• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3738 Courses in Sheffield delivered Live Online

Certified Information Privacy Technologist (CIPT)

By Training Centre

  The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles.  Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you.  The CIPT certification also holds accreditation under ISO 17024: 2012 About This Course   What will you learn?   Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to pre-empt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal.   This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice.   MODULE 1: Fundamentals of Information Privacy   Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles.   Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors.   Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM).   Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices.    MODULE 2: Privacy in Technology   Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments.   Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams.   Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle.   Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them.   Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data.   Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection.   Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use. Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. What's Included?   1 years membership of the IAPP  Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees Who Should Attend?   The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialists Accreditation Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
£1,395

Managing Successful Programmes 5th Edition Foundation: In-House

By IIL Europe Ltd

Managing Successful Programmes (MSP®) 5th Edition Foundation: In-House Training Managing Successful Programmes (MSP®) is a globally-recognized framework for best practice programme management. MSP certification provides guidance for programme managers, business change managers and the next step for project managers to develop their knowledge and skills to be able to positively respond to the challenges for managing programmes and larger, more strategic or multiple projects. MSP 5th edition emphasizes flexibility, adaptability, and responsiveness by adopting an incremental approach to the programme lifecycle and thus enabling organizational agility. AXELOS offers two levels of MSP Examination: MSP Foundation and MSP Practitioner. The MSP Foundation Examination is intended to assess whether the candidate can demonstrate sufficient recall and understanding of the MSP programme management framework. The MSP Foundation qualification is a prerequisite for the MSP Practitioner Examination, which assesses the ability to apply understanding of the MSP programme management framework in context. The MSP® 5th Edition Foundation course is a training based on the exam specification for MSP Foundation certification and is aligned with the Managing Successful Programmes (5th Edition) guide from AXELOS. What you will Learn At the end of this course, participants will be able to: Understand key concepts relating to programmes and MSP Understand how the MSP principles underpin the MSP framework Understand the MSP themes and how they are applied throughout the programme Understand the MSP processes and how they are carried out throughout the programme Key Concepts of MSP Programmes Three Lenses of MSP Principles Themes and Governance Organization Organization Theme Organization Structure Individual Roles Stakeholder Management Design Design Theme Benefits Risk Identification and Prioritization Target Operating Model Documents and Key Roles Justification Justification Theme Business Case Financial Planning Documents and Key Roles Structure Structure Theme Delivery Planning Dependencies Benefits Realization Plan Resourcing Documents and Key Roles Knowledge Knowledge Theme Knowledge Management Information Management Document and Key Roles Assurance Assurance Theme Assurance at Multiple Levels Assurance Planning Document and Key Roles Decisions Decisions Theme Issue Resolution Risk Response Data Gathering and Reporting Options and Analysis Document and Key Roles MSP Processes Identify the Programme    Design the Outcomes Plan Progressive Delivery Deliver the Capabilities Embed the Outcomes Evaluate New Information Close the Programme

Managing Successful Programmes 5th Edition Foundation: In-House
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

TOGAF® EA Course - Foundation and Practitioner (Level 1 and 2)

By Advised Skills

This course is designed to enable candidates to develop the knowledge of the terminology and basic concepts of TOGAF Standard, 10th Edition and principles of Enterprise Architecture. Candidates will also be able to analyze and apply knowledge of TOGAF Standard.

TOGAF® EA Course - Foundation and Practitioner (Level 1 and 2)
Delivered OnlineFlexible Dates
£1,419

