• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2950 DOM courses

Use Cases for Business Analysis: In-House Training

By IIL Europe Ltd

Use Cases for Business Analysis: In-House Training The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?

Use Cases for Business Analysis: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Project Management Office

By IIL Europe Ltd

Project Management Office The goal of this course is to equip the participant with the necessary knowledge and skills to establish, improve, and support a project management office (PMO) that is the catalyst for portfolio and delivery management excellence. This course addresses the complexities of both understanding and choosing the correct PMO framework from among several alternatives. Additionally, the typical PMO supporting elements: domains of work, maturity level, and performance metrics, are elaborated. These elements position a PMO to realize and sustain the business value anticipated by the organization. What You Will Learn At the end of this program, you will be able to: Define a PMO and articulate on its benefits to an organization Explain how a PMO facilitates organizational success Differentiate among the varied PMO frameworks Apply to a PMO framework, domains of work, metrics, and organizational maturity Describe the competency frameworks for management functions within a PMO Plan for and implement a PMO to ensure it is of business value Foundation Concepts Definitions and concepts PMO frameworks PMO domains PMO benefits PMO Frameworks Organizational unit PMO Project-specific PMO Project support or services PMO Center of excellence Enterprise PMO PMO Domains I Strategic planning Standards, methodologies, and processes Governance and performance management Organizational change management PMO Domains II Portfolio management Project and program delivery management Administrative support, knowledge, and talent management PMO Metrics and Maturity PMO metrics PMO maturity PMO maturity assessments PMO Implementation Originating and initiating a PMO Developing a PMO implementation plan Implementing a PMO

Project Management Office
Delivered In-Person in LondonFlexible Dates
£1,495

PMI-ACP Exam Prep: Virtual In-House Training

By IIL Europe Ltd

PMI-ACP® Exam Prep: Virtual In-House Training This course builds on the candidates' practical experience of Agile in the workplace to equip them with the broad range of knowledge and skills required for the PMI® Agile Certification exam. It will follow the PMI® requirements and reference the suggested reading list, including the Agile Practice Guide, but will not be limited to those areas. Within the profession and discipline of project management, Agile continues to develop as a significant and important aspect of bringing change to an organization. Where the products of change must be delivered to the business 'on time,' Agile is often the chosen methodology. In addition to equipping candidates for the PMI® Agile Certification examination, this course will also support candidates in taking a more informed and effective role in Agile projects. It will also enable them to take a significant role in encouraging and enabling the organization to become or develop as an Agile environment. What you will Learn You will learn how to: Appreciate the wider aspects of Agile project management tools and techniques Integrate various disciplines within Agile Tailor / customize Agile to suit the needs of different projects Prepare yourself for the PMI® Agile Certification examination Getting Started Introductions Agenda Expectations Foundation Concepts Defining 'Traditional' Project Management Project management parameters The 'traditional' approach to the parameters Strengths and weaknesses of the traditional approach Defining 'Agile' Project Management Project management parameters revisited The 'agile' approach to the parameters Strengths and weaknesses of agile Managing projects with traditional and agile methods Can the two approaches co-exist? Leveraging the benefits of both methods Options for using both methods on a project Avoiding the elephant traps Key aspects of the PMI® Agile Certified Practitioner (PMI-ACP)® Handbook Overview Eligibility requirements Exam information Exam Blueprint Continuing certification requirements Key aspects of the PMI Agile Certification Examination Content Outline Introduction Agile exam content outline Tools and techniques Knowledge and skills Domains and tasks (not examined) An Introduction to Agile and Implementing Agile Definable work vs. high-uncertainty work Project factors that influence tailoring The Agile Manifesto and 12 Principles Agile mindset Agile domains and tasks Agile Tools and Techniques Related to PM 'Hard Skills' Planning, monitoring, and adapting The need for planning, monitoring, and adapting The Agile approach to planning and plans The Agile planning tools and techniques The Agile monitoring tools and techniques The Agile approach to adapting Product quality A definition of 'product quality' Setting the standard for product quality Agile tools and techniques for achieving product quality Risk management A definition of 'risk' What is 'at risk'? The acceptability of risks The Agile tools and techniques for managing risks Agile Tools and Techniques Related to PM 'Soft Skills' The difference between PM 'hard and soft' skills Communications The importance of communications Forms of agile communications Communications within the project Communications from the project Communications to the project Making communications the cultural norm Interpersonal Skills Defining and understanding management Defining and understanding leadership Defining and understanding servant leadership Delegating vs. empowering Playing to people's strengths Overcoming the roadblocks Core Agile Tools and Techniques The philosophy of core Agile tools and techniques Agile estimation Will traditional forms of estimating work for agile? The relationship between estimating and guessing The relationship between estimating and sizing The where, who, and how of agile estimating Agile analysis and design Product analysis and design from a user point of view Product analysis and design from a supplier point of view Product analysis and design from an agile project point of view Value-Based Agile Tools and Techniques The role of value-based tools and techniques in bridging traditional PM with Agile Value-based prioritization Value-based prioritization and agile projects Investment appraisal methods Regulatory driven Customer driven Ranking methods (MMF, MoSCoW) Metrics What should we measure / track? Methods of measuring / tracking Adding value with metrics Process Improvement Value-stream analysis Value-stream mapping Agile Knowledge and Skills Context of Agile Knowledge and Skills vis-à-vis Agile Tools and Techniques Agile Knowledge and Skills Process focused People focused Product focused Project focused Exam Preparation and Course Closure The application process - where are you now? The 'Exam-Focused Journal' - what you still have to do Further preparation - self-study schedule Exam topic review Practice exam Practice exam debrief Course closure

