Duration 3 Days 18 CPD hours This course is intended for This course is designed for IT professionals with baseline skills in computer hardware, software support, and development who want to learn how to design, develop, implement, operate, and manage Internet of Things devices and related systems. It is for those interested in learning more about embedded systems, microcontroller programming, IoT security, and the development life cycle for IoT projects. While students will gain hands-on experience assembling a prototype IoT device and using software development tools, these activities are closely guided, so previous experience in electronics assembly and programming are not required. This course prepares students for taking the CertNexus Certified Internet of Things (IoT) Practitioner (Exam ITP-110). Overview In this course, you will learn how to apply Internet of Things technologies to solve real-world problems. You will: Construct and program an IoT device. Communicate with an IoT device using wired and wireless connections. Process sensor input and control an actuator on an IoT device. Manage security, privacy, and safety risks on IoT projects. Plan an IoT prototyping and development project. In this course, you will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network. You will create an IoT device based on an ESP8266 microcontroller, implementing various common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption. The instructor led course includes an exam voucher for the Certified Internet of Things Practitioner (CIoTP) exam (exam ITP-110). Planning an IoT Implementation Select a General Architecture for an IoT Project Identify Benefits and Challenges of IoT Constructing and Programming an IoT Device Select and Configure a Processing Unit Select a Microcontroller Power Source Use a Software Development Kit to Program an IoT Device Communicating with an IoT Device Communicate Using Wired Connections Communicate Using Wireless Connections Communicate Using Internet Protocols Processing IoT Data Process IoT Device Input and Output Process Data in the Cloud Provide Machine to Machine Communication Managing Risks on IoT Projects Identify IoT Security and Privacy Risks Manage IoT Security and Privacy Risks Manage IoT Safety Risks Undertaking an IoT Project Identify Real World Applications for IoT Follow the IoT Development Lifecycle Additional course details: Nexus Humans CertNexus Certified Internet of Things Practitioner (CIoTP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified Internet of Things Practitioner (CIoTP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Designed for individuals interested in obtaining information about the CBAP and CCBA exam process especially potential exam candidates interested in pursuing business analysis certification from IIBA in the next 3 to 6 months. Overview Review the 6 Knowledge Areas of the BABOK Guide and discuss the business analysis tasks performed in each. Understand the relationships between the business analysis processes and how each defines an important aspect of the business analysis discipline. Review key terms, business analysis techniques, and competencies important to business analysis. Discuss the 5 business analysis Perspectives presented in BABOK Guide, v3. Complete simulated exam questions to assess personal readiness for taking the exam. Obtain key tips and techniques for effectively preparing for and successfully completing the CBAP or CCBA exam. This course provides you with a clear and detailed understanding of the concepts covered within the CBAP© and CCBA© exams. You will gain valuable tips and techniques to help prepare, study, and assess your personal readiness. In addition, you will earn valuable professional development hours toward meeting the exam criteria. CBAP© and CCBA© Overview Discuss the benefits of professional certification Present the CBAP©/CCBA© eligibility requirements Explain the exam process Discuss the exam blueprints Understand the recertification process Introduction to BABOK© Guide v3 Define the purpose of A Guide to the Business Analysis Body of Knowledge© (BABOK© Guide) Present the structure/components of the BABOK© Guide Identify the six business analysis Knowledge Areas Discuss the supporting areas of the BABOK© Guide BABOK© Guide Key Concepts Define key concepts from the BABOK© Guide Present the Business Analysis Core Concept Model? Discuss the requirements classification scheme Explain Requirements and Designs Present the 5 Business Analysis Perspectives Business Analysis Planning and Monitoring Identify the 5 tasks in Business Analysis Planning and Monitoring Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Elicitation and Collaboration Identify the 5 tasks in Elicitation and Collaboration Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Life Cycle Management Identify the 5 tasks in Requirements Life Cycle Management Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Strategy Analysis Identify the 5 tasks in Strategy Analysis Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Analysis and Design Definition Identify the 6 tasks in Requirements Analysis and Design Definition Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Solution Evaluation Identify the 6 tasks in Solution Evaluation Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Underlying Competencies Describe and understand the importance of the underlying competencies (UCs) Understand how to prepare for questions about UCs on the exam Business Analysis Techniques More clearly understand the 50 techniques presented in the BABOK© Guide Understand how to study techniques for the exam Assess Your Readiness 1 hour mock-exam to