• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

26884 Courses delivered Online

PMI Agile Certified Practitioner (PMI-ACP)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for project leaders, scrum masters, coaches, product owners, and team members who intend on taking the PMI-ACP© exam. Overview Upon successful completion of this course, you will know: ? Agile principles and practices that will enhance team productivity and improve customer satisfaction ? How to create transparent communication among stakeholders ? How to manage project's scope, schedule and budget in an Agile environment ? How to maximize business value and deliver most value early in the project ? How to build high-performing team ? How to plan at multiple levels and manage stakeholders' expectations ? How to detect, track and resolve risks in an Agile project This course provides participants with a solid foundation of the PMI-ACP© exam. Participants will be introduced to PMI Agile concepts and practices. Introduction to the PMI-ACP© Course and ExamAgile Principles and Mindset Agile project Management Framework: ? What is Agility ? Agile Manifesto ? Agile Principles ? Agile Methodologies: Scrum, Kanban, Extreme programming (XP), Lean ? Agile leadership ? Agile process overview Value-Driven Delivery What is Value-driven delivery, how to deliver value early and minimize waste Assessing Value - Return on Investment (ROI), net present value (NPV), Internal rate of return (IRR), earned value management, managing risk Value Based prioritization ? Customer-Valued prioritization, prioritization schemes (Kano analysis, MoSCoW, relative prioritization / ranking Delivering incrementally ? Minimal Viable Product (MVP), Minimal marketable Feature (MMF), Work In progress (WIP), WIP Limits, Bottlenecks, Cumulative Flow Diagram (CFD) Contracting in Agile projects Verification and validation Stakeholder Engagement Identifying project stakeholders Managing stakeholder engagement Establishing a shared vision ? Agile chartering, Definition of 'Done' (DoD), Agile modelling, wireframes, personas Communication Management ? face to face communication, two-way communication, knowledge sharing, information radiators, social media Working collaboratively ? workshops, brainstorming, collaboration games Interpersonal skills for Agile success ? emotional intelligence, active listening, facilitation, negotiation, conflict resolution, participatory decision making Team Performance Agile team roles High-performing Agile teams ? stages of team development Adaptive leadership Creating collaborative team spaces ? co-located teams, osmotic communication, distributed teams Tracking team performance in Agile teams ? burn charts, velocity Adaptive Planning Defining adaptive planning Principles of Agile planning Tools for sizing and estimating Releases and Iterations planning Problem Detection ?nd Resolution How problems impact a project Detecting problems ? lead time and cycle time, defects, variance analysis, trend analysis, control limits Managing projects threats and issues ? risk-adjusted backlog, risk severity, risk burndown graphs Solving problems Continuous Improvement Multiple levels of improvement ? processes, product, people Implementing continuous process improvement ? process tailoring, systems thinking, process analysis, value stream mapping, project pre-mortems Working towards continuous product improvement ? product feedback loops and learning cycle Leading continuous people improvement ? retrospectives, team self-assessments PMI-ACP© Exam Preparation PMI-ACP© Exam Particulars Overview PMI-ACP© Exam Particulars PMI-ACP© Candidate Requirements PMI-ACP© Candidate Fees PMI-ACP© Exam Application Process

PMI Agile Certified Practitioner (PMI-ACP)
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP APM : Access Policy Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager. This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Module 3: Exploring the Access Policy Navigating the Access Policy Module 4: Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Module 5: Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Module 6: Understanding Assignment Agents List of Assignment Agents Module 7: Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Module 8: Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Module 9: Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Module 10: Exploring Client-Side Checks Client-Side Endpoint Security Module 11: Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Module 12: Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Module 13: Configuring App Tunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Module 14: Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Module 15: Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Module 16: Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Module 17: Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Module 18: Deploying SAML SAML Conceptual Overview SAML Configuration Overview Module 19: Exploring Webtops and Wizards Webtops Wizards Module 20: Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Module 21: Configuration Project Configuration Project Additional course details: Nexus Humans F5 Networks Configuring BIG-IP APM : Access Policy Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Configuring BIG-IP APM : Access Policy Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Networks Configuring BIG-IP APM : Access Policy Manager
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

