• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2702 Learning courses in Bristol delivered Live Online

Electronics Repair 2 Course

By Hi-Tech Training

Electronics Equipment Repair 2 (Online Virtual Classroom) is a follow on course to Electronics Equipment Repair 1. This course builds on the skills gained and enables participants to build, test and fault-find more complex Analogue Electronic circuits

Electronics Repair 2 Course
Delivered Online
£85 to £685

Change Management Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for CxO?s IT Managers/ Directors Senior Project Officers Project & Program Coordinator/Managers Operations Managers Quality Managers Business Analysts Engineering Managers IT Infrastructure Managers Internal Consultants Professional Consultants Overview Change and the individual Change and the organization Communication and stakeholder engagement Change practice Dealing with change and more importantly, the impact of change is a high priority for all organisations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ?body of knowledge? for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG?s refreshed Change Management certification is fully aligned with the change management body of knowledge. Prerequisites There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices. 1 - Change and the Organization Drivers for change Developing a vision Culture and climate Emergent change and lifecycle Organizational metaphors Models of change Roles required for change 2 - Stakeholders Principles Identification Analysis Influencing and listening Emotion and demonstration Communications Cognitive biases Remaining people focused Improving Communications Communications channels Collaboration Communications Planning Larger workshops 2 - Change Impact Assessing impact McKinsey 7 S Stakeholder impact assessment Assessing change readiness Large change ? how to staff Building a change team Preparing for resistance Building team effectiveness 4 - Individual Change Learning theory Motivation Change Curve Personality differences

Change Management Foundation
Delivered OnlineFlexible Dates
£2,000

CompTIA Cybersecurity Analyst (CySA+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of Reconnaissance Incidents Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of System Hacking Attacks Assess the Impact of Web-Based Attacks Assess the Impact of Malware Assess the Impact of Hijacking and Impersonation Attacks Assess the Impact of DoS Incidents Assess the Impact of Threats to Mobile Security Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES Assess Command and Control Techniques Assess Persistence Techniques Assess Lateral Movement and Pivoting Techniques Assess Data Exfiltration Techniques Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION Implement a Vulnerability Management Plan Assess Common Vulnerabilities Conduct Vulnerability Scans Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE Deploy a Security Intelligence Collection and Analysis Platform Collect Data from Network-Based Intelligence Sources Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA Use Common Tools to Analyze Logs Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS Analyze Incidents with Windows-Based Tools Analyze Incidents with Linux-Based Tools Analyze Malware Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS Deploy an Incident Handling and Response Architecture Mitigate Incidents Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS Apply a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES Remediate Identity and Access Management Issues Implement Security During the SDLC Additional course details: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cybersecurity Analyst (CySA+)
Delivered OnlineFlexible Dates
£2,475

Digital CCTV and Remote Access Course

By Hi-Tech Training

The Digital CCTV & Remote Access course is designed to give participants a practical knowledge of integrating Analogue and Digital technologies in addition to access and control from remote locations such as laptops, tablets and mobile phones.

