• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

98 IT Manager courses

Diploma in Business Analysis - CPD Accredited

By Training Tale

Business Analysis: Diploma in Business Analysis Course Online Do you want to improve your knowledge of business analysis? If yes, you should enrol in this Business Analysis: Diploma in Business Analysis Course to master the skills necessary to become a skilled business analyst. This Business Analysis: Diploma in Business Analysis Course offers crucial modules that instruct students about their needs and succession in the workplace. Business Analysis teaches everything you need to know and advance to a higher level of professionalism. Moreover, Business Analysis courses boost your awareness and good organizing abilities. Business Analysis: Diploma in Business Analysis Course is essential for fostering professionalism and trust in the workplace. Enrol in our Business Analysis: Diploma in Business Analysis Course and build yourself a successful career as a business analyst. Special Offers of this Business Analysis: Diploma in Business Analysis Course This Business Analysis: Diploma in Business Analysis Course includes a FREE PDF Certificate. Lifetime access to this Business Analysis: Diploma in Business Analysis Course Instant access to this Business Analysis: Diploma in Business Analysis Course Get FREE Tutor Support from Monday to Friday in this Business Analysis: Business Analysis Course Courses are included in this Business Analysis: Diploma in Business Analysis Course Course 01: Level 5 Diploma in Business Analysis Course 02: Diploma in Risk Management Course 03: Level 3 Business Administration [ Note: Free PDF certificate will provide as soon as completing the Business Analysis: Diploma in Business Analysis course] Business Analysis: Diploma in Business Analysis Course Online Industry Experts Designed this Business Analysis: Business Analysis course into 12 detailed modules. Course Curriculum of Business Analysis: Business Analysis Course Module 01: What is a Business Analyst? Module 02: What Makes a Good Business Analyst? Module 03: Roles of the Business Analyst Module 04: The Business Analyst and the Solution Team Module 05: Define the Problem Module 06: Vision Phase Module 07: Process Phase - Gather The Information Module 08: Process Phase - Determine the Solution Module 09: Process Phase - Write the Solution Document Module 10: Production Phase - Producing the Product Module 11: Production Phase - Monitor the Product Module 12: Confirmation Stage Assessment Method of Diploma in Business Analysis Course After completing each module of the Business Analysis: Diploma in Business Analysis Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Diploma in Business Analysis Course After completing the MCQ/Assignment assessment for this Business Analysis: Diploma in Business Analysis course, you will be entitled to a Certificate of Completion from Training Tale. A printed version is also available upon request. It will also be sent to you through a courier for £13.99. Who is this course for? Business Analysis: Diploma in Business Analysis Course Online This Business Analysis: Diploma in Business Analysis Course is perfect for- Students Recent graduates Job Seekers Anyone interested in business analysis. People who are already employed in related fields and wish to improve their knowledge and abilities. Requirements Business Analysis: Diploma in Business Analysis Course Online Students who intend to enrol in this Business Analysis: Diploma in Business Analysis Course must meet the following requirements: Business Analysis: Good command of the English language Business Analysis: Must be vivacious and self-driven. Business Analysis: Basic computer knowledge Business Analysis: A minimum of 16 years of age is required. Career path Business Analysis: Diploma in Business Analysis Course Online After completing this Business Analysis: Diploma in Business Analysis Course, you can explore: Business Analysts Business Managers Project Managers IT Managers Certificates Certificate of completion Digital certificate - Included

Diploma in Business Analysis - CPD Accredited
Delivered Online On Demand30 hours
£12

Information Management Diploma

5.0(1)

By Empower UK Employment Training

Information Management Diploma Unlock the potential of effective data governance with our Information Management Diploma. This course is meticulously designed to equip you with the expertise needed in Information Management, focusing on IT Asset Management (ITAM), data security, compliance, and the legal landscape around data management, such as GDPR. Learning Outcomes: Master the essentials of ITAM Policies and delineate IT Management Responsibilities within the scope of Information Management. Understand the intricacies of setting up an effective ITAM Program as a pivotal part of your Information Management strategy. Be adept in IT Asset Procurement and Deployment, essential processes in Information Management. Gain comprehensive knowledge in IT Asset Security and Compliance, key components of Information Management. Become proficient in the Principles of GDPR, especially its implications on Information Management. Recognise the Rights of Data Subjects and learn how to safeguard them in your Information Management systems. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Key Modules from Information Management Diploma: ITAM Policies and IT Management Responsibilities in Information Management Learn the foundational policies that govern IT Asset Management and the responsibilities that IT managers bear in Information Management. Setting up an ITAM Program within Information Management Acquire the knowledge and tools required to initiate, plan, and manage an ITAM program, ensuring it complements your Information Management strategy effectively. IT Asset Procurement and Deployment in Information Management Delve into the processes that govern the acquisition and implementation of IT assets, understanding how these processes fit into Information Management. IT Asset Security and Compliance in Information Management Develop the acumen to secure IT assets effectively and understand the compliance parameters within the realm of Information Management. Principles of GDPR in Information Management Equip yourself with an in-depth understanding of GDPR principles and their critical importance to Information Management. Rights of Data Subjects in Information Management Comprehend the rights that data subjects possess under GDPR and learn how to implement mechanisms to protect these rights within your Information Management strategies.

Information Management Diploma
Delivered Online On Demand3 hours 48 minutes
£5

Python Django Training

4.7(160)

By Janets

Elevate your web development skills with our Python Django Training. Master the Django framework and unleash the power of Python for building robust, scalable, and feature-rich web applications. Join our comprehensive training program to gain hands-on experience, expert guidance, and propel your career in the world of web development. Start your journey today!