Microsoft Project White Belt 2016: In-House Training

By IIL Europe Ltd

Microsoft® Project White Belt® 2016: In-House Training This workshop serves as an introduction to the interface and features of Microsoft® Project. This workshop serves as an introduction to the interface and features of Microsoft® Project. It is kept up to date with the framework outlined by Project Management Institute's A Guide to the Project Management Body of Knowledge (PMBOK® Guide). This course will be led by an IIL-certified instructor who will outline the benefits of Microsoft Project, provide tips on using various features and common shortcuts, recommend guidelines, and discuss the application of scheduling concepts to manage project work. What you Will Learn You'll learn how to: Define key scheduling concepts and terms Effectively navigate the user interface and interpret common views Configure essential elements of a new schedule Enter and modify a task list Set dependencies between tasks Create a basic resource list and generate assignments Format targeted areas of the Gantt Chart view Prepare the schedule for printing Getting Started Introductions Course objectives Course outline Navigating the User Interface and Views The ribbon The Quick Access Toolbar General and display options Major elements on the Project screen The Gantt chart, calendar, and network diagram views The help Setting up a New Schedule New schedules from blank, templates or other files The project starting date and forward scheduling The project standard calendar and exception days Entering, Modifying, and Outlining Task Data Task entering options and edition Unscheduled tasks Duration estimates for a single task or multiple tasks Tasks organization Multi-level outline Notes to detail tasks Creating Dependencies by Setting Links The critical path Critical path calculation in Project Dynamic schedules and dependencies Link tasks in Project Displaying the critical path Entering and Assigning Resources Resource planning Resource list Resource assignments Formatting Gantt Chart View Format options for text and Gantt charts Print options

Microsoft Project White Belt 2016: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£495

Emergency Response and Crisis Management

5.0(10)

By GBA Corporate

Overview Overview The purpose of this course is to enable participants to understand and apply the principles of emergency response planning and crisis management. It considers the need for emergency and crisis response planning and an integrated approach to emergency management. Training typically covers: Crisis management structure and staffing an emergency response team Incident reporting and notification Operational processes Guidance of facility response policies and procedures Annual testing and evaluation of the crisis management plan Upcoming Events Online (USD 1950) Online Streaming Live (Flexible Dates) At Venue (USD 4500) Dubai 13 March - 17 March Istanbul 20 March - 24 March London 20 March - 24 March For more dates and Venue, Please email sales@gbacorporate.co.uk

Emergency Response and Crisis Management
Delivered in Internationally or OnlineFlexible Dates
FREE to £1,489

Prioritizing Your Time Effectively

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Professionals wishing to maximize their productivity and efficiency by investing their time more effectively will benefit from this course. Overview Time Management Prioritization Organization Workflow Productivity Time is limited, so getting the most out of every minute is critical. In this course, students will learn to improve their focus, prioritize tasks, identify and avoid obstacles to staying on track, and develop strategies to get the most out of their time. Students will acquire time management tools and decision-making techniques to help focus on purpose and achieve your goals, balancing the needs of both business and personal life. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Wise Time Management Identifying Time Wasters Applying the 80/20 Rule Utilizing Calendars Creating Rituals 2. Prioritizing Your Time Taking Charge of Your Time Protecting Your Time through Assertiveness 3. Planning Wisely Managing the Power of Your Productivity Journal Finding Hidden Time Chunking, Blocking, and Tackling 4. Organizing Your Workspace Decluttering Managing Workflow Taking Control over Email 5. Tackling Procrastination Knowing Why You Procrastinate Nine Ways to Avoid Procrastination 6. Crisis Management Weathering the Storm Creating and Executing a Plan Applying Lessons Learned 7. Increase Your Productivity Applying Productivity Tools Finding What Works Eliminating the Word \'Should\' Building on Success Additional course details: Nexus Humans Prioritizing Your Time Effectively training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Prioritizing Your Time Effectively course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Prioritizing Your Time Effectively
Delivered OnlineFlexible Dates
£1,500

