Project Communication Skills: Virtual In-House Training Communication is the single most critical project success factor. When effective, projects get executed on time, within budget, and with objectives being met. But that isn't all. Strong communication also nurtures healthy team relationships. And in today's highly diverse world, where projects are often fast-paced, complex, and virtual, that is more important than ever. Strong communication skills foster cultural awareness, trust, and empathy. Together, they contribute greatly to project success-and ultimately, to future project success. In this course, participants will actively explore best communication practices from a variety of perspectives: in-person, virtual, electronic, and via formal project documentation. In order to be transformative, however, those perspectives will be filtered further through the lens of their formal, personalized assessment. It is a powerful tool which identifies individuals' internal needs and priorities. It translates those into descriptive profiles and reports, gifting users with valuable information about themselves and others. Paired with the course's real-world activities, it will provide uniquely strategic opportunities for communicating effectively and meaningfully-and with less conflict, both personally and professionally. What You Will Learn At the end of this program, you will be able to: Identify basic elements of communication and explain how they affect teams Explore how your assessment style impacts you and how you communicate with people of other styles Infer how your style impacts the way(s) you send and interpret emails and instant messages Analyze real world email and instant messaging practices to determine how they affect communication and relationships Explore best practices for formal project communications and presentations Analyze how your assessment style and global diversity can contribute to both strong team communication and conflict Identify solutions for virtual team work communication challenges Getting Started Foundation Concepts Communication as a foundation skill Elements of communication Communicating across media Targeting your audience How communication impacts team performance The Assessment Framework Overview of the assessment's approach Exploring assessment report Increasing your effectiveness with other assessment styles Email and Instant Messages Preferred communications and assessment styles The email brands we create Assessment styles and email Emotion and email Email guidelines and best practices Anatomy of an email The seven deadly email sins Instant messages and other interfaces Project Communications and Presentations Communicating across the project lifecycle Project templates Structuring a presentation Delivering a presentation Interpersonal and Team Communication Skills Communication styles and techniques Managing conflict in a project environment Styles and conflict Communication and global team leadership Virtual Communication Leading global virtual teams Virtual processes and technology Virtual team leadership
Project Communication Skills: In-House Training Communication is the single most critical project success factor. When effective, projects get executed on time, within budget, and with objectives being met. But that isn't all. Strong communication also nurtures healthy team relationships. And in today's highly diverse world, where projects are often fast-paced, complex, and virtual, that is more important than ever. Strong communication skills foster cultural awareness, trust, and empathy. Together, they contribute greatly to project success-and ultimately, to future project success. In this course, participants will actively explore best communication practices from a variety of perspectives: in-person, virtual, electronic, and via formal project documentation. In order to be transformative, however, those perspectives will be filtered further through the lens of their formal, personalized assessment. It is a powerful tool which identifies individuals' internal needs and priorities. It translates those into descriptive profiles and reports, gifting users with valuable information about themselves and others. Paired with the course's real-world activities, it will provide uniquely strategic opportunities for communicating effectively and meaningfully-and with less conflict, both personally and professionally. What You Will Learn At the end of this program, you will be able to: Identify basic elements of communication and explain how they affect teams Explore how your assessment style impacts you and how you communicate with people of other styles Infer how your style impacts the way(s) you send and interpret emails and instant messages Analyze real world email and instant messaging practices to determine how they affect communication and relationships Explore best practices for formal project communications and presentations Analyze how your assessment style and global diversity can contribute to both strong team communication and conflict Identify solutions for virtual team work communication challenges Getting Started Foundation Concepts Communication as a foundation skill Elements of communication Communicating across media Targeting your audience How communication impacts team performance The Assessment Framework Overview of the assessment's approach Exploring assessment report Increasing your effectiveness with other assessment styles Email and Instant Messages Preferred communications and assessment styles The email brands we create Assessment styles and email Emotion and email Email guidelines and best practices Anatomy of an email The seven deadly email sins Instant messages and other interfaces Project Communications and Presentations Communicating across the project lifecycle Project templates Structuring a presentation Delivering a presentation Interpersonal and Team Communication Skills Communication styles and techniques Managing conflict in a project environment Styles and conflict Communication and global team leadership Virtual Communication Leading global virtual teams Virtual processes and technology Virtual team leadership