PMI-ACP Exam Prep: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,550

Drilling Essentials for New Engineers and Non-Technical Professionals in Oil & Gas

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge in oil and gas drilling essentials with EnergyEdge's classroom training for new engineers and non-technical professionals.

Drilling Essentials for New Engineers and Non-Technical Professionals in Oil & Gas
Delivered In-PersonFlexible Dates
£1,499 to £1,599

ISO 27701 Internal Auditor

By Training Centre

  Being ISO 27701 Certified proves your Information Privacy Systems Audit experience, skills and knowledge, and demonstrates you are capable in the assessment of vulnerabilities, Compliance with GDPR and institutional controls within the enterprise.   Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards Enhance your existing or learn with new skills in the field of Data Protection Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements Become a Technical expert on the preparation required for ISO 27701 Certification Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit About This Course   ISO 27701 Internal Auditor Certification;    Confirms your knowledge and experience Quantifies and markets your expertise Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise Is globally recognized as the mark of excellence for the Information Privacy Audit professional Increases your value to your organization Gives you a competitive advantage over peers when seeking a new role Is administered by the International Examination & Certification Board (IECB), based in Estonia, and fully aligned to the ISO/IEC 17024:2012 standard (Conformity assessment - General requirements for bodies operating certification of persons)   Certified Individuals:    Are highly qualified, experienced professionals in the field of Data Protection Systems Audit Provide the enterprise with a Certification route for Information Privacy Assurance that is recognized by multinational clients, lending credibility to the enterprise Are excellent indicators of proficiency in control requirements creation and monitoring Demonstrate competence in five domains, including standards and practices; organization and management; processes; integrity, confidentiality and availability; and software development, acquisition and maintenance Demonstrate a commitment to providing the enterprise with trust in and value from your Privacy Compliance Framework Maintain ongoing professional development for successful on -the -job performance   The below job practice is organized by domains. Each domain is covered in the course.   Domain 1-The Process of Auditing Information Privacy Systems and Solutions   Provide audit services in accordance with ISO 19011 audit standards to assist the organization in protecting and controlling information privacy systems.    Domain 2 - Governance and Management of Information Privacy Technology   Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy.    Domain 3-Information Systems Acquisition, Development and Implementation   Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization's strategies and objectives.    Domain 4-Information Systems Operations, Maintenance and Service Management Provide assurance that the processes for information systems operations, maintenance and service management meet the organization's strategies and objectives.   Domain 5-Protection of Personally Identifiable Information (PII) Assets   Provide assurance that the organization's policies, standards, procedures and controls ensure the confidentiality, integrity and availability of PII.   Prerequisites   A thorough understanding of current Data Protection legislation, Information Security & Risk Management knowledge as well as ISO 19011 Auditing Standards is required to successfully pass the examination. What's Included?   Teas, Coffees, refreshments and a full Lunch* Course Slides Study Guide Exam Fees * For Classroom based Courses only Accreditation   Who Should Attend?   Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)   Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 3 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Our Guarantee   We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE.   *FREE training offered for retakes - come back within a year and train for free. Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 27701 Internal Auditor
Delivered OnlineFlexible Dates
£1,250

