Enhance your ear assessment and care skills with our comprehensive course on ear irrigation. Learn anatomy, assessment techniques, and safe practices for optimal ear health.
PfMP® Exam Prep: In-House Training This is an intensive PfMP® Exam preparation course. This learning experience guides you through the multi-faceted discipline of portfolio management by focusing on the related technical, leadership, and business skills required to navigate it in the real world. First and foremost, this is an intensive PfMP® exam preparation course. Over the course, we go beyond exam prep to provide selected practice in applying key portfolio management skills, tools, and techniques. This learning experience guides you through the multi-faceted discipline of portfolio management by focusing on the related technical, leadership, and business skills required to navigate it in the real world. The journey zooms in and out between governance context and specific operational activities. The ultimate goal is practical application, with the bonus of certification along the way. What You Will Learn By the end of this program, you will be able to: Align and manage the portfolio, strategically, to satisfy organizational objectives and priorities, through benefit realization Articulate and emulate the role of a portfolio manager Apply the principles and skills of a portfolio manager to your real-world environment Study and prepare for the PfMP® Examination Apply for the certification, per the PMI PfMP Handbook and pass the initial panel review on your application Getting Started Course Overview Details of the PfMP® Certification process Foundation Concepts Projects, program, and portfolios A portfolio management process Strategy and value The role of the portfolio manager The role of key stakeholders Life cycle management The Portfolio Life Cycle Overview of Life Cycle Portfolio Management Information System (PMIS) Governance within the Portfolio Life Cycle Strategic Management Strategy concepts Supporting documentation and the strategic plan Planning and optimization Organizational risk appetite Managing strategic change Governance Management Overview and Guiding Principles The Concept of Governance Effective Design Factors Governance Roles Capacity and Capability Management Overview and Guiding Principles Capacity Management and Planning Supply and Demand (Management and Optimization) Organization Capabilities (Assessment and Development) Performance Management (Reporting, Analytics, and Balance) Stakeholder Engagement The Importance of Stakeholders Overview and Guiding Principles Definition and Identification Analysis and Planning Communications Approaches and Management Value Management Overview (Guiding Principles, Definition, and Components) Negotiating Expected Value Maximizing Value Assuring Value Realizing Value Measuring and Reporting Value A Look at Tools Risk Management Overview and Guiding Principles Portfolio Risk Planning Portfolio Risk Identification Portfolio Risk Assessment Portfolio Risk Response Examination Content Outline (ECO) Overview Structure Strategic Tasks Mapping Governance Tasks Mapping Performance Tasks Mapping Risk Tasks Mapping Communication Tasks Mapping List of Knowledge and Skills Exam Prep and Practice Overview Documenting experience Submitting the application Preparing to sit for the exam
Mobile IP training course description A detailed examination of the protocols and architecture of Mobile IP. What will you learn Recognise the benefits of ADSL. Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. Mobile IP course details Who will benefit: Technical staff wanting to learn DNS.Network Administrators. Support personnel. Prerequisites: TCP/IP Foundation Duration 2 days Mobile IP course contents Introduction Quick review of IP, What is Mobile IP? What Mobile IP provides, Mobility requirements, Where Mobile IP is required, where mobile IP is not required, DHCP as an alternative, Proxy ARP as an alternative. Architecture Mobile node, home network, home agent, Foreign agent, Fixed home address, Care of address, Correspondent node, Tunnelling. How Mobile IP works Using two addresses, issues with TCP, discovering the care of address, registering care of address, tunnelling the care of address. The protocols involved. Issues with Mobile IP Routing inefficiencies, Security and firewalls, ingress filtering, QoS. MIP and IPv6 Stateless address configuration, Neighbour discovery, miscellaneous.
Enhance your ear assessment and care skills with our comprehensive course on ear irrigation. Gain practical knowledge and updated insights for optimal ear hygiene.
Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.
This qualification is aimed to give the individuals the skills and knowledge required to programme, supervise and induct a safe and effective programme for disabled clients.
The learner will be able to recognise the skills, knowledge and competence required in order to work with ante and post natal clients in an unsupervised manner. There will be focus on the considerations for safe and effective exercise and how to plan and adapt exercise for these particular clients.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.