• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

606 Courses in Leeds delivered Live Online

The Machine Learning Pipeline on AWS

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for: Developers Solutions Architects Data Engineers Anyone with little to no experience with ML and wants to learn about the ML pipeline using Amazon SageMaker Overview In this course, you will learn to: Select and justify the appropriate ML approach for a given business problem Use the ML pipeline to solve a specific business problem Train, evaluate, deploy, and tune an ML model using Amazon SageMaker Describe some of the best practices for designing scalable, cost-optimized, and secure ML pipelines in AWS Apply machine learning to a real-life business problem after the course is complete This course explores how to use the machine learning (ML) pipeline to solve a real business problem in a project-based learning environment. Students will learn about each phase of the pipeline from instructor presentations and demonstrations and then apply that knowledge to complete a project solving one of three business problems: fraud detection, recommendation engines, or flight delays. By the end of the course, students will have successfully built, trained, evaluated, tuned, and deployed an ML model using Amazon SageMaker that solves their selected business problem. Module 0: Introduction Pre-assessment Module 1: Introduction to Machine Learning and the ML Pipeline Overview of machine learning, including use cases, types of machine learning, and key concepts Overview of the ML pipeline Introduction to course projects and approach Module 2: Introduction to Amazon SageMaker Introduction to Amazon SageMaker Demo: Amazon SageMaker and Jupyter notebooks Hands-on: Amazon SageMaker and Jupyter notebooks Module 3: Problem Formulation Overview of problem formulation and deciding if ML is the right solution Converting a business problem into an ML problem Demo: Amazon SageMaker Ground Truth Hands-on: Amazon SageMaker Ground Truth Practice problem formulation Formulate problems for projects Module 4: Preprocessing Overview of data collection and integration, and techniques for data preprocessing and visualization Practice preprocessing Preprocess project data Class discussion about projects Module 5: Model Training Choosing the right algorithm Formatting and splitting your data for training Loss functions and gradient descent for improving your model Demo: Create a training job in Amazon SageMaker Module 6: Model Evaluation How to evaluate classification models How to evaluate regression models Practice model training and evaluation Train and evaluate project models Initial project presentations Module 7: Feature Engineering and Model Tuning Feature extraction, selection, creation, and transformation Hyperparameter tuning Demo: SageMaker hyperparameter optimization Practice feature engineering and model tuning Apply feature engineering and model tuning to projects Final project presentations Module 8: Deployment How to deploy, inference, and monitor your model on Amazon SageMaker Deploying ML at the edge Demo: Creating an Amazon SageMaker endpoint Post-assessment Course wrap-up Additional course details: Nexus Humans The Machine Learning Pipeline on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the The Machine Learning Pipeline on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

The Machine Learning Pipeline on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Supply Chain Management, Purchasing & Procurement

By NextGen Learning

Course Overview This comprehensive course in Supply Chain Management, Purchasing & Procurement equips learners with the essential knowledge to understand, analyse, and optimise supply chain functions. It covers the full spectrum of the supply process—from supply chain fundamentals and logistics planning to procurement cycles and supplier relationship management. Learners will gain insights into the critical drivers of supply chain performance, effective purchasing techniques, and risk mitigation strategies. By the end of the course, participants will be able to evaluate supply chain efficiency, manage procurement processes with confidence, and contribute to organisational success through strategic sourcing. Whether you are looking to start a career in this field or elevate your existing role, this course provides a structured foundation to support long-term career growth and operational excellence. Course Description The Supply Chain Management, Purchasing & Procurement course delves into key topics such as transport management, quality control, inventory strategies, and e-procurement systems. Through carefully structured modules, learners explore how to manage supplier relationships, develop category strategies, and navigate the complexities of competitive bidding. Emphasis is placed on understanding logistics frameworks, procurement tools, and risk analysis within global supply chains. The curriculum also highlights the pivotal role procurement plays in organisational success and how purchasing decisions impact overall business performance. Learners will be guided through the intricacies of purchasing toolkits, contract management, and process improvement, enhancing their ability to identify cost-saving opportunities and align supply activities with business objectives. By the end of this course, students will be well-prepared to operate effectively within a wide range of supply chain and procurement functions. Course Modules: Module 01: Supply Chain Basics Module 02: Supply Chain Drivers Module 03: Introduction to Logistic Management Module 04: Planning Framework for Logistics Module 05: Transport Management Module 06: Role of Procurement in an Organisation Module 07: The Purchasing Cycle Module 08: Purchasing Toolkits Module 09: Managing Competitive Bids Module 10: Quality Management Module 11: Supplier Relationship Management Module 12: Analysing and Reducing Risk in the Supply Chain Module 13: Improving Efficiency and Accuracy Module 14: Category Management Module 15: Inventory Management Module 16: E-Procurement (See full curriculum) Who is this course for? Individuals seeking to build a strong understanding of supply chain and procurement operations. Professionals aiming to progress into purchasing, logistics, or supplier management roles. Beginners with an interest in supply chain, logistics, or business operations. Business owners or entrepreneurs wanting to manage procurement functions more effectively. Career Path Supply Chain Analyst Procurement Officer Purchasing Manager Logistics Coordinator Inventory Controller Vendor Relationship Manager Operations Executive Category Manager