DevSecOps Practitioner (DevOps Institute)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The target audience for the DevSecOps Practitioner course are professionals including: Anyone focused on implementing or improving DevSecOps practices in their organization Anyone interested in modern IT leadership and organizational change approaches Business Managers Business Stakeholders Change Agents Consultants DevOps Practitioners IT Directors IT Managers IT Team Leaders Product Owners Scrum Masters Software Engineers Site Reliability Engineers System Integrators Tool Providers Overview After completing this course, students will be able to: Comprehend the underlying principles of DevSecOps Distinguish between the technical elements used across DevSecOps practices Demonstrate how practical maturity concepts can be extended across multiple areas. Implement metric-based assessments tied to your organization. Recognize modern architectural concepts including microservice to monolith transitions. Recognize the various languages and tools used to communicate architectural concepts. Contrast the options used to build a DevSecOps infrastructure through Platform as a Service, Server-less construction, and event-driven mediums Prepare hiring practices to recognize and understand the individual knowledge, skills, and abilities required for mature Dev Identify the various technical requirements tied to the DevSecOps pipelines and how those impact people and process choices. Review various approaches to securing data repositories and pipelines. Analyze how monitoring and observability practices contribute to valuable outcomes. Comprehend how to implement monitoring at key points to contribute to actionable analysis. Evaluate how different experimental structures contribute to the 3rd Way. Identify future trends that may affect DevSecOps The DevSecOps Practitioner course is intended as a follow-on to the DevSecOps Foundation course. The course builds on previous understanding to dive into the technical implementation. The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing DevSecOps practices to their organizational structure, building better pipelines in distributed systems, and having a common technological language. This course positions learners to successfully complete the DevSecOps Practitioner certification exam. DevSecOps Advanced Basics Why Advance Practices? General Awareness People-Finding Them Core Process Technology Overview Understanding Applied Metrics Metric Terms Accelerating People-Reporting and Recording Integrating Process Technology Automation Architecting and Planning for DevSecOps Architecture Basics Finding an Architect Reporting and Recording Environments Process Accelerating Decisions Creating a DevSecOps Infrastructure What is Infrastructure? Equipping the Team Design Challenges Monitoring Infrastructure Establishing a Pipeline Pipelines and Workflows Engineers and Capabilities Continuous Engagement Automate and Identify Observing DevSecOps Outcomes Observability vs. Monitoring Who gets which Report? Setting Observation Points Implementing Observability Practical 3rd Way Applications Revisiting 3rd Way Building Experiments Getting the Most from the Experiment The Future of DevOps Looking Towards the Future Staying Trained Innovation What, and from Who? Post-Class Assignments/Exercises Extended advanced reading associated with Case Stories from the course Additional course details: Nexus Humans DevSecOps Practitioner (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevSecOps Practitioner (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevSecOps Practitioner (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/E)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Lawyers Records Managers Information Officers Compliance Officers Human Resource Officers Anyone who uses, processes and maintains personal data Overview The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There's a lot to know, there's a lot at stake and there's a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation's data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There?s a lot to know, there?s a lot at stake and there?s a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe?and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation?s data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. Data protection laws Key European data protection laws and regulatory bodies Evolving toward a harmonised legislative framework Personal Data Understanding and differentiating between types of data as defined by the GDPR Personal, anonymous, pseudonymous and special categories Controllers and Processors Roles and relationships of controllers and processors as defined by the GDPR Processing Personal Data Data processing and GDPR processing principles Applying the GDPR Legal grounds for processing personal data Data subject rights Data subject rights Applying rights Controller and processor obligations Information provision obligations Controller obligations for providing information about data processing activities to data subjects Supervisory authorities as set out in the GDPR Cross-border data transfers Options and obligations under the GDPR for transferring data outside the European Economic Area Adequacy decisions Safeguards and derogations Compliance considerations Applying European data protection laws Legal bases and compliance requirements for processing personal data in practice Processing employee data Surveillance Direct marketing Internet technology and communications Security of processing Considerations and duties of controllers and processors for ensuring security of personal data GDPR specifications for providing notification of data breaches Accountability Accountability requirements Data protection management systems Data protection impact assessments Data protection policies Role of the data protection officer Supervision and enforcement Role, powers and procedures of supervisory authorities Composition and tasks of the European Data Protection Board Role of the European Data Protection Supervisor Remedies, liabilities and penalties for noncompliance as set out in the GDPR Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/E) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/E) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/E)
Delivered OnlineFlexible Dates
Price on Enquiry