Digital CCTV and Remote Access Course
Delivered Online
£85 to £685

Flow Assurance for Offshore Production

By EnergyEdge - Training for a Sustainable Energy Future

About this training course This 5-days comprehensive training not only an introduction into the issue associated with the development of oil and gas fields but also provides an in depth understanding of the issues to be considered in the development of these fields. The theme throughout this training course is Flow Assurance and Innovative Technologies. Each day consists of lectures in the morning and a hands-on workshop in the afternoon. The workshop allows the participants to appreciate the design process associated with field developments. Various software will be available during the workshop to predict Multiphase flows through wells, pipelines and risers, as well as evaluating reservoir production profiles using alternative technologies to develop reservoirs. Further software to assess Surge and environmental safety will also be available. The field design approach will consider an integrated solution through modelling the reservoir decline, wells, flowlines, risers and the host facility. The participants will have a total appreciation of the methodology required to develop offshore oil and gas fields and have an understanding of all of the Flow Assurance issues and technology requirements. Training Objectives After the completion of this training course, participants will be able to: Understand the process required and identify data to analyse Flow Assurance for oil and gas fields. Examine and Identify the Flow Assurance issues required to be evaluated for oil and gas fields design. These include; Wax, Hydrates, Slugging, Corrosion, Sand Erosion, Scaling and Surge. Establish the studies to be undertaken for each area of Flow Assurance including 'Rules of Thumb' and software to be used. Prioritize the need for innovative methods and the technologies to solve Flow Assurance issues and the need for economics considerations. Appreciate the need for an integrated analysis of the oil and fields from the reservoir to the host processing facility. Gain an appreciation of the emerging and enabling technologies for offshore fields application. Dive deeper into the operational strategies requirements to mitigate Flow Assurance issues. Target Audience This training course is suitable and will greatly benefit the following specific groups: Reservoir Engineers Flow Assurance Engineers Thermodynamics Engineers Process and Chemical Engineers Pipeline Engineers Facilities Engineers Control and Subsea Engineers working in the Oil and Gas industries Engineers in other disciplines may attend that require an appreciation of Flow Assurance Course Level Intermediate Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 5 days in total (35 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training Course delivery: This course is limited to a maximum of 20 participants only. A basic understanding of thermo-hydraulics would be advantageous. Morning Lectures and afternoon hands-on practical workshop. Special features: PC-based simulation software demonstration Workshop for hands-on training Course References & Additional resources: 'Flow Assurance for Oil and Gas Fields Production Transport', 1st Edition Handouts Pre & Post Assessment Trainer Your expert course leader is a renowned specialist in flow assurance management for the oil & gas field developments. His expertise enables him to support the operating and contracting companies as well as financial institutions regarding due diligence on offshore development investment decisions and associated operational system risks. Technical assessment of fields for acquisition and production enhancement opportunity. He possesses specialist expertise in evaluating difficult pipeline fluids transport such as Ethylene, Carbon Dioxide and Hydrogen through feasibility studies and technical reviews for clients. He has an exceptional academic background and natural leadership abilities are supported by practical experience of diverse projects worldwide, along with numerous publications at key conferences and publication of four books. Particular interests in developing novel and innovative technologies for subsea applications to solve difficult flow assurance problem areas and improve field development economics. He has worked on major industry projects including; Concorde aircraft fuelling system, the Channel Tunnel aerodynamics and the first deep water oil field development (Foinaven) in the West of Shetland. He is also currently developing a renewable energy solar farm and carbon neutral energy crop (Miscanthus) for domestic and commercial power generation application. He has developed in-house resources including specialist oil & gas field development evaluation software for subsea and onshore field infrastructure development options including; costing and financial analysis, reservoir viability, flow assurance assessment, subsea processing and boosting technologies, flow induced vibrations, surge analysis, heat transfer and chemical injection systems.

Flow Assurance for Offshore Production
Delivered in Internationally or OnlineFlexible Dates
£3,255 to £3,785

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered OnlineFlexible Dates
£2,975

Upstream Decarbonization: Strategies & Measures towards Lowering Emissions

By EnergyEdge - Training for a Sustainable Energy Future

About this training Decarbonization of the Upstream Oil & Gas sector has previously been based on inter-fuel competition. Market actions were seen as the most effective method for reducing the level of emissions. However, the pace of decarbonization is now being led by government policy acting in concert with a coalition of stakeholders such as investors and consumers. The primary focus of this pathway is on the management of carbon emissions to both mitigate and adapt to climate change. Some energy analysts have forecast that global production of oil and natural gas will have to decline annually by 4 to 6 percent in order to meet the global target of Net Zero Emissions by 2050. Oil and gas producers face a difficult challenge in deciding upon the strategy and measures that will best achieve targets set for them while maintaining supply, attracting investments and accessing markets. This 2-day training course will provide participants with an understanding of the strategies and measures for decarbonizing the Upstream Oil and Gas sector within the framework of measures implemented by individual governments through their respective commitments to reduce emissions to achieve their National Determined Contribution under the Paris Agreement. This course offers a unique opportunity to understand the rapidly increasing issues confronting the industry as well as the options for the management of carbon emissions to comply with corporate as well as national policies and the implementation of measures for controlling, reporting and verification. Training Objectives Upon completion of this course, participants will be better equipped to participate in the implementation of measures for the management of carbon emissions in the following areas: Implementation of measures for reducing carbon emissions Establishing systems for monitoring and reporting carbon emissions Evaluating the commerciality of discoveries Reviewing and strategizing future field development plans Meeting Environmental Obligations Target Audience This course has been specifically designed for professionals involved in the international oil and gas industry, whether employed a field operator, national oil company, or government. It offers a unique opportunity to rapidly increase your understanding of the issues confronting the industry as well as the options for the management of carbon emissions to comply with corporate as well as national policies and the implementation of measures for controlling, reporting and verification. Staff with the following roles will find this course particularly useful: Corporate Planners Project Engineers Financial Analysts Environmental Specialists Legal Advisors Regulatory & Compliance Officers Course Level Basic or Foundation Trainer Your expert course leader is an international legal expert in petroleum law who has been listed in the Guide to the World's Leading Energy and Natural Resources Lawyers. In his thirty years of practice, he has been the lead negotiator and acquisitions advisor for oil and gas companies in the US and the Asia-Pacific. These transactions have included both upstream (licences and leases) and downstream (refineries and pipelines) assets. He has been appointed as Distinguished Visiting Professor in Oil and Gas at the University of Wyoming and Honorary Professor at the Centre for Energy, Petroleum & Mineral Law & Policy (CEPMLP) at Dundee University. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Upstream Decarbonization: Strategies & Measures towards Lowering Emissions
Delivered in Internationally or OnlineFlexible Dates
£2,149 to £2,499

DevSecOps Foundation (DSOF)?