ICA Advanced Certificate in Practical Customer Due Diligence (CDD) Course The CDD training course covers best practice in dealing with Customer Due Diligence and working with CDD documentation. Adequate due diligence on new and existing customers has never been so instrumental to protecting a business from reputational, operational, legals and financial risks. Designed for KYC Analysts and professionals working with the CDD process, this course provides a practical qualification in CDD that will help you make clear and informed CDD judgements. In doing so, this course will also improve your ability to identify areas of potential risk for your firm in relation to Customer Due Diligence. Benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Students who successfully complete the course will be awarded the ICA Advanced Certificate in Practical Customer Due Diligence and will be entitled to use the designation- Adv.Cert(CDD) This qualification is awarded in association with Alliance Manchester Business School, the University of Manchester. This three workshop training programme will use CDD documents and hands-on learning to cover the following topics: Outcomes and success criteria of KYC Identification and verification Understanding the customer Understanding the relationship Beneficial ownership Understanding the control structure of the entity Customer screening Risk acceptance Enhanced due diligence How will you be assessed? Three hour examination which comprises multiple choice questions and short form written response questions (including a section where you will be provided with a set of CDD documentation and asked to assess the information/respond to questions based upon them.) Pre-reading/exercises/tasks to be completed in advance of virtual workshops, delivered via the online learning platform. Four compulsory virtual classrooms covering key areas and embedding them through discussions and practical exercises (workshops are compulsory as part of the exam is based on the case study used in the workshops). The innovative workshop exercises that use mock CDD documents, genuinely reflecting the practical issues encountered in the CDD environment.
About this Virtual Instructor Led Training (VILT) The energy industry has started its journey to be more data centric by embracing the industry 4.0 concept. As a result, data management - which was considered until recently as a back-office service to support geoscience, reservoir management, engineering, production and maintenance - is now given the spotlight! To become an active stakeholder in this important transition in E&P data management, it is necessary to understand the new technical opportunities offered by the Cloud, Artificial Intelligence and how data governance can pave the way towards more reliable and resilient processes within E&P domain. Several key questions that need to be addressed: Why place more focus on data assets? Is data management just about serving geoscientists or engineers with fresh data? What is the value of data management in the E&P sector for decision making? How to convince the data consumers that the data we provide is reliable? Is the data architecture of my organization appropriate and sustainable? The purpose of this 5 half-day Virtual Instructor Led Training (VILT) course is to present the data challenges facing the energy organizations today and see how they practically solve them. The backbone of this course is based on the DAMA Book of Knowledge for Data Management. The main data management activities are described in sequence with a particular focus on recent technological developments. Training Objectives Upon completion of this VILT course, the participants will be able to: Understand why the data asset is now considered as a main asset by energy organizations Appreciate the importance of data governance and become an active stakeholder of it Understand the architecture and implementation of data structure in their professional environment Get familiarized with the more important data management activities such as data security and data quality Integrate their subsurface and surface engineering skills with the data managements concepts This VILT course is unique on several points: All notions are explained by some short presentations. For each of them, a set of video, exercises, quizzes will be provided to help develop an engaging experience between the trainer and the participants A pre-course questionnaire to help the trainer focus on the participants' needs and learning objectives A detailed reference manual A lexicon of terms for data-management Limited class size to encourage the interactivity Target Audience This VILT course is intended for: Junior/new data managers Geoscientists Reservoir engineers Producers Maintenance specialists Construction specialists Human resources Legal Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-days consisting 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your expert course leader is a geologist by education who has dedicated his career to subsurface data management services. In 2016, he initiated a tech startup dedicated to Data Management using Artificial Intelligence (AI) tools. He is heavily involved in developing business plans, pricing strategies, partnerships, marketing and SEO, and is the co-author of several Machine Learning publications. He also delivers training on Data Management and Data Science to students and professionals. Based in France, he was formerly Vice President, Sales & Marketing at CGG where he was in charge of the Data Management Services strategy, Sales Manager at Spie O&G Services where he initiated the Geoscience technical assistance activities and Product Manager of interactive seismic inversion software design and marketing at Paradigm. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