assess personal readiness Strategies for Success Utilize 8 strategies for preparing for the CBAP© or CCBA© certification exams Develop study tools and a plan to assist you in preparing for the exams Understand the tools and resources available to help you be successful Wrap-up Take Your Questions Next Steps Additional course details: Nexus Humans BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Yes, you can do it. Take the 7-day challenge. Alternatively, consider hypnotherapy. Evidence shows hypnosis is far and away the most effective technique of all for stopping smoking and quitting for good - as summarised in New Scientistin 2010 (Lynn, Green, Accardi, & Cleere). Especially when it is carried out with an element of counselling. That is the therapy part of the word hypnotherapy, and why Richard talks about hypnotherapy for stopping smoking and not just hypnosis to quit. Take away a seven-step guide to quitting and, more importantly, the commitment to quit. During the session you will have the opportunity to: Explore why we find it difficult to quit Learn the seven key steps that can help you quit on your own Discover why some people prefer hypnotherapy
All organisations today operate in an environment of constant and rapid change. Managing this change effectively is often achieved through a portfolio of formal projects. Many organisations today have qualified and experienced project management staff to run their projects. Some organisations today have dedicated functions, staff or processes to support their project management teams. The very largest organisations have in-house Enterprise Programme Offices, or project management specialists in corporate audit or risk functions; or organise 'Red Team Reviews' of a project by other staff with project management experience who are not participating in the reviewed project. But for many mid-size businesses and SMEs - and even some larger organisations - these resources are simply not available. For them, having access to external expertise to assure project management disciplines and to coach project managers can be a major contributor to project success. Such reviews can take place at project initiation; at major stage-gates (especially if significant capital is to be committed at the stage-gate); or at any other time if concerns arise concerning project quality, cost or timescales. And it is for those organisations that we offer the necessary expertise, on an ad hoc basis, in reviewing projects and coaching senior project management staff. A document review and workshop led by one of our consultants can help you assess whether: The strategic goals and priorities for the project are clear and being addressed Governance of the project within the business is defined and being effectively executed Project roles and responsibilities are clear and effective The credibility and robustness of the project plan can be enhanced Performance measures and reporting procedures are effective Critical risks are identified and being managed and contingencies are agreed The roles, responsibilities and capabilities of the key players in the project team are fit for purpose Budgets are realistic and costs being managed effectively Communication and change management activities are effectively planned and being executed At your discretion, you can capture the outcomes from the workshop for yourselves, in terms of identifying opportunities for improvement, or you can have our consultant write a report and make recommendations to you.
In the fast-changing world of business, and especially IT, everyone in the organisation should be involved in sales. One of the best ways is to give the customer an outstanding experience. The customer experience is the competitive battlefield of today. Sales may be won or lost here. You can either close a sale for a quick buck, or open a long-term relationship to create a high lifetime value customer. By developing excellent communication skills, rapport and, most of all, a desire to serve and listen to the needs of the customer to the best of their ability, both sales teams and other IT professionals will create trust, nurture relationships and develop awareness of other opportunities with the customer. By the end of this course, participants will be able to: Understand the power of a positive customer experience in developing sales opportunities Recognise and develop a sales opportunity when it arises Engage with customers and develop rapport and trust Use verbal and non-verbal communication skills and pick up on signals Ask powerful questions - and listen to the answers Create 'magic moments' for the customer Turn a complaint into an opportunity Know when to ask for referrals and testimonials Pass on leads to the relevant people 1 Introduction Aims and objectives Beliefs about sales 2 Building rapport First impressions Short cuts to rapport Finding common interests 3 Selling or serving? Managing emotions and behaviour - Transactional Analysis Moments of truth - creating 'magic moments' Speed sells - the follow-up 4 Meetings Planning a successful meeting Pre-meeting connection and assistance Sales meeting failure reasons Right v wrong mindset 5 Communication - verbal and non-verbal The 3 Vs - Visual, Verbal, Vocal Picking up on signals 7 power questions Questioning techniques LISTEN - 3 types of listening skills 6 Influencing 6 levels of influence Framing to change perspectives Turning complaints into opportunities 7 Referrals The power of referrals How and when to ask for a referral 5 steps from rapport to referral 8 Presentation and pitching (optional session) Basic presentation structure and delivery Creating powerful impressions Creating a 60-second pitch The elevator 10-second pitch - answering 'What do you do?' Sales presentations Emotion v Intellect - how to engage Using visuals
