• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1273 Enterprise courses

SAFe Product Owner / Product Manager

By IIL Europe Ltd

SAFe® Product Owner / Product Manager Develop the skillsets needed to guide the delivery of value in a Lean Enterprise by becoming a SAFe® 5.0 Product Owner / Product Manager (POPM). During this course, attendees gain an in-depth understanding of how to effectively perform their role in the Agile Release Train (ART) as it delivers value through Program Increments. Attendees explore how to apply Lean thinking to decompose Epics into Features and Stories, refine Features and Stories, manage Program and Team backlogs, and plan and execute Iterations and Program Increments. Attendees also discover how the Continuous Delivery Pipeline and DevOps culture contribute to the relentless improvement of the ART. What you will Learn To perform the role of a SAFe® Product Owner / Product Manager, attendees should be able to: Articulate the Product Owner and Product Manager roles Connect SAFe® Lean-Agile principles and values to the PO / PM roles Decompose Epics into Features and decompose Features into Stories Manage Program and Team backlogs Collaborate with Agile teams in estimating and forecasting work Represent customer needs in Program Increment Planning Execute the Program Increment and deliver continuous value Becoming a Product Owner / Product Manager in the SAFe® enterprise Preparing for PI Planning Leading PI Planning Executing Iterations Executing the Program Increment Becoming a Certified SAFe® Product Owner / Product Manager

SAFe Product Owner / Product Manager
Delivered In-Person in LondonFlexible Dates
£1,795

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX Virtualization and High Availability course description This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. UNIX Virtualization and High Availability course details Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days UNIX Virtualization and High Availability course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

SAFe Product Owner / Product Manager: Virtual In-House Training

By IIL Europe Ltd

SAFe® Product Owner / Product Manager: Virtual In-House Training Develop the skillsets needed to guide the delivery of value in a Lean Enterprise by becoming a SAFe® 5.0 Product Owner / Product Manager (POPM). During this course, attendees gain an in-depth understanding of how to effectively perform their role in the Agile Release Train (ART) as it delivers value through Program Increments. Attendees explore how to apply Lean thinking to decompose Epics into Features and Stories, refine Features and Stories, manage Program and Team backlogs, and plan and execute Iterations and Program Increments. Attendees also discover how the Continuous Delivery Pipeline and DevOps culture contribute to the relentless improvement of the ART. What you will Learn To perform the role of a SAFe® Product Owner / Product Manager, attendees should be able to: Articulate the Product Owner and Product Manager roles Connect SAFe® Lean-Agile principles and values to the PO / PM roles Decompose Epics into Features and decompose Features into Stories Manage Program and Team backlogs Collaborate with Agile teams in estimating and forecasting work Represent customer needs in Program Increment Planning Execute the Program Increment and deliver continuous value Becoming a Product Owner / Product Manager in the SAFe® enterprise Preparing for PI Planning Leading PI Planning Executing Iterations Executing the Program Increment Becoming a Certified SAFe® Product Owner / Product Manager

SAFe Product Owner / Product Manager: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,650