This qualification is designed for learners aged pre-16 and above who wish to develop skills and knowledge in cookery. This course has been designed to be as affordable for families as possible and it is entirely possible to complete this qualification from a standard domestic kitchen. Please note, this is not a GCSE but is a GCSE Level course which is why it is designed to span 2 years, although we offer complete flexibility on the timeframe that learners can complete within. This qualification is a Level 2 Qualification and is Ofqual approved carrying 15 credits. Other examples of Level 2 qualifications are BTEC Level 2 and the Silver Arts Award. Feedback from our past learners shows that this qualiifcation is widely regarded as level to a grade A*-C/4-9 at GCSE standard when applying for college or work placements. Please also note, that whether this course is recognised as a GCSE equivalent by colleges and further education establishments, can vary according to location, college and even between courses at the same college. If reliant on this qualification for entry onto another course, it is recommended that you establish with the college whether or not this will aid admission, before committing to the course. Click here to download the 2023 Level 2 Cookery Info Pack.pdf The following video explains in detail how the course works and what the course covers: We don't impose any minimum or maximum ages on our learners as we recognise that every learner is an individual and is on their own unique learning journey. We believe, that their adult facilitator is the best person to judge whether a learner is ready for a particular course, but to enable you to make this decision we provide a workbook, free for you to try. Simpy email technologytriumphs@outlook.com to request a free sample session. We are also happy to advise you with this decision so do reach out to us if you would like our guidance on this. As part of your Induction pack, your learner will receive a free apron to use within their course, but aside from this we have designed the courses to utilise as affordable as possible. The following is not an exhaustive list, but does highlight the main costs associated with the course. *** PLEASE CLICK HERE TO BOOK *** UNIT SUMMARIES 601/3232/2/COO Credit Value: 15 Total Qualification Time: 150 hours 1 Be able to use materials, tools and equipment to develop craft techniques 1.1 Assess the properties of available materials for craft item(s) including the visual and tactile qualities 1.2 Select materials, tools, equipment and techniques to support craft ideas and give reasons for choices 1.3 Use appropriate tools and equipment for selected techniques 1.4 Develop craft techniques, making effective use of materials, tools and equipment 1.5 Maintain a safe working environment by ensuring safe use of materials, tools and equipment 1 Understand the market within a chosen craft area 1.1 Explore enterprises within a chosen craft area 1.2 Explain what makes them successful 1.3 Describe the market(s) for chosen craft area 1.4 Identify opportunities in chosen market(s) 1.5 Explain the importance of listening to stakeholders when developing ideas 1.6 Explain the importance of balancing risk against the potential reward of creative ideas 1.7 Identify appropriate financial tools to support creative enterprising ideas 1.8 Identify ways to market a creative product 2 Understand employment opportunities within a chosen craft area The learner can: 2.1 Explore employment opportunities within a chosen craft area 2.2 Describe the characteristics of an enterprising individual in a chosen craft area 2.3 Identify own strengths and areas for development within a chosen craft area 2.4 Produce an action plan for personal development/career aspirations 1 Be able to develop craft ideas The learner can: 1.1 Use a range of different sources to develop craft ideas 1.2 Develop visual language to communicate craft ideas 1.3 Use feedback and evaluation of own work to develop craft ideas 1.4 Adapt craft ideas in response to feedback and evaluation of own work 1.5 Select preferred craft idea giving reasons for 1.6 Maintain a safe working environment 1 Be able to create and present final craft item(s) The learner can: 1.1 Use chosen idea to create a production plan 1.2 Use selected tools, materials, equipment and techniques to produce final craft work 1.3 Display craft work in an appropriate way/setting 1.4 Maintain a safe working environment 2 Know how to evaluate the creative and craft making processes The learner can: 2.1 Evaluate the creative process 2.2 Review final craft item to identify opportunities for improvement or further development
