• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2174 Courses delivered Live Online

ISO 13485 Lead Auditor

By Training Centre

  During this training course, delegates will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. Based on practical exercises, you will learn audit techniques and become competent to manage an audit program, audit team, communication with customers, and understand reporting requirements. After acquiring the necessary expertise to perform this audit, you can sit for the exam and gain the "Certified ISO 13485 Lead Auditor' Certificate. By holding this Certificate, delegates can demonstrate that they have the competencies to audit organizations based on best practices. About This Course   Learning Outcomes   Review a Medical Devices Quality Management System based on ISO 13485 Acknowledge the correlation between ISO 13485 and other standards and regulatory frameworks Understand an auditor's role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011 Learn how to lead an audit and audit team Learn how to interpret the requirements of ISO 13485 in the context of a MDQMS audit Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011   Course Agenda   Day 1: Introduction to Medical Devices Quality Management Systems (MDQMS) and ISO 13485 Day 2: Audit principles, preparation and launching of an audit Day 3: On-site audit activities Day 4: Closing the audit and final exam.   Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final essay style exam, consisting of 12 questions, on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success.   Prerequisites   An understanding of ISO 13485 requirements and knowledge of audit principles. What's Included?   Certification fees are included on the exam price Training material containing over 500 pages of information and practical examples will be distributed An attestation of course completion worth 32 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course. Who Should Attend?   Auditors seeking to perform Medical Devices Quality Management System (MDQMS) certification audits Managers or consultants seeking to understand the Medical Devices Quality Management System audit requirements Individuals responsible for maintaining conformance with Medical Devices Quality Management System requirements Accreditation Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 13485 Lead Auditor
Delivered OnlineFlexible Dates
£1,450

European Data Protection & Privacy Programme Management - DPO Ready

By Training Centre

  European Data Protection   Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.   The training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program. Privacy Programme Management   Principles of Privacy Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organisation through process and technology-regardless of jurisdiction or industry.   The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Manager (CIPM) certification programme. Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle.  About This Course   Delivered in a modular format, this four day course covers   Days 1 & 2   Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework.  Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories.  Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors.  Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities.  Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor.  Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches.  Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer.  Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations.  Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance.  Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing.    Days 3 & 4   Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management.  Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks.  Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy.  Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments.  Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation.  Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten.  Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs.  Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design.  Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach.  Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP SITE What's Included?   1 years membership of the IAPP Breakfast, Lunch, mid-morning and afternoon snacks, teas, coffees Official Study Guides* Official Participant Guides* Official Exam Q&A's* Both exam fees * In electronic format for Live Online and hard copy for Classroom delegates     Who Should Attend?   This course is suitable for aspiring Data Protection Officers, as well as Information Security Managers, Lawyers, Data Managers, Analysts and Risk Teams. Provided by Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

European Data Protection & Privacy Programme Management - DPO Ready
Delivered OnlineFlexible Dates
£2,750

