ITIL® 4 Specialist: High Velocity IT: In-House Training The ITIL® 4 Specialist: High-Velocity IT module is part of the Managing Professional stream for ITIL® 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: High-Velocity IT exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. This module addresses the specifics of digital transformation and helps organizations to evolve towards a convergence of business and technology, or to establish a new digital organization. It was designed to enable practitioners to explore the ways in which digital organizations and digital operating models function in high-velocity environments. Working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing are included. What You Will Learn At the end of this course, participants will be able to: Understand concepts regarding the high-velocity nature of the digital enterprise, including the demand it places on IT. Understand the digital product lifecycle in terms of the ITIL operating model. Understand the importance of the ITIL guiding principles and other fundamental concepts for delivering high-velocity IT. Know how to contribute to achieving value with digital products. Course Introduction Let's Get to Know Each Other Course Learning Objectives Target Audience Characteristics ITIL® 4 Certification Scheme Course Components Course Agenda Module-End Exercises Exam Details Introduction to High-Velocity IT High-Velocity IT Digital Technology Digital Organizations Digital Transformation High-Velocity IT Approaches Relevance of High-Velocity IT Approaches High-Velocity IT Approaches in Detail High-Velocity IT Operating Models Introduction ITIL® Perspective High-Velocity IT Aspects High-Velocity IT Applications ITIL® Building Blocks for High-Velocity IT Digital Product Lifecycle Service Value Streams Four Dimensions of Service Management ITIL® Management Practices High-Velocity IT Culture Key Behavior Patterns ITIL® Guiding Principles Supporting Models and Concepts for Purpose Ethics Design Thinking Supporting Models and Concepts for People Reconstructing for Service Agility Safety Culture Stress Prevention Supporting Models and Concepts for Progress Working in Complex Environments Lean Culture ITIL® Continual Improvement Model High-Velocity IT Objectives and Techniques High-Velocity IT Objectives High-Velocity IT Techniques Techniques for Valuable Investments Prioritization Techniques Minimum Viable Products and Services Product / Service Ownership A/B Testing Techniques for Fast Developments Basic Concepts Related to Fast Development Infrastructure as Code Reviews Continual Business Analysis Continuous Integration / Continuous Delivery (CI/CD) Continuous Testing Kanban Techniques for Resilient Operations Introduction to Resilient Operations Technical Debt Chaos Engineering Definition of Done Version Control Algorithmic IT Operations ChatOps Site Reliability Engineering (SRE) Techniques for Co-created Value Basic Concepts of Co-created Value Service Experience Techniques for Assured Conformance DevOps Audit Defense Toolkit DevSecOpsPeer Review
Managing Benefits™ Foundation: In-House Training The APMG International Managing Benefits and Swirl Device logo is a trademark of The APM Group Limited, used under permission of The APM Group Limited. All rights reserved. Benefits are not simply just one aspect of project and programme management (PPM) - rather, they are the rationale for the investment of taxpayers' and shareholders' funds in change initiatives. Managing Benefits is designed to complement existing best practices in portfolio, programme and project management (such as PRINCE2®, MSP®, P3O® & MoP®), and consolidates existing guidance while expanding on the specific practices and techniques aimed at optimizing benefits realization. The purpose of the Managing Benefits guidance and certification scheme is to provide you with generally applicable guidance encompassing benefits management principles, practices, and techniques, and to prepare you to take and pass the Foundation exam on the last day. Managing Benefits provides: An overview of benefits management - what it is, the case for doing it, and some common misconceptions that can limit its effectiveness in practice Descriptions of the seven principles upon which successful approaches to benefits management are built, and examples of how they have been applied in practice Guidance on how to apply benefits management at a portfolio level, as well as at an individual project or programme level Details of the five practices in the Benefits Management Cycle and examples of how they have been applied in practice Advice on how to get started in implementing effective benefits management practices and sustain progress What You Will Learn You'll learn how to: Define benefits, benefits management and related terms, and the objectives of benefits management Explain the principles upon which successful approaches to benefits management are based Define the practices contained within the Benefits Management Cycle and relevant techniques applicable to each practice Describe key elements of portfolio-based benefits management, as well as the scope of key roles and responsibilities for benefits management and the typical contents of the main benefits management documentation Identify barriers to effective