• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

19013 Improv courses in Liverpool delivered Online

Youth Mental Health First Aid

5.0(50)

By Pochat Training

FAA Level 2 Award In First Aid For Youth Mental Health (RQF) Classroom (1 day course), Virtual (3 x 2½ hour sessions) Gives learners knowledge of Youth Mental Health First Aid Gives learners the skills to help young people with mental health problems and improve their mental health Course Contents: What is Youth Mental Health? The role of the mental health first aider Identifying mental health conditions Recognising and managing Stress Mental health conditions Recognising a range of mental health conditions:DepressionAnxietyPsychosisEating disordersSuicideSelf-harmPost-traumatic stress disorderConduct disorders - BullyingDrugs and alcohol Mental health first aid action plan Benefits of this course: These figures, taken from the Young Minds website show clearly how many young people suffer with their mental health... One in six children aged five to 16 are identified as having a probable mental health problem That means that, on average, five children in every classroom have a mental health problem 80% of young people with mental health needs agreed that the coronavirus pandemic had made their mental health worse Suicide was the leading cause of death for males and females aged between five to 34 in 2019 Around half of 17-19 year-olds with a diagnosable mental health disorder has self-harmed or attempted suicide at some point In 2018-19, 24% of 17-year-olds reported having self-harmed in the previous year, and seven per cent reported having self-harmed with suicidal intent at some point in their lives So please, learn more about how to help these youngsters, and give them the chance to live happy, healthy lives Accredited, Ofqual regulated qualification Our Mental Health First Aid Courses are nationally recognised, Ofqual regulated qualifications accredited by First Aid Awards Ltd in association with NUCO Training. This means that you can be rest assured that your Mental Health First Aid Certificates fulfill the upcoming legal requirements and are a very good way to make sure you and your employees have a supporting workplace to deal with staff's mental health conditions. The Ofqual Register number for this course is 603/7176/6

Youth Mental Health First Aid
Delivered in Chesterfield or Online + more
£150

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks. The job roles best suited to the material in this course are: Entry-level network engineer Network administrator Network support technician Help desk technician Overview This course will help you: Learn the knowledge and skills to install, configure, and operate a small- to medium-sized network Gain a foundation in the essentials of networking, security, and automation Earn 30 CE credits toward recertification The Implementing and Administering Cisco Solutions (CCNA) v2.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. This course helps you prepare to take the 200-301 Cisco© Certified Network Associate (CCNA©) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification. Course Outline Exploring the Functions of Networking ? Lecture Introducing the Host-to-Host Communications Model ? Lecture Operating Cisco IOS Software ? Lecture Introducing LANs ? Lecture Exploring the TCP/IP Link Layer ? Lecture Starting a Switch ? Lecture Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets ? Lecture Explaining the TCP/IP Transport Layer and Application Layer ? Lecture Exploring the Functions of Routing ? Lecture Configuring a Cisco Router ? Lecture Exploring the Packet Delivery Process ? Lecture Troubleshooting a Simple Network ? Lecture Introducing Basic IPv6 ? Lecture Configuring Static Routing ? Lecture Implementing VLANs and Trunks ? Lecture Routing Between VLANs ? Lecture Introducing OSPF ? Lecture Building Redundant Switched Topologies ? Self-study Improving Redundant Switched Topologies with EtherChannel ? Lecture Exploring Layer 3 Redundancy ? Self-study Introducing WAN Technologies ? Self-study Explaining Basics of ACL ? Lecture Enabling Internet Connectivity ? Lecture Introducing QoS ? Self-study Explaining Wireless Fundamentals ? Self-study Introducing Architectures and Virtualization ? Self-study Explaining the Evolution of Intelligent Networks ? Lecture Introducing System Monitoring ? Lecture Managing Cisco Devices ? Lecture Examining the Security Threat Landscape ? Self-study Additional course details: Nexus Humans Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)
Delivered OnlineFlexible Dates
£4,195