Dare to Lead

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Team leaders, managers, executives, and other business and IT professionals who lead others as well as Individual contributors ready for transformational self-development as a leader. Overview Recognize vulnerability as the emotion we feel during times of uncertainty, risk, and emotional exposure. Explain why courage requires vulnerability. Establish a link between what I learned and behaviors I want to change. Recognize the critical role that self-awareness plays in daring leadership. Give examples to support how armor - not fear -is the greatest obstacle to daring leadership. Identify the four skill sets that make up courage: rumbling with vulnerability, living into our values, BRAVING trust, and learning to rise. Recognize that courage is a collection of four skill sets that are measurable, observable, and teachable. Recognize that vulnerability is the birthplace of many of the behaviors that define daring leadership, including creativity, accountability, and difficult conversations. Give examples of why daring leadership requires showing up for hard conversations and rumbles, including giving and receiving feedback. This workshop is all about your own leadership self-awareness, identifying your call to courage as a leader and the learning, practice and integration of the four courage skills sets so you can show up authentically in life and leadership. Dare to Lead? is the ultimate playbook for developing brave leaders and courageous cultures. The greatest barrier to daring leadership is not fear; the greatest obstacle is armor ? how we self-protect when we feel uncertainty, risk and emotional exposure. Learn the skills to move from armored leadership to daring leadership. Daring leaders are self-aware, know how to have hard conversations, hold themselves and others accountable, build trust, lead with empathy and connection, take smart risks that lead to innovation, reset quickly after disappointments and setbacks, and give and receive feedback. This interactive curriculum is delivered in five, half-day sessions and is based on the research by Bren‚ Brown. This course comes with a PDF workbook and an Amazon gift card to purchase the Dare to Lead? book in the version of your choice. You also have access to a series of leadership and personal development assessments and exclusive training videos led by Dr. Bren‚ Brown. At the end of the event, a digital badge is awarded to those who complete 24 hours of course content. The Heart of Daring Leadership Permission Slips Container Building Armored Leadership versus Daring Leadership Call to Courage Assembling Our Armor Building Grounded Confidence to Replace our Armor Aplying the 5Cs Self-Awareness & Emotional Literacy Developing Emotional Literacy Getting Curious About Emotions Exploring the Iceberg The Myths of Vulnerability Rumbling with Vulnerability The Six Myths of Vulnerability Exploring Your Arena Shame Resilience Shame 101 Defining Shame The Physiology of Shame Shame Shields How Shame Shows Up in Organizations How Shame Shows up at Work Empathy and Self-Compassion Attributes of Empathy What Does Empathy Look Like? Empathy Misses Comparative Suffering Self-Compassion Talk to Yourself the Way You Talk to Someone You Love Empathy & Self-Compassion Commitment Supplemental Exercise: Kristin Neff?s Self-Compassion Scale Supplemental Exercise: Putting Empathy, Curiosity, and Rumble Tools in Action Living Into Our Values Living Into Our Values Values Clarification Taking Values from Professing Words to Practicing Behaviors Grounded Confidence and Rumbling Skills Grounded Confidence and Rumbling Skills Rumble Starters The 5Cs of Strategic Thinking, Decision Making, and Delegation Using the 5Cs Supplemental Exercise ? Gritty Faith & Gritty Facts Supplemental Exercise ? Horizon Conflict Engaged Feedback Giving Engaged Feedback Recognizing Defensiveness in Feedback Conversations BRAVING Trust BRAVING Trust Square Squad Rumbling with Self-Trust Trust with Others Trust on Teams Rumbling with Living BIG Learning to Rise: The Reckoning Learning to Rise: The Rising Strong Process The Rising Strong Process Getting Emotionally Hooked Offloading Hurt: Barriers to Reckoning with Emotion Strategies for Reckoning with Emotion The Rumble and The Revolution Writing My SFD The Delta The Revolution: When the Process Becomes a Daily Practice Supplemental Exercise ? Reset and Resilience Practices Integration Dare to Lead Integration Plan

Dare to Lead
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Learning Subscription Premium

By Nexus Human

Duration 45.625 Days 273.75 CPD hours Overview Live, instructor-led virtual classes: Benefit from an interactive classroom with added flexibility and convenience. Access to Red Hat certified instructors: Virtual classes are taught by the same experienced subject matter experts who lead classroom trainings. Flexible scheduling options: Various class topics and time options facilitate incorporating learning and preferences into busy schedules. Focused training sessions: Participants can narrow their learning to more specific topic areas. Choice of learning modality: A combination of self-paced materials and expert-taught classes maximizes learning. Train without traveling: Learn when, where, and how it is best for you Red Hat© Learning Subscription Premium provides a customizable learning experience with self-paced and live training options. Users can tailor their learning with recorded video classes, e-books, online content, and live virtual classes. A subscription provides access to content across the entire Red Hat product portfolio, content that is continuously updated by Red Hat experts. Live, instructor-led classes create an engaging, immersive learning experience. These interactive sessions compliment the on-demand, self-paced learning materials available with a Red Hat Learning Subscription for highly effective, flexible training for everyone from beginners to experienced professionals.This subscription provides an array of additional features to complement the learning experience. Cloud-based labs give the opportunity for hands-on practice in actual Red Hat environments. Expert extras are short, on-demand videos where Red Hat practitioners demonstrate innovative technologies in practical scenarios. Skills paths and pre-assessments are available for course selection guidance. Red Hat Learning Subscription Premium also includes certification exams. Red Hat?s exams are industry-recognized and performance-based. These exams validate that holders have the skills needed to undertake even the most ambitious technology projects. Reporting capabilities to track progress toward training and certification goals. 24x7 self-paced access to Red Hat online training and video classroom courses Content is created by Red Hat experts who build and use Red Hat technology and is directly related to Red Hat certification exams. Early access Be the first to explore in-development technology before it is officially released by accessing courses and labs in development. Cloud-based labs Get hands-on practice in authentic Red Hat environments, delivered 24x7 on six continents. Skills paths Map your learning and certification goals to one of the skills paths inside the platform to develop a strong foundation for a specific skill set. Certification exams and retakes Validate your skills through performance-based exams remotely or at a testing station. Exams can be taken when and where it's most convenient. Expert extras Red Hat field practitioners present short demo videos to supplement courses by showing innovative technologies and practices based on actual use cases. Expert chat Get direct answers and guidance from curriculum experts via a 30-minute chat session per day. Machine translations provide chat dialogue in local languages. E-book Downloads Download course e-books to continue learning offline. Reporting An individual?s dashboard provides a summary of training progress, courses and labs taken, and exam status. Management reports provide insights so a team?s engagement and progress can be measured. Globally available,translated content Access Red Hat?s most popular courses in as many as 11 languages: English, International Spanish, Brazilian Portuguese, French, Italian, German, Simplified Chinese, Korean, Japanese, Hindi, and Czech. Additional course details: Nexus Humans Red Hat Learning Subscription Premium training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Learning Subscription Premium course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Learning Subscription Premium
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/CAN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/CAN)
Delivered OnlineFlexible Dates
Price on Enquiry