benefits management and strategies to overcome them, including the key success characteristics of benefits management Improve your ability to pass the APMG Managing Benefits Foundation Certification exam Getting Started Introductions Course structure Course goals and objectives Overview of Managing Benefits The Benefits Management Model Key Benefits Management Practices What is Benefits Management? Definitions Value and Value Management Why do we need benefits management? Objectives Benefits Management Principles Align benefits with strategy Start with the end in mind Utilize successful delivery methods Integrate benefits with performance management Manage benefits from a portfolio perspective Apply effective governance Develop a value culture The Benefits Management Cycle Barriers to effective and efficient benefits management and overcoming them Key success characteristics of effective benefits management Key roles, responsibilities, and documentation Benefits Management Practice 1 - Identify and Quantify Benefits Management Practice 2 - Value and Appraise Benefits Management Practice 3 - Plan Benefits Management Practice 4 - Realize Benefits Management Practice 5 - Review Portfolio-based Benefits Management Implementing and Sustaining Progress APMG Managing Benefits Foundation Exam
ISTQB® FOUNDATION TRAINING COURSE (2 persons minimum) The aim of this course is to provide you with the knowledge and skills to pass an exam certifying you as an ISTQB® Certified Tester - Foundation Level. Most organisations require this certification as a minimum skill requirement for software testers. In this course you will learn a standardized approach to software testing that will be immediately applicable to your projects. In order to get the certification you will be required to pass a 60-minute exam. Our trainers will fully prepare you by employing scenarios that mirror the exam questions, and by focusing course delivery with a balance of theory and practice. Target group: Functional Tester, Agile Tester, User Acceptance Tester, Test Automation Specialist, Performance Testing Specialist, Testing Team Lead, Test Manager, Business analyst Prerequisites: There are no specific prerequisites for this course. This course is suitable for anyone involved in software testing. Duration: 3 days. Training objectives: Learn aspects of test planning, estimation, monitoring and control. Understand and use international standards and terminology. Understand and implement effective testing techniques. Be well prepared for the exam. Identify the missing testing skills for the career development purposes. This course covers the following areas: Fundamentals of software testing Testing throughout the life cycle (software development models, test levels, test types) Test design techniques (e.g. specification-based or black-box techniques, structure-based or white-box techniques) Static testing (static testing techniques, review process, tool-assisted static analysis) Test management (test organisation, test planning and estimation, test progress monitoring and control, risks) Tools to support testing (types, benefits and risks) Language: English
Linux network administration 2 course description LPIC-2 is the second certification in LPI's multi level professional certification program. This course teaches the skills necessary to pass the LPI 202 exam; the second of two LPIC-2 exams. Specifically, the course covers the administration of Linux systems in small to medium sized mixed networks. What will you learn Install and configure fundamental network services. Linux network administration 2 course details Who will benefit: Linux administrators. Prerequisites: Linux engineer certification 1 (LPIC-2) Duration 5 days Linux network administration 2 course contents Part II The LPI 202 Exam Organizing Email Services The Linux Mail System, Mail Transfer Agent, Mail Delivery Agent, Mail User Agent, Email Protocols, SMTP, POP, IMAP, Using Email Servers, Sendmail, Postfix, Local Email Delivery, Procmail Basics, Sieve, Remote Email Delivery, Courier, Dovecot. DNS DNS and BIND, Configuring a DNS Server, Starting, Stopping, and Reloading BIND, Configuring BIND Logging, Creating and Maintaining DNS Zones, BIND Zone Files, Managing BIND Zones, Securing a DNS Server, ailing BIND, DNSSEC, TSIG, Employing DANE. Offering Web Services Web Servers, HTTP, The Apache Web Server, Installing and configuring Apache, Hosting Dynamic Web Applications, Secure Web Servers, Proxy Servers, Installing and configuring Squid, Configuring Clients, Nginx Server, Installing Nginx, Configuring Nginx. Sharing Files Samba, Configuring Samba, Troubleshooting Samba, NFS, Configuring NFS, Securing NFS, Troubleshooting NFS, FTP Servers, Configuring vsftpd, Configuring Pure-FTPd. Managing Network Clients Assigning Network Addresses, DHCP, Linux DHCP Software, Installing and configuring a DHCP Server and clients, Authentication Service, PAM Basics, Configuring PAM, PAM Application Files, Network Directories, LDAP Basics, OpenLDAP Server, LDAP Clients. Setting Up System Security Server Network Security, Port Scanning, Intrusion Detection Systems, External Network Security, iptables, Routing in Linux, Connecting Securely to a Server, OpenSSH, OpenVPN, Security Resources, US-CERT, SANS Institute, Bugtraq.
