Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. Both Azure administration and Azure development with proven expertise in at least one of these areas. Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. AZ-104T00 - Microsoft Azure Administrator AZ-204T00: Developing Solutions for Microsoft Azure 1 - Introduction to DevOps What is DevOps? Explore the DevOps journey Identify transformation teams Explore shared goals and define timelines 2 - Choose the right project Explore greenfield and brownfield projects Decide when to use greenfield and brownfield projects Decide when to use systems of record versus systems of engagement Identify groups to minimize initial resistance Identify project metrics and key performance indicators (KPIs) 3 - Describe team structures Explore agile development practices Explore principles of agile development Define organization structure for agile practices Explore ideal DevOps team members Enable in-team and cross-team collaboration Select tools and processes for agile practices 4 - Choose the DevOps tools What is Azure DevOps? What is GitHub? Explore an authorization and access strategy Migrate or integrate existing work management tools Migrate or integrate existing test management tools Design a license management strategy 5 - Plan Agile with GitHub Projects and Azure Boards Link GitHub to Azure Boards Configure GitHub Projects Manage work with GitHub Project boards Customize Project views Collaborate using team discussions Agile Plan and Portfolio Management with Azure Boards 6 - Introduction to source control Explore DevOps foundational practices What is source control? Explore benefits of source control Explore best practices for source control 7 - Describe types of source control systems Understand centralized source control Understand distributed source control Explore Git and Team Foundation Version Control Examine and choose Git Understand objections to using Git Describe working with Git locally 8 - Work with Azure Repos and GitHub Migrate from TFVC to Git Use GIT-TFS Develop online with GitHub Codespaces 9 - Structure your Git Repo Explore monorepo versus multiple repos Implement a change log 10 - Manage Git branches and workflows Explore branch workflow types Explore feature branch workflow Explore Git branch model for continuous delivery Explore GitHub flow Explore fork workflow Version Control with Git in Azure Repos 11 - Collaborate with pull requests in Azure Repos Collaborate with pull requests Examine GitHub mobile for pull request approvals 12 - Identify technical debt Examine code quality Examine complexity and quality metrics Measure and manage technical debt Integrate other code quality tools Plan effective code reviews 13 - Explore Git hooks Implement Git hooks 14 - Plan foster inner source Explore foster inner source Implement the fork workflow Describe inner source with forks 15 - Manage Git repositories Work with large repositories Purge repository data Manage releases with GitHub Repos Automate release notes with GitHub 16 - Explore Azure Pipelines Explore the concept of pipelines in DevOps Describe Azure Pipelines Understand Azure Pipelines key terms 17 - Manage Azure Pipeline agents and pools Choose between Microsoft-hosted versus self-hosted agents Explore job types Explore predefined agent pool Understand typical situations for agent pools Communicate with Azure Pipelines Communicate to deploy to target servers Examine other considerations Describe security of agent pools Configure agent pools and understanding pipeline styles 18 - Describe pipelines and concurrency Understand parallel jobs Estimate parallel jobs Describe Azure Pipelines and open-source projects Explore Azure Pipelines and Visual Designer Describe Azure Pipelines and YAML 19 - Explore continuous integration Learn the four pillars of continuous integration Explore benefits of continuous integration Describe build properties Enable Continuous Integration with Azure Pipelines 20 - Implement a pipeline strategy Configure agent demands Implement multi-agent builds Explore source control types supported by Azure Pipelines 21 - Integrate with Azure Pipelines Describe the anatomy of a pipeline Understand the pipeline structure Detail templates Explore YAML resources Use multiple repositories in your pipeline 22 - Introduction to GitHub Actions What are Actions? Explore Actions flow Understand workflows Describe standard workflow syntax elements Explore events Explore jobs Explore runners Examine release and test an action 23 - Learn continuous integration with GitHub Actions Describe continuous integration with actions Examine environment variables Share artifacts between jobs Examine Workflow badges Describe best practices for creating actions Mark releases with Git tags Create encrypted secrets Use secrets in a workflow Implement GitHub Actions for CI/CD 24 - Design a container build strategy Examine structure of containers