• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4 Educators providing Courses in Coventry

Courses matching "Reviews"

Show all 54

How to Conduct and Write Systematic Literature Reviews

By Research'Kraft Consulting

Workshop objectives 1-Introduction to Systematic Reviews 2- Formulating the Research Question 3- Developing a Protocol 4- Literature Search 5- Study Selection 6- Data Extraction 7- Quality Assessment: 8- Data Synthesis 9- Reporting and Publication: 10- How to write a scoping review A certificate from Research'Kraft will be given after successful completion.

How to Conduct and Write Systematic Literature Reviews
Delivered in person or OnlineFlexible Dates
£40

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Scrum Product Owner Workshop: In-House Training

By IIL Europe Ltd

Scrum Product Owner Workshop: In-House Training The Product Owner is responsible for maximizing the value of the product and the work of the Development Team. The Product Owner must be knowledgeable, available, and empowered to make decisions quickly in order for an Agile project to be successful. The Product Owner's key accountability is the Product Backlog. Managing, maintaining, and evolving the Product Backlog involves: Establishing a clear Vision that engages the Development Team and stakeholders Clearly expressing Product Backlog items Ordering the items in the Product Backlog to best achieve the Vision and goals Ensuring that the Product Backlog is visible, transparent, and clear to all Working with the Development Team throughout the project to create a product that fits the customer's needs The overall course goal is to support you in becoming an effective Product Owner. What you will Learn You'll learn how to: Differentiate between poor, good, and great Product Owner attributes, and their impact on the team, product, stakeholders, and the organization Engage your stakeholders by knowing your customers and market Develop an effective and value-driven Product Backlog Evaluate the Product Owner's role in Scrum's 5 events and team engagement Foundation Concepts Agile foundation Product owner role Product Ownership Product ownership Project vision Understanding your customers and market Personas Stakeholder management and engagement The Product Backlog Epics and user stories Preparing user stories for a sprint The product backlog Visualizing the product backlog Product backlog prioritization Technical debt Sprint Planning and Delivery Sprint planning The sprint Sprint Reviews, Retrospectives, and Closing Sprint reviews Key agile patterns Retrospectives Closing the project

Scrum Product Owner Workshop: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Portfolio Management Skills: In-House Training

By IIL Europe Ltd

Portfolio Management Skills: In-House Training The main purpose of this workshop is to equip and enable people in a portfolio management office and PMO to effectively and efficiently support the Executive Leadership and Operational Management to plan, implement, manage, and evolve portfolio management in their organization. There is a deliberate focus on preparing you to become a strong and effective change advocate for meaningful portfolio management that delivers objective measurements of benefit contribution towards the strategic objectives to lead, manage, and continuously improve portfolio management governance, processes, and frameworks with and through the direction of a portfolio practice, principles, and delivery boards. What you Will Learn At the end of this program, you will be able to: Articulate the benefits of portfolio management Link the initiatives in an organization with its strategic objectives Participate in the introduction of portfolio management in an organization Create or improve the portfolio governance structure Lead the inventory of ongoing and new initiatives Assist the executives in the prioritization of initiatives through the use of Multi-criteria Analysis and other selection tools Support the executives in balancing the portfolio based on the optimal use of resources and priorities Create a portfolio delivery plan Define thresholds and variance reporting criteria Assist the executives and the financial team in the definition of Stage Gate Funding Lead the Stage Gate reviews Analyze the benefits that are being realized by the initiatives Foundation Concepts Definitions Benefits of Portfolio Management Objectives of Portfolio Management Portfolio Life Cycles Governing the Portfolio Portfolio Governance structure Roles and responsibilities Initial activities when starting portfolio management Prioritizing Initiatives Prioritize purpose Multi-Criteria Analysis Analytical Hierarchy Process (AHP) Strategic alignment Balancing the Portfolio Allocating resources and budgets Communicating decisions of initiatives status Planning the Portfolio Planning review cycles Using Stage Gate Funding Setting thresholds and variance reporting Tool examples Managing the Portfolio Delivery Project and Program Life Cycles Stage Gate Reviews Loop back to Prioritize, Balance and Plan Interaction with the Portfolio Delivery Board Project, Program and Functional Managers' roles and responsibilities

Portfolio Management Skills: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,695

Cyber Security Overview 1 Day Training in Coventry

By Mangates

Cyber Security Overview 1 Day Training in Coventry

Cyber Security Overview 1 Day Training in Coventry
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Warwick

By Mangates

Cyber Security Overview 1 Day Training in Warwick

Cyber Security Overview 1 Day Training in Warwick
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Hinckley

By Mangates

Cyber Security Overview 1 Day Training in Hinckley

Cyber Security Overview 1 Day Training in Hinckley
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Solihull

By Mangates

Cyber Security Overview 1 Day Training in Solihull

Cyber Security Overview 1 Day Training in Solihull
Delivered In-Person + more
£595 to £795

Manager Management 1 Day Training Coventry

5.0(1)

By Mangates

Manager Management 1 Day Training in Coventry

Manager Management 1 Day Training Coventry
Delivered In-Person + more
£595 to £795

Manager Management 1 Day Training Warwick

5.0(1)

By Mangates

Manager Management 1 Day Training in Warwick

Manager Management 1 Day Training Warwick
Delivered In-Person + more
£595 to £795