Cyber Security Engineer Job Placement - Essential

4.7(26)

By Academy for Health and Fitness

Start your career as a Cyber Security Manager/ Engineer and earn upto £35,000/ Month Are you ready to be the first line of defence in the digital world? Ever dreamed of becoming the unsung hero who safeguards the virtual corridors of data and privacy? Welcome to our Cyber Security Job Placement course, a cutting-edge, comprehensive program designed not only to equip you with the crucial skills required in the fast-paced realm of cybersecurity but also to give you that much-needed edge in today's competitive job market. Our course promises more than just theoretical knowledge. By merging an industry-driven curriculum with real-world scenarios, we prepare you to tackle the most formidable security challenges. Our robust Career Support guarantees individualised mentorship and networking opportunities with the industry's top professionals. But the cherry on top? Our Job Ready Program - we don't just teach you how to fish; we ensure you catch your big one! So, are you ready to take the plunge into the exciting world of cybersecurity? Secure your future with us today because in our world, opportunity doesn't knock twice! Our mission is simple - to be your trusted partner every step of the way, from training to employment. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring IT Network Cyber Security, so we can help you get your foot in the door. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our IT Network Cyber Security Training Program today and start your journey to becoming a successful IT Network Cyber Security Manager/ Engineer! If you have any questions, you can contact us. We will be happy to provide you with all the information you need. Why Choose Our Cyber Security Engineer Job Placement Program? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our IT Network Cyber Security Training: One-On-One Consultation Sessions with Industry Experts: Gain invaluable insights and guidance from seasoned professionals who have thrived in the IT Network Cyber Security field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking Cyber Specialists. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Our aim is to maximise your employment prospects and provide you with a range of exciting opportunities to choose from. Interview Preparation: We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Money-Back Guarantee: Your satisfaction is our top priority. We are confident in the quality of our training and support, which is why we offer a 14-day money-back guarantee. Continuous Career Support: Our commitment doesn't end when you secure a job. We'll be there for you throughout your career journey, offering continued support and guidance. Whether you need advice on career advancement, assistance with new projects, or simply a friendly ear to share your achievements, we'll be your trusted partner for long-term success. Here are the courses we will provide once you enrol in the Cyber Security Engineer program: Course 01: Cyber Security Incident Handling and Incident Response Course 02: Cyber Security Advanced Training Course 03: Linux File System Course 04: IT Support Technician Course 05: Functional Skills IT Course 06: CompTIA Security+ (SY0-601) Course 07: CompTIA A+ (220-1001) Course 08: CompTIA A+ (220-1002) Course 09: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 10: Learning Computers and Internet Course 11: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 12: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 13: CompTIA Network (N10-007) Course 14: CompTIA PenTest+ (Ethical Hacking) Course 15: Cryptography These courses will help you to develop your knowledge and skills to become a successful Cyber Security Expert. Cyber Security Engineer Job Placement Program The Cyber Security Engineer Job Placement Program is completed in 9 easy steps: Step 1: Enrol in the Cyber Security Engineer Job Placement Programme Begin your exciting journey with us by enrolling in the IT Network Cyber Security program. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 15 premium courses related to IT Network Cyber Security. These courses will teach you the knowledge and skills required to become a successful Cyber Security expert. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3: Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the Cyber Security - IT industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in IT Network Cyber Security, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful career in IT Network Cyber Security begins with us. So enrol now in thisCyber Security Engineer Job Placement Program to kickstart or uplift your career! CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Cyber Security Engineer Job Placement Program Cyber Security Engineer Job Placement Program This Cyber Security Engineer Job Placement Program course is for individuals who are: IT professionals looking to specialise in cybersecurity. Graduates in computer science or related fields seeking entry into the cybersecurity domain. Career changers who are intrigued by the prospect of a career in the ever-evolving IT security field. Anyone interested in understanding how to protect systems and data from cyber threats. Requirements Cyber Security Engineer Job Placement Program No experience is required to enrol in Cyber Security Engineer Job Placement Program. Just enrol in the Cyber Security Engineer Job Placement Program & start learning. Career path Cyber Security Engineer Job Placement Program Cybersecurity Analyst: £30,000 - £50,000 Information Security Specialist: £45,000 - £65,000 Cybersecurity Engineer: £55,000 - £80,000 Cybersecurity Manager: £65,000 - £95,000 Cyber Security Manager £45,000 - £90,000 Cyber Security Trainee £24,000 - £35,000 Cyber Security Analyst £60,000 - £95,000 Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included