Work with Docker containers Understand Dockerfile core concepts Examine multi-stage dockerfiles Examine considerations for multiple stage builds Explore Azure container-related services Deploy Docker containers to Azure App Service web apps 25 - Introduction to continuous delivery Explore traditional IT development cycle What is continuous delivery? Move to continuous delivery Understand releases and deployments Understand release process versus release 26 - Create a release pipeline Describe Azure DevOps release pipeline capabilities Explore release pipelines Explore artifact sources Choose the appropriate artifact source Examine considerations for deployment to stages Explore build and release tasks Explore custom build and release tasks Explore release jobs Configure Pipelines as Code with YAML 27 - Explore release recommendations Understand the delivery cadence and three types of triggers Explore release approvals Explore release gates Use release gates to protect quality Control Deployments using Release Gates 28 - Provision and test environments Provision and configure target environments Configure automated integration and functional test automation Understand Shift-left Set up and run availability tests Explore Azure Load Testing Set up and run functional tests 29 - Manage and modularize tasks and templates Examine task groups Explore variables in release pipelines Understand variable groups 30 - Automate inspection of health Automate inspection of health Explore events and notifications Explore service hooks Configure Azure DevOps notifications Configure GitHub notifications Explore how to measure quality of your release process Examine release notes and documentation Examine considerations for choosing release management tools Explore common release management tools 31 - Introduction to deployment patterns Explore microservices architecture Examine classical deployment patterns Understand modern deployment patterns 32 - Implement blue-green deployment and feature toggles What is blue-green deployment? Explore deployment slots Describe feature toggle maintenance 33 - Implement canary releases and dark launching Explore canary releases Examine Traffic Manager Understand dark launching 34 - Implement A/B testing and progressive exposure deployment What is A/B testing? Explore CI-CD with deployment rings 35 - Integrate with identity management systems Integrate GitHub with single sign-on (SSO) Explore service principals Explore Managed Identity 36 - Manage application configuration data Rethink application configuration data Explore separation of concerns Understand external configuration store patterns Examine Key-value pairs Examine App configuration feature management Integrate Azure Key Vault with Azure Pipelines Manage secrets, tokens and certificates Examine DevOps inner and outer loop Integrate Azure Key Vault with Azure DevOps Enable Dynamic Configuration and Feature Flags 37 - Explore infrastructure as code and configuration management Explore environment deployment Examine environment configuration Understand imperative versus declarative configuration Understand idempotent configuration 38 - Create Azure resources using Azure Resource Manager templates Why use Azure Resource Manager templates? Explore template components Manage dependencies Modularize templates Manage secrets in templates Deployments using Azure Bicep templates 39 - Create Azure resources by using Azure CLI What is Azure CLI? Work with Azure CLI 40 - Explore Azure Automation with DevOps Create automation accounts What is a runbook? Understand automation shared resources Explore runbook gallery Examine webhooks Explore source control integration Explore PowerShell workflows Create a workflow Examine checkpoint and parallel processing 41 - Implement Desired State Configuration (DSC) Understand configuration drift Explore Desired State Configuration (DSC) Explore Azure Automation State configuration (DSC) Examine DSC configuration file Explore hybrid management Implement DSC and Linux Automation on Azure 42 - Implement Bicep What is Bicep? Install Bicep Understand Bicep file structure and syntax 43 - Introduction to Secure DevOps Describe SQL injection attack Understand DevSecOps Explore Secure DevOps Pipeline Explore key validation points Explore continuous security validation Understand threat modeling 44 - Implement open-source software Explore how software is built What is open-source software Explore corporate concerns with open-source software components Explore common open-source licenses Examine license implications and ratings 45 - Software Composition Analysis Inspect and validate code bases for compliance Explore software composition analysis (SCA) Integrate Mend with Azure Pipelines Implement GitHub Dependabot alerts and security updates Integrate software composition analysis checks into pipelines Examine tools for assess package security and license