Disciplined Agile Senior Scrum Master (DASSM): Virtual In-House Training Do you want to take Disciplined Agile® to a new level? Are you looking for tools to solve complex problems and enhance your organization's agility? Do you want to learn how to lead your team to excellence? Expand your knowledge and build practical skills around Disciplined Agile®, business agility, leadership, and team development. Disciplined Agile Senior Scrum Master is a nine-lesson, instructor-led course that shows you how to use the Disciplined Agile tool kit to solve a variety of advanced problems, work with allies within your organization, and optimize how teams work. You will gain knowledge in planning, reporting and metrics, and coordinating activities, as well as how to meet challenges in these areas. And you'll develop the skills you need to foster emotional intelligence, resolve conflicts, and lead high-performance teams at any stage of development. Filled with activities, supplemental reading, and more, this course will prepare you to take the Disciplined Agile Senior Scrum Master (DASSM) exam and, equally important, start using Disciplined Agile immediately within your leadership role. What You Will Learn After the completion of this course, you will be able to: Accelerate your ability to lead high-profile initiatives that are critical to enterprise success Take a deep dive into the Disciplined Agile® tool kit to develop a comprehensive understanding of the hundreds of practices and strategies it contains and the trade-offs of applying them Apply the Disciplined Agile tool kit in hands-on exercises to guide your team in choosing and evolving your best way of working (WoW) in real-life situations Use the tool kit to solve complex challenges commonly encountered in development and operational teams, the value stream, and at the enterprise level Learn how to design and implement metrics that measure your improvements in areas where your teams are struggling Understand how to nurture emotional intelligence Feel confident empowering others on your team(s) Learn how to lead your teams in any situation to improve value delivery for your customers Apply the Disciplined Agile tool kit to guide your team in choosing and evolving the best way of working (WoW) in the situation you face Be prepared to take the Disciplined Agile® Senior Scrum Master (DASSM) exam and earn a valuable, credible certification Roles and responsibilities of DASSM Tuckman Team Development Model Emotional intelligence and why it is essential to team performance Business agility Tactical scaling factors in more complex situations Disciplined DevOps layer 'Test-first' method as it relates to the quality of requirements Scope and purpose of the value stream layer Coordinate activities process goal and why it is important Value creation structure of teams DA™ tool kit to optimize the flow of work and solve challenges related to coordinating and collaborating across teams, or within a larger team of teams Thomas-Kilmann Conflict Resolution Planning Five levels of scope Metrics
Overview In this competitive era no matter how much hard work and solid efforts are contributed still, too many projects end up creating unneeded and unsellable products. There is a significant risk that the outcome of the project may not be relevant to the client/user requirements or become outdated when needs change. Here is where Design Thinking and Agile Management play their role. The combination of Agile and Design Thinking should be used in order to achieve impactful outcomes. Agile and design thinking together works well and gives an effective approach to product development, one that results in efficient resolutions to significant problems. In this course, you'll learn how to define and determine what's important to a user primary in the process, to frontload value, by directing your team on testable narratives about the user and generating an effectively shared perspective. For more dates and Venue, Please email sales@gbacorporate.co.uk
LEARN ABOUT BEHAVIORAL VS. TRADITIONAL INTERVIEWING, AND HOW TO INCORPORATE AND DEVELOP INTERVIEWING SKILLS TO ENSURE THAT YOU FIND THE RIGHT CANDIDATE FOR THE JOB. Behavioral Interviewing means asking candidates questions that will help you to discover how the interviewee acted in specific employment-related situations. Because past performance is a good indicator of how someone will act in the future, this style of interviewing is extremely useful, and the method of choice for recruiting teams. In this session, you will learn about behavioral vs. traditional interviewing, and how you can incorporate and develop your interviewing skills to ensure that you have the right candidate for the job. OBJECTIVES Participants will be able to: Build a consistent framework and process to ensure an unbiased candidate experience; Choose job specifications and determine how success will be measured (skills); Identify characteristics and qualities that will support the required skills; Prepare questions to elicit descriptions of behaviors, attitudes, and skills necessary for the job; Review legal and appropriate interviewing etiquette/guidelines, including social media research; Screen candidates, using resumes and phone interviews; and Conduct successful role-play Behavioral Interviews in class. CLASSES WILL INCLUDE: Workbooks for future reference and study. Workshop / role play with actual interview scenarios to assist in internalizing data. Time for individual questions and concerns to aid in personalizing tactics. Online Format—Behavioral Interviewing is a 4-hour interactive online class for up to six people. Register for this class and you will be sent ONLINE login instructions prior to the class date. Rich has an engaging presentation style. The New Mexico chapter of the International Society for Performance Improvement (NMISPI) gave high marks to his interactive and lively Improving Customer Service workshop. There were opportunities to share ideas and analyze different techniques, and 87% of attendees said that they would recommend this workshop to others. Ildiko OraveczNew Mexico International Society for Performance Improvement
