Introduction to Agile for Executives: In-House Training This session provides executives with an overview of Agile values and principles, the key benefits of an Agile approach, and its differences with the traditional Waterfall method. During the session, we compare and contrast the major Agile methods, with an emphasis on Scrum, as the most popular in the market. And most importantly, we present some criteria for Agile Transformation, possible certifications to pursue, and what is needed at the senior leadership level to achieve the best business results. What you will Learn At the end of this program, you will be able to: Explain the basics and benefits of using an Agile approach Describe the Scrum framework, its events, artifacts, and roles and responsibilities Illustrate an Agile approach outside of Software Development Define Scaled Agile Determine how to support an Agile transformation for your organization Getting Started Introduction Course structure Course goals and objectives Agile Introduction What is Agile? Agile benefits Agile myths and realities Overview of Agile Methods Overview of Agile methods Scrum method Lean and Kanban methods Criteria and certifications What Executives Need to Know About Agile Agile is not just for IT Agile can be scaled Agile transformation needs your support Summary and Next Steps Review Personal Action Plan
Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.
Internet of Things training course description A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. What will you learn Describe the structure of the IoT List the technologies involved in IoT. Explain how IoT works. Internet of Things training course details Who will benefit: Non-technical staff working with IoT. Prerequisites: None. Duration 1 day Internet of Things training course contents What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak Security in IoT Authentication, Encryption, secure booting, firewalls.
WiFi demystified training course description A concise overview aimed at less technical staff requiring an overview of WiFi networks. The course covers the technologies at a high level allowing delegates to discuss WiFi networks with others recognising the buzzwords used. The course will also allow the delegates to recognise the issues involved in planning and installing WiFi networks as well as securing them. What will you learn Recognise the different WiFi technologies available. Describe the architecture of WiFi networks including the role of Access Points. Recognise the distance limitations of WiFi networks. Describe the buzzwords used in WiFi. Recognise the security issues of WiFi networks. WiFi demystified training course details Who will benefit: Anyone working with WiFi networks. Prerequisites: None. Duration 1 day WiFi demystified training course contents Introduction When to use wireless, when to use wired, WiFi technologies: 802.11, 802.11a, 802.11b, 802.11g, 802.11n, WiFi speeds and distances, comparison to other wireless technologies, 802.15 (Bluetooth), 802.16 (WiMax). Simple WiFi networks Network cards, Antennae, Access Points, WiFi routers. Enterprise WiFi networks SSIDs, Multiple WiFi networks, Repeaters, Wireless bridges, Controller based access points, Wireless switches, Power Over Ethernet. RF site surveys Steps and techniques, tools, analysing the feasibility of WiFi, range, performance, roaming. Security How safe are WiFi networks? Encryption, Authentication, WEP WPA WPA2. 802.1x, EAP, RADIUS.
NTP and PTP training course description This course looks at timing and synchronization as provided by NTP and PTP. Hands on sessions primarily involve using Wireshark to analyse the protocols. What will you learn Recognise the importance of timing and synchronisation. Explain how NTP works. Explain how PTP works. NTP and PTP training course details Who will benefit: Anyone using NTP or PTP but particularly relevant for those in the broadcast industry. Prerequisites: TCP/IP foundation for engineers Duration 1 day NTP and PTP training course contents Introduction Clock drift. Timing and synchronization. Importance in computing. Importance in broadcasting. NTP NTP versions, v0 to v4. Architecture. The intersection algorithm. Accuracy. Clock strata, Stratum 0, 1, 2 and 3. Protocol modes. Hands on NTP configuration More NTP NTP packet header. Timestamps. Variables in the header. Clock synchronization algorithm. SNTP. The Windows Time service. Hands on Wireshark and NTP analysis. PTP PTP v2, IEEE 1588. Architecture. Accuracy. Synchronization with PTP. Offset and delay. Hands on Analysing PTP packet flows. More PTP Ordinary clocks, boundary clocks, masters and grandmasters. PTP specific switch types. Hardware time stamping. SMPTE ST2059-2. PTP packet header. PTP domains. Best master clock algorithm. Hands on More Wireshark and PTP.
If you have at least 5 years working experience and you would like to attain Gold Card status via the Experienced Worker route by joining the City & Guilds 2346 NVQ Level 3, you will also need to hold the below two pre-requisite qualifications: City & Guilds 2391-52 Inspection and Testing Course C&G 2382-22 BS7671 18th Edition
Talk through problems in the marriage Advice on steps to take moving forward Person-centred and psychodynamic counselling Relationship skills training Objective communication training Marriage training Education on the four pillars of marriage 8 sessions https://relationshipsmdd.com/product/dating-advice-for-women-having-problems-with-their-husbands-package/
The NVQ Level 3 is designed to provide both new entrants and those seeking progression in their career, with the opportunity to develop the necessary skills to carry out job roles and responsibilities associated with the installation and maintenance of Electrotechnical systems. The EWR is for electricians who have been working in the industry for at least 5 years but have not formally completed an industry apprenticeship or Level 3 NVQ qualification. Successful completion of the NVQ and AM2 assessment will satisfy the entry criteria for JIB accredited Gold Card status. Bear in mind that the C&G 2391-50 and 18th Edition courses are pre-requisites to the Experienced Worker route. In case you don’t hold them, we can help you with a Pre-Experienced Worker Route package.
First Aid Trainer - Level 3 Emergency First Aid at Work Courses - delivered at your place of work
Overview This course sets out to develop attendee’s skills in understanding their own body language as well as being able to read the body language of others. If we can learn to identify and appreciate non-verbal clues, we can begin to improve our communication as a whole. This use of body language skills could impact situations such as; sales visits, interviews, presentations and normal day-to-day interactions where body language plays a part. Description Effective communication skills are critical in the development of relationships between people and although verbal communication plays a large part in this, studies have shown that a proportionate amount of our message comes from not what we say, but very often the non-verbal communication behind the message. Therefore, it is clear that body language is an important, influential aspect of communication and understanding how it works is essential in the development of your personal communication skills. Topics covered: Core Principles and the Five C’s – Exploring the subconscious effects of body language and setting the scene by ensuring participants appreciate the rules to interpreting body language. Reading Body Language – Gestures – An activity that helps participants realise the power of body language and how important it is to communication. Arm Barriers – Understanding the different arm barrier gestures and crossed arm positions and what each means. Palm and Handshake Gestures – Discussing the different handshakes and palm actions, what they mean and how they are applied in real life. Includes activities that test the theory. Hand and Thumb Gestures – A review of these different gestures and what they mean. Hand to Face Gestures…or… How to Spot a Liar! – An exploration of different gestures that involve the hand moving to the face. Identifying how to spot body language that signifies lying and what to watch out for. Chin and Cheek Gestures – An activity that helps participants understand the different chin and cheek gestures and how to interpret this body language. Eye Signals – A review of pupil dilation, directed gazes and eye accessing cues in order to fully understand how eyes provide body language clues. Matching & Mirroring – Looking at the technique of building rapport and developing relationships through careful observation of body language. Bringing it all Together – An activity that allows participants to embed their learning and realise how much they now understand and appreciate body language and its effect on communication. Who should attend Anyone who wants to gain a better understanding of their own body language, and that of others. Requirements for Attendees None.