ADHD – IMPROVING UNDERSTANDING AND INCLUSION

By Inclusive Solutions

Never before have so many children been labelled with ADHD – not just labelled but also given powerful amphetamines as a ‘treatment’. ADHD is described as impacting on school-aged children and resulting in restlessness, impulsive actions, and lack of focus impairing their ability to learn properly. Course Category Behaviour and Relationships Meeting emotional needs Autism and Communication Description Never before have so many children been labelled with ADHD – not just labelled but also given powerful amphetamines as a ‘treatment’. ADHD is described as impacting on school-aged children and resulting in restlessness, impulsive actions, and lack of focus impairing their ability to learn properly. It is the most commonly studied and diagnosed psychiatric disorder in children, affecting about 3 to 5 percent of children globally and diagnosed in about 2 to 16 percent of school-aged children. 30 to 50 percent of those individuals diagnosed in childhood continue to have symptoms into adulthood. Adolescents and adults with ADHD tend to develop coping mechanisms to compensate for some or all of their impairments. ADHD is diagnosed two to four times more frequently in boys than in girls. ADHD management usually involves some combination of medications, Applied behaviour analysis (ABA, the new term for Behaviour modification), lifestyle changes, and counselling. ADHD and its diagnosis and treatment have been considered controversial since the 1970s. The controversies have involved clinicians, teachers, policy-makers, parents and the media. Topics include ADHD’s causes, and the use of stimulant medications in its treatment. So join us on a reflective, creative day where we look deeper at this whole area – seeing what we can learn from other areas that may help us in our understanding and inclusion of children and young people with this label Learning Objectives Increased confidence and understanding regarding ADHD labelled pupils and their inclusion in mainstream schools Access to a wider range of practical strategies to impact on movement and behaviour issues New skills and processes to strengthen the inclusion of young people with ADHD labels in all settings Opportunity to reflect and understand more deeply what might be happening in situations for someone labelled ADHD Who Is It For ? Any professional, carer or parent concerned with the education and inclusion of children labelled ADHD Course Content We will explore what is known about: Movement differences and accommodations for these – starting, stopping, switching, continuing, combining and so on… Anxiety and its link to activity levels Emotional roots to activity – the Circle of Courage will guide us

ADHD – IMPROVING UNDERSTANDING AND INCLUSION
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

C++ programming foundation

5.0(3)

By Systems & Network Training

C++ training course description A hands on introduction to programming in the C++ language. The course concentrates on aspects that will be new to experienced C programmers and so is not suitable for those without C knowledge. What will you learn Write C++ programs Debug C++ programs. Examine existing code and determine its function. Use classes, function overloading, operator overloading, inheritance and virtual functions within C++ programs. C++ training course details Who will benefit: Programmers needing to write C++ code. Programmers needing to maintain C++ code. Prerequisites: C programming foundation. Duration 5 days C++ training course contents The origins of C++ C++ as a better C, C++ and Object Oriented Programming, encapsulation, polymorphism, inheritance. C++ standards. Getting started Simple C++ programs. Classes Basics, constructor and destructor functions, member and friend functions. Using objects. Default, copy and conversion constructors. A better C Arrays, pointers and references, new and delete. Improved safety with smart pointers, Resource Acquisition in Initialization (RAII). Functions in C++ Function overloading, default arguments, inline functions, Lambda functions. Templates Template classes and functions. Standard Library Containers, Iterators, algorithms, function objects. Operator overloading Basics, binary operators, the this pointer, relational operators, unary operators. Members versus friends. Inheritance Base class access control, protected members, multiple inheritance, virtual base classes. More I/O Manipulators, customising inserters, extractors. File I/O. Virtual functions Pointers to derived classes, run time polymorphism. Exception handling Throwing errors, trying code and catching errors.

C++ programming foundation
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced C++ programming

5.0(3)

