Nowadays not only do we rely on our commercial and sales staff to hit that bottom line but we expect our engineers and project teams to play their part too - not only through their engineering and management skills but by behaving in a commercially minded way in their dealings with their counterparts in customer or supplier organisations. This means understanding, amongst other things, the issues surrounding the commencement of work ahead of contract, having a clear contract baseline, recognising the broader implications of contract change, the need for timeliness and the consequences of failing to meet the contracted timetable. This practical one-day programme has been designed specifically to give engineers, project staff and others just that understanding. The course is designed principally to provide engineers and project staff with an appreciation of contractual obligations, liabilities, rights and remedies so that they understand the implications of their actions. It is also suitable for business development staff who are negotiating contracts on behalf of the business. The main focus of the day is on creating an awareness of when a situation may have commercial implications that would harm an organisation's business interests if not recognised and handled appropriately and how taking a positive but more commercial approach to those situations can lead to a more positive outcome for the business. As well as providing an understanding of the commercial imperatives the day also focuses on specific areas affecting engineers and project staff, such as the recognition and management of change, the risks when working outside the contract and managing delays in contracts. The course identifies the different remedies that may apply according to the reasons for the delay and provides some thoughts on pushing back should such situations arise. On completion of this programme the participants will: appreciate the need for contractual controls and will have a better understanding of their relevance and how they can be applied, particularly the issues of starting work ahead of contract, implementing changes and inadvertently creating a binding contract by their behaviour; have gained an understanding of the terminology and procedural issues pertaining to contracting within a programme; and be more commercially aware and better equipped for their roles. 1 Basic contract law - bidding and contract formation Purpose of a contract Contract formation - the key elements required to create a legally binding agreement Completeness and enforceability Express and implied terms Conditions v warranties The use of, and issues arising from, standard forms of sale and purchase Use of 'subject to contract' Letters of intent Authority to commit 2 Change management Recognising changes to a contracted requirement Pricing change Implementation and management of change 3 Key contracting terms and conditions By the end of this module participants will be able to identify the key principles associated with: Pricing Getting paid and retaining payment Cashflow Delivery and acceptance Programme delaysExamining some reasons for non-performance...Customer failureContractor's failureNo fault delays ... and the consequences of non-performance: Damages claimsLiquidated damagesForce majeureContinued performance Waiver clauses and recent case law Use of best/reasonable endeavours Contract termination 4 Warranties, indemnities and liability Express and implied warranties Limiting liability 5 Protection of information Forms of intellectual property Background/foreground intellectual property Marking intellectual property Intellectual property rights Copyright Software Confidentiality agreements Internet
Mental Health First Aid (MHFA) England Training with Mindmaps Wellbeing Enhance workplace wellbeing and mental health awareness with MHFA England-certified training by Mindmaps Wellbeing. Our expert-led courses, delivered by Registered Mental Health Nurses and Healthcare Educators, equip you with the skills to recognize, support, and respond to mental health challenges. Whether online or in-person, our training ensures flexible learning options without compromising quality. Join us to gain certification as a Mental Health First Aider and access exclusive benefits like ongoing peer support, expert forums, and resources for self-care. Book now with Mindmaps Wellbeing and take the first step toward a healthier, more supportive environment for all.
Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 2 Days 12 CPD hours Overview Working in a hands-on learning environment guided by our expert practitioner, students will explore: Introduction to Continuous Integration, Continuous Deployment and Jenkins-CI Installing and Running Jenkins Job Types in Jenkins Securing Jenkins Jenkins Plugin Distributed Builds with Jenkins Continuous Deployment and the Jenkins Pipeline Best Practices for Jenkins Introduction to Jenkins is a two-day, lab intensive hands-on training course geared for experienced programmers who need to learn how to:Install and configure Jenkins in a servlet containerCreate Jenkins buildsConfigure and use Apache Ant and Apache Maven with JenkinsUse Jenkins to generate Java coding standards reports, code coverage reports, and change noticesUse Jenkins to automatically deploy software into a testing environment. Introduction to Continuous Integration, Continuous Deployment and Jenkins-CI Agile Development Agile Development (cont'd) What is Continuous Integration What is Continuous Integration (cont'd) What is Continous Integration (cont'd) Typical Setup for Continuous Integration Continuous Deployment Continuous Deployment (cont'd) DevOps and Continuous Deployment Continuous Deployment Challenges Jenkins Continuous Integration Jenkins Features Running Jenkins Installing and Running Jenkins Downloading and Installing