Disciplined Agile Scrum Master (DASM): In-House Training Is your team treading water using waterfall? Do you feel trapped in an agile framework? Would you like to find solutions to the problems you've been wrestling with? Are you looking for ways to enhance your team's agility? Break free from your old ways by choosing a way of working that fits your team's context. Find strategies to improve your processes and strengthen your team with the Disciplined Agile® tool kit. Disciplined Agile Scrum Master is a nine-lesson, instructor-led course that shows you how to use Disciplined Agile (DA™) to improve your team's way of working. In just two days, you will become familiar with foundational agile and lean practices that DA supports, practice using the tool kit to solve problems, and learn how to build high-performance teams. Filled with activities, animations, supplemental reading, and more, this course will prepare you to take the Disciplined Agile Scrum Master (DASM) exam and, equally important, start using Disciplined Agile immediately. #BBD0E0 » What You Will Learn After the completion of this course, you will be able to: Apply foundational agile and lean practices in your own team setting Describe what business agility is and how it is core to value proposition of Disciplined Agile® Describe the significance of the Disciplined Agile mindset Define the DA™ principles, promises, and guidelines and how they set Disciplined Agile apart from other frameworks Explain how people are organized into DA teams Define the primary DA roles and how they each are key to the success of a self-organizing agile team Explain how to help your team work well together using the Lean principle of 'respect people' Analyze your team's context to make better process-related decisions Select the best-fit DA life cycles for your teams Apply the five DA steps of choosing your team's way of working (WoW) Apply the relevant agile and lean techniques to successfully initiate your team Apply the relevant agile and lean techniques to support your team producing business value Apply the relevant agile and lean techniques to support your team releasing their work into production Apply the relevant agile and lean techniques to support your team on an ongoing basis Recognize when to be resilient List and define the principles of Lean Significance of the Disciplined Agile® Mindset Business agility and how it is core to value proposition of Disciplined Agile Eight DA principles and how they are core to what sets Disciplined Agile apart from other agile frameworks Which situations each of the DA™ life cycles is best applied DA Practice of choosing a team's way of working (WoW) Foundations of Agile How people are organized into DA teams Primary DA roles and how they each are key to the success of a self-organizing agile team Help your team work well together (Lean principle 'Respect people') Inception phase and why it is important DA tool kit to tailor your way of working within a select phase according to context Agile techniques and ceremonies relevant to Inception Construction phase and why it is important Agile techniques and ceremonies that take place during Construction Eliminate Waste and Build Quality (Lean principles) Deliver Value Quickly (Lean principle) Transition phase and why it is important Ongoing phase and why it is important Learn Pragmatically (Lean principle) Elements of the process blade (onion) diagram Principles of Lean When to be resilient Benefits of explicit workflow Kaizen loops and PDSA techniques for continuous improvement Options for cross-team learning: "community of practice" and "center of excellence"
Level 2 NVQ Certificate in Plant Operations - Laying and Distributing
Level 2 NVQ Certificate in Plant Operations - Fork Lift Trucks
Windows certificates training course description A hands-on training course concentrating solely on PKI using Windows certificates. What will you learn Explain how PKI works. Install windows certificates. Configure windows certificates. Troubleshoot windows certificates. Windows certificates training course details Who will benefit: Technical security staff. Prerequisites: Windows server. Duration 3 days Windows certificates training course contents PKI Symmetric encryption, asymmetric encryption, authentication, digital signing, hashing, certificates, Certification Authorities, Root CA, Intermediate CA, policy CA, Issuing CA, Certificate Revocation Lists. Hands on Inspecting a certificate. Policies and PKI Security policy, certification policy. CA hierarchy Impact of CAs on Active Directory, CA architecture, number of tiers, issuing CA organisation, CA configuration files. CA security. Hands on CA installation PKI health tool, monitoring. Certificate revocation When to revoke, OCSP. Hands on Revoking certificates. Certificate validation Discovery, validation, checks, revocation checking, certificate chains, certification publication. Hands on Event viewer. Certificate templates Version 1, version 1, default, modifying templates. Hands on Template management. Roles Criteria roles, CA administrator, Certificate manager, Backup operator, Auditor. Other PKI management roles. Disaster recovery Backups, recovery. Hands on certutil. Issuing certificates The certificate enrolment process, enrolment methods, manual enrolment, automatic enrolment. Trust between organisations Creating Trust, CTLs, common root CA, cross certification, bridge CA. Web servers and certificates SSL encryption, certificate authentication. Hands on Web servers. VPN Hands on Certificate deployment for VPN. WiFi Hands on 802.1X
Level 2 NVQ Certificate in Highways Maintenance - Excavation and Reinstatement Operations
Course Overview The Level 2 NVQ Diploma in Plant Operations -Extracting Plant qualification has been developed for achievement in a real workplace environment which means you need to be employed to undertake this qualification. This qualification enables you, the learner, to demonstrate and recognise your skills, knowledge and understanding and to demonstrate your competence in a real workplace environment so you can work as a Plant Operator within the construction industry. You will be assessed against a set of performance and knowledge statements which have been derived from National Occupational Standards for your occupational area. You will be assessed by an occupationally competent and qualified assessor whose job is to work with you and help you complete your qualification. This qualification supports the learner to attain enabling, fundamental and transferable practical skills with associated underpinning knowledge. The learner will learn key practical skills and knowledge in these mandatory units: Conforming to General Health, Safety and Welfare in the Workplace Conforming to Productive Working Practices in the Workplace. The learner will also learn key practical skills and knowledge in one of the following optional units: Preparing and operating draglines to extract ground and/or loose materials in the workplace Preparing and operating 180 degree excavators to extract and excavate ground and loose materials in the workplace Preparing and operating tracked loading shovels to extract ground and loose materials in the workplace Preparing and operating tracked loading shovels to extract, transport and distribute materials in the workplace Preparing and operating 360 degree excavators to extract ground, face and/or loose materials in the workplace Preparing and operating trenchers to extract ground and/or loose materials in the workplace Preparing and operating crawler tractor dozers to carry out dozer operations in the workplace. Entry Requirements There are no formal entry requirements to take this qualification. This qualification can be undertaken without any previous training or qualifications in this subject area.
