CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.
About this Training Course This 5 full-day course provides detailed description of all combustion equipment and systems used in pulverized coal boilers and circulating fluidized bed (CFB) boilers including pulverized coal burning systems, coal feeder, pulverizer and classifier, pulverized coal burners, furnace and fans. This course provides also a comprehensive explanation of all boiler combustion control systems including pulverizer control system, combustion control, control of coal and air flow into the boiler, furnace pressure control, oxygen trim control, nitrogen oxides (NOx) and sulfur oxides (SOx) control, control of ammonia injection, flue gas dew point control, purge control, flame monitoring and tripping system as well as their tuning methods. All boiler control systems are covered as well in this course including drum level feedwater control, main steam and reheat steam temperature control, boiler limits and runback, sliding or variable pressure control, heat rate optimization with sliding pressure control, boiler-turbine coordinated control, etc. The course provides also detailed explanation of Boiler NFPA 85 Code (Boiler and Combustion Systems Hazards Codes) and American National Standard Institute/Instrument Society of America Code (ANSI/ISA-77-44-01-2007 Code). The burner management systems (BMS) and examples of boiler permissive starting logic and protective tripping logic will be explained thoroughly. The various methods used to calculate the boiler efficiency are covered in detail in this course including the direct and indirect methods. All the factors which affect the efficiency and emissions of pulverized coal boiler and CFB boiler will be explained thoroughly. The course covers also all the methods used to improve the efficiency of pulverized coal boilers and CFB boilers including improvement to their combustion efficiency and control systems performance. Training Objectives Boiler Combustion Equipment and Systems: Gain an in-depth understanding of all boiler combustion equipment and systems including pulverized coal burning systems, coal feeder, pulverizer and classifier, pulverized coal burners, furnace and fans Boiler Combustion Control Systems: Gain a thorough understanding of all boiler combustion control systems for pulverized coal boilers, and CFB boilers including pulverizer control system, combustion control, control of coal and air flow into the boiler, furnace pressure control, oxygen trim control, nitrogen oxides (NOx) and sulfur oxides (SOx) control, control of ammonia injection, flue gas dew point control, purge control, flame monitoring and tripping system Boiler Conventional Control Systems: Gain an in-depth understanding of all boiler conventional control systems including drum level feedwater control, main steam and reheat steam temperature control, boiler limits and runback, sliding or variable pressure control, heat rate optimization with sliding pressure control, and boiler-turbine coordinated control Boiler NFPA 85 Code (Boiler and Combustion Systems Hazards Codes) and American National Standard Institute/Instrument Society of America Code (ANSI/ISA-77-44-01-2007 Code): Learn about NFPA 85 code and ANSI/ISA-77-44-01-2007 code Burner Management System and Boiler Permissive Starting Logic and Protective Tripping Logic: Gain an in-depth understanding of burner management system and boiler permissive starting logic and protective tripping logic Boiler Efficiency Calculations: Learn how to calculate the boiler efficiency using the direct and indirect methods Factors Affecting the Efficiency and Emissions of Boilers: Understand all the factors which affect the boiler efficiency and emissions Methods Used to Improve the Efficiency of Boilers: Learn about all the methods used to improve the efficiency of pulverized coal boilers, and CFB boilers including improvement to their combustion efficiency and control systems performance Boiler Instrument and Piping Diagrams: Gain an in-depth understanding of all boiler instrument and piping diagrams CFB and Pulverized Coal Boilers Equipment and Systems: Learn about various types of equipment and systems used in CFB and pulverized coal boilers including economizers, steam drum, superheaters, air preheaters, ammonia injection systems, etc. Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: Excerpt of the relevant chapters from the 'POWER GENERATION HANDBOOK' second edition published by McGraw-Hill in 2012 (800 pages) Excerpt of the relevant chapters from the 'POWER PLANT EQUIPMENT OPERATION AND MAINTENANCE GUIDE' published by McGraw-Hill in 2012 (800 pages) COMBUSTION ENGINEERING FOR COAL FIRED POWER PLANTS MANUAL (includes practical information about combustion engineering for coal fired power plants - 550 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.
In this training course, you will learn about the various aspects of a CMS, including the compliance policy, compliance culture, compliance risk assessment, operational controls, performance measurements, leadership and commitment, internal audit, management review, and continual improvement. After completing the training course, you can sit for the exam. If you successfully pass the exam, you can gain the 'Certified ISO 37301 Foundation' credential. By gaining this Credential, you can demonstrate that you have the necessary professional capabilities to be part of an ISO 37301 CMS implementation project About This Course By participating in this training course, you will: Understand the basic compliance management concepts, definitions, and approaches Get acquainted with the ISO 37301 requirements for a compliance management system Develop a general understanding of how an organization can meet the requirements of ISO 37301 Course Agenda Day 1: Introduction to compliance concepts, CMS, and clauses 4-6 of ISO 37301 Day 2: Clauses 7-10 of ISO 37301 and certification exam Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 40 question, multiple choice type exam on Day 2 of the course. The overall passing score is 70%, to be achieved within the 60 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. What's Included? Certification fees are included in the exam price. Training material containing over 200 pages of information and practical examples will be given to each participant. An attestation of course completion worth 14 CPD (Continuing Professional Development) credits will be issued to participants who have attended the training course. In case participant(s) fail to pass the exam, they can retake the exam once for free within 12 months of the initial exam date. Prerequisites There are no prerequisites to participate in this training course. Accreditation Provided by This course is Accredited by NACS and Administered by the IECB.
