Duration 1 Days 6 CPD hours This course is intended for Those who need to understand the financial implications of their day-to-day decisions to increase the profitability and performance of their business. This course is suitable for managers with little or no financial knowledge. Overview Understanding of financial accounts and reports The ability to use and understanding of financial concepts Analytical skills to interpret financial results using ratios This course shows how to interpret key financial statements highlighting the questions and areas that matter. It identifies warning signals that managers need to be aware of and shows how to understand key performance indicators to drive profitability. Course Outline The Business Cycle: understand how money flows in a business Business objectives: use financial data to achieve business targets The income statement, the cash flow statement and the balance sheet Accrual and cash accounting Operational & Financial Gearing Profit vs Cash and other key financial ratios, how to use them effectively Working capital management Cash flow management EBIT, EBITDA, Free & Operating Cash Flow & other measures of profit / cash Understanding Return on Investment & asset valuations Additional course details: Nexus Humans Finance for Non Finance Managers (1 Day) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Finance for Non Finance Managers (1 Day) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
In this live webinar workshop with Marilyn Allis, you will learn how to create a beautiful scene from a Dorset farm using watercolour and mixed-media techniques. In this class, you will focus on bringing farm animals to life when tackling the subject of dairy cows. Don't worry if you're a beginner, Marilyn will guide you through using a combination of mixed-media, including collage and watercolour, to achieve an impressive painting. You'll explore new techniques and approaches in a supportive environment, allowing you to experiment without feeling overwhelmed. - You'll discover how to incorporate subliminal references subtly into your artwork - Marilyn will provide tips and advice suitable for artists of all levels - Learn how to create loose impressionistic paintings without overthinking Throughout the class, you will work with paper for a subliminal underlying story or as a different type of canvas. Using metallic mediums and some ink. This hands-on experience may inspire you to see your subject matter in a new light and develop your skills further. Join Marilyn Allis in this transformative workshop, where you'll learn, create, and explore your artistic abilities in an engaging and encouraging setting.
Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of managing requirements (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Requirements Engineering principles and techniques. Key areas are: Requirements Engineering framework The hierarchy of requirements Key stakeholders in the framework Requirements elicitation Requirements modelling Requirements documentation Requirements analysis Requirements validation Requirements management The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The practical course provides in-depth knowledge and practice in Requirements Engineering. Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Structure and Benefits of Business Analysis Foundation Exam Details Business Analysis Certification Scheme What is Business Analysis? Intent and Context Origins of business analysis The development of business analysis The scope of business analysis work Taking a holistic approach The role and responsibilities of the business analyst The competencies of a Business Analyst Personal qualities Business knowledge Professional techniques The development of competencies Strategy Analysis The context for strategy The definition of strategy Strategy development External environmental analysis Internal environmental analysis SWOT analysis Executing strategy Business Analysis Process Model An approach to problem solving Stages of the business analysis process model Objectives of the process model stages Procedures for each process model stage Techniques used within each process model stage Investigation Techniques Interviews Observation Workshops Scenarios Prototyping Quantitative approaches Documenting the current situation Stakeholder Analysis and Management Stakeholder categories and identification Analysing stakeholders Stakeholder management strategies Managing stakeholders Understanding stakeholder perspectives Business activity models Modelling Business Processes Organizational context An altrnative view of an organization The organizational view of business processes Value propositions Process models Analysing the as-is process model Improving business processes (to-be business process) Defining the Solution Gab analysis Introduction to Business Architecture Definition to Business Architecture Business Architecture techniques Business and Financial Case The business case in the project lifecycle Identifying options Assessing project feasibility Structure of a business case Investment appraisal Establishing the Requirements A framework for requirements engineering Actors in requirements engineering Requirements elicitation Requirements analysis Requirements validation Documenting and Managing the Requirements The requirements document The requirements catalogue Managing requirements Modelling the Requirements Modelling system functions Modelling system data Delivering the Requirements Delivering the solution Context Lifecycles Delivering the Business Solution BA role in the business change lifecycle Design stage Implementation stage Realization stage Additional course details: Nexus Humans Business Analysis - Requirements Engineering training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Requirements Engineering course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