PRINCE2® Foundation and Practitioner

By Underscore Group

Learn the processes, practices and principles of project management described in the PRINCE2® approach and prepare for the Foundation and Practitioner examinations on this accredited programme. Duration: 5 days (32.5 hours) Our PRINCE2® Foundation and Practitioner Qualification course is designed to teach the processes, practices and principles of project management described in the PRINCE2® approach and to prepare delegates for the Foundation and Practitioner examinations, held as part of the course. This course is designed for existing and potential Project and Team Managers who would like to gain a comprehensive understanding of the PRINCE2® method of managing projects and will provide those responsible for planning and managing projects with a structure that will help, without imposing inflexible processes or stifling creative thinking. The PRINCE2® Foundation and Practitioner Course is based on the “Managing Successful Projects with PRINCE2® 7th Edition”, which describes the structured project management method. These are intensive modules and require delegates to undertake some evening work in their own time. Objectives  By the end of the course you will be able to be: Describe the background, principles, structure and terminology used in the PRINCE2® 7th Edition project management method Prepare for and take both the PRINCE2® Foundation and Practitioner Exams Please note that examinations are the responsibility of the examination board, PEOPLECERT and must be organised separately by each person attending. Content Introduction Introduction to projects and project management Structure Of PRINCE2® 7th Edition The seven Principles –the basis of what defines a PRINCE2 project People – leading successful change, teams and communication The seven Practices – to be addressed throughout the project The seven Processes - the activities to direct, manage and deliver a project successfully Practices Business case – establishing mechanisms to decide whether project is desirable, viable and achievable Organizing – establishing accountabilities and responsibilities Quality – defining mechanisms to ensure that products are fit for purpose Plans – the product based approach to planning Risk – identifying, assessing and controlling uncertainty Issues – identifying, assessing and controlling changes to the baseline and other issues Progress – monitoring actual achievements against estimate and controlling deviations Processes Starting up a Project - is there a viable and worthwhile project Directing a Project – enabling key decision making by the Project Board Initiating a Project – establishing solid foundations Controlling a Stage –assigning and monitoring work and keeping within stage tolerance Managing Product Delivery – controlling the link between the Project Manager and Team Manager(s) Managing a Stage Boundary – current stage review and next stage planning Closing a Project – confirmation of acceptance and project review Tailoring PRINCE2® - to the project environment Foundation Examination and results Practitioner Workshop and Examination PRINCE2® Practitioner Examination Objectives and Guidance PRINCE2® Review PRINCE2® Practitioner Examination Workshops PRINCE2® Practitioner Examination PRINCE2® Foundation and Practitioner Examinations The PRINCE2® Foundation Exam is of 1 hour duration and consists of 60 multiple choice questions. A Pass is 36 correct answers, 60%. The PRINCE2® Practitioner Exam is a written paper of 2.5 hours duration. There are 70 Objective Test style questions to be answered in the 2.5 hours and the candidate may use an annotated manual. The candidate must score 42/70 to be successful, 60%.   Presented in association with aims4change, a PEOPLECERT Accredited Training Organisation. PRINCE2® is a Registered Trade Mark of AXELOS Limited.

PRINCE2® Foundation and Practitioner
Delivered OnlineFlexible Dates
£1,245

Certified Lead Crisis Manager

By Training Centre

  The course imparts knowledge about the fundamental principles and concepts underpinning crisis management, as well as how to effectively establish and implement a crisis management framework. In addition to elucidating the theoretical aspects of crisis management, the training program incorporates practical examples and scenario-based quizzes to bolster your understanding and prepare you for real-life crisis management situations. Upon successfully completing the training course, participants are eligible to take the exam and, upon passing, gain the "IECB Certified Lead Crisis Manager" Certification. This credential attests to the participant's possession of both theoretical and practical expertise, enabling them to guide and support an organization in crafting and enhancing its crisis management capability in alignment with ISO 22361 standards and industry best practices. Learning Objectives   Upon completing this training course, participants will achieve the following learning objectives: Elucidate the fundamental principles and concepts underpinning crisis management, as per ISO 22361 standards. Establish, sustain, and enhance a crisis management framework that encompasses leadership, structure, culture, and competence. Foresee, evaluate, avert, and ready for potential crises. Respond to, recuperate from, and garner insights from crises to enhance an organization's crisis management prowess.   Our approach   This training is based on both theory and best practice Lessons are illustrated with examples based on case studies Practical exercises are based on a real world case study Practice tests are similar to the Certification Exam   Course Agenda   Day 1: Introduction to ISO 22361 Day 2: The Crisis Management framework Day 3: Preparedness and Crisis prevention Day 4: Crisis response and recovery and the Certification exam   Who Should Attend?   The Lead Crisis Manager training course is designed for: Professionals accountable for establishing a crisis management capability within their organization. Professionals tasked with executing a crisis management plan and framework within their organization. Leaders responsible for managing crises. Members of crisis management teams. Individuals with a keen interest in comprehending crisis management. Those looking to initiate or progress their careers in the field of crisis management. Consultants, advisors, and experts seeking comprehensive insight into ISO 22361 crisis management guidelines. Accreditation Assessment   All candidates at official training courses are tested throughout their course with quizzes and exercises, in combination with a final exam held on the last day of the course. Both elements are a part of the overall score. For this course, the final exam constitutes a 12 question essay type which should be completed within 180 minutes. A passing score is achieved at 70%.   Exam results are returned within 24 hours, with successful candidates receiving both a digital badge and a Certificate of Achievement. Prerequisites   Delegates should have a basic understanding of ISO 22361 What's Included?   Participant Guide Study materials Exam Pass Guarantee Provided by   This course is Accredited by NACS and Administered by the IECB