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is Enterprise Desktop Support Technicians (EDSTs). These technicians provide Tier 2 support to users with domain-joined computers running the Windows 11 OS, typically in medium to large enterprise organizations. Overview Important Windows 11 features How these features are used in an Active Directory How to troubleshoot these features This is a 5-day ILT course that is designed to provide you with the knowledge and skills required to support and troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment. 1: Introducing Windows 11 Overview of Windows 11 Recommendations for typical troubleshooting procedures Troubleshooting installation and deployment Introduction to management and troubleshooting tools 2: Administering Windows 11 remotely Using Windows Admin Center Using Windows PowerShell Implementing Remote Management 3: Troubleshooting startup and performing system recovery Recovering Windows 11 Configuring the Registry Troubleshooting Windows 11 startup Implementing and troubleshooting BitLocker Troubleshooting OS service Issues 4: Troubleshooting devices and device drivers Overview of hardware troubleshooting Troubleshooting device drivers 5: Configuring and troubleshooting network connectivity Configuring network connectivity Troubleshooting network connectivity Implementing and troubleshooting name resolution Implementing and troubleshooting remote access 6: Troubleshooting Group Policy Overview of Group Policy Resolve GPO application issues on client devices 7: Configuring and Troubleshooting Security Settings Implementing network security Implementing Windows 11 security features Configuring and troubleshooting user accounts 8: Configuring and Troubleshooting User State Implementing and troubleshooting user state Implementing and troubleshooting Folder Redirection 9: Configuring and Troubleshooting Resource Access Configuring and troubleshooting file access. Configuring and troubleshooting shared folders. Implementing and troubleshooting Work Folders. Managing and troubleshooting printers. Recovering files. 10: Troubleshooting apps Troubleshooting desktop apps Troubleshooting app compatibility Managing UWP apps 11: Monitoring and Maintaining Windows 11 Monitoring Windows 11 Optimizing Windows 11 performance Managing Windows 11 updates
Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security
Study abroad is about stepping out of your comfort zone, embracing a new culture and way of life, and coming home with unforgettable memories
Duration 2 Days 12 CPD hours This course is intended for This course is designed for people who know how to create basic list and group reports and need to create reports that include subreports, cross-tabs, advanced formulas, and charts based on more than one data series. They may also need to build tools that make it easier for other people to create reports. They may or may not have programming and/or SQL experience. Overview In this course, you will create complex reports using tools in Crystal Reports 2016. You will: Create automatic and manual running totals. Work with cross-tab reports. Add subreports. Create drill-downs in a report. Use SQL statements in report processing. Create complex formulas. Add charts to reports. Enhance report functionality. In this course, students will create complex reports & data sources using the tools in Crystal Reports 2016. Students will not only create more complex reports including sub-reports and cross-tabs, but will also increase their speed and efficiency. 1 - CREATING RUNNING TOTALS Topic A: Create a Running Total Field Topic B: Modify a Running Total Field Topic C: Create a Manual Running Total 2 - WORKING WITH CROSS-TABS Topic A: Create a Cross-Tab Report Topic B: Format a Cross-Tab Report Topic C: Create Groups in Cross-Tab Reports 3 - ADDING SUBREPORTS Topic A: Insert a Subreport Topic B: Edit a Subreport Topic C: Share Variables 4 - CREATING DRILL-DOWNS IN A REPORT Topic A: Create a Drill-Down Topic B: Create Headings for Drill-Down Data 5 - USING SQL STATEMENTS IN REPORT PROCESSING Topic A: Create a Report Using SQL Queries Topic B: Summarize Report Data Topic C: Create Joins Using SQL Topic D: Create Subqueries Topic E: Create an SQL Expression Field 6 - CREATING COMPLEX FORMULAS Topic A: Work with Loops Topic B: Work with Arrays 7 - ADDING CHARTS TO REPORTS Topic A: Create Charts Topic B: Create a Chart with Drill-Down Topic C: Create a Top N Chart Topic D: Create a Cross-Tab Chart Topic E: Create Charts for Grouped Data Topic F: Format a Chart Topic G: Create a Chart Template 8 - ENHANCING REPORT FUNCTIONALITY Topic A: Organize Data Based on a Hierarchy Topic B: Create a Dynamic Image Topic C: Create a Report Alert Topic D: Create a Geographic Map 9 - APPENDIX Appendix A: Managing Reports Appendix B: Processing Data on the Server Appendix C: Detecting and Fixing Problems
This course provides a comprehensive introduction to foodborne viruses, focusing on their properties, transmission, and impact on food safety. Designed for professionals at all levels, it covers detection methods, contamination risks, and prevention strategies to help businesses mitigate viral threats in food supply chains. Delivered by an industry expert, the course includes an interactive Q&A session for deeper insights. No prior knowledge is required.