Certified Associate in Project Management (CAPM)® Exam Prep: In-House Training: In-House Training This course gives you the knowledge you need to pass the exam and covers CAPM®-critical information on project management theory, principles, techniques, and methods Are you planning on taking the CAPM® examination? This course gives you the knowledge you need to pass the exam and covers CAPM®-critical information on project management theory, principles, techniques, and methods. You'll also have an opportunity for practical applications and time to review the kinds of questions you'll find in the CAPM® Exam. What you Will Learn Apply for the CAPM® Examination Develop a personal exam preparation plan Describe the structure, intent, and framework principles of the current edition of the PMBOK® Guide Explain the PMBOK® Guide Knowledge Areas, as well as their inter-relationships with the each other and the Process Groups Getting Started Program orientation The CAPM® certification process Certified Associate in Project Management (CAPM®) Examination Content Outline CAPM® eligibility requirements Code of Ethics and Professional Conduct Application options Foundation Concepts Skills and qualities of a project manager Project management terminology and definitions Relationship of project, program, portfolio, and operations management Project lifecycle approaches Project Integration Management Review Project Integration Management Knowledge Area Develop Project Charter Develop Project Management Plan Direct and Manage Project Work Manage Project Knowledge Monitoring and Controlling Perform Integrated Change Control Close Project or Phase Project Stakeholder Management Review Project Stakeholder Management Knowledge Area Identify Stakeholders Plan Stakeholder Engagement Manage Stakeholder Engagement Monitor Stakeholder Engagement Project Scope Management Review Project Scope Management Knowledge Area Plan Scope Management Collect Requirements Define Scope Create WBS Validate Scope Control Scope Project Schedule Management Review Project Schedule Management Knowledge Area Plan Schedule Management Define Activities Sequence Activities Estimate Activity Durations Develop Schedule Control Schedule Project Cost Management Review Project Cost Management Knowledge Area Plan Cost Management Estimate Costs Determine Budget Control Schedule Project Resource Management Review Project Resource Management Knowledge Area Plan Resource Management Estimate Activity Resources Acquire Resources Develop Team Manage Team Control Resources Project Quality Management Review Project Quality Management Knowledge Area Plan Quality Management Manage Quality Control Quality Project Risk Management Review Project Risk Management Knowledge Area Plan Risk Management Identify Risks Perform Qualitative Risk Analysis Perform Quantitative Risk Analysis Plan Risk Responses Implement Risk Responses Monitor Risks Project Communications Management Review Project Communications Management Knowledge Area Plan Communications Management Manage Communications Monitor Communications Project Procurement Management Review Project Procurement Management Knowledge Area Plan Procurement Management Conduct Procurements Control Procurements Summary and Next Steps Program Review Mock CAPM® Exam Getting Prepared for the CAPM® Exam After the CAPM® Exam
The Gold Card Training Programme is the most comprehensive electrician course available. We offer weekday, weekend and evening delivery options. JIB ECS (Gold) Card is quickly becoming a necessity when seeking work on commercial sites, or sub-contracting to larger contractors.
Level 3 Supporting Teaching and Learning in Schools Certificate is a RQF qualification & this course play a major role by working with pupils & supporting teachers. This course has been designed to teach the knowledge required to be a teaching assistant and support children’s learning from birth to nineteen years. The course covers various requirements needed to work as an assistant within schools and how to approach a career in the education sector. ABOUT THIS COURSE: Level 3 Award in Supporting Teaching and Learning is a knowledge only qualification. Experience in the real work environment is not required and the entire course is completed online. Please note that this is a knowledge only Level 3 qualification and does not require any practical assessments. COURSE ASSESSMENT: To pass this course learners must pass 4 assignments. These are completed after navigating through the corresponding lessons and writing your answers to assignment questions. Once these have been read and marked by your personal tutor, feedback and marks are provided to students which contain helpful tips to improve work in future assignments. UNITS COVERED: • Unit 1: Schools and Colleges as Organisations • Unit 2: Support Health and Safety in a Learning Environment • Unit 3: Understand how to Safeguard Children and Young People • Unit 4: Understand How Children and Young People Develop HOW MUCH THIS COURSE COST? Level 3: Award in Supporting Teaching and Learning Course will cost for Distance Learning / Online £249.99 and for class based £349.99. There is no any hidden fess/cost.
