• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2960 DOM courses

BCS Foundation Certificate in Information Security Management Principles

5.0(12)

By Nemstar Ltd

This CISMP course and exam is for anyone wishing to progress their career in the rapidly expanding fields of Information Security, risk and cyber especially within the UK public sector.

BCS Foundation Certificate in Information Security Management Principles
Delivered OnlineFlexible Dates
£1,914

Negotiation Skills and Techniques for Engineers and Technical Professionals

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This is a 2 full-day course that is aimed at providing professionals in the Oil & Gas business with a comprehensive set of core negotiating skills. Negotiations take place in many situations e.g. between peers, manager and subordinate, company and trade unions, company and government. The skills learnt on this course will be useful in all of these situations. However, this course puts a focus on the skills needed in commercial negotiations. A particular emphasis is placed on the relationship and negotiations typically carried out between client and contractor, vendor or the provider of services. A mixture of theory, examples and practical exercises are used so that the participants understand the principles and get an opportunity to try them out. The case studies used are real cases encountered in the Oil & Gas industry. Training Objectives Many technical experts find it difficult to move out of their expertise areas and deal with commercial matters. Negotiating to optimise business value is a step further from their comfort zones. All too often negotiations are then left to finance personnel. They bring many strengths to the table but an understanding of engineering trade-offs is not one of them. By the end of this course, the participants will add to their technical know-how a core competence in negotiation skills. They will thus become formidable negotiating opponents. Target Audience The course is intended for middle-managers and technical and other staff who are responsible for contracts, but with limited previous exposure to negotiations, and who will need these skills in the near future. Course Level Intermediate Trainer Your expert course leader is a consultant, manager and engineer with more than 30 years' experience in a broad range of positions. He spent 15 years with the Shell group and during this time, gained extensive negotiating experience with contractors, vendors, service agents, trade unions and purchasers of equipment and products. Over the last 15 years, he has worked with a broad range of multinational businesses across the globe in a wide range of negotiation related roles including: Developing negotiating capability and skillsets Advising on negotiation strategies Establishing Alliances, Joint Ventures and Partnerships, & Remediating Alliances, Joint Ventures and Partnerships He has many years of teaching experience to technical staff - both in a corporate setting, and in an academic setting - for Melbourne University in Melbourne, Australia. Several thousand people from around the world have benefited from his courses. He brings an engineer's practical perspective, and can readily empathize with technical staff making forays into the commercial world of negotiations. He is joint author (with Professor Danny Samson) of Patterns of Excellence ISBN 0273638769, published by Financial Times Management. This has been adopted by a number of blue chip companies as the core text for management development. Corporate Experience: 15 years with Shell in a broad range of international & domestic technical and managerial and change management roles. Consulting Experience: 5 Years with McKinsey Consulting Group 4 Years with Melbourne Business Schoo POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Negotiation Skills and Techniques for Engineers and Technical Professionals
Delivered in Internationally or OnlineFlexible Dates
£2,407 to £2,799

Natural Gas & LNG Sales Agreements

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge of natural gas and LNG sales agreements with EnergyEdge course. Enroll now to gain valuable industry knowledge and skills.

Natural Gas & LNG Sales Agreements
Delivered in Internationally or OnlineFlexible Dates
£2,699 to £2,799

The Gold Card Training Programme for Experienced Workers

5.0(9)

By Optima Electrical Training

The NVQ Level 3 is designed to provide both new entrants and those seeking progression in their career, with the opportunity to develop the necessary skills to carry out job roles and responsibilities associated with the installation and maintenance of Electrotechnical systems.

The Gold Card Training Programme for Experienced Workers
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£1,995

Production Sharing Contracts (PSC) & Related Agreements

By EnergyEdge - Training for a Sustainable Energy Future

Gain a deep understanding of Production Sharing Contracts (PSC) and related agreements through our expert-led course. Enroll now and excel in your field with EnergyEdge.

Production Sharing Contracts (PSC) & Related Agreements
Delivered in Internationally or OnlineFlexible Dates
£2,699 to £2,799

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered OnlineFlexible Dates
£2,380

Methanol Bunkering & Fuel Cell Technology For Vessels

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge with Energy Edge's course on methanol bunkering and fuel cell technology for vessels. Enroll now!