rate Interpret alerts from scanner tools Implement security and compliance in an Azure Pipeline 46 - Static analyzers Explore SonarCloud Explore CodeQL in GitHub Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP and Dynamic Analyzers Plan Implement OWASP Secure Coding Practices Explore OWASP ZAP penetration test Explore OWASP ZAP results and bugs 48 - Security Monitoring and Governance Implement pipeline security Explore Microsoft Defender for Cloud Examine Microsoft Defender for Cloud usage scenarios Explore Azure Policy Understand policies Explore initiatives Explore resource locks Explore Azure Blueprints Understand Microsoft Defender for Identity 49 - Explore package dependencies What is dependency management? Describe elements of a dependency management strategy Identify dependencies Understand source and package componentization Decompose your system Scan your codebase for dependencies 50 - Understand package management Explore packages Understand package feeds Explore package feed managers Explore common public package sources Explore self-hosted and SaaS based package sources Consume packages Publish packages Package management with Azure Artifacts 51 - Migrate consolidating and secure artifacts Identify existing artifact repositories Migrate and integrating artifact repositories Secure access to package feeds Examine roles Examine permissions Examine authentication 52 - Implement a versioning strategy Understand versioning of artifacts Explore semantic versioning Examine release views Promote packages Explore best practices for versioning 53 - Introduction to GitHub Packages Publish packages Install a package Delete and restore a package Explore package access control and visibility 54 - Implement tools to track usage and flow Understand the inner loop Explore Azure Monitor and Log Analytics Examine Kusto Query Language (KQL) Explore Application Insights Implement Application Insights Monitor application performance with Application Insights 55 - Develop monitor and status dashboards Explore Azure Dashboards Examine view designer in Azure Monitor Explore Azure Monitor workbooks Explore Power BI Build your own custom application 56 - Share knowledge within teams Share acquired knowledge within development teams Integrate with Azure Boards Share team knowledge using Azure Project Wiki 57 - Design processes to automate application analytics Explore rapid responses and augmented search Integrate telemetry Examine monitoring tools and technologies 58 - Manage alerts, blameless retrospectives and a just culture Examine when get a notification Explore how to fix it Explore smart detection notifications Improve performance Understand server response time degradation Reduce meaningless and non-actionable alerts Examine blameless retrospective Develop a just culture
Join Patrick Garton for a pair of connected session about effective classroom behaviour. This is for all teachers who want to refresh and deepen their skills and understanding in this vital area.
Who is this course for? Sketchup Artificial Intelligence Training Course. Mastering SketchUp Artificial Intelligence (AI) is essential for designers, offering automation, efficiency, and innovative solutions. It saves time, enhances visualizations, fosters collaboration, and future-proofs skills, ensuring a competitive edge in the design industry. Click here for more info: Website How to Book? 1-on-1 training. Customize your schedule from Mon to Sat from 9 am to 7 pm Call to book Duration: 16 hours. Method: In-person or Live Online Sketchup and (Artificial Intelligence) Stable Diffusion Rendering Course (16 hours) Module 1: Sketchup Fundamentals (2 hours) Sketchup software overview and interface navigation Introduction to basic drawing tools and fundamental geometry creation techniques Module 2: Texturing and Material Mastery (2 hours) Application of textures and customization of materials Exploration of texture mapping and comprehensive material libraries Module 3: Illumination and Shadows (2 hours) Comprehending lighting principles and strategic light placement Crafting realistic shadows and reflections Module 4: Advanced Modeling Techniques (3 hours) Creating intricate shapes and harnessing advanced modeling tools Efficiently managing groups, components, and modifiers Module 5: Stable Diffusion Rendering (2 hours) Initiating stable diffusion rendering Optimizing rendering settings for superior outcomes Module 6: Scene Composition and Camera Configuration (2 hours) Exploring composition principles and camera perspectives Scene management and creation of captivating walkthrough animations Module 7: Rendering Optimization Strategies (2 hours) Techniques for optimizing models to expedite rendering Application of render passes and post-processing methods Module 8: Real-World Projects and Portfolio Building (1 hour) Application of acquired skills in completing authentic projects Professional