• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

834 Courses delivered Live Online

Unlock the Power of AI: A Product Manager's Guide to Working Smarter, Not Harder

By Front Porch Agility

Feeling overwhelmed by multiple tasks? Ready to enhance your product management strategy with AI technology? It’s time to meet your new AI partner! Our course, “Unlocking the Power of AI,” will demonstrate how cutting-edge tools like Generative Pre-trained Transformers (GPTs) can simplify your workflow and bolster your decision-making process. In modern-day fast paced commercial enterprise world, adaptability is vital for success. As a product manager, you oversee the entire product lifecycle—from concept to launch and beyond. With Certified Product Management techniques, you can navigate changing market dynamics, prioritize features efficiently, and deliver value to customers quickly. However, agility alone isn’t sufficient. To excel in your role, embrace the potential of AI. By integrating AI into your practices, you can automate tasks, analyze data effortlessly, and make informed decisions. Picture having a virtual assistant capable of analyzing data and predicting market trends. With AI as your ally, you can focus on engaging customers, innovating, and strategic planning. Don’t hesitate. Embrace the future of product management now. Join us on this journey to unlock the full potential of AI, revolutionizing your workflow and achieving your goals faster than ever before. What You'll Learn (in just 3 hours!) AI 101 for Product Managers We'll break down the buzzwords and get you up to speed on how AI (especially those clever GPTs) can transform your work life. Market Research Master Think of your new AI pal as a super-powered market researcher. Learn how to analyze competitor data, customer feedback, and trends faster than you can say "pivot!" AI-Powered Strategy Say goodbye to gut feelings and hello to data-driven insights. Discover how AI helps you strategize, prioritize features, and build roadmaps that will make your product shine. Hands-on Workshop Dive into real-world scenarios and use GPT tools to tackle market analysis, craft user stories, and nail down your product roadmap. Ethics in the AI Age We'll explore responsible AI use and make sure you understand the potential pitfalls. Because with great power comes great responsibility! Our AI + Your Workflow = Dream Team We'll cover how to access our Product Management tool, how to use it effectively and fit it seamlessly into your existing processes. The future of Product Management is here, don’t get left behind. This course is perfect for Product managers and owners are essential drivers of product success, constantly challenged to balance priorities, navigate complex decisions, and foster innovation in competitive markets. With technology advancing rapidly and consumer preferences evolving, staying ahead can be daunting. Our training programs offer a solution. Designed for product managers and owners, they equip you with the tools, insights, and strategies to enhance productivity, make informed decisions, and ignite innovation. Our courses empower you to navigate modern challenges successfully. Whether you seek to refine strategic planning, optimize product development, or enhance customer engagement, our tailored programs cater to your needs. Join us on a journey to unlock your full potential and propel your career to new heights as a product manager or owner. The Takeaway Empowerment: Leave this workshop feeling empowered, armed with a potent toolkit for achieving product success. AI in Product Management: Recognize that AI is the future of product management, and this course will equip you to leverage its potential effectively. Leadership Position: Position yourself as a leader in product management by embracing AI and staying ahead of industry trends. Innovation: Embrace innovation and drive change within your organization with the insights gained from this course. Confidence: Approach the future with confidence, knowing that you have the skills and knowledge to navigate the evolving landscape of product management.

Unlock the Power of AI: A Product Manager's Guide to Working Smarter, Not Harder
Delivered OnlineFlexible Dates
£150

Dragon Energy Activation for the New Moon in Virgo

5.0(5)