Circle of Friends is an approach to enhancing the inclusion, in a mainstream setting, of any child or young person who is experiencing difficulties in school because of disability, personal crisis or because of their challenging behaviour towards others. The ‘circle of friends’ approach works by mobilising the young person’s peers to provide support and engage in problem solving with the person in difficulty. Online Course now available via Teachable Platform – Creating Circles ofFriends Learn at your own pace… lots of text and video support Course Category Inclusion Peer Support Behaviour and Relationships Autism and Communication Description Circle of Friends is an approach to enhancing the inclusion, in a mainstream setting, of any child or young person who is experiencing difficulties in school because of disability, personal crisis or because of their challenging behaviour towards others. The ‘circle of friends’ approach works by mobilising the young person’s peers to provide support and engage in problem solving with the person in difficulty. ‘Circle of friends’ is not the same as ‘circle time’ but many of the skills and techniques used by teachers in ‘circle time’ can be used to support the ‘circle of friends’ process. Over the past 12 years Colin Newton and Derek Wilson have been encouraging the use of ‘circle of friends’ in a wide variety of primary and secondary schools, often with very successful outcomes. Some of these are described in their books ‘Circles of Friends’, (Folens, 1999) and ‘Creating Circles of Friends’ (Inclusive Solutions, 2005). This is an excellent opportunity to learn from Colin Newton and Derek Wilson the educational psychologists who brought this Department of Education endorsed approach to the UK. Learn how to build teams around challenging pupils by drawing on a resource which is always there…. other children. Enjoy participating in a multi media workshop that will challenge, entertain and reach for your emotions. Circles of support are for us all, for life…. and they work! Testimonials ‘Absolutely fantastic session – so thought provoking and positive.’ ‘Well presented excellent course’ ‘Wonderful, mind blowing day. Lots of children and young people there we need to really see – not treat’ ‘Excellent presentation, lively, modern, current – definitely got the attention. Course gave great food for thought and I feel confident that this way of working will have a place in the future of our school. Learning Objectives To be able to understand the values and wider context of inclusion To be able to set up and run a ‘circle of friends’ to reduce likelihood of a pupil being excluded or segregated To understand and be able to maximise the power of the peer group in supporting relationships, achievement and behaviour Who Is It For ? Primary and secondary teachers Heads and Deputies SENCOs Learning Support and Guidance staff Advanced Skills Teachers Parents Local Authority Support Services Community Development workers Early Years and School based Practitioners Course Content The course answers the questions: What do you do with the child who is isolated by their aggression and anger, through being different, disabled or new to the school or community? Practically how do we go about including high profile children or young people? How can we help some children be friends? We will cover: The importance of Welcome Inclusion values underpinning this work The Intentional Building of Relationships – ‘Circle of Friends’ work as an example Not doing it alone – The Importance of Teams in developing inclusive practice Practical setting up of circles of friends Lessons learned Stories of circles in primary and secondary mainstream schools ^ Circles of Friends Training in Kiev, Ukraine