portfolio presentation techniques Optional: Stable Diffusion and Python Installation (Additional 10 hours) Module 1: Introduction to Stable Diffusion and Python Comprehensive understanding of Stable Diffusion and Python's significance Module 2: System Prerequisites Hardware and software requirements for successful installation Module 3: Python Installation Guide Step-by-step installation process for various operating systems Module 4: Configuring Python Environment Configuration of environment variables and package managers Module 5: Stable Diffusion Installation Downloading and installing the Stable Diffusion package Module 6: Setting Up the Development Environment Configuration of integrated development environments (IDEs) for Python and Stable Diffusion Module 7: Troubleshooting and Common Issues Identification and resolution of common installation errors Module 8: Best Practices and Recommendations Effective management of Python and Stable Diffusion installations Module 9: Practical Applications and Projects Hands-on exercises exemplifying the practical usage of Stable Diffusion and Python Module 10: Advanced Topics (Optional) Exploration of advanced features and techniques Stable Diffusion https://stablediffusionweb.com https://stable-diffusion-ui.github.io https://stability.ai/stable-diffusion Upon successful completion of the Sketchup and Stable Diffusion Rendering Course with a focus on AI image rendering, participants will achieve the following: 1. Mastery of AI Image Rendering: Attain expertise in employing AI-powered rendering techniques to produce realistic and top-quality visualizations. 2. Proficiency in Sketchup for 3D Modeling: Navigate the software adeptly, utilize drawing tools with proficiency, and craft intricate 3D models. 3. Enhanced Rendering Optimization: Implement AI-based rendering to enhance model visuals, resulting in faster rendering times and superior image quality. 4. Application of AI-driven Lighting and Shadows: Employ AI algorithms for precise lighting placement, shadows, and reflections, elevating the realism of renderings. 5. Development of a Professional Portfolio: Present AI-rendered projects within a polished professional portfolio, highlighting advanced image rendering capabilities. 1. Mastering Sketchup: Attain proficiency in Sketchup, a renowned and user-friendly 3D modeling software, equipping you with the skills needed to adeptly create and manipulate 3D models. 2. Advanced Rendering Expertise: Explore stable diffusion rendering, an avant-garde technique that simplifies the creation of realistic and high-quality renderings. Broaden your rendering capabilities, producing visually stunning representations of your designs. 3. Practical Industry Applications: Cultivate practical skills relevant to diverse industries, encompassing architecture, interior design, product development, and visualization. Elevate your professional portfolio with captivating renderings that showcase your design prowess. 4. Interactive Learning: Participate in hands-on exercises and projects that promote active learning and the practical application of concepts. Benefit from personalized feedback and expert guidance, ensuring your continuous progress throughout the course. 5. Career Advancement: Elevate your career prospects by adding valuable skills to your toolkit. Proficiency in crafting detailed 3D models and impressive renderings through stable diffusion techniques opens doors to diverse job opportunities within the design and visualization sector. 6. Flexibility and Convenience: Access course materials online and learn at your own pace. Enjoy the flexibility of tailoring the coursework to your schedule, allowing you to harmonize your learning journey with other commitments. Course Advantages: Tailored Learning: Enjoy personalized 1-on-1 sessions, accommodating your schedule from Monday to Saturday, 9 am to 7 pm. Mastery of Sketchup: Develop proficiency in the widely-used and user-friendly 3D modeling software, enabling efficient creation and manipulation of 3D models. Advanced Rendering Proficiency: Acquire expertise in stable diffusion rendering for producing realistic, high-quality renderings that enhance the visual appeal of your designs. Practical Applicability: Develop practical skills applicable across diverse domains, including architecture, interior design, product development, and visualization, enriching your professional portfolio. Interactive Practical Experience: Engage in hands-on exercises with personalized guidance from seasoned instructors, ensuring consistent progress in your skillset. Career Progression: Boost your career opportunities by gaining valuable skills in 3D modeling and generating impressive renderings through stable diffusion techniques. Comprehensive Support: Benefit from free portfolio reviews, mock interviews, and career advice, providing additional resources to enhance your professional journey.