This qualification is designed for learners aged pre-16 and above who wish to develop skills and knowledge in cake decorating. This course has been designed to be as affordable for families as possible and it is entirely possible to complete this qualification from a standard domestic kitchen. Please note, this is not a GCSE but is a GCSE Level course which is why it is designed to span 2 years, although we offer complete flexibility on the timeframe that learners can complete within. This qualification is a Level 2 Qualification and is Ofqual approved carrying 15 credits. Other examples of Level 2 qualifications are BTEC Level 2 and the Silver Arts Award. Feedback from our past learners shows that this qualiifcation is widely regarded as level to a grade A*-C/4-9 at GCSE standard when applying for college or work placements. Please also note, that whether this course is recognised as a GCSE equivalent by colleges and further education establishments, can vary according to location, college and even between courses at the same college. If reliant on this qualification for entry onto another course, it is recommended that you establish with the college whether or not this will aid admission, before committing to the course. Click here to download the Level 2 Cake Decorating Information Pack.pdf We recently hosted an Open Day live which can be watch on replay here: We don't impose any minimum or maximum ages on our learners as we recognise that every learner is an individual and is on their own unique learning journey. We believe, that their adult facilitator is the best person to judge whether a learner is ready for a particular course, but to enable you to make this decision we provide a workbook, free for you to try. Simpy email technologytriumphs@outlook.com to request a free sample session. We are also happy to advise you with this decision so do reach out to us if you would like our guidance on this. As part of your Induction pack, your learner will receive a free apron to use within their course, but aside from this we have designed the courses to utilise as affordable as possible. The following is not an exhaustive list, but does highlight the main costs associated with the course. UNIT SUMMARIES 601/3232/2/CAK Credit Value: 15 Total Qualification Time: 150 hours 1 Be able to use materials, tools and equipment to develop craft techniques 1.1 Assess the properties of available materials for craft item(s) including the visual and tactile qualities 1.2 Select materials, tools, equipment and techniques to support craft ideas and give reasons for choices 1.3 Use appropriate tools and equipment for selected techniques 1.4 Develop craft techniques, making effective use of materials, tools and equipment 1.5 Maintain a safe working environment by ensuring safe use of materials, tools and equipment 1 Understand the market within a chosen craft area 1.1 Explore enterprises within a chosen craft area 1.2 Explain what makes them successful 1.3 Describe the market(s) for chosen craft area 1.4 Identify opportunities in chosen market(s) 1.5 Explain the importance of listening to stakeholders when developing ideas 1.6 Explain the importance of balancing risk against the potential reward of creative ideas 1.7 Identify appropriate financial tools to support creative enterprising ideas 1.8 Identify ways to market a creative product 2 Understand employment opportunities within a chosen craft area The learner can: 2.1 Explore employment opportunities within a chosen craft area 2.2 Describe the characteristics of an enterprising individual in a chosen craft area 2.3 Identify own strengths and areas for development within a chosen craft area 2.4 Produce an action plan for personal development/career aspirations 1 Be able to develop craft ideas The learner can: 1.1 Use a range of different sources to develop craft ideas 1.2 Develop visual language to communicate craft ideas 1.3 Use feedback and evaluation of own work to develop craft ideas 1.4 Adapt craft ideas in response to feedback and evaluation of own work 1.5 Select preferred craft idea giving reasons for 1.6 Maintain a safe working environment 1 Be able to create and present final craft item(s) The learner can: 1.1 Use chosen idea to create a production plan 1.2 Use selected tools, materials, equipment and techniques to produce final craft work 1.3 Display craft work in an appropriate way/setting 1.4 Maintain a safe working environment 2 Know how to evaluate the creative and craft making processes The learner can: 2.1 Evaluate the creative process 2.2 Review final craft item to identify opportunities for improvement or further development
Obtain The Assessor's Qualification through our comprehensive teaching and assessing courses at Kleek Training. Develop the skills and knowledge needed to effectively assess learners. Enquire today!
Duration 1 Days 6 CPD hours This course is intended for The audience for this course is individuals who want to learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build their foundational knowledge of cloud data services within Microsoft Azure. Overview Describe core data concepts Identify considerations for relational data on Azure Describe considerations for working with non-relational data on Azure Describe an analytics workload on Azure In this course, students will gain foundational knowledge of core data concepts and related Microsoft Azure data services. Students will learn about core data concepts such as relational, non-relational, big data, and analytics, and build their foundational knowledge of cloud data services within Microsoft Azure. Students will explore fundamental relational data concepts and relational database services in Azure. They will explore Azure storage for non-relational data and the fundamentals of Azure Cosmos DB. Students will learn about large-scale data warehousing, real-time analytics, and data visualization. 