Jenkins Running Jenkins as a Stand-Alone Application Running Jenkins as a Stand-Alone Application (cont'd) Running Jenkins on an Application Server The Jenkins Home Folder Installing Jenkins as a Windows Service Initial Configuration Configuration Wizard Configuration Wizard (cont'd) Configuring Tools Configuring Tools - Best Practices Job Types in Jenkins Different types of Jenkins Items Different types of Jenkins Items (cont'd) Configuring Source Code Management(SCM) Working with Subversion Working with Subversion (cont'd) Working with Git Storing Credentials Storing Credentials (cont'd) Build Triggers Schedule Build Jobs Polling the SCM Maven Build Steps Securing Jenkins Jenkins Security - Overview Jenkins Security Authentication Authorization Confidentiality Activating Security Configure Authentication Using Jenkins's Internal User Database Creating Users Authorization Matrix-Based Security Note ? Create the Administrative User Project-based Matrix Authorization Project-Based Authentication Jenkins Plugin Introduction Jenkins Plugins - SCM Jenkins Plugins ? Build and Test Jenkins Plugins ? Analyzers Jenkins for Teams Installing Jenkins Plugins Distributed Builds with Jenkins Distributed Builds - Overview Distributed Builds ? How? Slave Machines Configure Jenkins Master Configure Projects Continuous Deployment and the Jenkins Pipeline Continuous Deployment Continuous Deployment (cont'd) DevOps and Continuous Deployment Continuous Deployment Challenges Continuous Deployment with Jenkins The Pipeline Plugin The Pipeline Plugin (cont'd) Defining a Pipeline A Pipeline Example Pipeline Example (cont'd) Parallel Execution Creating a Pipeline Invoking the Pipeline Interacting with the Pipeline Best Practices for Jenkins Best Practices - Secure Jenkins Best Practices - Backups Best Practices - Reproducible Builds Best Practices - Testing and Reports Best Practices - Large Systems Best Practices - Distributed Jenkins Additional course details: Nexus Humans Introduction to Jenkins / Jenkins Quick Start (TTDV7520) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Jenkins / Jenkins Quick Start (TTDV7520) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Time for you to talk, explore and work through challenges you are facing... I help individuals find / reconnect with their passion & purpose, so they get up & do what they love! Giving people direction, self-confidence and belief to do the thing they want to do... Through 1:1 coaching, I create a space that supports people to explore and find solutions; giving clarity, confidence and energy to move forwards. If you feel stuck in your life or career, frustrated or unsure of how to move forwards, don't know what you want to do next... that's ok - we can work through your challenges at your pace over a series of coaching sessions that works for your time and budget.
Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network
Linux Security and Hardening Course Overview: This "Linux Security and Hardening" course provides a comprehensive introduction to the essential practices required to secure Linux systems. It covers fundamental aspects of security, including general, physical, account, and network security, as well as file system security measures. With a focus on Linux-specific tools and techniques, the course is designed to equip learners with the knowledge to protect their systems from common vulnerabilities. By completing this course, learners will understand the key concepts and be able to implement security measures effectively, ensuring the integrity and confidentiality of their Linux-based systems. Course Description: In this course, learners will explore various layers of Linux security and hardening techniques to protect against threats. Topics covered include general system security, physical security, account management, network protection, and securing file systems. The course also provides additional resources to enhance your understanding of Linux security. By engaging with these modules, learners will acquire the skills necessary to safeguard systems, mitigate risks, and create a secure environment. This course is suitable for those wishing to bolster their technical expertise and for professionals eager to advance their career in Linux system administration and security. Linux Security and Hardening Curriculum: Module 01: Course Overview and Downloads Module 02: General Security Module 03: Physical Security Module 04: Account Security Module 05: Network Security Module 06: File System Security Module 07: Additional Resources (See full curriculum) Who is this course for? Individuals seeking to enhance their knowledge of Linux security. Professionals aiming to advance their career in Linux system administration. Beginners with an interest in system security and IT infrastructure. Those looking to specialise in security and hardening for Linux-based environments. Career Path: Linux System Administrator IT Security Analyst Network Security Specialist System Security Engineer Cybersecurity Consultant