Supply Chain Management, Purchasing & Procurement
Delivered OnlineFlexible Dates
£9.99

Diet and Nutrition Specialist Course

By NextGen Learning

Course Overview The Diet and Nutrition Specialist Course provides a comprehensive introduction to the principles of healthy eating, nutrient functions, and dietary management. This course is designed to equip learners with an in-depth understanding of food science, digestion, nutritional needs across different life stages, and the role of diet in preventing and managing health conditions. Throughout the course, students will explore a variety of essential topics, from macronutrients and micronutrients to food intolerances and women’s health concerns. Upon completion, learners will possess the knowledge to interpret food labels, recommend balanced diets, and understand the nutritional considerations for various groups. This course holds immense value for anyone wishing to enhance their expertise in dietetics or pursue a career focused on promoting health and wellbeing. Learners will leave with the ability to make informed nutritional assessments and offer evidence-based advice for healthy living. Course Description The Diet and Nutrition Specialist Course offers a structured learning journey through the fundamentals of food and nutrition, covering key topics essential for understanding human health. Learners will delve into the classification and function of macronutrients and micronutrients, explore the processes of digestion, absorption, and detoxification, and examine how nutrition impacts common health conditions such as heart disease, cancer, and diabetes. Further areas of focus include energy requirements, managing food allergies, maintaining a healthy weight, and specific nutritional needs during pregnancy and infancy. The course is delivered through engaging lessons designed to build both theoretical knowledge and critical thinking skills. By completing this course, participants will develop a robust foundation in nutrition science, enabling them to confidently address dietary concerns, support wellness initiatives, and contribute to healthier communities. This programme is ideal for those committed to advancing their knowledge of nutrition within a professional or personal context. Course Modules Module 01: Basics of Food and Nutrition Module 02: Macronutrients: Classification & Functions of Carbohydrates Module 03: Macronutrients: Classification & Functions of Lipids and Proteins Module 04: Micronutrients I & II Module 05: Digestion and Absorption Module 06: Detoxification Module 07: Healthy & Balanced Diet and Food Labelling Module 08: Average Requirements for Energy and Nutrients Module 09: Food Intolerances and Allergies Module 10: Health Conditions: Heart Disease, Cancer & Diabetes Module 11: Maintaining a Healthy Weight and Eating Problems & Treatments Module 12: Women’s Health Care & Common Concerns During Pregnancy Module 13: Nutrition for the Baby & Special Foods (See full curriculum) Who is this course for? Individuals seeking to gain a comprehensive understanding of diet and nutrition. Professionals aiming to enhance their career in health, wellness, or nutrition advisory roles. Beginners with an interest in nutrition, healthy eating, and human health. Health enthusiasts wanting to deepen their knowledge of dietary science. Career Path Nutrition Advisor Diet and Wellness Consultant Health Coach Community Health Worker Food and Nutrition Educator Public Health Assistant Healthcare Support Roles