ISO 27701 Internal Auditor

By Training Centre

  Being ISO 27701 Certified proves your Information Privacy Systems Audit experience, skills and knowledge, and demonstrates you are capable in the assessment of vulnerabilities, Compliance with GDPR and institutional controls within the enterprise.   Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards Enhance your existing or learn with new skills in the field of Data Protection Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements Become a Technical expert on the preparation required for ISO 27701 Certification Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit About This Course   ISO 27701 Internal Auditor Certification;    Confirms your knowledge and experience Quantifies and markets your expertise Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise Is globally recognized as the mark of excellence for the Information Privacy Audit professional Increases your value to your organization Gives you a competitive advantage over peers when seeking a new role Is administered by the International Examination & Certification Board (IECB), based in Estonia, and fully aligned to the ISO/IEC 17024:2012 standard (Conformity assessment - General requirements for bodies operating certification of persons)   Certified Individuals:    Are highly qualified, experienced professionals in the field of Data Protection Systems Audit Provide the enterprise with a Certification route for Information Privacy Assurance that is recognized by multinational clients, lending credibility to the enterprise Are excellent indicators of proficiency in control requirements creation and monitoring Demonstrate competence in five domains, including standards and practices; organization and management; processes; integrity, confidentiality and availability; and software development, acquisition and maintenance Demonstrate a commitment to providing the enterprise with trust in and value from your Privacy Compliance Framework Maintain ongoing professional development for successful on -the -job performance   The below job practice is organized by domains. Each domain is covered in the course.   Domain 1-The Process of Auditing Information Privacy Systems and Solutions   Provide audit services in accordance with ISO 19011 audit standards to assist the organization in protecting and controlling information privacy systems.    Domain 2 - Governance and Management of Information Privacy Technology   Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy.    Domain 3-Information Systems Acquisition, Development and Implementation   Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization's strategies and objectives.    Domain 4-Information Systems Operations, Maintenance and Service Management Provide assurance that the processes for information systems operations, maintenance and service management meet the organization's strategies and objectives.   Domain 5-Protection of Personally Identifiable Information (PII) Assets   Provide assurance that the organization's policies, standards, procedures and controls ensure the confidentiality, integrity and availability of PII.   Prerequisites   A thorough understanding of current Data Protection legislation, Information Security & Risk Management knowledge as well as ISO 19011 Auditing Standards is required to successfully pass the examination. What's Included?   Teas, Coffees, refreshments and a full Lunch* Course Slides Study Guide Exam Fees * For Classroom based Courses only Accreditation   Who Should Attend?   Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)   Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 3 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Our Guarantee   We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE.   *FREE training offered for retakes - come back within a year and train for free. Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 27701 Internal Auditor
Delivered OnlineFlexible Dates
£1,250

Business Analysis Process Model

5.0(10)

By GBA Corporate

Overview Objective Understanding the Importance of Business Analysis Model Determining various techniques of Process Modelling Understanding the scope of modelling Efficiently mapping the business landscape Analysing the enterprise structure How to avoid project failures. Learning efficient skills of being a successful business analyst. Understand and document various techniques for the organization delivers value. Successful project conversion Building team, changing the organization and overcoming resistance. Creating an effective Business Case.

Business Analysis Process Model
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Cisco Deploying Cisco Unified Contact Center Enterprise v2.0 (DUCCE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Upon completing this course, the learner will be able to meet these overall objectives: These are the ones listed in the Objectives Table I put together: Identify the basic components and operations of the Unified CCE solution. Use the available UCCE tools to complete a basic UCCE system installation. Discuss the installation and configuration steps required to support agent functionality in a UCCE deployment. Install a basic CCE VXML Solution. Install, configure and run a CCE Outbound Option Campaign. Describe how to support CCE. Deploying Cisco Unified Contact Center Enterprise (DUCCE) v2.0 is a 5-day instructor-led course presented by training partners. The course allows learners to deploy the Unified CCE v10.0 solution including installation, deploying HA and using troubleshooting tools to identify issues with inbound and outbound Contact Center functionality. This course is intended for those installing the Unified CCE solution, or those providing Level 3 solution support. This course also serves as a foundation for the two corresponding UCCE Administration courses, but is not a prerequisite. Students will learn enough about CCE scripting in this course to ensure system functionality only. A separate course exists for advanced scripting. Course Outline Module 1: Cisco Unified Contact Center Enterprise v10 Foundations Module 2: Preparing UCCE for Basic IVR Scripting Module 3: Preparing UCCE for Basic Agent Functionality Module 4: Installing and Configuring CCE VXML Solution Module 5: Installing CCE Outbound Option Module 6: Supporting CCE

Cisco Deploying Cisco Unified Contact Center Enterprise v2.0 (DUCCE)
Delivered OnlineFlexible Dates
Price on Enquiry

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

Linux virtualization and HA training course description The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. Linux virtualization and HA training course details Who will benefit: Linux professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days Linux virtualization and HA training course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

