Microsoft Project Orange Belt® 2013: Virtual In-House Training This workshop gives participants a full insight into creating effective schedules using Microsoft® Project 2013, allowing you to estimate, coordinate, budget, staff, and control projects and support other users. This workshop gives participants a full insight into creating effective schedules using Microsoft® Project 2013, allowing you to estimate, coordinate, budget, staff, and control projects and support other users. This workshop provides the eBook Dynamic Scheduling with Microsoft® Project 2013, and is kept up to date with the framework of knowledge outlined by the Project Management Institute's PMBOK® Guide and the Practice Standard for Scheduling. What you Will Learn You'll learn how to: Understand what's new in Project 2013 Explain where Project 2013 fits in the Microsoft® EPM solution Initialize Project 2013 to start project planning Create a well-formed project schedule Understand task types and the schedule formula Assign resources and costs to tasks Analyze resource utilization and optimize the schedule Set a baseline and track progress Create and manage project reports Customize views and fields Apply Earned Value Management Understand the basics of managing multiple projects Getting Started Introductions Course structure Course goals and objectives Enterprise Project Management Concepts and Framework Getting Started with Project 2013 Project 2013: What's New and General Overview Setting Up a New Project Schedule (templates, options, save, etc.) Setting the Project Calendar Entering Tasks The Planning Processes Importing Tasks (Word, Excel, SharePoint) Synchronizing with SharePoint Tasks List Creating and managing the WBS (include tasks, manually scheduled tasks, summary tasks and milestones, as well as custom WBS coding) Entering Estimates Tendencies in Estimating The Rolling Wave Approach Entering Duration and Work Estimates Types of Tasks Entering Dependencies The Principle of Dynamic Scheduling Choosing the Right Type of Dependency Entering Dependencies in Project 2013 Different Applications of Dependencies Entering Deadlines, Constraints, and Task Calendars Use of Deadlines and Constraints Entering Deadlines and Constraints in Project 2013 Entering Resources and Costs Types of Resources Entering Resources in Project 2013 Calendars and Resources Entering Costs in Project 2013 Entering Assignments Assignments in a Schedule Assignments and Task Types Entering Assignments in Project 2013 Assignments, Budgets, and Costs Optimizing the Schedule The Critical Path Method and the Resource Critical Path Resource Leveling Optimizing Time, Cost, and Resources in Project 2013 Updating the Schedule The Baseline Updating Strategies and Situations Prepare the Status and Forecast Report in Project 2013 Reporting Using Reports Using Visual Reports Formatting and Printing in Project 2013 Customizing Fields in Project 2013 Earned Value Management (EVM) Overview of EVM Applying EVM with Project 2013 Evaluating the Project Evaluating the Project Performance Project Benefits and Results Templates for Future Projects Summary Tools and Checklist Best Practices Checklist Consolidated Schedules Creating Consolidated Schedules Using a Resource Pool Links across Projects Solving common problems Analyzing the Critical Path across Projects
Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.