Duration 5 Days 30 CPD hours This course is intended for Network professionals, including systems engineers Channel Partners Customers Overview After taking this course, you should be able to: Describe IP multicast services Identify IP multicast issues on a data link layer Explain why Protocol Independent Multicast Sparse Mode (PIM-SM) is the most current scalable IP multicast routing protocol Describe Rendezvous Point (RP) distribution solutions Recognize the drawbacks of the PIM-SM and describe two extensions to provide possible solutions Explain basic concepts of Multiprotocol BGP (MP-BGP) and its use in the IP multicast environment Configure and deploy Multicast Source Discovery Protocol (MSDP) in the interdomain environment Describe solutions to mitigate security issues in the IP multicast network Describe the process of monitoring and maintaining multicast high-availability operations Design multicast-related application and network solutions in customer and service provider networks The Implementing Cisco Multicast (MCAST) v2.0 course teaches you the fundamentals of IP multicasting, including multicast applications, sources, receivers, group management, and IP multicast routing protocols such as Protocol Independent Multicast (PIM) used within a single administrative domain. You will learn about issues in switched LAN environments and reliable IP multicasting, and technical solutions for simple deployments of IP multicast within a provider or customer network. The course reviews the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco© routers. Labs offer hands-on experience to help you prepare to deploy IP multicast successfully. Course Outline Module 1: IP Multicast Concepts and Technologies Module 2: Multicast on the LAN Module 3: PIM Sparse Mode Module 4: Rendezvous Point Engineering Module 5: PIM Sparse Mode Protocol Extensions Module 6: Multiprotocol Extensions for BGP Module 7: Interdomain IP Multicast Module 8: IP Multicast Security Module 9: Multicast Optimization and High-Availability Features Module 10: Applications of Multicast
Duration 1 Days 6 CPD hours This course is intended for This course is intended for hiring managers who want to save company time and money recruiting and hiring the right candidates. Overview Upon successful completion of this course, participants will know how to present an open position, develop a workable hiring strategy, know how to find and select candidates for open positions. In this course, participants will gain skills and tools to help seek out great candidates that are a fit for your company. Learn to find the diamond in the rough. Getting Started Workshop Objectives Action Plan Defining and Knowing the Position Know the Position Needs Analysis Job Analysis Task Analysis Practical Illustration Hiring Strategy Company Information Salary Range Top Performers Be Prepared Practical Illustration Lure in Great Candidates Advertise Where Candidates Visit Develop Corporate Citizenship Treat Your Candidates Well Look at the Competition Practical Illustration Filtering Applicants to Interview Put Lots of Weight on Cover Letters Grading Resumes Internet Search Initial Phone Interview Practical Illustration The Interview (1) Introduce Everyone Use a Panel Match the Interview to the Job Types of Questions Practical Illustration The Interview (2) Tell Me About My Company Distractions Interview More Than Once Wrap Up Practical Illustration Selection Process (1) Testing Look for Passion and Enthusiasm Background Checks Trust Your Instincts Practical Illustration Selection Process (2) Education Level vs. Experience Have a Consensus Keep Non-Hires on File Checking References Practical Illustration Making an Offer Do it Quickly Employment Details Notify Rejected Candidates Be Creative Practical Illustration Onboarding Training and Orientation Mentoring 30-60-90 Day Reviews Make Them Feel Welcome Practical Illustration Wrapping Up Words From the Wise
An information security manager takes responsibility for overseeing and controlling all aspects of computer security in a business. The job entails planning and carrying out security measures that will protect a business’s data and information from deliberate attack, unauthorized access, corruption and theft.” Randstad.co.uk Learning outcomes: How to ensure essential guidelines are in place for adhering to industry rules and regulations. How to conduct internal audits and reviews to ensure compliance (SOX, etc). How to carry-out gap analysis using ISO27001, ISO27002, ISO27005, NIST CSF etc. How to review companies’ policies, procedures, and guidelines. How to carry-out risk assessment and ensuring the right treatment is selected. How to identify vulnerabilities and patch the weaknesses How to compliance to regulatory requirements (UK Data Privacy, GDPR, HIPAA, etc). How to ensure employees are thoroughly updated about the organization’s policies, regulations, and processes. How to ensure employees are guided and made aware of information security risks the legal implication. Who is the course for? Managers Accountant Engineers Business Analysts Healthcare Professionals. Teachers and Academics. Students and professions with transferable skills. E-mail: info@prefortconsult.com Website: www.prefortconsult.com Mobile: +447455884242 Attending this will enable you to access some paid courses and training for free. HURRY NOW and book your place before the opportunity closes. Note: All sessions/classes will take place online via Zoom. You are also required to attend group discussions to improve your skills like presentation, communication, analysis, etc.