1 - Explore core data concepts Identify data formats Explore file storage Explore databases Explore transactional data processing Explore analytical data processing 2 - Explore data roles and services Explore job roles in the world of data Identify data services 3 - Explore fundamental relational data concepts Understand relational data Understand normalization Explore SQL Describe database objects 4 - Explore relational database services in Azure Describe Azure SQL services and capabilities Describe Azure services for open-source databases 5 - Explore Azure Storage for non-relational data Explore Azure blob storage Explore Azure DataLake Storage Gen2 Explore Azure Files Explore Azure Tables 6 - Explore fundamentals of Azure Cosmos DB Describe Azure Cosmos DB Identify Azure Cosmos DB APIs 7 - Explore fundamentals of large-scale data warehousing Describe data warehousing architecture Explore data ingestion pipelines Explore analytical data stores 8 - Explore fundamentals of real-time analytics Understand batch and stream processing Explore common elements of stream processing architecture Explore Azure Stream Analytics Explore Apache Spark on Microsoft Azure 9 - Explore fundamentals of data visualization Describe Power BI tools and workflow Describe core concepts of data modeling Describe considerations for data visualization
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Management of Value (MoV®) Foundation: Virtual In-House Training This interactive MoV® Foundation course provides a modular and case-study-driven approach to learning Management of Value (MoV). The core knowledge is structured and comprehensive; and well-rounded modules cover the methodology and various techniques. A case study is used to help appreciate the relevance of MoV in its practical application. What you will Learn Upon completion of an MoV course candidates should be able to discuss and explain: The main processes and techniques used within MoV and the reasons for using them How MoV may be applied at portfolio, program, project and operational levels The differences in applying MoV at different stages in a project and the expected outputs from a MoV Study at each stage The circumstances under which MoV should be used The concept of value and how value may be improved The main benefits arising from the use of MoV Approaches for implementing MoV How to respond to external and internal influences The principles of embedding MoV into an organization The key topics in document checklists, the toolbox, health check, organizational maturity and individual competence. Upon successful completion of this course, you will be able to: Organize and contribute constructively to a Management of Value (MoV) Study Demonstrate a knowledge of MoV principles, processes, approach and environment Analyse a company, program or project to establish its organizational value; includes identification and weighting of Value Drivers Pass the AXELOS MoV Foundation Examination Introduction to value management and MoV Value and Value Management Capabilities, Outcomes, Benefits and Disbenefits What is Value? What is Management of Value (MoV)? Why use MoV? Where use MoV? When MoV should be used? What using MoV involve? Selected MoV benefits Relationship with other AXELOS Global Best Practices and Models How MoV fits with other AXELOS Global Best Practice Guides MoV principles Align with organization's objectives Focus on functions and required outcomes Balance the variables to maximise value Apply throughout the investment decision Tailor MoV to suit the subject Learn from experience and improve Assign clear roles and responsibilities and build a supportive culture MoV processes Frame the programme or project Gather information Analyse information Process information Evaluate and select Develop Value Improving Proposals Implement and share outputs MoV techniques Function Analysis Function Analysis System Technique (FAST) Traditional (or classic) FAST Technical FAST Customer FAST Value Trees Measuring value Value profiling (a.k.a. value benchmarking) Simple multi-attribute rating technique (a.k.a. SMART) Value index Value metrics Value for money (VfM) ratio Value Engineering / Analysis Common techniques used in MoV Analysis of information Benchmarking Process Mapping Root Cause Analysis Discounted Cash Flow Analysis Generating Ideas Brainstorming Evaluation and option selection Option Selection Matrix Idea selection Allocation to Categories Idea Selection Matrix Weighting techniques Paired Comparisons Points Distribution Developing VIPs Developing Proposals Cost Benefit Analysis Building Decisions Implementing VIPs Implementation Plans Feedback Following up Tracking Benefits Approach to Implementation Generic approach to MoV implementation Plan the MoV activities Understand and articulate value Prioritize value Improve value Quantify value Monitor improvements in value Learn lessons Environmental factors Portfolio Considerations Programme considerations Project considerations Operational Considerations Embedding MoV into an organization Benefits of Embedding MoV into an organization MoV Policy MoV Policy Composition Embedding MoV into an organisation Key steps Suggested MoV Management Structure Overcoming barriers We do it anyway It takes up too much time We can't afford to make the changes What's in it for me? Don't fix it if it ain't broke Fixed returns on investment MoV products Briefing Meeting Agenda (A.1) Communications Checklist (A.2) Equipment list for an Effective Study/Workshop (A.3) Invitation to join the Study Team (A.4) Option Evaluation Matrix (A.5) Plan the Study (A.6) Recording Idea Selection (A.7) Reporting Study outputs (A.8) Scoping the Study (A.9) Study or Workshop Handbook (A.10) Value-Improvement Proposal Forms (A.11) Value Improvement Tracking Report (A.12) MoV toolbox MoV health check and maturity model P3M3 Maturity Model MoV Maturity Model (aligned with P3M3)