Diet and Nutrition Specialist Course
Delivered OnlineFlexible Dates
£9.99

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. Exploring Cisco Tetration Data Center Challenges Define and Position Cisco Tetration Cisco Tetration Features Cisco Tetration Architecture Cisco Tetration Deployment Models Cisco Tetration GUI Overview Implementing and Operating Cisco Tetration Explore Data Collection Install the Software Agent Install the Hardware Agent Import Context Data Describe Cisco Tetration Operational Concepts Examining Cisco Tetration ADM and Application Insight Describe Cisco Tetration Application Insight Perform ADM Interpret ADM Results Application Visibility Examining Cisco Tetration Intent-Based Networking Describe Intent-Based Policy Examine Policy Features Implement Policies Enforcing Tetration Policy Pipeline and Compliance Examine Policy Enforcement Implement Application Policy Examine Policy Compliance Verification and Simulation Examining Tetration Security Use Cases Examine Workload Security Attack Prevention Attack Detection Attack Remediation Examining IT Operations Use Cases Key Features and IT Operations Use Cases Performing Operations in Neighborhood App-based Use Cases Examining Platform Enhancement Use Cases Integrations and Advanced Features Third-party Integration Examples Explore Data Platform Capabilities Exploring Cisco Tetration Analytics Administration Examine User Authentication and Authorization Examine Cluster Management Configure Alerts and Syslog Additional course details: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco NSO Essentials for Programmers and Network Architects v3.0 (NSO201)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolutions designers Overview After completing this course, you should be able to:Explain transactional service activation and how it relates to business requirementsExplain the benefits and uses of Cisco NSOExplain how Cisco NSO communicates with network devicesUnderstand the NETCONF protocol and be able to read and write simple YANG modelsInstall NSO and describe how NSO uses NETCONF and the Device Manager componentUnderstand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capableExplain the YANG service model structureDescribe how YANG is used with NSO, create and deploy a service, and explain NSO FASTMAPDesign and manage services with YANG modelsPerform NSO configuration and basic troubleshooting, and describe the following NSO features: integration options, alarms and reporting, scalability and performance options, and available function packsUse logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devicesExplain the mapping logic of service parameters to device models and consequently to device configurationsDescribe the use of different integration options and APIsExplain the use of Reactive FASTMAP for manipulating and implementing advanced Network Functions Virtualization (NFV) componentsDescribe the use of feature components and function packsDefine and explain the European Telecommunications Standards Institute (ETSI) Open Source NFV Management and Orchestration (MANO) principles and solutionWork with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures The Cisco NSO Essentials for Programmers and Network Architects (NSO201) course introduces you to Cisco© Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides a brief overview of NSO as a network automation solution, as well as an introduction to NETCONF, YANG, and XPath. You will learn about service packages, network element drivers, and Application Programming Interfaces (APIs). The course also covers service creation, device and configuration management, NSO maintenance, NSO options and integrations, and basic NSO troubleshooting. Introduction to Cisco NSO Meeting Challenges with Orchestration Challenges of Network Management Challenges of Network Orchestration NSO Features and Benefits That Meet Challenges Standardized Approach What Is NSO? Logical Architecture Components What Does NSO Do? Orchestration Use Cases How Does NSO Work? Introduction to NETCONF and YANG Packages Mapping Logic Network Element Drivers (NEDs) Resources and Training Resources Training Get Started with Cisco NSO Installing Cisco NSO Setup Overview Cisco NSO Local Installation Installing NEDs Using NetSim NETCONF Overview Challenges of Network Management Introduction to NETCONF NETCONF Operation Device Manager Device Manager Overview Device Configuration Management Device Connection Management Templates and Groups Other Device Management Tools Service Manager Essentials YANG Overview Introduction to YANG Other Representations of YANG Data Types XPath Overview Basic YANG Statements Can You Spot the Error? Using Services Package Architecture Creating a Service Package Sample Service Configuration Service Template YANG Service Model Deploying a Service Model-to-Model Mapping Mapping Introduction Mapping Logic FASTMAP Template Processing Service Design and Cisco NSO Programmability Service Design Service Design Overview Top-Down Approach Bottom-Up Approach Device Configuration Service Model Service Management Service Management Tasks Service Lifecycle Management Guidelines NSO Programmability Introduction NSO Programmability Overview Python Service Skeleton Creating a Service YANG Model Creating a Service Template Template Processing with Python Cisco NSO Flexibility System Configuration and Troubleshooting System Configuration System Troubleshooting Integration Integration Options NETCONF Server Web Integration SNMP Agent Alarm Management and Reporting Alarm Management Reporting Scalability and Performance High Availability High-Availability Cluster Communications Clustering Layered Service Architecture Addressing Performance Limitations Components and Function Packs Function Packs NFV Orchestration Reactive FASTMAP

Cisco NSO Essentials for Programmers and Network Architects v3.0 (NSO201)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware HCX: Management and Operations