Certified Lead Crisis Manager
Delivered OnlineFlexible Dates
£1,450

Certified ScrumMaster: Virtual In-House Training

By IIL Europe Ltd

Certified ScrumMaster®: Virtual In-House Training This course covers Scrum and the principles and tools required to be an effective ScrumMaster. You will come away with a good understanding of the Scrum framework and the underlying principles required to make effective decisions regarding the application of Scrum to different situations. At the end of the course, you will receive membership to the Scrum Alliance for two years and, following completion of an online test, will become a Scrum Alliance Certified ScrumMaster®. Our Certified Scrum Trainers pay the initial, two-year membership fee for each student who successfully completes our Certified ScrumMaster® course. This membership fee also covers the cost of the CSM Test. A link to the test will be sent to you following your course. The CSM test has a passing score of 37 out of 50 questions within a 60-minute timeframe. You will have two attempts within 90 days after you receive your welcome e-mail to pass the test at no cost. After two attempts or 90 days, you will be charged $25 for each additional attempt. What you will Learn At the end of this program, you will be able to: Provide a clear understanding of the fundamental principles of Scrum Use the principles, practices, and tools required to be an effective ScrumMaster Make effective decisions regarding the application of the Scrum framework to different situations, including: Practical, project-proven practices The essentials for getting a project off on the right foot How to write user stories and structure your product backlog How to help both new and experienced teams be more successful How to successfully scale Scrum Tips and tricks from the instructor's many years of using Scrum in a wide variety of environments Getting Started Introduction Course structure Course goals and objectives Agile Principles and Scrum Overview Agile Principles Lean Principles Process control models Incremental and Iterative development Shifting the focus on product management Overview of the Scrum process The Team Dedicated cross-functional teams T-shaped people Sprint Planning Team capacity Facilitating the Sprint Planning meeting The Sprint backlog Sprint Burndown chart Scrum Roles and Responsibilities The team and building effective teams ScrumMaster responsibilities Product Owner responsibilities The Scrum project community What happens to traditional roles in Scrum? Scrum Meetings Daily Scrum Reviews Retrospectives Product Backlog and User Stories Product backlog characteristics User stories Getting your first backlog Getting backlog items ready Slicing User stories Estimation for Forward Planning Why comparative estimation works Planning poker Affinity estimation Release Planning and Tracking Progress Velocity Release planning Tracking release progress Scaling Scrum Scrum of Scrums Scaling the product backlog Scaling across a program and business areas Distributed teams

Certified ScrumMaster: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,595

Suicide First Aid Lite

5.0(2)

By Changing Minds Training

This half-day Suicide First Aid Lite training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.

Suicide First Aid Lite
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered OnlineFlexible Dates
£2,380