WiFi demystified training course description A concise overview aimed at less technical staff requiring an overview of WiFi networks. The course covers the technologies at a high level allowing delegates to discuss WiFi networks with others recognising the buzzwords used. The course will also allow the delegates to recognise the issues involved in planning and installing WiFi networks as well as securing them. What will you learn Recognise the different WiFi technologies available. Describe the architecture of WiFi networks including the role of Access Points. Recognise the distance limitations of WiFi networks. Describe the buzzwords used in WiFi. Recognise the security issues of WiFi networks. WiFi demystified training course details Who will benefit: Anyone working with WiFi networks. Prerequisites: None. Duration 1 day WiFi demystified training course contents Introduction When to use wireless, when to use wired, WiFi technologies: 802.11, 802.11a, 802.11b, 802.11g, 802.11n, WiFi speeds and distances, comparison to other wireless technologies, 802.15 (Bluetooth), 802.16 (WiMax). Simple WiFi networks Network cards, Antennae, Access Points, WiFi routers. Enterprise WiFi networks SSIDs, Multiple WiFi networks, Repeaters, Wireless bridges, Controller based access points, Wireless switches, Power Over Ethernet. RF site surveys Steps and techniques, tools, analysing the feasibility of WiFi, range, performance, roaming. Security How safe are WiFi networks? Encryption, Authentication, WEP WPA WPA2. 802.1x, EAP, RADIUS.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for business users who have been using Power BI to build analytic solutions and are ready to take advantage of the power and flexibility that DAX provides. Learning DAX is a very common 'next step' for experienced Power BI users. Overview At course completion, you should be able to describe DAX syntax, data types, and errors use DAX to create calculated columns, measures, and tables explain how DAX calculations are evaluated, along with the differences between row context and filter context configure and use Time Intelligence to perform common time-based calculations, for example to-date calculations, year-over-year analysis, moving averages, etc. create calculated columns and measures that use data from multiple tables in the data model write measures that handle error conditions gracefully use DAX to enhance the Power BI user experience use DAX Studio to connect to a Power BI data model and execute simple queries Welcome to Introduction to DAX for Power BI. This two-day instructor-led course is intended for business users who have been using Power BI and want to use DAX to create custom calculations in their data models. In this class, you will be introduced to using Data Analysis Expressions (DAX), which is the expression language that is used to create custom calculations in the Power BI Data model. The course covers some of the theoretical underpinnings of the data model and the DAX language, but the emphasis is on using DAX to solve common business problems. You will learn how to write your own calculated columns, measures, and tables, how to visualize the way Power BI computes DAX calculations, and how to troubleshoot custom code. MODULE 1: GETTING STARTED WITH DAX INTRODUCTION TODAX CREATING OBJECTS WITHDAX CONTEXT AND RULES OF EVALUATION VARIABLES,COMMENTS,AND TESTING MODULE 2: PERFORMING BASIC CALCULATIONS GETTING STARTED IMPLICIT MEASURES ADDING QUICK MEASURES WORKING WITH DAX DATA TYPES . DOING BASIC MATH USING LOGIC IN YOUR CALCULATIONS USING THE IF() FUNCTION NESTED IF() USING THE SWITCH() FUNCTION ADVANCED SWITCH() LOGICAL OPERATORS & FUNCTIONS: ||, OR(), &&, AND(), NOT() AGGREGATING AND SUMMARIZING DATA THE SUM() FUNCTION MODULE 3: WORKING WITH CONTEXT IN THE DATA MODEL CONTEXT DEFINED DATA MODELING BASICS INTRODUCTION TO DIMENSIONAL MODELING RELATIONSHIPS AND THEIR EFFECT ON THE EVALUATION CONTEXT GETTING DATA FROM OTHER TABLES USING RELATED() AND RELATEDTABLE LOOKING UP DATA WITHOUT USING RELATIONSHIPS MODIFYING THE CONTEXT USING CALCULATE() MODULE 4: PERFORMING MORE ADVANCED CALCULATIONS THE DAX ITERATOR FUNCTIONS USING TABLE MANIPULATION FUNCTIONS MODULE 5: WORKING WITH TIME PERFORMING DATE CALCULATIONS WORKING WITH DATE TABLES GENERATING A DATE TABLE WITH THE CALENDAR() FUNCTION DEFINING CUSTOM OPERATING PERIODS YTD, QTD, AND MTD CALCULATIONS CUSTOM TO-DATE CALCULATIONS FINDING YEAR-OVER-YEAR CHANGE FINDING MOVING AVERAGES MODULE 6: ENHANCING THE USER EXPERIENCE CONTROLLING VISIBILITYOF YOUR MEASURES USING WHAT-IF PARAMETERS ADDING BANDING USING DAX TO PROVIDE ROW-LEVEL SECURITY
Elevate your expertise in clean hydrogen derivatives - ammonia, methanol, and synthetic hydrocarbon with EnergyEdge's course. Enroll now for virtual instructor-led training!
