What is a User Story? Epics and User Stories Acceptance Criteria Preparing User Stories for a Sprint Definition of Ready (DoR) and Definition of Done (DoD) User Story Estimation Using Planning Poker Backlog Grooming Roadmaps, Story Maps, Impact Mapping Product Backlog Prioritization, MoSCoW, Kano Analysis Technical Debt The Sprint Team Capacity and Velocity Planning Sprint Planning Meeting and Sprint Plan The Sprint: Learning to Become Self-managing, Self-organizing, Self-improving Sprint Review Meeting Retrospectives Project Progress and Completion The Daily Scrum The Task Board and The Burndown Chart Information Radiators Closing a Scrum Project Summary and Next Steps Review of course goals, objectives, and content
Level 7 Diploma In Accounting & Finance - Pathway To MSc Accounting & Finance Degree Level 7 Diploma in Accounting & Finance (QCF) – 6 - 8 Months Credits: 120 Credits This qualification is designed for learners who wish to pursue a career in the financial services industry, professional accountancy, banking, and finance or management. The qualification equips learners with the essential skills and knowledge needed to pursue high-level careers in all types of organizations in the public and private sector and within industry and commerce, both in the UK and abroad. The Level 7 Diploma in Accounting and Finance qualification also provides learners with the opportunity to work toward a relevant master’s programme with advanced standing. This programme is a Pathway programme to MSc Accounting & Finance Degree Course Details Assessment: Assignments Objectives: contemporary and specialized approaches to accountancy and finance key practical, theoretical and empirical issues, and academic research the complexity of the ever-changing legal framework in which the financial sector operates the latest developments in accountancy and reporting required by local, national and European governments. Accreditation All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. University Progression University Top-up On completion of this course, students have the opportunity to complete a Master degree programme from a range of UK universities. The top-up programme can be studied online or on campus. The top-up comprises the final 60 credits which consist of either a dissertation or a dissertation and one module. (The course tuition fee listed above does NOT include the top-up fees) University Progression Click here to see University routes and fee information for progression. Entry Requirements For entry onto the Level 7 Diploma in Human Resource Management leading to the MA Human Resource Management qualification, learners must possess: An honours degree in related subject or UK level 6 diploma or equivalent overseas qualification i.e. Bachelors Degree or Higher National Diploma OR Mature learners (over 25) with at least 5 years of management experience if they do not possess the above qualification (this is reviewed on a case by case basis) Workshops Workshops are conducted by live webinars for all students. Visa Requirements There is no Visa requirement for this programme.