ISO 27001: 2022 Internal Auditor

By Training Centre

  During this training course, you will acquire the knowledge and skills to plan and carry out internal audits in compliance with ISO 19011. About This Course   Based on a number of exercises, you will learn how to utilise audit techniques and become competent to manage an internal audit programme, communicate with customers, and manage conflict resolution. After acquiring the necessary expertise, you can sit for the exam and gain 'Certified ISO/IEC 27001: 2022 Internal Auditor' Certification. By holding this Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices. Learning objectives By the end of this training course, the participants will be able to: Explain the concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001: 2022 Analyse the ISO/IEC 27001: 2022 requirements for an ISMS from the perspective of an auditor Evaluate the ISMS conformity requirements Plan, conduct, and close an ISO/IEC 27001: 2022 compliance audit programme Assist an organisation in transitioning from ISO 27001: 2013 Deliver an ISO/IEC 27001: 2022 Internal audit programme Our approach This training is based on both theory and best practices used in ISMS audits Lessons are illustrated with examples based on case studies Practical exercises are based on a real world case study Practice tests are similar to the Certification Exam Course Overview Module 1 Foundational Audit principles and concepts of Information Security Management System (ISMS) Module 2 The Information Security Management System (ISMS) Module 3 ISO 19011 audit concepts and principles Module 4 Preparation of an ISO/IEC 27001 audit Module 5 Providing an ISO/IEC 27001 audit Module 6 Closing an ISO/IEC 27001 audit Module 7 Managing an ISO/IEC 27001 Internal audit programme Course Agenda Day 1: Introduction to the information security management system (ISMS) and ISO/IEC 19011 Day 2: Audit principles, preparation, and initiation of an audit Day 3: Audit activities, Closing the Audit and the Certification exam Accreditation Assessment   All candidates at official training courses are tested throughout their course with quizzes and exercises, in combination with a final exam held on the last day of the course. Both elements are a part of the overall score. For this course, the final exam constitutes a 10 question essay type which should be completed within 125 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. Exam results are returned within 24 hours, with successful candidates receiving both a digital badge and a Certificate of Achievement Prerequisites     A general understanding of ISO/IEC 27001: 2022 and knowledge of audit principles.   Provided by   This course is Accredited by NACS and Administered by the IECB What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides CPD Certificate The Exam Who Should Attend?   Auditors seeking to perform Internal Information Security Management System (ISMS) certification audits Managers or consultants seeking to master an Information Security Management System audit process Individuals responsible for maintaining conformance with Information Security Management System requirements Technical experts seeking to prepare for an Information Security Management System audit Expert advisors in Information Security Management