Supporting Microsoft IIS training course description This course provides students with the fundamental knowledge and skills to configure and manage Internet Information Services. This course is intended to help provide pre-requisite skills supporting a broad range of Internet web applications, security, and knowledge to help support other products that use IIS such as Exchange and SharePoint. What will you learn Install IIS. Configure IIS. Secure websites. Maintain IIS. Supporting Microsoft IIS training course details Who will benefit: Technical staff working with Microsoft IIS. Prerequisites: TCP/IP foundation for engineerss Supporting Windows ( XP or 2000 or 2003) Duration 5 days Supporting Microsoft IIS course contents Overview and Installing IIS Web Server infrastructure, installing IIS. Hands on Default install of IIS, verify and test.. Configuring the default website Default website, IIS Manager, default IIS file structure, configuring DNS records for a website, creating virtual directories and Applications. Hands on Configuring the Default website for public access. Creating Virtual Directories and Applications. Application Pools Application Pool Architecture, Application Pool recycling. Hands on Creating and managing Application Pools. Creating additional websites Multiple websites on a single server, website bindings. Hands on Creating new websites. Website and Web application support Configuring Common features, adding support for web applications. Hands on Adding support for web applications. Securing Websites and applications Access control, sites, applications, authentication and permissions. URL authorization rules. Hands on Configuring Authentication and permissions. Securing Data Transmissions with SSL Certificates and SSL, creating certificates for a web server, adding a certificate to a website. Hands on Certificates and HTTPS. Using the Central Certificate Store The Central Certificate Store. Hands on Install and configure the Central Certificate Store. Configuring Remote Administration Installing and Configuring the Management Service. Connecting to remote web servers and websites. Delegating Management Access. Hands on Remote administration. Implementing FTP Implementing FTP, configuring an FTP site. Hands on Install and configure a secured FTP site. Monitoring IIS IMonitoring IIS logs with Log Parser. Hands on Analyze a set of IIS log files for possible issues using Log Parser. Analyze performance data for performance related problems using PerfMon. Backing up and Restoring IIS The IIS environment. Hands on Performing a backup and restore of a website. Building Load-Balanced Web Farms Load-balancing mechanisms, building a Load-Balanced Web Farm using ARR, sharing content to a Web Farm using a network share, Sharing content to a Web Farm using DFS-R, Sharing IIS Configurations in a Web Farm. Hands on Installing and configuring ARR, sharing content to a Web Farm using network share and DFS-R, sharing IIS Configurations in a Web Farm.
Introduction to Agile and Scrum: In-House Training This half-day course provides an overview of Agile principles and mindset, and the Scrum framework as a key Agile approach. It will provide you with the key benefits of an Agile approach, and its differences with the traditional Waterfall method. Lastly, as Agile is looked upon more frequently as an alternative delivery method, you will review situations where Agile can be adapted outside of software development, where it is most commonly used. What you will Learn At the end of this program, you will be able to: Explain the basics and benefits of using an Agile approach Describe the Scrum framework, its events, artifacts and roles and responsibilities Illustrate Agile approaches outside of Software Development Getting Started Introduction Course structure Course goals and objectives Agile Introduction What is Agile? Agile Benefits Agile Methods Overview of Scrum Scrum Overview Scrum Events Scrum Artifacts Scrum Roles Definition of Done Agile Approaches Outside of Software Development Agile in other environments Product Development Course Development Marketing Agile Project Candidates Summary What Agile is not... Concerns and Pitfalls
Overview The course introduces the participants to the importance of personnel in any organisation, and the systematic processes of handling personnel to bring out the best in them in order to achieve the objectives of the organisation is the responsibility of the holder of this certificate. The course curriculum covers human resource planning; recruitment and selection; employee training and development; employee health and safety etc.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.