When staff are new to sales it can seem daunting, especially when they have targets to meet. If the staff you need to promote your products and services get it wrong then it can knock their confidence and negatively impact how your customers see you as an organisation. This programme provides staff with the basic skills they need to sell. This course will help participants: Profile customers Research and identify potential new customers Use the consultative sales process Build effective rapport with customers Identify customer needs through effective questioning and listening Position products and services effectively Close the sale or gain commitment to further action Manage their customer portfolio to maximise sales 1 Introduction Aims and objectives of the training Personal introductions and objectives Self-assessment of existing sales skills Overview of content 2 Knowing your customers Who are your customers, and what do they want from you? What are your strengths, compared to your competitors? Who are your new potential customers? How do you communicate with new customers? What do you need to know about your customers before you start to sell? Making the initial approach Planning your pipeline - keeping the customers coming 3 The four-step sales process Overview of the consultative sales process Key benefits of using the consultative sales process Focusing on behaviours not targets The behaviours of a good salesperson Common pitfalls and mistakes Personal strengths and weaknesses 4 Building rapport First impressions - Mehrabian theory of communication Short cuts to building rapport Looking out for clues as to how the customer is thinking Looping back to keep the conversation flowing Acknowledging past communication Dealing with emotions such as anger Setting the agenda to keep control Getting past gatekeepers 5 Questioning and listening How to ask open questions to uncover information Left brain questions When closed question can be useful What stops us listening? The four levels of listening How to develop your listening skills 6 Presenting products and services to customers When to present Using benefits not features Making it personal Using reciprocity The tendency towards the middle Using consistency 7 Gaining commitment Testing the water Dealing with objections using ACLEO Asking for the business Getting referrals Ending with a personalised close Following-up 8 Managing your customer pipeline Spotting opportunities for cross-sales Managing your portfolio Maximising sales proactively Review meetings Customer satisfaction measures and surveys Mystery shopping 9 Putting it all together Skills practice Personal learning summary and action plans
This workshop will provide participants with the insight and skills to be more effective business networkers, face-to-face and online. The approach taken is to build on the strengths people already have and their successes. It is easier to develop what you already have than to try and develop skills that do not come easily. Being yourself is the most effective tool for business networking and building relationships. This course will help those attending: Appreciate the importance of networking, and different forms of networking Understand the dynamics of communication that are specific to networking Become more confident and assured when 'working' a room Improve their influencing skills, especially with people who are experts and in positions of authority 'Sell' themselves and promote their company Identify and manage their profiles using online social networking sites Use effective follow-up to maintain active contacts and connections Select the correct networking groups, clubs and events Create their own personal network 1 The importance, and different types, of networking Personal objectives and introductions Test networking session Examples of the importance, purpose and format of various types of networking, and benefits you can expect 2 How to work a room - preparation and strategy Three things to know before you attend any event Non-verbal communication and art of rapport Breaking the ice - worked examples with practical demonstration 3 Communication dynamics in networking - the power of the listening networker Why it is better to listen than talk Effective questioning and active listening Creating a natural and engaging conversation, 1-2-1 and in a larger group 4 Assumptions when networking How to use the 'instant judgement' of others to your advantage What assumptions are you making? How to keep an open mind 5 Business networking etiquette Meeting and greeting at a business networking event - approaching complete strangers and introducing yourself Socialising: joining and leaving groups easily Making a good first impression in 30 seconds The use of status when networking 6 Making connections Asking for cards, contact details and referrals Gaining a follow-up commitment Some tips and tricks 7 Business networking rehearsals Practice sessions 8 Personal business networking online Overview of different types of networking sites - there is a lot more out there than just Facebook! Examples of creating an effective profile Using social networking effectively - case studies and application 'Advanced' applications - blogs, articles, twitter, feeds, etc. Online demonstration and examples 9 Building relationships - follow-up and follow-through Maintaining a good database Developing a contact strategy with different types and levels of contact How to analyse your contact base