Course Objectives By the end of this course, participants will be able to: Differentiate between coaching and mentoring and understand their unique purposes. Apply effective communication and active listening skills in developmental conversations. Use coaching models to guide structured conversations. Build trust and psychological safety in coaching and mentoring relationships. Create actionable development plans and track progress. Understand ethical boundaries and confidentiality. Course Outline Day 1: Foundations of Coaching and Mentoring Session 1: Introduction and Context What is coaching? What is mentoring? Key differences and when to use each Benefits to individuals and organisations Session 2: Core Skills for Effective Coaching and Mentoring Active listening Powerful questioning Giving and receiving feedback Empathy and emotional intelligence Session 3: Building Trust and Creating Psychological Safety Establishing rapport Confidentiality and ethical guidelines Setting boundaries and expectations Session 4: Coaching Models and Frameworks GROW Model (Goal, Reality, Options, Will) OSKAR and CLEAR frameworks Practical application and role play Day 2: Practising and Embedding Coaching and Mentoring Session 5: The Coaching and Mentoring Conversation Structuring conversations Using real-life workplace examples Practice with feedback Session 6: Setting Goals and Development Plans SMART and CLEAR goal setting Creating growth-focused action plans Monitoring progress and accountability Session 7: Mentoring for Career and Leadership Development Mentor roles and responsibilities Supporting long-term growth and resilience Reverse mentoring and cross-generational partnerships Session 8: Embedding a Coaching and Mentoring Culture How to support coaching within your team or organisation Integrating into performance conversations Sustaining development through peer coaching and communities of practice Assessment and Evaluation Participation in discussions and practical activities Feedback on peer coaching/mentoring exercises Optional personal development plan submission Course Materials Provided Participant workbook Coaching and mentoring toolkit (templates, models, guides) Suggested reading and resource list
Course Objectives By the end of this course, participants will be able to: Differentiate between coaching and mentoring and understand their unique purposes. Apply effective communication and active listening skills in developmental conversations. Use coaching models to guide structured conversations. Build trust and psychological safety in coaching and mentoring relationships. Create actionable development plans and track progress. Understand ethical boundaries and confidentiality. Course Outline Day 1: Foundations of Coaching and Mentoring Session 1: Introduction and Context What is coaching? What is mentoring? Key differences and when to use each Benefits to individuals and organisations Session 2: Core Skills for Effective Coaching and Mentoring Active listening Powerful questioning Giving and receiving feedback Empathy and emotional intelligence Session 3: Building Trust and Creating Psychological Safety Establishing rapport Confidentiality and ethical guidelines Setting boundaries and expectations Session 4: Coaching Models and Frameworks GROW Model (Goal, Reality, Options, Will) OSKAR and CLEAR frameworks Practical application and role play Day 2: Practising and Embedding Coaching and Mentoring Session 5: The Coaching and Mentoring Conversation Structuring conversations Using real-life workplace examples Practice with feedback Session 6: Setting Goals and Development Plans SMART and CLEAR goal setting Creating growth-focused action plans Monitoring progress and accountability Session 7: Mentoring for Career and Leadership Development Mentor roles and responsibilities Supporting long-term growth and resilience Reverse mentoring and cross-generational partnerships Session 8: Embedding a Coaching and Mentoring Culture How to support coaching within your team or organisation Integrating into performance conversations Sustaining development through peer coaching and communities of practice Assessment and Evaluation Participation in discussions and practical activities Feedback on peer coaching/mentoring exercises Optional personal development plan submission Course Materials Provided Participant workbook Coaching and mentoring toolkit (templates, models, guides) Suggested reading and resource list
Course Objectives By the end of this course, participants will be able to: Differentiate between coaching and mentoring and understand their unique purposes. Apply effective communication and active listening skills in developmental conversations. Use coaching models to guide structured conversations. Build trust and psychological safety in coaching and mentoring relationships. Create actionable development plans and track progress. Understand ethical boundaries and confidentiality. Course Outline Day 1: Foundations of Coaching and Mentoring Session 1: Introduction and Context What is coaching? What is mentoring? Key differences and when to use each Benefits to individuals and organisations Session 2: Core Skills for Effective Coaching and Mentoring Active listening Powerful questioning Giving and receiving feedback Empathy and emotional intelligence Session 3: Building Trust and Creating Psychological Safety Establishing rapport Confidentiality and ethical guidelines Setting boundaries and expectations Session 4: Coaching Models and Frameworks GROW Model (Goal, Reality, Options, Will) OSKAR and CLEAR frameworks Practical application and role play Day 2: Practising and Embedding Coaching and Mentoring Session 5: The Coaching and Mentoring Conversation Structuring conversations Using real-life workplace examples Practice with feedback Session 6: Setting Goals and Development Plans SMART and CLEAR goal setting Creating growth-focused action plans Monitoring progress and accountability Session 7: Mentoring for Career and Leadership Development Mentor roles and responsibilities Supporting long-term growth and resilience Reverse mentoring and cross-generational partnerships Session 8: Embedding a Coaching and Mentoring Culture How to support coaching within your team or organisation Integrating into performance conversations Sustaining development through peer coaching and communities of practice Assessment and Evaluation Participation in discussions and practical activities Feedback on peer coaching/mentoring exercises Optional personal development plan submission Course Materials Provided Participant workbook Coaching and mentoring toolkit (templates, models, guides) Suggested reading and resource list