SAP Training: Overview What is SAP? SAP is one of the largest ERP(Enterprise Resource Planning) software in the world. It provides end to end solution for Financials, Manufacturing, Logistics, Distributions etc. SAP applications, built around their latest R/3 system, provide the capability to manage financial, asset, and cost accounting, production operations and materials, personnel, plants, and archived documents. The R/3 system runs on a number of platforms including Windows and MAC and uses the client/server model. SAP Business Cases/ Live Project Our SAP training courses are designed in a way which gives the students maximum exposure of real-life scenario through no of business cases and guidance on implementation by professional SAP Consultants. You receive a certificate once you finish the course from Osborne Training. SAP Certification During the training, you get access to Sap sandbox which continues even after training finishes until the completion of the Internship. You can also do an external exam to receive certification from SAP (Optional), for details on exam booking you may visit the SAP website. SAP Training Modules Available Financial & Controlling (FICO) High-Performance Analytic Appliance (HANA) Supply Relationship Management (SRM) Customer Relationship Management (CRM)
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
Public Healthcare Course Overview This course provides a comprehensive introduction to public healthcare, offering learners a deeper understanding of the policies, concepts, and challenges involved in providing healthcare services to the public. It explores key aspects of public health, including health promotion, the role of religion, and the foundational quality features of health coverage. By the end of the course, learners will be equipped with a strong theoretical foundation in public healthcare and its practical application. With a focus on global healthcare systems, this course prepares learners for roles in healthcare management, policy development, and public health advocacy. Course Description In this course, learners will delve into the core concepts of public healthcare, covering a broad spectrum of topics such as health policies, the definition of health, and the intersection of religion and healthcare. The course offers a detailed exploration of health promotion, public health concepts, and the quality features essential to effective healthcare coverage. Learners will gain insights into the barriers that hinder healthcare delivery and the strategies to overcome them. This learning experience will help learners develop a thorough understanding of the systems, challenges, and opportunities within public healthcare, equipping them with the knowledge to engage effectively in healthcare discussions, policy making, and strategic planning. Public Healthcare Curriculum Module 01: Definitions and Healthcare Policies Module 02: Concepts of Health Module 03: Religion and Health Module 04: Understanding the Role of Health Promotion Module 05: Concept of Public Health Module 06: Fundamental Quality Features of Health Coverage Module 07: Practical Barriers to Provision of Healthcare (See full curriculum) Who is this course for? Individuals seeking to understand public healthcare systems. Professionals aiming to enhance their career in healthcare policy, management, or advocacy. Beginners with an interest in healthcare and public health. Anyone seeking to contribute to the improvement of health services. Career Path Healthcare policy analyst Public health advisor Healthcare management professional Health promotion officer Public health researcher Policy maker in healthcare organisations
Hospitality - Concierge Course Overview: This comprehensive course on Concierge Services equips learners with the essential skills and knowledge required to excel in the hospitality industry. Covering a range of concierge services, from customer care to handling emergency situations, it offers valuable insights into the role of a concierge within various service sectors. Learners will gain a thorough understanding of the necessary skills and principles to provide high-quality service, helping them build a solid foundation for a career in hospitality. By the end of the course, learners will have developed the competencies needed to operate efficiently and professionally within the dynamic environment of hotel and hospitality services. Course Description: The "Hospitality - Concierge" course provides a thorough exploration of the concierge service industry. It covers essential topics, including the various types of services offered by concierges, the required skills for success, and key principles for running a concierge service business. Learners will gain a deep understanding of customer service and the etiquettes required in a professional concierge environment. The course also prepares learners for managing emergency situations in the hospitality industry, ensuring they are well-equipped to handle any challenges