The PRINCE2® Practitioner course provides delegates with in-depth knowledge of project management methodologies. In this 2-day PRINCE2® Practitioner course enables learners to tailor the PRINCE2® methodology to any given project scenario. At the end of this PRINCE2® Practitioner course, delegates will be able to do delegating tolerances Course Overview The PRINCE2® Practitioner course provides delegates with in-depth knowledge of project management methodologies. In this 2-day PRINCE2® Practitioner course enables learners to tailor the PRINCE2® methodology to any given project scenario. They will learn about various essential topics such as communication management approach, tailoring the SU process, giving Ad Hoc direction, setting up the project controls, risk management procedure, PRINCE2® quality requirements, PRINCE2® approach to plan, tailoring SB, and many more. At the end of this PRINCE2® Practitioner course, delegates will be able to do delegating tolerances and report actual and forecast progress effectively. They will also be able to properly prepare the risk management, change control approach, quality management, and communication management approaches. The PRINCE2® Practitioner enables learners to apply their acquired knowledge and obtain highly reputed jobs with upgraded salaries. Concepts covered: • Balance of justification • Create the project plan • Quality audit trail • Quality review technique • Designing a plan • Gantt chart and tailoring • Change control approach Who should attend this PRINCE2® training course? This PRINCE2® Practitioner training course is for anybody interested in the field of project management. This PRINCE2® course is also intended for anyone looking to build their knowledge of how to tailor the PRINCE2® method to workplace scenarios. Other individuals that would benefit from undertaking PRINCE2® certifications include: • Project Managers • Aspiring Project Managers • Project Board Members • Project Support Staff • Office Support and Line Managers • Product Deliver Managers • Senior Responsible Owners • Change Analysts PRINCE2® Practitioner Prerequisites: It is required that delegates provide sufficient evidence of having satisfied the prerequisites before attending the PRINCE2® Practitioner training course. Delegates must hold the 2009 or 2017 version of the PRINCE2® Foundation certification or another valid qualification such as PMP, CAPM, or an IPMA Level A-D qualification. What’s Included in this PRINCE2® Practitioner Training Course? The following is included in this PRINCE2® Practitioner course: • PRINCE2® Practitioner Examination • Pre-course material • Post-course material • PDUs • Experienced PRINCE2® Instructor • Certificate • Refreshments Course Content: Module 1: Organisation Theme: • Four Levels of Management • PRINCE2® Organisation Requirements • Project Management Team • Project Management Team Roles • Project Board • Project Assurance • Change Authority • Project Support • Communication Management Approach Module 2: Starting Up a Project (SU): • Process Overview • Feasibility Study and Mandate • Appoint the Executive and the Project Manager • Capture Previous Lessons • Design and Appoint the Project Management Team • Prepare the Outline Business Case • Project Product Description • Select the Project Approach and Assemble the Project Brief • Plan the Initiation Stage • Tailoring the SU Process Module 3: Directing a Project (DP): • Authorise Initiation • Authorise the Project • Authorise a Stage or Exception Plan • Authorise Project Closure • Give Ad Hoc Direction • Tailoring the DP Process • Theme Overview • Balance of Justification • Continued Business Justification • PRINCE2® Requirements • Contents of a Business Case • Business Case Development • Benefits Management Approach • Key Responsibilities Module 4: Initiating a Project (IP): • Agree the Tailoring Requirements • Prepare the Risk Management Approach • Prepare the Change Control Approach • Prepare the Quality Management Approach • Prepare the Communication Management Approach • Set Up the Project Controls • Create the Project Plan • Prepare the Benefits Management Approach • Assemble the Project Initiation Documentation • Tailoring the IP process Module 5: Risk Theme: • Risk Definition • Effective Risk Management • PRINCE2® Risk Requirements • Risk Management Approach • Probability/Impact Grid • Risk Register • Risk Management Procedure • Identify Step • Risk Budget • Key Responsibilities Module 6: Quality Theme: • Quality Definitions • Quality Management • Quality Planning and Control • What is Quality Assurance? • PRINCE2® Quality Requirements • PRINCE2® Quality Documentation Requirements • Quality Management Approach • Quality Audit Trail • Project Product Description • Product Description • Quality Review Technique • Quality Review Roles/Responsibilities • Quality Review Meeting • Off-Specifications and Concessions • Review Follow-Up • Quality Review Benefits • Key Responsibilities • Communication Management Approach Module 7: Plans Theme: • Dealing with the Planning Horizon • PRINCE2® Planning Requirements • Documentation Requirements • Project and Stage Plans • Team Plans and Work Packages • Plans Relationship • What is in a Plan? • PRINCE2® Approach to Plans • Designing a Plan • Delivery Approaches • Defining and Analysing the Products • Product Breakdown Structures • Product Description • Product Flow Diagram • Identify the Activities and Dependencies • Preparing Estimates • Preparing a Schedule • Documenting the Plan • Analysing Risks to a Plan • Gantt Chart and Tailoring • Key Responsibilities Module 8: Progress Theme: • Progress Definition • PRINCE2® Requirements • Progress Control • Management by Exception • Delegating Tolerances and Reporting Actual and Forecast Progress • Types of Control • Management Products and Progress Control Module 9: Change Theme: • Issue Definition • PRINCE2® Approach to Change • PRINCE2® Change Documentation • Issue Register • Change Control Approach • Change Budget • Issue and Change Control Procedure • Issue Report • Exception Report Module 10: Controlling a Stage (CS): • Activity Breakdown • Authorise a Work Package • Work Package • Review Work Package Status • Receive Completed Work Packages • Review the Management Stage Status • Report Highlights • Highlight Report • Capture and Assess Issues and Risks • Escalate Issues and Risks • Take Corrective Action • Tailoring CS Module 11: Managing Product Delivery (MP): • Accept a Work Package • Execute a Work Package • Checkpoint Report • Deliver a Work Package • Tailoring MP Module 12: Managing a Stage Boundary (SB) : • Plan the Next Management Stage • What is in a Plan? • Update the Project Plan • Update the Business Case • Report the Management Stage End • End-Stage Report • Produce an Exception Plan • Tailoring SB Module 13: Closing a Project (CP): • Prepare Planned Closure • Hand Over Products • Evaluate the Project • End Project Report • Recommend Project Closure • Tailoring CP DURATION 2 Days WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate
Game design training face to face training customised and bespoke.
Management of Risk (M_o_R®) Practitioner The M_o_R® Practitioner course has been designed to provide learners with the opportunity to practice the practical application of the M_o_R method and covers the twelve M_o_R principles: Approach, Process and the basic techniques essential to managing risks using the M_o_R guidance. The purpose of the M_o_R Practitioner qualification is to confirm that the learner has achieved sufficient understanding of how to apply and tailor M_o_R in a scenario situation. What you will Learn At the end of the M_o_R Practitioner course, learners will gain competencies in: M_o_R framework (principles, approach based on risk documentation, process steps, and embedding and reviewing M_o_R principles Outline of M_o_R approach documents (including policy, process guide, and risk communications plan) Risk identification, assessment, and control Embedding and reviewing M_o_R M_o_R organizational perspectives (strategic, program, project, operational) Benefits The M_o_R Practitioner course offers a wide-ranging set of guidelines that will help in the management of risk in a project or program environment. It will help prepare learners for the M_o_R Practitioner Exam. They will feel more confident in approaching risk management after attending the course and will be aware of the use of different techniques that can assist in this task, including: Improved basis for effective strategy formation Reduced time spent fire-fighting and fewer unwelcome surprises Increased likelihood of successful change initiative outcomes Closer internal focus on doing the right things properly Increase in efficient use of resources waste and fraud Better management of contingency resources M_o_R roles and responsibilities M_o_R health check M_o_R maturity model Risk specialisms (including business continuity management) Introduction Introduction to the course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify - contexts Identify - the risks Assess - estimate Assess - evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Programme perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management
IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
Enhance your expertise in HV/MV power system design and protection coordination with EnergyEdge's virtual instructor-led training. Join now!