By Systems & Network Training

Advanced C++ training course description The course will give a broad overview of the C++ Programming language, focusing on modern C++, up to C++17. This course will cover the use of the Standard Library, including containers, iterator, function objects and algorithms. From the perspective of application development, a number of design patterns will be considered. What will you learn Write C++ programs using the more esoteric language features. Utilise OO techniques to design C++ programs. Use the standard C++ library. Exploit advanced C++ techniques Advanced C++ training course details Who will benefit: Programmers needing to write C++ code. Programmers needing to maintain C++ code. Prerequisites: C++ programming foundation. Duration 5 days Advanced C++ training course contents Study of a string class Create a string class as a means to investigate many issues, involving the use of operator overloading and including overloading new and delete. Creation of the class will also require consideration of 'const correctness'. Exception handling Consider the issues involved in exception handling including the concept of exception safety. Templates Review definition of template functions, including template parameter type deduction. Introduction to template metaprogramming. Newer features including template template parameters and variadic templates. Creation of template classes. Design patterns Introduction to Design Patterns and consideration of a number of patterns, such as, factory method, builder, singleton and adapter. The standard C++ library (STL) Standard Library features, such as, Containers, Iterator, Function Objects and Algorithms. Introduction to Lambda expressions. C++ and performance The writing of code throughout the course will be oriented towards performant code, including use of R Value references and 'move' semantics. Pointers The use of pointers will be considered throughout the course. Smart pointers will be considered to improve program safety and help avoid the use of 'raw' pointers. Threading This section will consider the creation of threads and synchronisation issues. A number of synchronisation primitives will be considered. Async and the use of Atomic will also be considered. New ANSI C++ features Summarising some of the newer features to be considered are: Auto, Lambdas expression, smart pointers, variadic templates and folds, R Value references and tuple together with structured binding.

Advanced C++ programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Lean Six Sigma Black Belt Certification Program: Virtual In-House Training

By IIL Europe Ltd

Lean Six Sigma Black Belt Certification Program: Virtual In-House Training This course is specifically for people wanting to become Lean Six Sigma Black Belts, who are already Lean Six Sigma practitioners. If advanced statistical analysis is needed to identify root causes and optimal process improvements, (Lean) Six Sigma Green Belts typically ask Black Belts or Master Black Belts to conduct these analyses. This course will change that. Green Belts wanting to advance their statistical abilities will have a considerable amount of hands-on practice in techniques such as Statistical Process Control, MSA, Hypothesis Testing, Correlation and Regression, Design of Experiments, and many others. Participants will also work throughout the course on a real-world improvement project from their own business environment. This provides participants with hands-on learning and provides the organization with an immediate ROI once the project is completed. IIL instructors will provide free project coaching throughout the course. What you Will Learn At the end of this program, you will be able to: Use Minitab for advanced data analysis Develop appropriate sampling strategies Analyze differences between samples using Hypothesis Tests Apply Statistical Process Control to differentiate common cause and special cause variation Explain and apply various process capability metrics Conduct Measurement System Analysis and Gage R&R studies for both discrete and continuous data Conduct and analyze simple and multiple regression analysis Plan, execute, and analyze designed experiments Drive sustainable change efforts through leadership, change management, and stakeholder management Successfully incorporate advanced analysis techniques while moving projects through the DMAIC steps Explain the main concepts of Design for Six Sigma including QFD Introduction: DMAIC Review IIL Black Belt Certification Requirements Review Project Selection Review Define Review Measure Review Analyze Review Improve Review Control Introduction: Minitab Tool Introduction to Minitab Minitab basic statistics and graphs Special features Overview of Minitab menus Introduction: Sampling The Central Limit Theorem Confidence Interval of the mean Sample size for continuous data (mean) Confidence Interval for proportions Sample size for discrete data (proportions) Sampling strategies (review) Appendix: CI and sample size for confidence levels other than 95% Hypothesis Testing: Introduction Why use advanced stat tools? What are hypothesis tests? The seven steps of hypothesis tests P value errors and hypothesis tests Hypothesis Testing: Tests for Averages 1 factor ANOVA and ANOM Main Effect Plots, Interaction Plots, and Multi-Vari Charts 2 factor ANOVA and ANOM Hypothesis Testing: Tests for Standard Deviations Testing for equal variance Testing for normality Choosing the right hypothesis test Hypothesis Testing: Chi Square and Other Hypothesis Test Chi-square test for 1 factor ANOM test for 1 factor Chi-square test for 2 factors Exercise hypothesis tests - shipping Non-parametric tests Analysis: Advanced Control Charts Review of Common Cause and Special Cause Variation Review of the Individuals Control Charts How to calculate Control Limits Four additional tests for Special Causes Control Limits after Process Change Discrete Data Control Charts Control Charts for Discrete Proportion Data Control Charts for Discrete Count Data Control Charts for High Volume Processes with Continuous Data Analysis: Non-Normal Data Test for normal distribution Box-Cox Transformation Box-Cox Transformation for Individuals Control Charts Analysis: Time Series Analysis Introduction to Time Series Analysis Decomposition Smoothing: Moving Average Smoothing: EWMA Analysis: Process Capability Process capability Discrete Data: Defect metrics Discrete Data: Yield metrics Process Capability for Continuous Data: Sigma Value Short- and long-term capabilities Cp, Cpk, Pp, Ppk capability indices Analysis: Measurement System Analysis What is Measurement System Analysis? What defines a good measurement system? Gage R&R Studies Attribute / Discrete Gage R&R Continuous Gage R&R Regression Analysis: Simple Correlation Correlation Coefficient Simple linear regression Checking the fit of the Regression Model Leverage and influence analysis Correlation and regression pitfalls Regression Analysis: Multiple Regression Analysis Introduction to Multiple Regression Multicollinearity Multiple Regression vs. Simple Linear Regression Regression Analysis: Multiple Regression Analysis with Discrete Xs Introduction Creating indicator variables Method 1: Going straight to the intercepts Method 2: Testing for differences in intercepts Logistic Regression: Logistic Regression Introduction to Logistic Regression Logistic Regression - Adding a Discrete X Design of Experiments: Introduction Design of Experiment OFAT experimentation Full factorial design Fractional factorial design DOE road map, hints, and suggestions Design of Experiments: Full Factorial Designs Creating 2k Full Factorial designs in Minitab Randomization Replicates and repetitions Analysis of results: Factorial plots Analysis of results: Factorial design Analysis of results: Fits and Residuals Analysis of results: Response Optimizer Analysis of results: Review Design of Experiments: Pragmatic Approaches Designs with no replication Fractional factorial designs Screening Design of Experiment Case Study Repair Time Blocking Closing: Organizational Change Management Organizational change management Assuring project sponsorship Emphasizing shared need for change Mobilizing stakeholder commitment Closing: Project Management for Lean Six Sigma Introduction to project management Project management for Lean Six Sigma The project baseline plan Work Breakdown Structure (WBS) Resource planning Project budget Project risk Project schedule Project executing Project monitoring and controlling and Closing Closing: Design for Lean Six Sigma Introduction to Design for Lean Six Sigma (DMADV) Introduction to Quality Function Deployment (QFD) Summary and Next Steps IIL's Lean Six Sigma Black Belt Certification Program also prepares you to pass the IASSC Certified Black Belt Exam (optional)

