Intro to SQL training course description A hands on course focusing on the use of SQL. In particular this course does not concentrate on any particular version of SQL but rather enables delegates to recognise the differences found in SQL on different platforms. What will you learn Explain the difference between standard SQL and different flavours. Use SQL statements to query databases. Use SQL statements to define databases. Intro to SQL training course details Who will benefit: Anyone working with databases. Prerequisites: None. Duration 2 days Intro to SQL training course contents What is SQL? What is SQL? History, standards, What is SQL used for? Dialects, ANSI SQL, PL/SQL, Transact SQL, front ends. Database basics RDBMS, Tables. Hands on Investigating a database. Basic SQL commands SQL Overview: SQL DML, SQL DDL, SQL queries. SELECT, WHERE and ORDER BY clauses. Combining conditions. IN, LIKE and BETWEEN. Hands on Querying a database from existing tables. SQL data retrieval Scalar functions. Hands on Selecting data from an existing database. More SQL data retrieval Scalar functions, variations. Aggregate functions, GROUP BY. HAVING. Hands on Selecting data from an existing database. Table joins Multiple tables, joins, keys, inner joins, left joins, right joins. Hands on Selecting data from an existing database. SQL basic data manipulation INSERT, UPDATE, MERGE, DELETE. Transaction controls: COMMIT, ROLLBACK. Hands on Modifying data in tables. SQL Data Definition USE, CREATE, DROP, TRUNCATE, ALTER. Hands on Managing new tables and columns. Data control GRANT, REVOKE. Hands on Defining permissions.
Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment
Overview Overview The purpose of this course is to enable participants to understand and apply the principles of emergency response planning and crisis management. It considers the need for emergency and crisis response planning and an integrated approach to emergency management. Training typically covers: Crisis management structure and staffing an emergency response team Incident reporting and notification Operational processes Guidance of facility response policies and procedures Annual testing and evaluation of the crisis management plan Upcoming Events Online (USD 1950) Online Streaming Live (Flexible Dates) At Venue (USD 4500) Dubai 13 March - 17 March Istanbul 20 March - 24 March London 20 March - 24 March For more dates and Venue, Please email sales@gbacorporate.co.uk
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Advanced Kibana training course description This training course is aimed at users who already have some experience with Kibana, who are looking to further their knowledge. What will you learn Lens Timelion Maps Custom Visualisations with Vega Canvas Filters and Controls Drilldown and Dashboards KQSL and ElasticQueries Scripted and RunTime Fields Alerts and Alarms Advanced Kibana training course details Who will benefit: Users who already have some experience with Kibana, who are looking to further their knowledge. Prerequisites: None Duration 1 day Advanced Kibana training course contents Topics Lens Visualisation types (tables,bars,charts) Category breakdown Adding multiple metrics Using formulas in metrics Labels Adding reference layer Limitations Visualise Library Timeseries, Metrics Different types of aggregations Maps GeoMapping Heat Maps Using ES index as data source Visualisation, tool tips Custom Visualisations with Vega Introduction to vega scripting Canvas Widgets and Texts Elasticsearch SQL Canvas Expressions Filters and Controls Dropdown filters Ad-hoc filters Searchbar filters Drilldown Dashboards Linking one dashboard to another KQSL and ElasticQueries Bool Query AND/OR Phrase Part match vs keyword search Wildcard search Scripted and RunTime Fields Creating ad-hoc calculated fields using scripts Performance issues Alerts and Alarms Query Based Formatting output Connector types(email,index,teams etc)
Better Business Cases™ Practitioner: In-House Training: In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best-practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the practitioner course is to develop a candidate's ability to deliver a comprehensive business case, through encouraging expanded knowledge to guide the practical application of theoretical foundations. Upon the completion of this Practitioner course, a candidate will be able to start applying the model to a real business case development project. What You Will Learn At the end of this program, you will be able to: Develop the lifecycle of a business case and to establish the relationships between the five cases Apply the steps in the business case development framework, in order to support the production of a business case, using the Five Case Model, for a given scenario Overview of Better Business Cases Alignment with the strategic planning process Importance of the Business Case using the Five Case Model Overview of the Five Case Model Purpose of the key stages in the development of a spending proposal Purpose of a Business Justification Case Business Case Development Process Purpose of project / programme assurance and assurance reviews Responsibility for producing the Business Case Determining the Strategic Context and Undertaking the Strategic Assessment Scoping the Scheme and Preparing the Strategic Outline Case Planning the Scheme and Preparing the Outline Business Case Procuring the Solution and Preparing the Full Business Case Implementation and monitoring Evaluation and feedback Making the Case for Change Agree on the strategic context Determine spending objectives, existing arrangements, and business needs Determine potential business scope and key service requirements Determine benefits, risks, constraint, and dependencies Exploring the Preferred Way Forward Agree on critical success factors Determine long list options and SWOT analysis Recommend a preferred way forward Determining Potential Value for Money Revisit the short list Prepare the economic appraisal for short-listed options Undertake benefits appraisal Undertake risk appraisal Select preferred option and undertake sensitivity analysis Preparing for the Potential Deal Determine the procurement strategy Determine service streams and required outputs Outline potential risk apportionment Outline potential payment mechanisms Ascertain contractual issues and accountancy treatment Ascertaining Affordability and Funding Requirement Prepare the financial model Prepare the financial appraisals Planning for Successful Delivery Plan programme / project management Plan change and contract management Plan benefits realization Plan risk management Plan programme / project assurance and post project evaluation Procuring the Value for Money Solution Revisit the case for change Revisit the OBC options Detail procurement process and evaluation of best and final offers (BAFOs) Contracting for the Deal Set out the negotiated deal and contractual arrangements Set out the financial implications of the deal Ensuring Successful Delivery Finalize project management arrangements and plans Finalize change management arrangements and plans Finalize benefits realization arrangements and plans Finalize risk management arrangements and plans Finalize contract management arrangements and plans Finalize post-project evaluation arrangements and plans