By This Divine Life

Following on from last month's activation harnessing fire energy, ignited by the New Moon in Leo, I invite you to join me to welcome in the Virgo New Moon that approaches fast. Ushering in a new cycle and a new influx of energy. With its timely intercession at the tail end of summer, Virgo always seems to me like a real opportunity to feel into what is next. To access a greater sense of clarity and creativity. And to start to ready ourselves to fully call in the new aspects that are calling each of us. This is also a great way that we can contribute to the collective. For as we each focus on that which is calling, we open up more of the field for others to connect to their own heart centredness and a more expanded sense of self. As the sun travels out of Leo into Virgo the energy of creation is heightened with the auspicious presence of the Royal Star Regulus. An ideal time to focus on calling in your highest timeline and attracting what your heart desires. Further anchoring heart energy within and without. This will be an energy activation and will include a transmission and/or connection to the Dragons. We will come together online and get those energies moving. What’s an energy activation? An energy activation is a reawakening of part or parts of your Divine blueprint. It has the capacity to create lasting change, by removing blocks, habits, patterns or stagnancy that are ready to go! This particular activation will most likely use a blend of guided meditation, channelling and light language, to bypass the conscious mind, as I am guided during our time together. If you require any further information or have specific questions not covered in the FAQ, simply reach out to me via email here: melody@thisdivinelife.com 8PM BST * 9PM CET * 12PM PST * 3PM EST Beautiful image created by MythologyArt via Pixabay

Dragon Energy Activation for the New Moon in Virgo
Delivered OnlineJoin Waitlist
£23

EC-Council Certified Network Defender (C|ND) v.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence

EC-Council Certified Network Defender (C|ND) v.2
Delivered OnlineFlexible Dates
Price on Enquiry

NIST Cyber Security Professional (NCSP) Foundation

By Nexus Human

Duration 1 Days 6 CPD hours Overview The purpose of this document is to provide the learning outcomes for the course and the assessment criteria. It also provides an overview of the examination design in terms of the types of questions asked.Starting with Chapter 2, Digital Transformation, the BL 1 & 2 (for Bloom's Taxonomy 1 & 2) provides the number of questions that will appear on the exam. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explain what it means to ?become digital.? Discuss the difference between industrial and digital era enterprises. Explain how cybersecurity supports an organization?s digital transformation. Understanding cyber Risks Explain the cyber risk equation. Identify and explain each component of the cyber risk equation. Describe the basics of a risk assessment. NIST Cybersecurity Framework Fundamentals9 Explain the genesis of the NIST-CSF. List and describe the components of the NIST-CSF. Describe each of the NIST-CSF?s objectives. Core Functions, Categories & Subcategories Understand and explain the a.Core Functions b.Framework Categories c.Informative References. Implementation Tiers & Profiles Understand and explain Implementation Tier terms and their use. Understand and explain each Implementation Tier. Understand and describe the three risk categories Understand and explain Profiles and their use a.Current b.Target Understand and describe the use of Profiles when a.Determining gaps b.Identify & prioritize focus areas Cybersecurity Improvement Understand and explain how an organization can approach the adoption and adaptation of the NIST-CSF Understand and describe how to implement cybersecurity controls using an incremental improvement approach. Understand and describe CIIS as a practice within an organization.

NIST Cyber Security Professional (NCSP) Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSAN: Troubleshooting [v7]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Storage and virtual infrastructure administrators who want to be able to perform initial troubleshooting on their software-defined storage with vSAN Overview By the end of the course, you should be able to meet the following objectives: Describe the software components of vSAN and their roles Diagram how the components relate to each other Use Skyline Health to investigate and help determine failure conditions Use the command-line tools to help determine failure conditions In this two-day course, you focus on learning the tools and skills necessary to troubleshoot VMware vSAN? 7 implementations. You gain practical experience with vSAN troubleshooting concepts through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives vSAN Architecture Describe the vSAN architecture and components Describe the policy-driven, object-based vSAN storage environment Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Explain the relationships between the vSAN software components Explain the relationship between objects and components Determine how specific storage policies affect components Describe component placement Troubleshooting Methodology Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Troubleshooting Tools Discuss the improvements and added capabilities in Skyline Health for vSAN Use Skyline Health for vSAN to identify and correct issues in vSAN Discuss the ways to run various command-line tools Discuss the ways to access VMware vSphere© ESXi? Shell Use commands to view, configure, and manage your vSphere environment Discuss the esxcli vsan namespace commands Discuss when to use Ruby vSphere Console (RVC) commands Explain which log files are useful for vSAN troubleshooting Use log files to help troubleshoot vSAN problems