ISO 27001: 2022 Internal Auditor
Delivered OnlineFlexible Dates
£1,250

Rhino 2D | 3D Training Course for Jewellery Design

By London Design Training Courses

Why Opt for the Rhino 3D Training Course in Jewelry Design? Click here for more info Within a span of 10 hours, you'll master the interface and gain insights into how Rhino leverages points, lines, surfaces, and solids to fashion printable 3D objects. Moreover, you'll explore the art of crafting repetitive and intricate geometric shapes, perfect for creating minimalist and elegant jewelry. Flexible Scheduling: 1-on-1 training sessions tailored to your schedule. Pick any hour between 9 am and 7 pm from Mon to Sat. Course Duration: 10 hours. Training Methods: Choose between in-person sessions or live online training. Why Choose Our Rhino 3D Training Course for Jewelry Design? Rhino, also known as Rhinoceros, stands as a robust 3D computer graphics and computer-aided design software extensively utilized in various industries, including architecture, industrial design, and multimedia. LDTC offers meticulously crafted Rhino courses to empower you in mastering this software. Led by experienced instructors, our courses ensure a comprehensive understanding of Rhino, equipping you to create exceptional designs, specifically tailored for jewelry creation. Rhino 3D Training for Jewelry Design: Our Rhino 3D training caters to both beginners and those aspiring to acquire advanced techniques, emphasizing its application in jewelry design. Course Highlights: Precise 3D Modeling: Master the art of crafting free-form 3D NURBS models with utmost precision. Advanced Functionality: Explore Rhino's advanced surfacing commands and features tailored for jewelry design. User Interface Mastery: Navigate Rhino's interface seamlessly and refine your skills in curves, surfaces, and solids. Expert Guidance: Acquire expertise in Rhino's modeling environment under the guidance of seasoned professionals. Modeling Why Choose Our Rhino 3D Training Course for Jewelry Design? Rhino, also known as Rhinoceros, stands as a robust 3D computer graphics and computer-aided design software extensively utilized in various industries, including architecture, industrial design, and multimedia. LDTC offers meticulously crafted Rhino courses to empower you in mastering this software. Led by experienced instructors, our courses ensure a comprehensive understanding of Rhino, equipping you to create exceptional designs, specifically tailored for jewelry creation. Rhino for Jewelry Design - 16-Hour Course Module 1: Introduction and Navigation Get acquainted with Rhino's interface, menus, and screen layout. Navigate Rhino models with precision in 2D lines, polylines, and NURBS curves. Use modeling setup features like snap, ortho, and planar constraints for accuracy. Leverage object snaps and Smart Track functionality for enhanced precision. Module 2: Solid and Surface Modeling Fundamentals Rapidly develop 3D solids and surfaces using Rhino's organized layering system. Utilize coordinates and constraints for meticulous modeling in 3D space. Create diverse shapes, including rectangles, circles, arcs, ellipses, and polygon curves. Enhance models with Rhino render, render color, and free-form curves. Efficiently handle model views with pan, zoom, and view management tools. Implement various editing commands for curve manipulation and transforming curves into surfaces and solids. Utilize history tracking for advanced editing and execute general editing actions. Module 3: Intermediate Edit and Surfacing Techniques Introduce essential NURBS modeling concepts and terminologies. Edit curves and surfaces through control point manipulation and rebuilding for optimal refinement. Use the nudge modeling aid for precise adjustments and generate deformable shapes. Create curves through projection techniques and split surfaces using curves and surfaces. Blend surfaces seamlessly, utilizing symmetry tools, lighting, and rendering effects. Convert intricate 3D objects into detailed 2D drawings and craft page layouts. Module 4: Advanced Surfacing and Solid Modeling Techniques Construct model primitives and solid text using techniques such as pipe and extrusion. Efficiently modify solids using Boolean tools, expanding surface modeling capabilities. Utilize techniques like extrusion, lofting, and revolving for intricate surfaces. Create sweeps using 1 and 2 rail curves and master surface network techniques for complex shapes. Downlaod Rhino. Upon completion of the Rhino 3D Training Course for Jewelry Design, participants can expect the following learning outcomes: Mastering Rhino Interface: Gain a comprehensive understanding of Rhino's interface, menus, and screen layout. Precision in Modeling: Navigate Rhino models with precision using 2D lines, polylines, and NURBS curves. Modeling Setup Proficiency: Utilize modeling setup features such as snap, ortho, and planar constraints for accurate designs. Enhanced Navigation Techniques: Leverage object snaps and Smart Track functionality for enhanced precision during navigation. Solid and Surface Modeling Skills: Rapidly develop 3D solids and surfaces with Rhino's organized layering system. Coordination and Constraint Application: Utilize coordinates and constraints for meticulous modeling in 3D space. Diverse Shape Creation: Create diverse shapes, including rectangles, circles, arcs, ellipses, and polygon curves. Rendering and Enhancement Techniques: Enhance models with Rhino render, render color, and free-form curves. Efficient Model View Handling: Efficiently handle model views with pan, zoom, and view management tools. Intermediate Edit and Surfacing Techniques: Edit curves and surfaces through control point manipulation and rebuilding for optimal refinement. NURBS Modeling Mastery: Introduce essential NURBS modeling concepts and terminologies. Advanced Editing and Modeling Skills: Use the nudge modeling aid for precise adjustments and generate deformable shapes. Complex Shape Creation: Create sweeps using 1 and 2 rail curves and master surface network techniques for intricate shapes. Solid Modeling Proficiency: Construct model primitives and solid text using techniques such as pipe and extrusion. Application of Boolean Tools: Efficiently modify solids using Boolean tools, expanding surface modeling capabilities. Advanced Surfacing Techniques: Utilize techniques like extrusion, lofting, and revolving for intricate surfaces. Conversion and Crafting of 2D Drawings: Convert intricate 3D objects into detailed 2D drawings and craft page layouts. Hands-On Project Experience: Engage in practical exercises and hands-on projects tailored for jewelry design applications. Upon mastering these skills, participants will be well-equipped to create sophisticated jewelry designs using Rhino 3D modeling software.