Migrating to AWS

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Solutions architects, Software engineers, Operations leads, and IT project managers. Overview Recognize the common business and technical drivers for migrating to the cloud Summarize the three phases of a migration and associated objectives, tasks, and stakeholders for each Describe AWS architecture, tools, and migration best practices Distinguish between the various cloud migration strategies and when each is most appropriate Determine an organization?s application migration readiness Discover a portfolio and gather data necessary for migration Plan and design an application migration strategy Perform and validate application migration to the cloud Optimize applications and operations after migrating to the cloud This course is for individuals who seek an understanding of how to plan and migrate existing workloads to the AWS Cloud. You will learn about various cloud migration strategies and how to apply each step of the migration process, including portfolio discovery, application migration planning and design, conducting a migration, and post-migration validation and application optimization. Hands-on labs reinforce learning, and each lab is designed to provide you with the understanding and foundation necessary to complete migration tasks in your organization. Prerequisites We recommend that attendees of this course have: Familiarity with enterprise IT infrastructure (hardware and software) Completed the AWS Technical Essentials or Architecting on AWS training 1 - What Is a Cloud Migration? Summarize the drivers and desired outcomes of a cloud migration Identify the elements of a successful migration journey Describe the three-phase AWS migration process 2 - Assessing Migration Readiness Summarize the activities and goals of the assess phase Evaluate tools for assessing your organization?s cloud readiness Describe Migration Readiness Assessments (MRAs) and their importance 3 - Preparing for a Migration and Understanding Related Workstreams Summarize the mobilize phase of the process Discuss the eight unique migration-related workstreams 4 - Discovering Landing Zones and Their Benefits Explain the function of a landing zone Discuss best practices for creating a custom landing zone Describe how you would use AWS Control Tower to create a landing zone 5 - Building a Landing Zone Summarize the process of building a landing zone Determine the best multi-account structure, governance policies, and connectivity plan for a landing zone 6 - Discovering the Portfolio and Understanding Migration Strategies Explain the activities of the detailed portfolio discovery workstream Describe how to assess an application?s migration readiness Summarize the seven migration strategies 7 - Understanding and Choosing Portfolio Discovery Tools Summarize the various discovery tools available Distinguish which tools are best to use based on scenario 8 - Planning and Designing a Migration Describe the planning and design process Summarize how to set up a migration factory Choose and finalize an application migration strategy 9 - Performing the Migration to AWS Explain the server migration process Discuss the various migration automation and governance tools available Evaluate server migration tools for compatibility with your environment 10 - Understanding Database and Data Migration Services Summarize the significance of database and data migration Discuss the various data migration tools available 11 - Understanding Additional Migration Support Options Discuss additional migration support options Summarize AWS Managed Services and AWS Marketplace Describe SAP on AWS and services offered for Windows 12 - Integrating, Validating, and Cutting Over Applications Discuss the process and benefits of integrating, validating, and cutting over applications 13 - Modernizing and Optimizing an Application Migration Identify post-migration opportunities for modernization and optimization Understand cost and security optimization processes Explore tools available to support these processes 14 - Understanding Operations Tools, Integration Testing, and Automation Summarize operations in the cloud Discuss four functions of operations and their domains Review operations automation and relevant support tools 15 - Migration Best Practices Course review and key takeaways Summarize and reinforce AWS best practices for migrating Additional course details: Nexus Humans Migrating to AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Migrating to AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Migrating to AWS
Delivered OnlineFlexible Dates
Price on Enquiry