Course Information Join our comprehensive three-day training programme tailored for individuals seeking a foundational grasp of computerised system validation. This course equips participants with essential knowledge to effectively validate systems within their respective organisations for utilisation in GxP (GLP, GCP, GMP, GDP, and GPvP) environments. Attendees will also gain proficiency in auditing validated computerised systems, ensuring compliance with pertinent GxP regulations. Commencing with an overview of regulatory prerequisites and the system life cycle, the course transitions into practical aspects, centered around validating computerised systems and conducting subsequent audits. Engage in a dynamic blend of presentations, interactive discussions, and hands-on practical workshops throughout the course. This course will provide delegates with an understanding of the computerised system validation process, including: Definition of end user requirements Risk management, including supplier assessment and techniques for audit planning Validation planning and reporting Linking system development with good business practices Formal testing and qualification Understanding of data integrity and security issues How to assess system validation documentation to verify compliance. Is this course for you? IT professionals new to implementing computerised systems into regulated environments Quality professionals who monitor or audit computerised systems System owners, end users, tester and project staff. Tutors Tutors will be comprised of (click the photos for biographies): Nichola Stevens Director and Principal Consultant, Nuncius Compliance Solutions Ltd Barry McManus Consultancy Partner, Empowerment Quality Engineering Ltd Programme Please note timings may be subject to alteration. Day 1 09:00 Welcome, Introduction and Course Objectives 09:45 Why Validate? Regulations and Guidance on Computerised System Validation Overview of the regulations and guidance applicable to CSV and their key expectations. 10:30 Break 10:45 The System Lifecycle The concept of the SLC and the key outputs from it. 12:00 Lunch 12:45 The Validation Process The approach to validation for different system types and a look at some of the key deliverables. 14:00 Project Introduction 14:15 Exercise 1 - User Requirements Capturing, agreeing and documenting the user requirements for a system. 15:15 Break 15:30 Exercise 1 - Feedback 16:00 Risk Management Risk management and its impact on validation. Identifying the deliverables required. Then group discussion on risk assessment for three systems. 17:00 Questions and Answers Answers to any outstanding questions from Day 1. 17:15 Close of Day Day 2 09:00 Supplier Assessment The different approaches to supplier assessment and the things to be considered when assessing a supplier. 10:15 Exercise 2 - Supplier Assessment Planning a vendor audit with a focus on the key validation deliverables. 11:00 Break 11:15 Exercise 2 - Feedback 11:45 Test Overview and Test Planning The different test phases, the purpose of each test phase and things to be considered when planning and reporting testing. 12:45 Lunch 13:30 Test Overview and Test Planning Continued. 14:15 Test Script Design, Execution and Review What a good test script looks like and the key things to consider when creating, executing and reviewing a test script. 15:30 Break 15:45 Exercise 3 - Creating a Test Script Create a test script based on user requirements created on Day 1. 17:15 Close of Day Day 3 09:00 Exercise 3 Feedback 09:30 Infrastructure Configuration and Qualification 10:30 Break 10:45 Validation Reporting Overview of the Validation Report and what should be included in it. 11:15 Maintaining the Validated State The procedures and records needed to ensure the system remains fit for purpose. 12:30 Lunch 13:15 Change Control Key concepts related to making changes to validated systems. 14:00 Data Integrity and Security How can we assure the integrity and security of our data. 15:15 Break 15:30 Course Objectives Summary and Panel Discussion A round up of key learning from the course. 17:00 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 19 Points Development Level Develop
UNIX shell programming training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the UNIX system. UNIX shell programming training course details Who will benefit: Programmers developing programs under UNIX. Anyone working with XML. Administrators Support personnel who wish to find out more about the workings of UNIX or write simple utility programs. Prerequisites: UNIX fundamentals Some programming experience would be useful although not essential. Duration 2 days UNIX shell programming training course contents Review of UNIX fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. What is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters 0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command, The if statement, while loops, for loops, The case statement, Special characters, Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database The tput comand Avanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.
Management of Risk (M_o_R®) Practitioner: In-House Training The M_o_R® Practitioner course has been designed to provide learners with the opportunity to practice the practical application of the M_o_R method and covers the twelve M_o_R principles: Approach, Process and the basic techniques essential to managing risks using the M_o_R guidance. The purpose of the M_o_R Practitioner qualification is to confirm that the learner has achieved sufficient understanding of how to apply and tailor M_o_R in a scenario situation. What you will Learn At the end of the M_o_R Practitioner course, learners will gain competencies in: M_o_R framework (principles, approach based on risk documentation, process steps, and embedding and reviewing M_o_R principles Outline of M_o_R approach documents (including policy, process guide, and risk communications plan) Risk identification, assessment, and control Embedding and reviewing M_o_R M_o_R organizational perspectives (strategic, program, project, operational) Benefits The M_o_R Practitioner course offers a wide-ranging set of guidelines that will help in the management of risk in a project or program environment. It will help prepare learners for the M_o_R Practitioner Exam. They will feel more confident in approaching risk management after attending the course and will be aware of the use of different techniques that can assist in this task, including: Improved basis for effective strategy formation Reduced time spent fire-fighting and fewer unwelcome surprises Increased likelihood of successful change initiative outcomes Closer internal focus on doing the right things properly Increase in efficient use of resources waste and fraud Better management of contingency resources M_o_R roles and responsibilities M_o_R health check M_o_R maturity model Risk specialisms (including business continuity management) Introduction Introduction to the course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify - contexts Identify - the risks Assess - estimate Assess - evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Programme perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management