Agile is not what you do, Agile is what you become! An introduction to the essentials of Agile Scrum as a delivery method. The same learning objectives as used in central government & public sector digital delivery projects. Agile is not what you do, Agile is what you become! Since 2012, all government departments have been required to use the Agile approach to project management, to build and run new digital services. As you begin your Agile journey, one of your first challenges will be understanding the rules and roles that support Agile delivery, some of the most frequently asked questions are "Which Agile framework is applicable to our business operating model?" or, "Is the Project Manager role equivalent to that of theProduct Owner?" and, "What does a Scrum Master do?" A strong corporate culture not accustomed to the Agile mindset can also be a difficult environment in which to implement Agile methods. In some cases, the company’s culture and practices may reward non-Agile milestones while inadvertently discouraging Agile success. This intensive two-day training course combines PowerPoint presentations, informal discussions and practical exercises to introduce you to Agile Scrum as a Delivery Method, without the impending pressure of having to pass a formal certification examination. Previous experience of Agile delivery is not a pre-requisite to attending this course, although it is assumed delegates have previously attended the Primer course, or have some understanding of Agile Scrum terms and practices. This course, designed by Agile Scrum practitioners and coaches with specialist experience of working on GDS (Government Digital Service) Service Standards compliant government and public sector projects has been accredited by The CPD Certification Service and is now available outside its usual central government and public sector digital delivery setting. Who this course is for Service and Programme Managers If you are a Service Manager or Programm Manager who wants to explore the benefits of transitioning to Agile ways of working and want to understand how your existing business processes and resource landscape will fit into an Agile delivery model, then this course aims to provide you with enough information to enable you to make an informed decision. Career ambitions If you are new to Agile and your intention is to pursue a career either as an Agile Scrum Master or Agile Product Owner, you will hopefully be provided with enough knowledge to enable you to determine which role best suits your Agile career ambitions. Frequently Asked Questions How this course differs from other Agile courses Delegates will learn the 'How', not just the 'What'! This course has been designed by highly experienced Agile practitioners and coaches with specialist real-life experience of working on GDS (Government Digital Service) Service Design Standard projects. Delegates will find that the learning objectives are significantly more detailed than with other Agile courses which only focus on teaching the learning objectives of The Scrum Guide. Delegates must take the certification assessment. No! During enrolment, delegates can opt out of taking the C-ASDM certification assessment. The online Agile Scrum as a Delivery Method – Essentials course quiz is optional Absolutely! Delegates are provided access to the online Agile knowledge quiz which accompanies the Agile Scrum as a Delivery Method – Essentials course. The quiz helps delegates gauge their level of attainment but is entirely optional. Delegates can take the certification assessment without enrolling on the course. Yes! Delegates with existing Agile project delivery experience can choose to take the certification assessment without enrolling on the course. I will receive my certificate as soon as I have completed the course You will initially receive an Assessment Completion report after completing the assessment. The report details the certification status: 'Pass' or 'Fail', and includes information on which questions were answered incorrectly. Your certificate is issued by the CPD Certification Service approximately four-to six-weeks after successfully completing and passing the C-ASDM Certification Assessment. A CPD certification is recognised by employers Yes! CPD certification is recognised by private and public sector employers, and in central government departments as a valuable way to evaluate the skills of an individual, and the quality of the learning activities. Listing your CPD certification as well as the number of CPD Points you have achieved on your CV is essentially showcasing your achievements in continuing your professional development. One CPD Point is equivalent to an hour of training CPD points are units that quantify time, and the quality of learning and development activities. Delegates will earn 3 CPD Points upon