• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3136 Development courses in Glasgow delivered Live Online

Occupational Health Immunisation Update - Webinar

4.7(25)

By AB Health Group

Tailored to Occupational Health Nurses needs. Updating and any new immunisation advice. Discussion on Contraindications, side effects, vaccine ingredients, research etc. Very interactive discussions.

Occupational Health Immunisation Update - Webinar
Delivered Online + more
£210

Talent Development Services - LS International

5.0(1)

By LS International

On top of our Academy, we've created additional ways to support your growth. From there, explore targeted support through individual and group coaching, in-depth assessments, and strategic networking services—each designed to help you grow with intention and land the opportunities you deserve. If you haven’t yet joined our essential course, you can get started here: Join the Academy – Transform Your Job Search

Talent Development Services - LS International
Delivered OnlineFlexible Dates
$25 to $510

Scrum Product Owner Workshop: Virtual In-House Training

By IIL Europe Ltd

Scrum Product Owner Workshop: In-House Training: Virtual In-House Training The Product Owner is responsible for maximizing the value of the product and the work of the Development Team. The Product Owner must be knowledgeable, available, and empowered to make decisions quickly in order for an Agile project to be successful. The Product Owner's key accountability is the Product Backlog. Managing, maintaining, and evolving the Product Backlog involves: Establishing a clear Vision that engages the Development Team and stakeholders Clearly expressing Product Backlog items Ordering the items in the Product Backlog to best achieve the Vision and goals Ensuring that the Product Backlog is visible, transparent, and clear to all Working with the Development Team throughout the project to create a product that fits the customer's needs The overall course goal is to support you in becoming an effective Product Owner. What you will Learn You'll learn how to: Differentiate between poor, good, and great Product Owner attributes, and their impact on the team, product, stakeholders, and the organization Engage your stakeholders by knowing your customers and market Develop an effective and value-driven Product Backlog Evaluate the Product Owner's role in Scrum's 5 events and team engagement Foundation Concepts Agile foundation Product owner role Product Ownership Product ownership Project vision Understanding your customers and market Personas Stakeholder management and engagement The Product Backlog Epics and user stories Preparing user stories for a sprint The product backlog Visualizing the product backlog Product backlog prioritization Technical debt Sprint Planning and Delivery Sprint planning The sprint Sprint Reviews, Retrospectives, and Closing Sprint reviews Key agile patterns Retrospectives Closing the project

Scrum Product Owner Workshop: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Coaching Skills for HR Professionals - ILM Recognised

By British School of Coaching

A practical programme for HR professionals who are keen to develop a coaching style of interaction either within their teams and/or with business stakeholders. Develop skills in taking a more engaging, non-directive approach to supporting your business and to encouraging a coaching style of communication in your organisation.

Coaching Skills for HR Professionals - ILM Recognised
Delivered OnlineFlexible Dates
£708

Introduction to Exploration and Production for New Engineers and Non-Technical Professionals in Oil & Gas