Methanol Bunkering & Fuel Cell Technology For Vessels
Delivered In-PersonFlexible Dates
£2,599 to £2,799

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Domestic Oil (Initial)

5.0(39)

By City Training Group

OFTEC Domestic Oil Course (Initial)

Domestic Oil (Initial)
Delivered In-PersonFlexible Dates
£799

Business Relationship Management Professional (BRMP)

By IIL Europe Ltd

Business Relationship Management Professional (BRMP)® Business Relationship Management (BRM) embodies a set of competencies (knowledge, skills, and behaviors) to foster an effective business value-producing relationship between a service provider and its business partners. The BRM Discipline rests on solid research-based foundations verified and enhanced over a decade of successful implementations in leading organizations across the world. Proven to be equally effective for shared services including Human Resources, Finance, Legal, external service providers and others, BRM practices have enjoyed widespread adaptation in IT. The Business Relationship Management Professional (BRMP) training and certification program provides a foundational understanding of business relationship management (BRM) for individuals at every experience level, with the training and certification designed to provide a solid baseline level of knowledge. In other words, this course provides the 'why' and the 'what' - 'why' business relationship management is important to your organization and 'what' a BRM capability does to add value to your organization. This interactive course, with discussions, partnering activities, and periodic knowledge checks, will provide you with the opportunity to apply learning to your unique organizational situations, creating solutions that you can use immediately upon returning to your workplace. This practical knowledge will allow you to demonstrate immediate value in your role, as well as prepare you for the BRMP Certification exam. What You Will Learn This course provides a foundational understanding of Business Relationship Management. Upon completion of the BRMP® course, participant will be able to demonstrate their understanding: Explain what business relationship management is and the value it provides to an organization Articulate the need for an organization to move beyond traditional goals of profit and products to encompass those that are appropriate for a relationship-centered organization Describe the importance of integrating business relationship management into every element of their organization Define the importance of educating their organization that a mature BRM capability will evolve culture, build partnerships, drive value, and satisfy purpose Apply business relationship management to their organization's triple bottom line of people, purpose, and planet Explain the basic knowledge, skills, and mindsets of the business relationship management role Clarify the core business relationship management approaches, tools, and templates used to achieve results Illustrate the value and impact the BRM capability has on an organization by completing a draft of the BRM Capability Workbook BRM Introduction - The Bigger Picture Why BRM = why now? Relationship-centered organization Theory of 'relationshipism' Triple bottom line BRM defined Activity domains BRM challenges BRM Capability BRM capability framework Organizational purpose and strategy Now-to-new Evolve culture Build partnerships Drive value Satisfy purpose Limitless growth and improvement BRM Capability - Evolve culture Evolve culture framework Purposeful narrative Desired behaviors Influential relationships Personal growth BRM Capability - Build partnerships Build partnerships framework BRM role competency model Relationship maturity and quality Partnering mindsets Relationship discovery Relationship nurturing BRM Capability - Drive value What is value? Types of value Sources of value Drive value framework BRM role competency model Value discovery Value realization Value results BRM Capability - Satisfy purpose Satisfy purpose framework BRM role competency model Through the BRM capability Through the triple bottom line Social value BRM Capability - Wrap-up Evolve culture capability framework Build partnerships capability framework Drive value capability framework Satisfy purpose capability framework BRM Role Our purpose and what we believe Role clarity Single point of focus BRM Code of Ethics BRM Role Competency Model BRM mindset Scope of BRM role BRM role with organizational factors BRM Team Our purpose and what we believe BRM team definition BRM team purpose, mission, and vision Assessing the value of a BRM team Organizing a BRM team Leading a BRM team Transition management Coaching BRMs Closing - BRM Key Learnings Key learnings from each module Closing - BRMP Course Wrap-Up What to do in the next 30/60/90/365 days Digital badge After passing the exam Recap learning objectives Review learning objectives Review expectations Course feedback

Business Relationship Management Professional (BRMP)
Delivered In-Person in LondonFlexible Dates
£2,795