Cyber Security Engineer Job Placement - Essential
Delivered Online On Demand3 hours
£1,999

Certified Network Cabling Design Professional (CNCDP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional, consultant and/or those who work in network cabling system design, implementation and operation. Overview With few exceptions, enterprises today rely on IT for the delivery of business-critical services - often directly to the end consumer. It is therefore vital that the mission-critical data centre is designed, maintained and operated with high-availability and efficiency in mind. Among all the facilities, network cabling is the foundation for the network and one of the major contributors to the availability of the data center.CNCDP© is a 2-day course designed to expose participants to in-depth knowledge in designing and installing the data network cabling system which includes key subject matters such as; technical standards, designing of different cabling sub-systems, calculation of material requirements, architecture, installation, testing and acceptance. Introduction to Structured Cabling System (SCS) Brief history of SCS Basic copper and fibre transmission Copper and fibre cabling Single and multimode fibre Step/graded index multimode fibre Difference between Commercial Wiring and data centre cabling Development of standards Role of standards ANSI/TIA 568 standard Common standards The new usage of cabling to support Smart building Horizontal and Administration - Commercial Building Standard diagram recap: ANSI/TIA-568 Functional elements and example Scenario A: Determine the number of work areas Scenario B: Determine the number of user locations Zone wiring Administration: Interconnect and cross-connect Angled and flat panels Creating a cabling schematic design Convert schematic into physical layout Calculating the material list Horizontal and Administration - Data Centre Standard diagram recap: TIA-942 Basic/Reduced/Typical data centre setup Traditional 3 layers network design/ Spine and Leaf network design Select termination hardware Administration design ToR/EoR/Spine & Leaf cabling design Network and cabling resiliency Create cabling schematic design for ToR/EoR Convert into patch panel/rack layout Calculate the material list for ToR/EoR Building Backbone - Commercial Building Backbone diagram Calculate the copper backbone requirements per Telecom Room (TR) Calculate the fibre backbone requirements per Telecom Room Summarize the building backbone requirements Recognised cables Backbone Patch panels The maximum backbone distances Create cabling schematic design Converting the schematic design into patch panel/ rack layout Building Backbone - Data Centre TIA-942 based backbone topology TIA-942 backbone requirements Recognised backbone cable ToR/EoR/Spine and Leaf Backbone distance estimation Resiliency of backbone cable routes Creating cabling schematic design Converting the schematic design into patch panel/ rack layout Field and Fusion Termination for fibre connectors Pre-terminated fibre trunk and copper cables Architectural Considerations ANSI/TIA569-D Cable pathway and spaces Common requirements for the rooms Definition of the rooms Entrance Room/Demarcation Ceiling and floor pathways types Cable trays/basket/ladder/conduit Inner duct/sleeve/slot Calculating of pathway size Cable run best practices Cable management/AIM Grounding and bonding Separation distance requirements for copper cabling to power cabling Fire stopping Fire rated barrier Fire rated jacket cable Campus / Outdoor Backbone Common campus cable installation and cable types : Aerial cable / Direct-buried / Underground in-conduit Outdoor cable installation planning Lightning / surge protection Approved ground for surge protector Creating a schematic diagram Converting a schematic into a physical layout Site Inspection and Testing Visual site inspection notes Installation common issues Copper testing standard Permanent link / Channel / Patch cord / MPTL testing configuration Fibre connectors Fibre testing standard Tier 1 & 2 certification Fibre link definition Fibre testing steps Fibre inspection and cleaning Calibrating the test sets - 3 methods Setting up mandrel for testing Fibre loss budget calculation G.657 Bend insensitive fibre Optical Time-Domain Reflectometer (OTDR) Exam - Certified Network Cabling Design Professional (CNCDP©) The exam is a 60-minute closed book exam, with 40 multiple-choice questions. The candidate requires a minimum of 27 correct answers to pass the exam. Additional course details: Nexus Humans Certified Network Cabling Design Professional (CNCDP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Network Cabling Design Professional (CNCDP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Network Cabling Design Professional (CNCDP)
Delivered OnlineFlexible Dates
£1,250

Certified Information Privacy Auditor (CIPA)