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Individuals responsible for maintaining and improving the workplace safety, Occupational health and safety officers, consultants, and advisors, Professionals wishing to acquaint themselves with PECB's IMS2 Methodology for implementing an OH&S MS, Individuals responsible for maintaining the conformity of OH&S MS to ISO 45001 requirements, Members of OH&S teams, Individuals aspiring to pursue a career as OH&S MS implementers, consultants, or officers Overview Explain the fundamental concepts and principles of an occupational health and safety management system (OH&S MS) based on ISO 45001 Interpret the ISO 45001 requirements for an OH&S MS from the perspective of an implementer Initiate and plan the implementation of an OH&S MS based on ISO 45001, by utilizing PECB's IMS2 Methodology and other best practices Support an organization in operating, maintaining, and continually improving an OH&S MS based on ISO 45001 Prepare an organization to undergo a third-party certification audit This course is designed to equip you with the competence to establish, implement, manage, and maintain an occupational health and safety management system (OH&S MS) in accordance with ISO 45001:2018 requirements and guidance. This training course aims to provide an in-depth understanding of ISO 45001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of an OH&S MS. The ultimate ambition of this training course is to enable you to create the conditions for a safer workplace. Introduction to ISO 45001 and initiation of an OH&S MS implementation Training course objectives and structure Standards and regulatory frameworks Fundamental concepts and principles of OH&S Initiation of the OH&S MS implementation The organization and its context Implementation plan of an OH&S MS Leadership and worker participation OH&S MS scope OH&S policy and objectives Hazard identification and assessment of risks and opportunities Implementation of an OH&S MS Resource management Awareness and communication Documented information management Operations management Emergency preparedness and response OH&S MS performance evaluation, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit Management review Treatment of nonconformities and incidents Continual improvement Preparation for the certification audit Closing of the training course
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
RESILIA™ Foundation: Virtual In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
In this training course, you will be acquainted with the various aspects of a QMS based on ISO 9001, such as the role of top management, risks and opportunities, quality policy, processes that shape product and service provision activities, requirements for performance evaluation, and the importance of continual improvement. After completing this course, you can sit for the exam and gain the "Certified ISO 9001 Foundation" credential. In holding this credential, you demonstrate that you have a general knowledge of ISO 9001 requirements for a QMS and enables you to be part of QMS implementation projects. About This Course Learning objectives Upon successful completion of this training course, the participants will be able to: Describe the quality management concepts, principles, and definitions Explain the main ISO 9001 requirements for a quality management system Identify potential actions and approaches that organizations can use to achieve conformity to ISO 9001 Educational approach The training course is participant centered and contains: Lecture sessions are illustrated with graphics, examples, and discussions Interactions between participants by means of questions and suggestions Quizzes with similar structure to the exam Accreditation Prerequisites There are no prerequisites to participate in this training course. What's Included? Certificate and examination fees are included in the price of the training course. Over 200 pages of instructional materials containing explanations, guidance, and practical examples. An attestation of course completion worth 14 CPD (Continuing Professional Development) credits will be issued. In case of exam failure, you can retake the exam within 12 months for free. Who Should Attend? The ISO 9001 Foundations training course is intended for: Managers and consultants seeking knowledge about the basic concepts of quality management Professionals wishing to get acquainted with ISO 9001 requirements for a QMS Personnel responsible for maintaining and improving the quality of products and services of their organization Individuals wishing to pursue a career in quality management Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 40 question, multiple choice type exam on Day 2 of the course. The overall passing score is 70%, to be achieved within the 60 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Provided by This course is Accredited by NACS and Administered by the IECB
Online Asset Management Diploma course. Sit the IAM Diploma anywhere in the world
Data dashboards provide key information to stakeholders so that they can make informed decisions. While there are plenty of software solutions for building these essential data products, there is much less guidance on how to design dashboards to meet the diverse needs of users. This course is for anyone who is building or implementing dashboards, and wants to know more about design principles and best practice. You could be using business intelligence software (such as Power BI or Tableau), or implementing bespoke solutions. The course will give your team the ability to evaluate user needs and levels of understanding, make informed decisions about chart selections, and make effective use of interactivity dynamic data. We’ll work with you before the course to ensure that we understand your organisation and what you’re hoping to achieve. Sample learning content Session 1: Data with a purpose Understanding the different types of dashboard. Information overload and other common dashboard pitfalls. Assessing user needs and levels of data fluency. Session 2: Planning a dashboard Assessing diverse user needs and levels of data fluency. Taking a User Experience (UX) approach to design and navigation. Applying an interative and collaborative approach to onboarding. Session 3: Graphs, charts and dials Understanding how graphical perception informs chart choices. Making intelligent design choices to help users explore. Design principles for layout and navigation. Session 4: Using interactivity Making effective use of filters to slice and dice data sets. Using layers of information to enable drilldown data exploration. Complenting dashboards with automated alerts and queries. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people. Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets. Testimonial “Alan was great to work with, he took us through the concepts behind data visualisation which means our team is now equipped for the future. He has a wide range of experience across the topic that is delivered in a clear, concise and friendly manner. We look forward to working with Alan again in the future.” John Masterson | Chief Product Officer | ImproveWell