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevSecOps Foundation course are professionals including: Anyone involved or interested in learning about DevSecOps strategies and automation Anyone involved in Continuous Delivery toolchain architectures Compliance Team Business managers Delivery Staff DevOps Engineers IT Managers IT Security Professionals, Practitioners, and Managers Maintenance and support staff Managed Service Providers Project & Product Managers Quality Assurance Teams Release Managers Scrum Masters Site Reliability Engineers Software Engineers Testers Overview You will learn: The purpose, benefits, concepts, and vocabulary of DevSecOps How DevOps security practices differ from other security approaches Business-driven security strategies and Best Practices Understanding and applying data and security sciences Integrating corporate stakeholders into DevSecOps Practices Enhancing communication between Dev, Sec, and Ops teams How DevSecOps roles fit with a DevOps culture and organization In this course, students will gain a solid understanding of how DevSecOps provides business value, enhancing your business opportunities, and improving corporate value. The core DevSecOps principles taught can support an organizational transformation, increase productivity, reduce risk, and optimize resource usage. This course explains how DevOps security practices differ from other approaches then delivers the education needed to apply changes to your organization. Participants learn the purpose, benefits, concepts, vocabulary and applications of DevSecOps. Most importantly, students learn how DevSecOps roles fit with a DevOps culture and organization. At the course?s end, participants will understand ?security as code? to make security and compliance value consumable as a service. This course prepares you for the DevSecOps Foundation (DSOF) certification. Realizing DevSecOps Outcomes Origins of DevOps Evolution of DevSecOps CALMS The Three Ways Defining the Cyberthreat Landscape What is the Cyber Threat Landscape? What is the threat? What do we protect from? What do we protect, and why? How do I talk to security? Building a Responsive DevSecOps Model Demonstrate Model Technical, business and human outcomes What?s being measured? Gating and thresholding Integrating DevSecOps Stakeholders The DevSecOps State of Mind The DevSecOps Stakeholders What?s at stake for who? Participating in the DevSecOps model Establishing DevSecOps Best Practices Start where you are Integrating people, process and technology and governance DevSecOps operating model Communication practices and boundaries Focusing on outcomes Best Practices to get Started The Three Ways Identifying target states Value stream-centric thinking DevOps Pipelines and Continuous Compliance The goal of a DevOps pipeline Why continuous compliance is important Archetypes and reference architectures Coordinating DevOps Pipeline construction DevSecOps tool categories, types and examples Learning Using Outcomes Security Training Options Training as Policy Experiential Learning Cross-Skilling The DevSecOps Collective Body of Knowledge Preparing for the DevSecOps Foundation certification exam Additional course details: Nexus Humans DevSecOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevSecOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevSecOps Foundation (DSOF)?
Delivered OnlineFlexible Dates
£1,495

MENTAL HEALTH – UNDERSTANDING AND MEETING NEEDS

By Inclusive Solutions

In this course we explore Mental Health and address how such needs can be met in mainstream classrooms. Course Category Behaviour and Relationships Meeting Emotional Needs Description This is our lead workshop/training day on understanding mental health, behaviour and relationship work in schools other settings and is both a values primer and a practical guide to successful innovative strategies for improving behaviour and strengthening relationships for challenging children and young people of all ages. Not just another day on ‘Behaviour Management’ – Our Mental Health Day goes well beyond a rewards and sanctions approach to ‘behaviour’. We will be focused on those young people for whom rewards and punishments do not always work and who confuse the adults who work with them. We aim to take a relationships-based approach and to give those attending an opportunity to think more deeply about why young people do the things they do and what our part as adults is in creating, sustaining and changing these behaviours. The day gives those present opportunities to reflect on their attitudes and practice in relation to children’s behaviour and relationship building.   If your usual approaches to managing tackling mental health needs aren’t working with particular individuals then take a tour through this range of cutting edge strategies for bringing about positive behaviour change, and for meeting challenging emotional needs  Learning Objectives reinforce and affirm good practice re-energise, stimulate and challenge thinking about inclusion of challenging pupils and children increased understanding of mental health increased confidence in managing challenging pupils in mainstream schools access to a wider range of practical strategies to impact on behaviour problems opportunity to reflect on professional attitudes and behaviour towards mental health in families and pupils Who Is It For ?  Anyone concerned with understanding and meeting emotional and mental health needs  Course Content Circle of Courage – belonging-achievement-generosity – independence – model for understanding mental health Compass of Anxiety – understanding and going deeper Active listening – Listening to the person underneath the behaviour Involving other children and young people in solutions and interventions - Circles of friends: peer support, counselling and mediation Team Problem Solving – Solution Circles: a 30 minute group problem solving process to get Teams ‘unstuck’ and to generate positive first action steps Restorative justice and restitution: principles and practice of this approach to repairing harm and restoring relationships without reliance on punishment Understanding the effects of Separation, Loss, Trauma and Neglect on children’s learning and relationships in school and what adults can do to reach and support these children