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System administrators System engineers Migration engineers Migration architects Overview By the end of the course, you should be able to meet the following objectives: Describe core VMware HCX use cases and common triggers for mobility Describe the core components and features of VMware HCX Describe a real-life example of a VMware HCX project Identify all major Cloud Providers offering and supporting VMware HCX Describe the features of VMware HCX services Explain the different deployment types for VMware HCX and choose the correct components to deploy for a particular use case Understand the resource, network, and VMware ESXi™ and VMware vCenter requirements for VMware HCX Install and configure VMware HCX Understand, deploy, and manage the HCX Service Mesh Understand Network Extension and Traffic Engineering Create Network Extension and enable Mobility Optimized Networking Understand WAN Optimization Understand the different migration types and be able to choose the best one for different applications and workloads Incorporate VMware HCX into a disaster recovery strategy Design a VMware HCX deployment for different use cases Manage the lifecycle of VMware HCX This four-day course gives you knowledge and practical exercises sufficient to manage VMware HCX© and to migrate virtual machines using VMware HCX. The course focuses on configuration and management of VMware HCX. The course equips system administrators with the knowledge, skills, and abilities to achieve competence in migrating virtual machines. Course Introduction Introductions and course logistics Course objectives Introduction to VMware HCX Describe workload mobility challenges that VMware HCX addresses Recognize use cases for VMware HCX Identify all major Cloud providers offering and supporting VMware HCX HCX Services and Deployment Types Describe the functions of VMware HCX components Recognize the services provided by VMware HCX Recognize when to use different deployment types for VMware HCX Be able to choose which components to install and configure for a different VMware HCX service HCX Deployment Identify the resource, network, and ESXi/VMware vCenter server requirements for VMware HCX Understand the VMware vCenter user roles and access requirements Describe the installation workflow Install, activate, and configure VMware HCX manager Understand the compute and network profile requirements for VMware HCX and its services Create site pair, compute, and network profiles Describe and manage the HCX Service Mesh Create and configure a HCX Service Mesh Network Extension Describe network extension use case and benefits Compare the HCX-Network extension service with other solutions Examine Network Extension capabilities and topology Create a Network Extension Describe network traffic packet flow Describe Mobility Optimized Networking Enable Mobility Optimized Networking Describe the TCP Flow Conditioning and Application path resiliency feature of VMware HCX Recognize the key benefits of TCP flow conditioning and Application path resiliency Describe WAN optimization Workload Mobility Describe different migration types Recognize the limitation of each migration method and consideration when planning a migration Understand Bulk and Replication Assisted VMware HCX© vMotion© migration methods Migrate a VM using Bulk migration Describe cold and vMotion migration method Migrate a VM using HCX vMotion migration Examine non VMware vSphere© workload migration Migrate a VM using an OS assisted migration method Business Continuity and Disaster Recovery Examine disaster recovery concepts Describe disaster recovery networks Plan and create disaster recovery networks Describe VM protection operations Protect, recover, and test recovery and reverse replication of a VM Understand VMware HCX and SRM integration and value HCX Lifecycle Management Backup and restore the VMware HCX manager Locate and access VMware HCX logs Troubleshoot VMware HCX Plan for VMware HCX manager and component updates Customer Design Scenarios Design a VMware HCX deployment Choose workload mobility methods for the migration Discuss customer requirements and proposed design Discuss components, services, and migration methods for the scenario

VMware HCX: Management and Operations
Delivered OnlineFlexible Dates
Price on Enquiry

MoD contract terms and conditions (In-House)