Rhino 2D | 3D Training Course for Jewellery Design
Delivered in London or OnlineFlexible Dates
£290

Level 3 Certificate in Understanding Autism

By Step Into Learning

Level 3 Certificate in Understanding Autism will provide further learning in autism for those that have already completed the level 2 qualification.

Level 3 Certificate in Understanding Autism
Delivered OnlineFlexible Dates
£811

Cloud Operations on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview Identify the AWS services that support the different phases of Operational Excellence, an AWS Well-Architected Framework pillar Manage access to AWS resources using AWS accounts and organizations and AWS Identity and Access Management (IAM) Maintain an inventory of in-use AWS resources by using AWS services, such as AWS Systems Manager, AWS CloudTrail, and AWS Config Develop a resource deployment strategy using metadata tags, Amazon Machine Images (AMIs), and AWS Control Tower to deploy and maintain an AWS cloud environment Automate resource deployment by using AWS services, such as AWS CloudFormation and AWS Service Catalog Use AWS services to manage AWS resources through CloudOps lifecycle processes, such as deployments and patches Configure a highly available cloud environment that uses AWS services, such as Amazon Route 53 and Elastic Load Balancing, to route traffic for optimal latency and performance Configure AWS Auto Scaling and Amazon EC2 Auto Scaling to scale out your cloud environment based on demand Use Amazon CloudWatch and associated features, such as alarms, dashboards, and widgets, to monitor your cloud environment Manage permissions and track activity in your cloud environment by using AWS services, such as AWS CloudTrail and AWS Config Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service State the purpose, benefits, and appropriate use cases for mountable storage in your AWS Cloud environment Explain the operational characteristics of object storage in the AWS Cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier Build a comprehensive cost model to help gather, optimize, and predict your cloud costs by using services such as AWS Cost Explorer and the AWS Cost & Usage Report This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems. The course also covers specific AWS features, tools, and best practices related to these functions. Prerequisites Successfully completed the AWS Technical Essentials course Background in either software development or systems administration Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows Basic knowledge of networking protocols (TCP/IP, HTTP) 1 - Introduction to Cloud Operations on AWS What is Cloud Operations AWS Well-Architected Framework AWS Well-Architected Tool 2 - Access Management AWS Identity and Access Management (IAM) Resources, accounts, and AWS Organizations 3 - System Discovery Methods to interact with AWS services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config 4 - Deploy and Update Resources Cloud Operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower 5 - Automate Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Hands-On Lab: Infrastructure as Code 6 - Manage Resources AWS Systems Manager Hands-On Lab: Operations as Code 7 - Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 8 - Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager 9 - Monitor and Maintain System Health Monitoring and maintaining healthy workloads Monitoring AWS infrastructure Monitoring applications Hands-On Lab: Monitor Applications and Infrastructure 10 - Data Security and System Auditing Maintaining a strong identity and access foundation Implementing detection mechanisms Automating incident remediation 11 - Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC 12 - Mountable Storage Configuring Amazon Elastic Block Store (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Hands-On Lab: Automating with AWS Backup for Archiving and Recovery 13 - Object Storage Deploying Amazon Simple Storage Service (Amazon S3) Managing storage lifecycles on Amazon S3 14 - Cost Reporting, Alerts, and Optimization Gaining AWS cost awareness Using control mechanisms for cost management Optimizing your AWS spend and usage Hands-On Lab: Capstone lab for CloudOps Additional course details: Nexus Humans Cloud Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloud Operations on AWS
Delivered OnlineFlexible Dates
£2,025