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course  Exploration and production technology, equipment specification and processes have a unique language that must be conquered by executives such as you. A confident understanding of the technical jargon and a visual appreciation of the various pieces of equipment used provides for an overall 'big picture' of industry value chain. This serves as an excellent foundation for smooth communication and increased efficiency in inter-department project team efforts. Gain a comprehensive overview of the entire value chain and process of oil & gas upstream operations and business in this 3 full-day training course. Training Objectives By attending this industry fundamentals training course, participants will be better able to: Appreciate the dynamics of world energy demand & supply and its impact on pricing Understand the formation of petroleum reservoirs and basic geological considerations Examine the exploration process to gain an overview of the technical processes involved Gain a comprehensive overview of drilling activities - from pre-drilling preparation, through to well drilling, well evaluations and post drilling activities Get familiarised with the common production methods and the different stages of its processes Integrate your understanding of asset maintenance and downstream supply chain activities Better visualise through video presentations the various exploration equipment/ technologies and understand the major cost components Target Audience This course will be useful and applicable, but not limited to: Accounting Administration Business Development Commercial Construction E & P IT / Data Finance Finance & Treasury Health & Safety Human Resource Joint Venture Co-ordinators Legal Logistics Materials Planning Procurement Sales & Marketing Senior Management Sourcing Strategic Planning Supply Chain Tender Contract Course Level Basic or Foundation Training Methods Multi-media presentation methodology to enable better understanding and appreciation technical jargon and equipment applied in the field A pre-course questionnaire to help us focus on your key learning objectives Detailed reference manual for continuous learning and sharing Limited class size to ensure one to one interactivity Trainer Your expert course leader worked for BP for 28 years as a Research Associate and Team Leader, working on Feasibility Studies and acting as a trouble shooter covering all aspects of BPs businesses. These covered field Development Project in the North Sea and several novel resource recovery techniques which were taken from Concept to Field Pilot trials in Canada. His specific work in the offshore area covered Subsea Robotics / Automation, Seabed Production Concepts, Seabed Excavation Methods, Underwater Repair Techniques, Flexible Riser Studies and Maintenance Cost Reductions. After leaving BP in 1992, he continued working in the offshore oil industry through Azur Offshore Ltd, including activities in the assessment of Emerging and Novel Technologies, Technical and Economic Audits, Studies, Production Sharing Agreement Evaluations, Safety and Environmental issues. Clients have included Chevron UK, BP Exploration, British Gas, Technomare, Trident Consultants, Fina UK and Cameron France. He is a regular University lecturer at Crandfield School of Industrial Sciences (UK) and is a course Group Project external examiner for Crandfield. He also lectures on offshore oil industry activities at ENSIETA (France), the Technical University of Delft (Holland) and the Northern Territories University in Darwin (Australia). He is an active member of the UK Society for Underwater Technology (SUT) and serves on their Subsea Engineering and Operations Committee. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Introduction to Exploration and Production for New Engineers and Non-Technical Professionals in Oil & Gas
Delivered in Internationally or OnlineFlexible Dates
£2,149 to £2,499

Agile Release Plans: Virtual In-House Training

By IIL Europe Ltd

Agile Release Plans: Virtual In-House Training While many Agile frameworks provide guidance on a focus on value and iterative development, many do not explain how that value is delivered to the customer. Release Plans have become an accepted and common practice to bridge the gap between the Product Vision and the Product Backlog (Agile requirements). In this course, you will be provided with an introduction to Agile and to Scrum, the most utilized Agile framework. You will also learn how the Vision, Roadmap, and Charter help to establish the Release Plan. The goal of this course is to equip you with the necessary knowledge, skills, and techniques to build Release Plans to ensure you deliver the most value to your customers. What you will Learn At the end of this program, you will be able to: Recall the Scrum framework elements (roles, events, and artifacts) Examine the benefits of Agile Develop a Product Vision and Roadmap Create an Agile Project Charter Prepare a Release Plan Write user stories to support a Product Backlog Foundation Concepts Introduction to Scrum Scrum Overview Agile Benefits Product Definition Business Goals Product Vision Product Roadmap Agile Project Charter Product Scope Project Risks Release Deadlines Sprint Durations Team Norms Release Planning Release Plan Process Select Stories and a Release Date Product Backlog User stories Building the product backlog Product Backlog Refinement Transitioning to the Scrum Team

Agile Release Plans: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Agile product development: an introduction (In-House)

By The In House Training Company

The aim of this course is to provide an overview of Agile approaches to product development. It explains what Agile is and when and why to use it. The scope of the programme includes: The course emphasises the collaborative nature of Agile and the flexibility it offers to customers. The principal training objectives for this programme are to help participants understand: Why and when to use Agile How to use Agile The roles involved in Agile development The cultural factors to take into account How to manage Agile developments 1 Introduction (Course sponsor and trainer) Why this programme has been developed Review of participants' needs and objectives 2 Background to Agile Issues with traditional approaches to product development How Agile helps Roots of Agile Agile lifecycles Product v project 3 How Agile works The Agile Manifesto Agile principles Process control: defined v empirical Different Agile methods The Scrum framework DSDM Atern 4 Managing Agile When to use Agile Managing Agile projects Team organisation 5 Agile techniques Daily stand-ups User stories Estimating MoSCoW prioritisation 6 Course review and action planning (Course sponsor present) Are there opportunities to use Agile? What actions should be implemented to adopt Agile? Conclusion