MENTAL HEALTH – UNDERSTANDING AND MEETING NEEDS
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

ITIL 4 Leader: Digital and IT Strategy: In-House Training

By IIL Europe Ltd

ITIL® 4 Leader: Digital and IT Strategy: In-House Training The ITIL® 4 Leader: Digital and IT Strategy (DITS) is one of the two modules in the ITIL® 4 Strategic Leader (SL) certification scheme. The other module in the SL designation is the ITIL® 4 Strategist: Direct, Plan & Improve. Accredited training for the ITIL® 4 Strategic Leader modules is mandatory to enable full understanding of the core material. The ITIL ® 4 Digital and IT Strategy certification focuses on enabling business success through the creation of digital and IT strategies. The IT and Digital Strategy certification adds a new perspective to the ITIL suite and elevates the discussion around ITIL concepts to a strategic level among business leaders and aspiring leaders. The ITIL® 4 Digital and IT Strategy course is based on the ITIL® 4 Digital and IT Strategy exam specification from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, you will acquire relevant knowledge to pass the certification exam. The core learning material in the course is supported by interactive case study, discussions and activities. What You Will Learn The ITIL ® 4 Digital and IT Strategy course covers the content in relation to the following learning outcomes of the exam specification for ITIL ® 4 Digital and IT Strategy: Demonstrate the use of the ITIL guiding principles in Digital and IT Strategy decisions and activities Understand how to leverage digital strategy to react to digital disruption Understand the relationship between the concepts of Digital and IT Strategy, the service value system and the service value chain, and explain how to utilize them to create value Understand how an organization uses Digital and IT Strategy to remain viable in environments disrupted by digital technology Understand strategic approaches made possible by digital and information technology to achieve customer/market relevance and operational excellence Understand the risks and opportunities of Digital and IT Strategy Understand the steps and techniques involved in defining and advocating for a Digital and IT Strategy Understand how to implement a Digital and IT Strategy Key Concepts of Digital and IT Strategy Digital, Information, and Communication Technology Digital Transformation Services, Products, and Competitive Advantage Tiers of Strategy Business Models Operating Models Strategy and the Service Value System Opportunity and Demand Value Governance ITIL® Guiding Principles Continual Improvement ITIL® Practices What is Vision? Disruptions Vision Digital Disruptions Balanced Strategic Focus Positioning Tools for Digital Organizations Assignment 1: Digital Disruption and Digital Positioning Where Are We Now? Environmental Analysis Opportunity Analysis Digital Readiness Assessment How Do We Get There (Strategic Planning) Strategy Planning Financial Aspects of Digital and IT Strategy Business Models for Strategy Planning Portfolio Optimization How Do We Get There (Strategic Approaches) Strategic Approaches for Digital Organizations Strategic Approaches for Operational Excellence Strategic Approaches to Evolution Strategic Approaches to Social Responsibility and Sustainability Assignment 2: Strategic Approaches for Digital Organizations Take Action (Managing Strategic Initiatives) How Strategies are Implemented Coordinating Strategy and Strategic Initiatives Leading Digital Transformation Digital Leadership Assignment 3: Strategy Planning and Communication Did We Get There? (Measuring Strategy) Key Facts About Measurement Measuring a Strategy Instrumenting Strategy How Do We Keep the Momentum Going Long-Term Momentum: Ensuring Organizational Viability Short-Term Momentum: Parallel Operation Assignment: Digital Strategy in VUCA Environment Managing Innovation and Emerging Technologies Managing Innovation Formal Approach to Innovation Management Culture that Supports Innovation Approaches to Innovation Evaluating and Adopting Emerging Technology Managing Strategic Risk Risk Management Risk Identification Risk Posture Risk Treatment

ITIL 4 Leader: Digital and IT Strategy: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£2,495