that may arise. By completing this course, learners will be prepared for roles in customer service, hotel management, and other areas within hospitality, ensuring a high standard of service in their future careers. Hospitality - Concierge Curriculum: Module 01: Understanding the Service Module 02: Types of Concierge Services Module 03: Necessary Skills for Any Concierge Module 04: Principles for a Concierge Service Business Module 05: Delivering Customer Service Module 06: Concierge Work Environment and Etiquettes Module 07: Emergency Measures for a Hotel Concierge (See full curriculum) Who is this course for? Individuals seeking to start a career in hospitality. Professionals aiming to develop customer service and management skills. Beginners with an interest in concierge services or hotel management. Anyone looking to enhance their understanding of the hospitality sector. Career Path: Hotel Concierge Hospitality Customer Service Representative Front Desk Supervisor Concierge Manager Event Coordinator Travel and Tourism Industry Professional
Nanny Care Worker Course Overview The "Nanny Care Worker" course provides learners with essential knowledge and skills to thrive in a career as a nanny. It covers a range of key areas, including child development, child safety, healthy living, and effective time management. By focusing on practical, professional caregiving skills, the course ensures that learners are prepared to provide exceptional care for children. On completion, learners will be equipped to manage daily routines, foster relationships with children, and create a safe and nurturing environment. The course also offers valuable insights into career progression within the nanny industry. Course Description This course is designed to give learners a comprehensive understanding of the core responsibilities of a nanny care worker. Topics include child development, ensuring children’s safety and health, creating structured routines, and understanding early years provision. The course explores the critical role of nutrition and healthy living in a child's upbringing, alongside essential time management skills for nannies. Learners will gain insight into the role and profile of a nanny and how to establish a successful career in this field. By the end of the course, learners will possess the skills necessary to provide high-quality care and support in a professional childcare environment. Nanny Care Worker Curriculum Module 1: Introduction to Nanny Care Workers Module 2: Understanding Child Development Module 3: Care for Children Module 4: Healthy Food, Healthy Living Module 5: Keeping Children Healthy & Safe Module 6: Early Years Provision Module 7: Establishing Relationships and Routines Module 8: Time Management for Nannies Module 9: Nanny’s Job Profile Module 10: Establishing a Nanny’s Career (See full curriculum) Who is this course for? Individuals seeking to become professional nanny care workers. Professionals aiming to expand their childcare expertise. Beginners with an interest in working with children. Those looking to enter the nanny or childcare industry. Career Path Nanny Childcare Assistant Early Years Practitioner Family Support Worker Child Development Specialist Child Protection Officer
Learn to Level Up Your Leadership Course Overview "Learn to Level Up Your Leadership" is designed for individuals who want to enhance their leadership capabilities and navigate the challenges of leading teams. This course delves into essential leadership concepts such as decision-making, communication, and team management. Learners will gain a solid understanding of leadership styles, conflict resolution, and how to motivate and inspire their teams. By the end of the course, learners will be equipped to lead more effectively, build trust, and foster a positive team environment, which are essential skills in today's dynamic business world. Course Description This course covers a comprehensive range of leadership topics, offering insights into modern leadership techniques and strategies. Learners will explore various leadership styles, learn the importance of emotional intelligence in leadership, and understand the core principles of team dynamics. They will also be introduced to conflict management strategies, decision-making processes, and the significance of leading with integrity. The course is designed to provide a robust foundation for individuals who wish to improve their leadership skills and grow in their professional careers. Learners will develop the skills to manage diverse teams, handle challenges, and drive organisational success. Learn to Level Up Your Leadership Curriculum Module 01: Introduction to Leadership Module 02: Leadership Styles and Approaches Module 03: Emotional Intelligence in Leadership Module 04: Effective Communication for Leaders Module 05: Decision-Making and Problem Solving Module 06: Managing and Motivating Teams Module 07: Conflict Resolution and Negotiation Module 08: Leading with Integrity and Vision (See full curriculum) Who is this course for? Individuals seeking to develop their leadership skills. Professionals aiming to advance their careers through enhanced leadership capabilities. Beginners with an interest in management or leadership roles. Aspiring managers looking to transition into leadership positions. Career Path Team Leader Project Manager Department Manager Operations Manager Leadership Consultant HR Manager Executive Role in various industries