Cisco Administering Cisco Unified Contact Center Enterprise Part 1 v2.0 (AUCCE1)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Course Objectives Identify the basic components and operations of the Unified CCE solution. Configure and script a basic UCCE CVP deployment. Perform the ICM configuration tasks required to support basic agent functionality. Build and test a basic ICM script utilizing microapps. Configure and script UCCE to support reporting requirements, precision queuing and RONA. Identify how to successfully deploy the CVP VXML component in a Unified CCE solution. Generate basic reports using Cisco Unified IC. The Administering Cisco Unified Contact Center Enterprise Part 1 (AUCCE1) v2.0 is a 5 day instructor-led course presented by training partners to system engineers and customers who will be involved with Day 2 support of a UCCE solution deployed in a CVP comprehensive environment. This course describes the requirements, resources and tools needed to perform routine adds, moves and changes in the inbound/outbound UCCE environment. This course is intended for those administering the solution, or who may be responsible for Level 1-2 support of the solution. Course Outline Module 1: Cisco Unified Contact Center Enterprise v10 Foundations Module 2: UCCE Configuration and Scripting Module 3: Unified CCE Inbound Agent Considerations Module 4: Unified CCE IVR/VRU Functionality Module 5: Additional UCCE Considerations Module 6: VXML Implementation Module 7: Cisco Unified Intelligence Center Reporting

Cisco Administering Cisco Unified Contact Center Enterprise Part 1 v2.0 (AUCCE1)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Managing Enterprise Networks with Cisco Prime Infrastructure (MENPI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Engineers Technicians Overview Upon completing this course, the learner should be able to meet these overall objectives: Fundamental network management concepts and introduce the features of Cisco Prime Infrastructure Manage the inventory with Cisco Prime Infrastructure Map the network using the tools in Cisco Prime Infrastructure Manage user access to tasks, functions, and devices in Cisco Prime Infrastructure Manage the devices and configuration archive in Cisco Prime Infrastructure Work with Cisco AVC, QoS, and Cisco IWAN services using Cisco Prime Infrastructure tools and deploy Cisco TrustSec identity services using Cisco Prime Infrastructure Monitor and troubleshoot your network with Cisco Prime Infrastructure Perform system administration tasks in Cisco Prime Infrastructure In this Cisco Prime Infrastructure training course, you will learn how to design, deploy, operate, and optimize enterprise networks with the Cisco Prime Infrastructure solution (PI). Cisco Prime Infrastructure is part of a Unified Access solution that converges traditional wired and wireless networks into a single network management tool. The Managing Enterprise Networks labs put you in a realistic customer scenario and let you practice what you learned using Cisco Prime Infrastructure 3.7. This MENPI training course?s network management perspective has a heavier lean to the wired side of the network management. We suggest students have a working understanding of networks and networking terminology with regards to CCNA Routing and Switching. Course Outline Module 1: Cisco Prime Infrastructure Overview Module 2: Inventory Management Module 3: Map the Network Module 4: Role-Based Access Control Module 5: Configuration Management Module 6: Compliance Management Module 7: Services Management Module 8: Monitor and Troubleshoot Module 9: System Administration

Cisco Managing Enterprise Networks with Cisco Prime Infrastructure (MENPI)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco CCNA and CCNP Bundle with 3 Exams

By Hudson

This course bundle is ideal for anyone looking to establish their Cisco networking career. It consists of one Cisco Certified Network Associate (CCNA) certification, and two Cisco Certified Networking Professional (CCNP) certifications. Although there are no formal prerequisites to enrol on the CCNA certification course and sit for the exam, learners should have a good foundation knowledge in networking. The newly retooled CCNA covers a breadth of topics, including: Network fundamentals Network access IP connectivity IP services Security fundamentals Automation and programmability Achieving CCNA certification is the first step in preparing for a career in networking technologies. To earn your CCNA certification, you only need to pass one exam – which covers a broad range of fundamentals for IT careers, based on the latest networking technologies. The CCNP is the next level from the CCNA. As with the CCNA, there are no formal prerequisites to enrol on the CCNP certification course and sit for the exams. Learners taking a CCNP course generally have an in-depth knowledge of networking, as well as a good understanding of Cisco technologies. The typical certification path for most learners would begin with the CCNA, then progress onto the CCNP. Learners need to pass two exams (one core exam and one concentration exam) in order to gain a CCNP certification. This course bundle includes both exams. The core exam’s focus is based around implementing and operating Cisco enterprise network core technologies. The concentration exam’s focus for this particular bundle is around designing Cisco enterprise networks.

Cisco CCNA and CCNP Bundle with 3 Exams
Delivered Online On Demand
£1,295