Is your partner upset with you? Does your partner feel you are not making enough effort? This is the package for keeping your relationship on track we will organise your partners birthdays, dates, valentines day and anniversary etc. We will make sure the gifts,date nights, spontaneous trips and quality time aspect of your relationship is arranged for you.We organise everything in your relationship anonymously and your partner doesn’t need to know you use this service. Price on application Call 03333443853 https://relationshipsmdd.com/product/relationship-maintenance-package/
Duration 1 Days 6 CPD hours This course is intended for Professionals desiring to improve their business planning, financial management, and decision-making skills and practice them in an ethical and professional manner will benefit from this course. Overview Recognize the importance of the big picture in business planning Leverage financial information to make sound business decisions Identify the importance of other financial levers to your business Understand the importance of ethics on long-term business success Appreciate how business etiquette affects your organizational success Students will learn to understand the mechanics of the organization ? reading and interpreting financials, making sound business decisions, and setting a course ? while also developing the skills to guide and direct your workforce. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Gaining a Wider Perspective Understanding Business Acumen Improving Long and Short Term Interactions Finding and Recognizing Growth Opportunities Making Mindful Decisions How to Relate to Others 2. Understanding the Numbers Developing, Defining, and Reporting Key Performance Indicators (KPIs) Keeping Up with the Business Understanding Sales, Costs, and Profit Margin Monitoring Assets, Liabilities, Equity, and Financial Ratios Reviewing Income Statements, Balance Sheets, and Cash Flow Statements 3. Management Considerations Recognizing Talent and Organizational Management Thinking Critically - Asking the Right Questions, Evaluating the Situation, and Making the Decision Leveraging the Organization - Investing in Employees and Customers, Process Improvement, and Goal Alignment 4. Business Ethics Ensuring Ethical Obligations are Met Understanding Roles and Responsibilities Balancing Personal and Organizational Ethics Managing Ethically - Maintaining the 4 P\'s 5. Business Etiquette Maintaining Etiquette across Communication Platforms - Email, IMs, and Telephone Following Etiquette in Meetings Delivering Etiquette in Customer Interactions
The course is relevant to anyone requiring an understanding of the use of Agile or looking to adopt it. This includes, but is not limited to, organisational leaders and managers, marketing executives and managers, and/or all professionals working in an Agile environment, including software sesters, developers, business analysts, UX designers, project management office (PMO), project support and project coordinators.
Motorsport is as much a business as it is a sport. Our new Master’s Degree programme will provide students with a broad range of modules which examine the national and international aspects of the industry from a commercial perspective. Study an individual module from the MA Business of Motorsport for Continuing Professional Development (CPD).
LAN training course description A concise overview course covering Local Area Networks with particular emphasis on the use of Ethernet and Wireless LANS. As well as explaining buzzwords we cover how the technology works at a simple level. After defining LANs the course moves onto Ethernet and switching also covering VLANs. WiFi is then covered, with coverage of 802.11 standards and frequencies along with integrating WiFi with Ethernet. The course then covers routers and their role in connecting networks and the course finishes with a comparison of Ethernet vs WiFi and when to use them. What will you learn Describe how Ethernet works (in simple terms) and when to use Ethernet. Explain the difference between a switch and a router. Describe how WiFi works (in simple terms). Describe the role of Access points. Evaluate wireless technologies and when to use them. List the speeds of various LAN technologies. LAN training course details Who will benefit: Sales staff, managers and other non technical staff. Prerequisites: None. Duration 1 day LAN training course contents LANS What is a LAN? LAN standards, LAN choices, choosing the media, copper, UTP, cat5e, fibre, RF, bandwidth speeds, link aggregation, Full/half duplex. Ethernet What is Ethernet? 802.3, parts of Ethernet, Ethernet evolution, MAC addresses, frames, broadcasts. Ethernet switches What are switches, switches versus hubs, how switches work, ways to configure switches, Loops, STP. VLANs What are VLANs? Why have VLANs, impact of VLANs, Tagging (aka trunking), 802.1Q Wireless LANS Type of wireless LAN, RF frequencies, 2.4GHz, 5GHz, others, interference, standards, 802.11 and variants, CSMA/CA. Wireless LANS NICs, Access points, integration with Ethernet, multiple access points, mesh networks, WiFi security. Interconnecting LANs Routers, connecting networks, interconnecting VLANs, IP addressing, Layer 3 switches. Summary WiFi vs Ethernet.