Wireshark 101 training course description Wireshark is a free network protocol analyser. This hands-on course focuses on troubleshooting networks using the Wireshark protocol analyser. The course concentrates on the product and students will gain from the most from this course only if they already have a sound knowledge of the TCP/IP protocols What will you learn Download and install Wireshark. Capture and analyse packets with Wireshark. Configure capture and display filters. Customise Wireshark. Troubleshoot networks using Wireshark. Wireshark 101 training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 2 days Wireshark 101 training course contents What is Wireshark? Protocol analysers, Wireshark features, versions, troubleshooting techniques with Wireshark. Installing Wireshark Downloading Wireshark, UNIX issues, Microsoft issues, the role of winpcap, promiscuous mode, installing Wireshark. Wireshark documentation and help. Hands on Downloading and installing Wireshark. Capturing traffic Starting and stopping basic packet captures, the packet list pane, packet details pane, packet bytes pane, interfaces, using Wireshark in a switched architecture. Hands on Capturing packets with Wireshark. Troubleshooting networks with Wireshark Common packet flows. Hands on Analysing a variety of problems with Wireshark. Capture filters Capture filter expressions, capture filter examples (host, port, network, protocol), primitives, combining primitives, payload matching. Hands on Configuring capture filters. Working with captured packets Live packet capture, saving to a file, capture file formats, reading capture files from other analysers, merging capture files, finding packets, going to a specific packet, display filters, display filter expressions. Hands on Saving captured data, configuring display filters. Analysis and statistics with Wireshark Enabling/disabling protocols, user specified decodes, following TCP streams, protocol statistics, conversation lists, endpoint lists, I/O graphs, protocol specific statistics. Hands on Using the analysis and statistics menus. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, idl2eth. Hands on Using tshark. Advanced issues 802.11 issues, management frames, monitor mode, packet reassembling, name resolution, customising Wireshark. Hands on Customising name resolution.
Management of Risk (M_o_R®) Practitioner: In-House Training The M_o_R® Practitioner course has been designed to provide learners with the opportunity to practice the practical application of the M_o_R method and covers the twelve M_o_R principles: Approach, Process and the basic techniques essential to managing risks using the M_o_R guidance. The purpose of the M_o_R Practitioner qualification is to confirm that the learner has achieved sufficient understanding of how to apply and tailor M_o_R in a scenario situation. What you will Learn At the end of the M_o_R Practitioner course, learners will gain competencies in: M_o_R framework (principles, approach based on risk documentation, process steps, and embedding and reviewing M_o_R principles Outline of M_o_R approach documents (including policy, process guide, and risk communications plan) Risk identification, assessment, and control Embedding and reviewing M_o_R M_o_R organizational perspectives (strategic, program, project, operational) Benefits The M_o_R Practitioner course offers a wide-ranging set of guidelines that will help in the management of risk in a project or program environment. It will help prepare learners for the M_o_R Practitioner Exam. They will feel more confident in approaching risk management after attending the course and will be aware of the use of different techniques that can assist in this task, including: Improved basis for effective strategy formation Reduced time spent fire-fighting and fewer unwelcome surprises Increased likelihood of successful change initiative outcomes Closer internal focus on doing the right things properly Increase in efficient use of resources waste and fraud Better management of contingency resources M_o_R roles and responsibilities M_o_R health check M_o_R maturity model Risk specialisms (including business continuity management) Introduction Introduction to the course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify - contexts Identify - the risks Assess - estimate Assess - evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Programme perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management
Management of Risk (M_o_R®) Foundation: In-House Training This M_o_R® Foundation course prepares learners to demonstrate knowledge and comprehension of the four elements of the M_o_R framework: Principles, Approach, Processes, Embedding and Reviewing and how these elements support corporate governance. The M_o_R Foundation Course is also a prerequisite for the M_o_R Practitioner qualification. What you will Learn At the end of the M_o_R Foundation course, participants will gain competencies in and be able to: Describe the key characteristics of risk and the benefits of risk management List the eight M_o_R Principles List and describe the use of the key M_o_R Approach documents Create Probability and Impact scales Define and distinguish between risks and issues Create a Risk Register Create a Stakeholder map Identify the key roles in risk management Use the key techniques and describe specialisms in risk management Undertake the M_o_R Foundation examination Introduction Introduction to the M_o_R course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify contexts Identify the risks Assess estimate Assess evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Program perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management