CWNA training course description A hands-on course focusing on the technical support of WiFi. Wireless LANs are often seen as simple communications that are simply installed and then left alone to work. This course ensures that delegates will be able to install WiFi networks which work but also enable the delegates to troubleshoot WiFi when it does go wrong. What will you learn Compare 802.11 standards. Configure WiFi networks. Troubleshoot WiFi networks using spectrum analysers, Wireshark and other tools. Implement 802.11 security. Perform RF surveys. CWNA training course details Who will benefit: Technical staff working with WiFi networks. Anyone wishing to pass the CWNA exam. Prerequisites: Intro to data communications & networking Duration 5 days CWNA training course contents Introduction History, standards. RF fundamentals What is RF? Wavelength, Frequency, Amplitude, Phase. Wave behaviour. RF components. Watts, mW, dB, SNR, Link budgets. Hands on Spectrum analysis. Listing WiFi networks. WiFi connection. inSSIDer. Antennas Radiation envelopes, polar charts, gain, Antenna types. Line of Sight, MIMO. Hands on Connecting, installing, changing antennae. RSSI values. 802.11 802.11-2007, 802.11 post 2007, 802.11 drafts. 802.11 b/g/n. Hands on WiFi performance measurement. Spread Spectrum RF frequency bands, FHSS, DSSS, OFDM. Channels. Hands on Configuring channels. Topologies Mesh, Access points, distribution systems, SSID. Hands on AP configuration. Client connection profiles. 802.11 MAC CSMA/CA, Management frames, control frames, data frames. Passive scanning, active scanning. Open system authentication. Shared Key authentication. Association. RTS/CTS. Power management. Hands on Capturing frames, analysing frames. WiFi architecture WiFi client, WLAN architecture: Autonomous, Centralised, distributed. WiFi bridges. WiFi routers. PoE. Hands on WLAN controllers. Troubleshooting RF interference, multipath, adjacent channels, low SNR, mismatched power. Coverage, capacity. 802.11 Security Basics, Legacy security: WEP, MAC filters, SSID cloaking. PSK, 8021.X/EAP, WPA/WPA2. TKIP/ CCMP encryption. Guest WLANs. Wireless attacks, intrusion monitoring. Hands on WEP cracking, WPA2 configuration. RADIUS. RF Site surveys Protocol and spectrum analysis, coverage analysis. Site survey tools. Hands on Performing a site survey.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
WCNA training course description Wireshark is a free network protocol analyser. This hands-on course provides a comprehensive tour of using Wireshark to troubleshoot networks. The course concentrates on the information needed in order to pass the WCNA exam. Students will gain the most from this course only if they already have a sound knowledge of the TCP/IP protocols. What will you learn Analyse packets and protocols in detail. Troubleshoot networks using Wireshark. Find performance problems using Wireshark. Perform network forensics. WCNA training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 5 days WCNA training course contents What is Wireshark? Network analysis, troubleshooting, network traffic flows. Hands on Download/install Wireshark. Wireshark introduction Capturing packets, libpcap, winpcap, airpcap. Dissectors and plugins. The menus. Right click. Hands on Using Wireshark. Capturing traffic Wireshark and switches and routers. Remote traffic capture. Hands on Capturing packets. Capture filters Applying, identifiers, qualifiers, protocols, addresses, byte values. File sets, ring buffers. Hands on Capture filters. Preferences Configuration folders. Global and personal configurations. Capture preferences, name resolution, protocol settings. Colouring traffic. Profiles. Hands on Customising Wireshark. Time Packet time, timestamps, packet arrival times, delays, traffic rates, packets sizes, overall bytes. Hands on Measuring high latency. Trace file statistics Protocols and applications, conversations, packet lengths, destinations, protocol usages, strams, flows. Hands on Wireshark statistics. Display filters Applying, clearing, expressions, right click, conversations, endpoints, protocols, combining filters, specific bytes, regex filters. Hands on Display traffic. Streams Traffic reassembly, UDP and TCP conversations, SSL. Hands on Recreating streams. Saving Filtered, marked and ranges. Hands on Export. TCP/IP Analysis The expert system. DNS, ARP, IPv4, IPv6, ICMP, UDP, TCP. Hands on Analysing traffic. IO rates and trends Basic graphs, Advanced IO graphs. Round Trip Time, throughput rates. Hands on Graphs. Application analysis DHCP, HTTP, FTP, SMTP. Hands on Analysing application traffic. WiFi Signal strength and interference, monitor mode and promiscuous mode. Data, management and control frames. Hands on WLAN traffic. VoIP Call flows, Jitter, packet loss. RTP, SIP. Hands on Playing back calls. Performance problems Baselining. High latency, arrival times, delta times. Hands on Identifying poor performance. Network forensics Host vs network forensics, unusual traffic patterns, detecting scans and sweeps, suspect traffic. Hands on Signatures. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, dumpcap. Hands on Command tools.