Conflict is a word that conjures up many emotions. It is something that most people would prefer to avoid, if possible. Work can be an emotive place. Positive relationships can make your life at work exciting, motivating and challenging, whilst relationships that do not hold value to you could make your life very difficult and stressful, especially if there is conflict between you and your manager. This course is essential for people who want to understand where conflict can be used to positive effect and how to manage conflict in your working relationships and see it as something positive that can stimulate the environment. Research has shown that relationships at work are an extremely high motivational factor, and for a lot of people it has a higher importance that salary! Therefore, it is essential that we invest in relationships and search out new ways to make them better in order to have a more positive influence on our surroundings. By understanding why other people are in conflict we can manage the conversation a lot better, with outcomes managed more effectively so the 'conflict' will add value to the organisation. This participative event will cover a wide variety of exercises and personal stories, and leave course participants with a clear strategy to identify when they are in conflict with someone and how they will structure their approach to get to a satisfactory outcome. This is a workshop that targets anyone where conflict needs to be managed and cannot seem to resolve it, whether internally or externally. At the end of the day, participants will: Know their key relationships and the strength of those relationships Complete the Strengths Deployment Inventory (SDI) to identify where you deploy your strengths Understand what is important to you and your key stakeholders Know how motivational value systems can influence behaviour Tailor your communication style to match that of your opposite party Know conflict strategies to resolve conflict in others Learn to be more assertive when challenging Achieve key personal, departmental and organisational objectives 1 Where are you now? How effective are your current working relationships? Can I work effectively without the input from others? Who do you need to be a success? 2 The Strengths Deployment Inventory (SDI) Completion of the SDI questionnaire An understanding of the theory A 'trip around the triangle' Predicting relationship interaction Your scores and what they mean in your relationships 3 Conflict theory What is conflict? The 3 flags of conflict What are your conflict triggers? Your conflict scores plotted The conflict sequence 4 Conflict resolution strategies Early warning signs Most productive behaviours Least productive behaviours Preventable / unwarranted conflict Review of the dynamic triangle Review of the day, personal learning and action planning
Software comes in a variety of guises - application software, firmware, middleware, system software. Increasingly, however, it doesn't necessarily present that way, especially as the boundaries between software, data and source code are becoming more and more blurred. And as software becomes more complex and more difficult to disentangle, so it becomes harder to manage and to value. But as it becomes more integral to every aspect of a business, so it is ever more important to keep on top of the technical, legal and commercial issues that arise, issues such as: To address these issues, organisations need a process for evaluating their current situation from all perspectives and for identifying the key actions they need to take to ensure holistic management of their software. This very practical programme will help set your organisation on the right path. Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. This programme is designed to give you a deeper understanding of: The technical, legal and commercial risks associated with software development, procurement, use and commercial exploitation The most appropriate processes and responsibilities for managing those risks Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. 1 Software business model What is the software business model? What options exist? Has the software business model been thoroughly reviewed to ensure its viability? This means fully understanding the market opportunity, the business environment and customer and end-user expectations. 2 Technology What are the technologies? How has the technology selection been validated considering the competitiveness, structure, and potential for future innovation? 3 UI and UX What is the UI and UX? How to best articulate this? Has the user interface and user experience been studied from both a subjective and objective view to give insight into customer behaviour? 4 Legal framework / commercial aspects Has the necessary legal framework or commercial aspects that may impact upon use or operation of the software been understood and risks identified and mitigated? 5 Software development What is the software development process? Are both the business management and development team's processes resilient in order to improve the company's capability and the maturity of the software? 6 Software quality What is quality? What are the metrics around software quality? What is the maturity level, based around a qualitative and quantitative assessment? 7 Intellectual property associated What IP should be considered when it comes to software? Does the company understand both the intellectual property risks and potential opportunities associated with this software? 8 Security What does software security mean in this context? How is it being addressed? 9 An holistic approach Review of roles and responsibilities to ensure appropriate management and protection