VMware vSAN: Troubleshooting [v7]
Delivered OnlineFlexible Dates
Price on Enquiry

Just Enough Scala

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Developers Overview The basics of and motivation for using the functional programming paradigmFeatures of the Scala languageWorking with variables in ScalaUsing Scala collectionsControlling code flow in ScalaImporting and using Scala code libraries Scala training course will teach students the key language concepts and programming techniques, essential for students to focus on the covered subjects without having to also learn a complex programming language at the same time. Scala Basics Scala Background Information Key Scala Concepts Programming in Scala Variables Scala Variables Numerical Boolean String Collections Tuples The Collections Hierarchy Sets Lists Arrays Maps Common Conversions Flow Control Looping Iterators Functions Passing Functions Collection Iteration Methods Pattern Matching Libraries Classes and Objects Packages Import Additional course details: Nexus Humans Just Enough Scala training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Just Enough Scala course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Just Enough Scala
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks: Cortex XDR 3.2: Investigation and Response(EDU-262)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cybersecurity analysts and engineers Security operations specialists Overview Successful completion of this instructor-led course with hands-on lab activities should enable participants to: Investigate and manage incidents Describe the Cortex XDR causality and analytics concepts Analyze alerts using the Causality and Timeline Views Work with Cortex XDR Pro actions such as remote script execution Create and manage on-demand and scheduled search queries in the Query Center Create and manage the Cortex XDR rules BIOC and IOC Working with Cortex XDR assets and inventories Write XQL queries to search datasets and visualize the result sets Work with Cortex XDR's external-data collection This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution. Multiple modules focus on how to leverage the collected data. You will create simple search queries in one module and XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact-related data, such as IP and Hash Views. Additionally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external-data collection capabilities, including the use of Cortex XDR API to receive external alerts. This class is powered by Cloud Harmonics. Course Outline Module 1 - Cortex XDR Incidents Module 2 - Causality and Analytics Concepts Module 3 - Causality Analysis of Alerts Module 4 - Advanced Response Actions Module 5 - Building Search Queries Module 6 - Building XDR Rules Module 7 - Cortex XDR Assets Module 8 - Introduction to XQL Module 9 - External Data Collection

Palo Alto Networks: Cortex XDR 3.2: Investigation and Response(EDU-262)
Delivered OnlineFlexible Dates
Price on Enquiry

B6061 IBM Cognos Analytics - Author Reports with Multidimensional Data (V11.0)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Report authors working with dimensional data sources. Through interactive demonstrations & exercises, participants will learn how to author reports that navigate & manipulate dimensional data structures using the specific dimensional functions & features available in IBM Cognos Analytics. Introduction to Dimensional Concepts Identify different data sources and models Investigate the OLAP dimensional structure Identify dimensional data items and expressions Differentiate the IBM Cognos Analytics query language from SQL and MDX Differentiate relational and dimensional report authoring styles Introduction to Dimensional Data in Reports Work with members Identify sets and tuples in IBM Cognos Analytics Dimensional Report Context Understand the purpose of report context Understand how data is affected by default and root members Focus Your Dimensional Data Compare dimensional queries to relational queries Explain the importance of filtering dimensional queries Evaluate different filtering techniques Filter based on dimensions and members Filter based on measure values Filter using a slicer Calculations & Dimensional Functions Use IBM Cognos Analytics dimensional functions to create sets and tuples Perform arithmetic operations in OLAP queries Identify coercion errors and rules Functions for Navigating Dimesional Hierarchies Navigate dimensional data using family functions Relative Functions Navigate dimensional data using relative functions Navigate dimensional data using relative time functions Advanced Drilling Techniques & Member Sets Understand default drill-up and drill-down functionality Identify cases when you need to override default drilling behavior Configure advanced drilling behavior to support sophisticated use cases Define member sets to support advanced drilling Define member sets to support functions Set Up Drill-Through Reports Navigate from a specific report to a target report Drill down to greater detail and then navigate to target report Navigate between reports created using different data sources End-to-End Workshop Review concepts covered throughout the course