Cloud Operations on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview Identify the AWS services that support the different phases of Operational Excellence, an AWS Well-Architected Framework pillar Manage access to AWS resources using AWS accounts and organizations and AWS Identity and Access Management (IAM) Maintain an inventory of in-use AWS resources by using AWS services, such as AWS Systems Manager, AWS CloudTrail, and AWS Config Develop a resource deployment strategy using metadata tags, Amazon Machine Images (AMIs), and AWS Control Tower to deploy and maintain an AWS cloud environment Automate resource deployment by using AWS services, such as AWS CloudFormation and AWS Service Catalog Use AWS services to manage AWS resources through CloudOps lifecycle processes, such as deployments and patches Configure a highly available cloud environment that uses AWS services, such as Amazon Route 53 and Elastic Load Balancing, to route traffic for optimal latency and performance Configure AWS Auto Scaling and Amazon EC2 Auto Scaling to scale out your cloud environment based on demand Use Amazon CloudWatch and associated features, such as alarms, dashboards, and widgets, to monitor your cloud environment Manage permissions and track activity in your cloud environment by using AWS services, such as AWS CloudTrail and AWS Config Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service State the purpose, benefits, and appropriate use cases for mountable storage in your AWS Cloud environment Explain the operational characteristics of object storage in the AWS Cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier Build a comprehensive cost model to help gather, optimize, and predict your cloud costs by using services such as AWS Cost Explorer and the AWS Cost & Usage Report This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems. The course also covers specific AWS features, tools, and best practices related to these functions. Prerequisites Successfully completed the AWS Technical Essentials course Background in either software development or systems administration Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows Basic knowledge of networking protocols (TCP/IP, HTTP) 1 - Introduction to Cloud Operations on AWS What is Cloud Operations AWS Well-Architected Framework AWS Well-Architected Tool 2 - Access Management AWS Identity and Access Management (IAM) Resources, accounts, and AWS Organizations 3 - System Discovery Methods to interact with AWS services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config 4 - Deploy and Update Resources Cloud Operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower 5 - Automate Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Hands-On Lab: Infrastructure as Code 6 - Manage Resources AWS Systems Manager Hands-On Lab: Operations as Code 7 - Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 8 - Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager 9 - Monitor and Maintain System Health Monitoring and maintaining healthy workloads Monitoring AWS infrastructure Monitoring applications Hands-On Lab: Monitor Applications and Infrastructure 10 - Data Security and System Auditing Maintaining a strong identity and access foundation Implementing detection mechanisms Automating incident remediation 11 - Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC 12 - Mountable Storage Configuring Amazon Elastic Block Store (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Hands-On Lab: Automating with AWS Backup for Archiving and Recovery 13 - Object Storage Deploying Amazon Simple Storage Service (Amazon S3) Managing storage lifecycles on Amazon S3 14 - Cost Reporting, Alerts, and Optimization Gaining AWS cost awareness Using control mechanisms for cost management Optimizing your AWS spend and usage Hands-On Lab: Capstone lab for CloudOps Additional course details: Nexus Humans Cloud Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloud Operations on AWS
Delivered OnlineFlexible Dates
£2,025

Autodesk 3ds max Project based Training 1-2-1 Live online or Face to Face.

By Real Animation Works

3ds max face to face training customised and bespoke. Live online or Face to Face.

Autodesk 3ds max Project based Training 1-2-1 Live online or Face to Face.
Delivered in London or OnlineFlexible Dates
£800

DP-080T00 Querying Data with Microsoft Transact-SQL

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course can be valuable for anyone who needs to write basic SQL or Transact-SQL queries. This includes anyone working with data as a data analyst, a data engineer, a data scientist, a database administrator or a database developer. It can also be useful for others peripherally involved with data, or wanting to learn more about working with data such as solution architects, students and technology managers. This course will teach the basics of Microsoft's dialect of the standard SQL language: Transact-SQL. Topics include both querying and modifying data in relational databases that are hosted in Microsoft SQL Server-based database systems, including: Microsoft SQL Server, Azure SQL Database and, Azure Synapse Analytics. 1 - Introduction to Transact-SQL Work with schemas Explore the structure of SQL statements Examine the SELECT statement Work with data types Handle NULLs 2 - Sort and filter results in T-SQL Sort your results Limit the sorted results Page results Remove duplicates Filter data with predicates 3 - Combine multiple tables with JOINs in T-SQL Understand joins concepts and syntax Use inner joins Use outer joins Use cross joins Use self joins 4 - Write Subqueries in T-SQL Understand subqueries Use scalar or multi-valued subqueries Use self-contained or correlated subqueries 5 - Use built-in functions and GROUP BY in Transact-SQL Categorize built-in functions Use scalar functions Use ranking and rowset functions Use aggregate functions Summarize data with GROUP BY Filter groups with HAVING 6 - Modify data with T-SQL Insert data Generate automatic values Update data Delete data Merge data based on multiple tables Additional course details: Nexus Humans DP-080T00 Querying Data with Microsoft Transact-SQL training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-080T00 Querying Data with Microsoft Transact-SQL course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-080T00 Querying Data with Microsoft Transact-SQL
Delivered OnlineFlexible Dates
£1,190