Lean Six Sigma Black Belt Certification Program: Virtual In-House Training
Delivered OnlineFlexible Dates
£4,750

Effecting Business Process Improvement: In-House Training

By IIL Europe Ltd

Effecting Business Process Improvement: In-House Training Business analysts facilitate the solution of business problems. The solutions are put into practice as changes to the way people perform in their organizations and the tools they use. The business analyst is a change agent who must understand the basic principles of quality management. This course covers the key role that business analysts play in organizational change management. What you will Learn You will learn how to: Define and document a business process Work with various business modeling techniques Perform an enterprise analysis in preparation for determining requirements Analyze business processes to discern problems Foundation Concepts Overview of business analysis and process improvement Defining the business process Introducing the proactive business analyst Focusing on business process improvement for business analysts Launching a Successful Business Process Improvement Project Overview of the launch phase Understanding and creating organizational strategy Selecting the target process Aligning the business process improvement project's goals and objectives with organizational strategy Defining the Current Process Overview of current process phase Documenting the business process Business modeling options: work-flow models Business modeling options: Unified Modeling Language (UML) model adaptations for business processes Analyzing the Current Process Process analysis overview Evaluation: establishing the control group Opportunity techniques: multi-discipline problem-solving Opportunity techniques: matrices Building and Sustaining a Recommended Process Overview of the recommended process and beyond Impact analysis Recommended process Transition to the business case Return to proactive state

Effecting Business Process Improvement: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

M.D.D IMPROVE MY RELATIONSHIP BEHAVIOUR PACKAGE (SINGLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Eliminate bad relationship and dating behaviour Improve confidence Understand people better Effective communication skills training Eliminate regressive dating patterns Address poor dating habits Introspection in your character and behavioural patterns Be a better partner 1 month Course 1 hr once a week Dating advice for singles https://relationshipsmdd.com/product/improve-my-relationship-behaviour-package/

M.D.D IMPROVE MY RELATIONSHIP BEHAVIOUR PACKAGE (SINGLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£1,200