Agile product development: an introduction (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

ITIL© 4 High Velocity IT (HVIT)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Ideally candidates should have at least two years professional experience working in IT Service Management. The ITIL 4 HVIT Qualification would most likely suit the following delegates: Individuals continuing of their journey in service management ITSM managers and aspiring ITSM managers IT managers and practitioners involved in digital services or working in digital transformation projects, working within or towards high velocity environments Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This course has been created to help IT service management practitioners working in organizations that are becoming more digitally enabled. The practitioners are familiar with traditional IT service management concepts, and now want to be able to discuss ?digital? with more confidence, to develop practical competences, and to be valued contributors in the digital domain. They want to improve how they and their co-workers: Help get customers? jobs done ? helping customers become who they seek to become Keep raising the bar ? taking things to a significantly higher level Trust and are trusted ? as professional knowledge workers in a healthy workplace Accept ambiguity and uncertainty - not scared of not knowing an answer Commit to continual learning ? all as part of their daily work The scope of the course is the primary activities in the digital value chain. In other words, what the practitioner does and which resources they use across the lifecycle of digital products, in order to: Make the right digital investments Realize and deliver digital products and services quickly Provide digital products and services that are highly resilient to disruption Ensure that the service consumer realizes value from the digital products and services Assure conformance of activities with governance, risk and compliance requirements. Understand and know how to use the key principles and methods of Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in directing, planning and improvement Understand and know how to direct, plan and improve value streams and practices ITIL 4 is a framework for quality IT service management (ITSM) through proven best practice, providing practical and flexible guidance to support your organization on its journey to digital transformation while empowering your IT teams to continue to play a crucial role in the wider business strategy. This course highlights the ways in which digital organizations and digital operating models function in high-velocity environments, including the use of working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing. This class includes an exam voucher. Prerequisites ITIL© 4 Foundation 1 - THE NATURE OF HIGH-VELOCITY IN A DIGITAL WORLD Overview of the key ITIL 4 high-velocity terminology Understand when the transformation to high velocity IT is desirable and feasible Understand the five objectives associated with digital products ? to achieve: Valuable investments ? strategically innovative and effective application of IT Fast development - quick realization and delivery of IT services and IT-related products Resilient operations - highly resilient IT services and IT-related products Co-created value - effective interaction between service provider and consumer Assured conformance - to governance, risk and compliance (GRC) requirements. 2 - ITIL OPERATING MODEL ? DIGITAL PRODUCT LIFECYCLE Understand how high velocity IT relates to: The four dimensions of service management The ITIL service value system The service value chain The digital product lifecycle 3 - FUNDAMENTAL CONCEPTS FOR DELIVERING HVIT Understand the following concepts: Ethics Safety culture Toyota Kata Lean / Agile / Resilient / Continuous Service-dominant logic Design thinking Complexity thinking Use the principles, models and concepts to contribute to: Help get customers? jobs done Trust and be trusted Commit to performance Deal with uncertainty Improve by being inquisitive 4 - ACHIEVING VALUE WITH DIGITAL PRODUCTS Know how the service provider ensures valuable investments are achieved. Know how to use the following practices to contribute to achieving valuable investments: Portfolio management Relationship management Know how the service provider ensures fast deployment is achieved Know how to use the following practices to contribute to achieving fast deployment: Architecture management Business analysis Deployment management Service validation and testing Software development and management Know how the service provider ensures resilient operations are achieved Know how to use the following practices to contribute to achieving resilient operations: Availability management Capacity and performance management Monitoring and event management Problem management Service continuity management Infrastructure and platform management Know how the service provider ensures co-created value is achieved Know how to use the following practices to contribute to achieving co-created value with the service consumer: Relationship management Service design Service desk Know how the service provider ensures assured conformance is achieved Know how to use the following practices to contribute to achieving assured conformance: Information security management Risk management

ITIL© 4 High Velocity IT (HVIT)
Delivered OnlineFlexible Dates
£2,385

Use Cases for Business Analysis: Virtual In-House Training

By IIL Europe Ltd

Use Cases for Business Analysis: Virtual In-House Training The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?

Use Cases for Business Analysis: Virtual In-House Training
Delivered OnlineFlexible Dates
£850