By The In House Training Company

This very practical two-day workshop analyses the content and implications of key MoD terms and conditions of contract. The programme explains the principles and terminology of the contractual aspects of defence procurement as well as considering a number of relevant policies and initiatives. The course covers key components, constructs and methodologies associated with any commercial venture entered into with the UK MoD. Starting at the MoD organisational level the workshop sets the scene by looking at the acquisition process and organisation, detailing the various roles and responsibilities of MoD personnel. The workshop provides an in-depth examination of MoD DEFCONs and many narrative terms, setting them in the context of the organisation and its structures. The workshop helps participants to gain an understanding of the content and purpose of the range of MoD DEFCONs and narrative conditions commonly used throughout the acquisition lifecycle. It includes a review of Part 2 of the Defence Reform Act 2014 regarding Single Source Pricing, which comes into effect in 2015 and is already starting to be applied to significant contracts. On completion of this programme the participants will understand the terminology associated with the MoD terms and conditions of contract and will have an accurate view of their relevance, usage and their legal basis and how they can affect contractual and commercial decision-making. They will have gained an insight into defence acquisition contracting and they will be more commercially aware. DAY ONE 1 The commercial environment Key roles and responsibilities of the MoD organisations at the heart of the acquisition process 2 Tendering to MoD An appraisal of some of the obligations placed upon contractors when they are submitting a proposal to the MoD pre-contract 3 Standardised contracting MoD have introduced non-negotiable standardised contracts for certain levels of procurement. This section considers their use and relevance to defence contracting 4 Pricing, profit, post-costing and payment The parameters specific to a costing structure and the differences between competitive and non-competitive bidding The role of the QMAC, the profit formula, the requirements for equality of information and post-costing Different types of pricing and issues surrounding payment 5 Defence Reform Act - Single Source Pricing Single Source Pricing under Part 2 of the new Defence Reform Act Changes from the existing position, how contractors are affected and the compliance regime that accompanies the new requirements 6 Delivery and acceptance Specific requirements and the significance and impact of failing to meet them Acceptance plans Non-performance and the remedies that may be applied by the Customer - breach of contract, liquidated damages and force majeure DAY TWO 7 Protection of information and IPR Contractor's and MoD's rights to own and use information How to identify background and foreground intellectual property Technical information and copyright in documentation and software How to protect IPR at the various stages of the bidding and contracting process 8 Defence Transformation and Defence Commercial Directorate Widening and increasing roles and functions of the Defence Commercial Directorate Background to the Defence Reform Act 2014 9 Legal requirements Terms used in MoD contracts to reflect basic legal requirements Records and materials required for MOD contracts and therefore the obligations, responsibilities and liabilities that a company undertakes when it accepts these conditions Overseas activities 10 Subcontracting and flowdown Understanding the constructs required by the MoD for subcontracting Which terms must be flowed down to the subcontractor and which are discretionary 11 Termination Termination of a contract for default Termination for convenience How to optimise the company's position on termination 12 Warranties and liabilities Obligations and liabilities a company might incur and how they might be mitigated MoD policy on indemnities and limits of liability 13 Electronic contracting environment Electronic forms of contracting Progress toward a fully electronic contracting environment

MoD contract terms and conditions (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Cisco NSO Essentials for Programmers and Network Architects (NSO201) v4.0

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System installers System integrators System administrators Network administrators Solutions designers Overview After completing this course, you should be able to: Explain transactional service activation and how it relates to business requirements Explain the benefits and uses of Cisco NSO Explain how Cisco NSO communicates with network devices Understand the NETCONF protocol and be able to read and write simple YANG models Install NSO and describe how NSO uses NETCONF and the Device Manager component Understand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capable Explain the YANG service model structure Describe how YANG is used with NSO, create and deploy a service, and explain NSO FASTMAP Design and manage services with YANG models Perform NSO configuration and basic troubleshooting, and describe the following NSO features: integration options, alarms and reporting, scalability and performance options, and available function packs Use logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devices Explain the mapping logic of service parameters to device models and consequently to device configurations Describe the use of different integration options and APIs Explain the use of Reactive FASTMAP for manipulating and implementing advanced Network Functions Virtualization (NFV) components Describe the use of feature components and function packs Define and explain the European Telecommunications Standards Institute (ETSI) Open Source NFV Management and Orchestration (MANO) principles and solution Work with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures The Cisco NSO Essentials for Programmers and Network Architects (NSO201) v. 4.0 course introduces you to Cisco© Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides an overview of NSO as a network automation solution, as well as introductions to NETCONF, YANG, and XPath. You will learn about managing devices and creating device templates, service management and service package creation, network element drivers, interfacing with other systems using APIs, configuring and troubleshooting system settings, managing alarms and reporting, configuring NSO for scalability and performance, and capabilities that can be added to Cisco NSO. Introduction to Cisco NSO Meeting Challenges with Orchestration Challenges of Network Management Challenges of Network Orchestration NSO Features and Benefits That Meet Challenges Standardized Approach What Is NSO? Logical Architecture Components What Does NSO Do? Orchestration Use Cases How Does NSO Work? Introduction to NETCONF and YANG Packages Mapping Logic Network Element Drivers (NEDs) Resources and Training Resources Training Get Started with Cisco NSO Installing Cisco NSO Setup Overview Cisco NSO Local Installation Installing NEDs Using NetSim NETCONF Overview Challenges of Network Management Introduction to NETCONF NETCONF Operation Device Manager Device Manager Overview Device Configuration Management Device Connection Management Templates and Groups Other Device Management Tools Service Manager Essentials YANG Overview Introduction to YANG Other Representations of YANG Data Types XPath Overview Basic YANG Statements Can You Spot the Error? Using Services Package Architecture Creating a Service Package Sample Service Configuration Service Template YANG Service Model Deploying a Service Model-to-Model Mapping Mapping Introduction Mapping Logic FASTMAP Template Processing Service Design and Cisco NSO Programmability Service Design Service Design Overview Top-Down Approach Bottom-Up Approach Device Configuration Service Model Service Management Service Management Tasks Service Lifecycle Management Guidelines NSO Programmability Introduction NSO Programmability Overview Python Service Skeleton Creating a Service YANG Model Creating a Service Template Template Processing with Python Cisco NSO Flexibility System Configuration and Troubleshooting System Configuration System Troubleshooting Integration Integration Options NETCONF Server Web Integration SNMP Agent Alarm Management and Reporting Alarm Management Reporting Scalability and Performance High Availability High-Availability Cluster Communications Clustering Layered Service Architecture Addressing Performance Limitations Components and Function Packs Function Packs NFV Orchestration Reactive FASTMAP