B6061 IBM Cognos Analytics - Author Reports with Multidimensional Data (V11.0)
Delivered OnlineFlexible Dates
Price on Enquiry

Agile: an introduction (In-House)

By The In House Training Company

Agility has become a prized business attribute. Although Agile methods were once most associated with software development, they are now applied in a host of different areas. Agile continues to find new applications because it is primarily an attitude. This programme delivers a solid grounding in both the Agile mindset and Agile methods. It covers three methods, illustrates the benefits of each and shows how they can be integrated. It includes practical techniques as well as background knowledge. By the end of the session, participants will be able to: Apply Agile concepts to self-manage their work Understand the roles people take on in Agile teams Use a variety of techniques to help deliver customer satisfaction Focus on delivering against priorities Employ a range of estimating techniques 1 Introduction Overview of the programme Review of participants' needs and objectives 2 The basics of Agile What makes Agile different Agile Manifesto and Principles Using feedback to deliver what is needed 3 Agile teams Multi-disciplinary teams Team size and empowerment Agile values 4 Agile at the team level - Scrum Scrum roles Scrum 'events' Scrum 'artifacts' 5 Agile for teams juggling multiple demands - Kanban Taking control of the work Improving throughput Dealing with bottlenecks 6 Agile in projects - AgilePM The phases of an Agile project Managing change requests Delivering on time 7 Estimating T-shirt / Pebble sizing Yesterday's weather Planning poker 8 Pick 'n' mix - some useful techniques The daily stand-up User stories Retrospectives Work-in-process limits Burndown charts Minimum viable product A / B testing 9 Review and action planning Identify actions to be implemented individually Conclusion

Agile: an introduction (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Cisco Operating Cisco IP Fabric for Media Solution v2.0 (IPFMSN)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for broadcast engineers. It might also be of interest to technical solution architects, network engineers, and network administrators. Overview After taking this course, you should be able to: Describe the overall solution and how it works, and identify all components of the solution and their functions Understand initial sizing and capacity Understand the basic requirements for IPFM Understand how Non-Blocking Multicast (NBM) and multicast function in the IPFM Understand and verify Precision Time Protocol (PTP) clocking Describe the DCNM Media Controller Demonstrate the DCNM Media Controller configuration and verification Explain how to deploy an IPFM solution in a high-availability manner Use the DCNM Media Controller to monitor fabric and to troubleshoot basic connectivity and performance issues Understand the approach and basic steps involved in responding to alarms and other notifications The Operating Cisco IP Fabric for Media Solution(IPFMSN) v2.0 course introduces you to the Cisco© IP Fabric for Media (IPFM) solution. The course is designed for broadcast engineers who will use IP technologies to replace Serial Digital Interface (SDI)-based deployments. You will learn about Cisco IPFM deployment, operation, and troubleshooting.The course also covers the Data Center Network Manager (DCNM) Media Controller, a core component of the Cisco IPFM solution. Through lab exercises that focus on building IP fabric as a baseline for a complete IPFM solution, you will learn how to deploy and troubleshoot the DCNM Media Controller to control flows through the fabric. Course Outline Introducing Cisco IP Fabric for Media Media over IP Standardization Designing Cisco IPFM Solution Building Cisco IP Fabric for Media Exploring Non-Blocking Multicast in Cisco IPFM Describing Cisco DCNM Introducing Cisco DCNM PowerOn Auto Provisioning (POAP) Process Implementing Cisco DCNM Flow and Host Policies Precision Time Protocol Cisco IPFM Operations, Administration, and Management Cisco IPFM High Availability Monitoring and Troubleshooting Cisco IPFM Operation

Cisco Operating Cisco IP Fabric for Media Solution v2.0 (IPFMSN)
Delivered OnlineFlexible Dates
Price on Enquiry