successful completion of the C-ASDM Certification Assessment or 13 CPD Points after completing the two-day course. My CPD certificate will expire after three years Your certificate will not expire however, best practice suggests a renewal after three years. You can do this by enrolling on the C-ASDM course to ensure your knowledge of Agile as a Delivery Method is up to date. Service features Two-day Agile Scrum training course The course uses eCommerce and other Business Case examples for context Optional online CPD certification assessment Optional Agile knowledge quiz to help delegates gauge level of attainment Online Retrospective feedback to enable continuous course improvements. Service benefits Delegates will understand the concepts and benefits of Agile Scrum development Scrum team roles and role accountabilities INVEST-compliant User Stories and BDD formatted Acceptance Criteria Agile approach to incremental project delivery Agile artefacts and Agile reports (burn-down & burn-up charts) Agile Events & Scrum rules Comparison: Agile methodologies (Lean, XP, SAFe & Scrum) Use of Kanban for workflow management Government Digital Service (GDS) Service Standards and Service Assessment Be able to communicate the ideals of Agile to stakeholders Service Agenda General knowledge Agile Delivery 101 Scrum process and sprints Applicability of Scrum Agile Manifesto Scrum roles and accountabilities Overview of Scrum roles (Core & Ancillary) Scrum Master role and role responsibilities Scrum Product Owner role and role responsibilities Scrum team Scrum events Sprint Planning Daily Scrums Sprint Reviews Sprint Retrospectives Scrum artefacts Product Backlog Sprint Backlog Increments Scrum Reports Burn-down and Burn-up Charts Scaling Scrum Working with multiple Scrum teams Working with distributed Scrum teams GDS (Government Digital Service) Service Standards Service Assessments Risks and challenges Risks and challenges of transitioning to Agile delivery Frequently asked questions Discussion on frequently asked Agile questions Agile knowledge quiz Examples of the multiple-choice questions in the optional online quiz On-going support Email support No Telephone support No Webchat support No Online support No Community Support Yes! Delegates are offered access to our private online 'Community of Agile Scrum Practitioners'. Delegates who achieve the pass mark for CPD certification are additionally offered access to our private 'Certified Scrum Practitioners’ Guild', a private Slack community of like-minded Agile professionals.
The importance of building services to the success of an organisation has never been greater and continues to grow. Developers and occupiers are becoming more aware of the contribution that building services make to the well being of occupants and hence their perception of the quality of the working environment. Those involved with the design, construction, maintenance and operation will increasingly be required to deliver building services that demonstrable contribution to the occupier's business. Energy efficiency, carbon management and occupant satisfaction depend substantially on the way building services are designed, managed and operated. To optimise these aspects, an informed strategic approach is essential. Tried and tested techniques and processes are available that, when applied holistically, will deliver substantial benefits. This course reviews best practice in the area and inspires participants to ensure that building services perform at their optimal level. To provide a better understanding of how building services can be designed, managed and operated to: Maximise occupant comfort, satisfaction and wellbeing Add value and contribute to the success of the business of the occupier Improve health safety Reduce operating cost, energy use, carbon emissions and environmental impact Optimise cost and value Provide strategies for continuous improvement and sustainable operation 1 Building services fundamentals The function of services in commercial buildings and their importance to the core business 2 Techniques and processes for optimising cost and value Programmed operation evaluation Continuous commissioning Lifetime product management Performance-based service Energy efficiency and the scope for environmental improvement 3 Making the business case and preparing the strategy Motivating decision-makers Empowering those who have to deliver the results Managing business risk 4 Strategy implementation and monitoring results Ensuring that rich and robust feedback is available to support continuous improvement and strategy enhancementWhen to get feedbackWhyHowWhat to do with it 5 Case histories and 'air time' Sharing experience and addressing specific issues of interest to participants Course review Close
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options