Cisco NSO Essentials for Programmers and Network Architects (NSO201) v4.0
Delivered OnlineFlexible Dates
Price on Enquiry

BA01 - Business Analysis Essentials

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Designed for individuals new to the business analyst role or those who supervise and/or work with business analysts. Overview Understand the role of the business analyst Discuss industry standards/resources for obtaining more information about business analysis Acquire a solid understanding of the various tasks/activities that comprises business analysis Recognize the pre and post project business analysis activities Learn how to plan, elicit, analyze, model, and test requirements This is an introductory course designed to provide students with a basic understanding of the benefits, functions and impact a business analyst has within an organization. The course discusses the business analysis process as it is applied throughout a project as well as the pre-project activities that comprise strategy analysis. Students learn how a business analyst supports the project throughout the solution development life cycle, from defining business needs and solution scope to validating that requirements have been met in the testing phase and ensuring the solution continues to provide value after implementation. Introduction to Business Analysis Business analysis defined The activities that comprise business analysis IIBA/PMI and the goals of a professional association IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Exercise: Requirements challenges The IIBA? and the role of the Business Analyst Business analyst defined BA role vs. PM role Importance of communication/collaboration The deliverables produced as part of business analysis The BA career path Exercise: Review case Study Strategy Analysis and Change The definition of Strategy Analysis Components of Strategy Analysis Identifying stakeholders and business needs Exercises: Business Need development and RACI Stakeholder Identification Understanding and Defining Solution Scope Defining Solution Scope Project scope vs. product scope Defining a problem statement Techniques for defining scope Exercises: Conduct a brainwriting session and create a context diagram Optional exercise: Create a Use Case Diagram Understanding Requirements Define the term requirement Understand requirement types Present the requirements process Requirements vs. specifications and business rules Exercise: Identify Requirements Planning & Eliciting Requirements The Requirements Work Plan (RWP) Components of the RWP Identifying good questions for elicitation Active listening Categories and types of elicitation techniques Exercise: Planning for elicitation Analzying & Documenting Requirements Understanding requirements analysis The Business Requirements Document (BRD) The BRD vs. the functional requirements specification BRD components The purpose of packaging requirements Exercise: Analyzing Requirements Elicitation & Process Modeling Why models are created Objectives of modeling What is process management Understanding process modeling Modeling using BPMN AS-IS vs. TO-BE modeling BPMN subclasses BPMN simple structure Prototyping Business Process Modeling case study Exercises: Modeling and create a Prototype of your application Verifying & Validating Requirements The difference between validation and verification Characteristics of good requirements Risks associated with requirements Types of testing approaches Creating a test plan Requirements traceability matrix Verified and validated requirements Exercise: Testing Requirements Additional Resources Helpful links for obtaining additional business analysis information Additional course details: Nexus Humans BA01 - Business Analysis Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA01 - Business Analysis Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA01 - Business Analysis Essentials
Delivered OnlineFlexible Dates
Price on Enquiry