Python Django Training
Delivered Online On Demand11 hours
£25

IT Security Basics

By St. Paul's College

This IT Security Basics course provides a scientific approach to safeguarding information, delving into the core principles that protect our digital infrastructure. Equip yourself with the knowledge to defend against cyber threats and secure sensitive data.

IT Security Basics
Delivered Online On Demand2 hours
£11.99

Cloudera Essentials for Apache Hadoop

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The course is appropriate for IT managers, architects or anyone who wants to understand the big picture of what Apache Hadoop brings to the enterprise. All levels of technology knowledge are welcome. In this course, students unveil Apache Hadoop, giving themselves a thorough understanding of what the technology is and how it would impact their organizations. In this course, students unveil Apache Hadoop, giving themselves a thorough understanding of what the technology is and how it would impact their organizations.

Cloudera Essentials for Apache Hadoop
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Cloud Computing

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for business and IT managers who may need to consider or work within a cloud computing environment. Overview Upon successful completion of this course, students will be able to: - identify the pros and cons of the cloud computing technology and determine its impact on businesses.- differentiate the currently-available cloud services.- differentiate cloud categories and adoption measures.- identify risks involved and risk mitigation measures in cloud computing. In this course, students will define cloud computing technology and describe its impact on IT scenario. Introducing Cloud Computing Impact of the Cloud on Businesses Cloud Computing?An Overview Cloud Components Differentiating Cloud Services Infrastructure as a Service (IaaS)?An Overview Platform as a Service (PaaS)?An Overview Software as a Service (SaaS)?An Overview Integrating Cloud Services Categories of Cloud Deployment Models Migration to the Cloud Identifying Risks and Risk Mitigation Measures Cloud Computing Risks Cloud Computing Risk Mitigation Measures Additional course details: Nexus Humans Introduction to Cloud Computing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Cloud Computing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Cloud Computing
Delivered OnlineFlexible Dates
Price on Enquiry

Continuous Testing Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Test Engineering course is anyone involved in defining a DevOps Testing strategy, such as: Delivery Staff DevOps Engineers IT Managers Project Managers Lab Staff Maintenance and Support Staff Quality Assurance Managers Quality Assurance Teams Release Managers Testers Software Engineers Overview The learning objectives for DTE include a practical understanding of: The purpose, benefits, concepts and vocabulary of DevOps testing How DevOps testing differs from other types of testing DevOps testing strategies, test management and results analysis Strategies for selecting test tools and implementing test automation Integration of DevOps testing into Continuous Integration and Continuous Delivery workflows How DevOps testers fit with a DevOps culture, organization and roles This comprehensive course addresses testing in a DevOps environment and covers concepts such as the active use of test automation, testing earlier in the development cycle, and instilling testing skills in developers, quality assurance, security, and operational teams. The course is relevant for every modern IT professional involved in defining or deploying a DevOps testing strategy for their organization, as test engineering is the backbone of DevOps and the primary key for successful DevOps pipeline to support digital transformation. This course prepares you for the Continuous Testing Foundation(CTF) certification. Course Objectives and Modules, Logistics What is DevOps Testing and its Business Benefits?Relation of DevOps Testing in other Test MethodologiesDevOps Testing Best Practices DevOps Testing Terminology Culture changes Organization changes Process and team friction Motivation strategies Measuring Success Continuous Evolution Troubleshooting What is the DevOps pipeline? DevOps Testing on the pipeline Test strategy choices Pre-Flight strategies Continuous Integration Testing System, Delivery and Customer Testing Test Environments Lab Management Topology orchestration Test Automation Frameworks Test Tools Selection criterion Automated metrics Key concepts Test Case Best Practices & Design Exercise Test Suite Best Practices & Design Exercise Principles of DevOps Management DevOps Test Management Metrics DevOps Management Tools DevOps Test Results Analysis Integrating DevOps Results Analysis Test Management Exercise Fictitious Product Test Requirements Individual Exercise Class discussion Exam Preparation

Continuous Testing Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

C)SLO-Certified Security Leadership Officer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)SLO-Certified Security Leadership Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
Price on Enquiry

Getting Started with Google Kubernetes Engine

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Application developers, Cloud Solutions Architects, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview At the end of the course, students will be able to: Understand container basics. Containerize an existing application. Understand Kubernetes concepts and principles. Deploy applications to Kubernetes using the CLI. Set up a continuous delivery pipeline using Jenkins Learn to containerize workloads in Docker containers, deploy them to Kubernetes clusters provided by Google Kubernetes Engine, and scale those workloads to handle increased traffic. Students will also learn how to continuously deploy new code in a Kubernetes cluster to provide application updates. Introduction to Containers and Docker Acquaint yourself with containers, Docker, and the Google Container Registry. Create a container. Package a container using Docker. Store a container image in Google Container Registry. Launch a Docker container. Kubernetes Basics Deploy an application with microservices in a Kubernetes cluster. Provision a complete Kubernetes cluster using Kubernetes Engine. Deploy and manage Docker containers using kubectl. Break an application into microservices using Kubernetes? Deployments and Services. Deploying to Kubernetes Create and manage Kubernetes deployments. Create a Kubernetes deployment. Trigger, pause, resume, and rollback updates. Understand and build canary deployments. Continuous Deployment with Jenkins Build a continuous delivery pipeline. Provision Jenkins in your Kubernetes cluster. Create a Jenkins pipeline. Implement a canary deployment using Jenkins. Additional course details: Nexus Humans Getting Started with Google Kubernetes Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Getting Started with Google Kubernetes Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Getting Started with Google Kubernetes Engine
Delivered OnlineFlexible Dates
Price on Enquiry