By Training Centre

  Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements.   Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards. Enhance your existing or learn with new skills in the field of Data Protection; Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements; Become a Technical expert on the preparation required for ISO 27701 Certification About This Course   Learning outcomes Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit Course Overview Domain 1-The Process of Auditing Information Privacy Systems & Solutions Domain 2-Governance & Management of Information Privacy Technology Domain 3-Information Systems Acquisition, Development & Implementation Domain 4-Information Systems Operations, Maintenance & Service Management Domain 5-Protection of Personally Identifiable Information (PII) Assets Course Agenda Day 1: Introduction to Privacy Information Management System (PIMS) and ISO/IEC 27701 Day 2: Audit principles, preparation, and launching of an audit Day 3: On-site audit activities and Closing the Audit Accreditation   This course is Accredited by NAS and Administered by the IECB Assessment   All candidates at official training courses will be tested throughout the course delivery, with quizzes and exercises. The final exam is a 10 question essay type exam, offered on the afternoon of the final day. This exam should be completed within 180 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. Prerequisites   None, but candidates would benefit from having a fundamental understanding of Audit principles What's Included?   Comprehensive course materials totalling some 450 pages Case Study Exam fees Exam pass guarantee Who Should Attend?   Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)

Certified Information Privacy Auditor (CIPA)
Delivered OnlineFlexible Dates
£1,250

24th February Nicky Lovick #Agent121. Looking for: ADULT FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION Nicky Lovick has worked as an editor for over twenty years, working for top five publishers. She is now an agent at WGM Talent, building the books list. She is looking for commercial fiction, from upmarket women’s fiction, bookclub, romance, domestic noir and psychological thrillers, to crime series. She loves hooky stories such as Freida McFadden’s The Housemaid and Turn of the Key by Ruth Ware set in confined settings, such as hotels. She’s always on the lookout for romcoms with a fresh, contemporary feel to them such as Emily Henry’s Book Lovers. Also historical fiction with a twist and sweeping family sagas. Nicky wants you to make her laugh, make her cry or keep her hooked.  Nicky would like you to submit a covering letter, 1-2 page synopsis and the opening three chapters of your manuscript in a single word document.  (In addition to the paid sessions, Nicky is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 17th January 2025

24th February Nicky Lovick #Agent121. Looking for: ADULT FICTION
Delivered Online + more
£72

Emotional Intelligence: In-House Training

By IIL Europe Ltd

Emotional Intelligence: In-House Training Emotional Intelligence is a set of emotional and social skills that collectively establish how well we: Perceive and express ourselves Develop and maintain social relationships Cope with challenges Use emotional information in an effective and meaningful way It is a skill set that transfers across all categories of relationships. It is also a predictor of success - both in life and at work. This highly-interactive course delivers a practical approach to developing, improving, and sustaining effective and mutually beneficial relationships. The design of the course involves individual reflection and paired activities, interwoven with small and large group interactions. The EQ-i 2.0® assessment reports will be debriefed over the course of the two days. In addition, participants will delve into their personal strengths and blind spots, and will explore topics including: the neuroscience of emotion, the connection between empathy and performance, and how communication styles impact our perceptions of self and other. Role-play activities give participants the opportunity to try out new behaviors and techniques. The program includes: A personal behavioral profile, the results of which you will bring to your training 2-day highly interactive workshop and experiential learning Optional professional coaching activities initiated in class that can continue over the four months after class ends What you will Learn Recognize your interpersonal strengths and potential blind spots regarding Emotional Intelligence Identify the five domains within the EQ-i 2.0 assessment model Summarize what neuroscience research has discovered about emotions and actions Recognize ways that human beings are physiologically impacted by stress Articulate ways to develop and maintain strong working relationships Describe how emotional intelligence translates into high performance Make use of the EI model and associated competencies Employ strategies for enhancing leadership through Emotional Intelligence Foundation Concepts The biology of emotion Why Emotional Intelligence matters The impact of EI on performance The EQ-I 2.0 Model Overview of the EQ-i 2.0 framework Exploring your report Balancing your EI domains Self: Awareness and Sensitivity Self-awareness and empathy Perception vs. reality Acting by choice, not impulse Other: Communication and Relationship-Building Elements of effective communication Communication styles Communication techniques Neuroscience and Behavioral Change Insights from social neuroscience Making a change

Emotional Intelligence: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,295