Learn how to manage internal and/or external stakeholders’ expectations within a project environment. Course overview Duration: 1 day (6.5 hours) This course is suitable for anyone who has to manage internal and/or external stakeholders’ expectations within a project environment. The course will provide tools and techniques to manage stakeholder’s expectations and needs. It will help participants to map all stakeholders who impact the capability to deliver the desired results. Participants will work with a fictitious project to bring all the analysis and tools to life. Objectives By the end of the course you will be able to: Identify both primary and secondary stakeholders Use tools and processes to manage stakeholder expectations Use techniques to help win support for your projects Put together a stakeholder communication plan Determine the best communication methods Build relationships between you and key stakeholders Use influencing skills to influence stakeholders before they influence you Effectively handle conflict that occurs throughout the project lifecycle Determine the fundamental rules of negotiation and how to achieve a satisfactory outcome Content Identification and stakeholder analysis Using a mind map to determine stakeholders and stakeholder groups Analysis of stakeholder interest and power Using different tools to help determine stakeholder needs and expectations Categorising your stakeholders into primary, secondary and key Interviewing stakeholders to determine needs, expectations and politics Influencing strategies Using a planning tool to determine how different stakeholders can be influenced Interviewing stakeholders to determine what will motivate/de-motivate them Looking at communication methods and choosing the most appropriate in order to influence and manage expectations Production the communication strategy Using a case study and project Gantt to produce a detailed communication plan Using a communication plan structure Conflict Management Identifying common causes of conflict in the project lifecycle Finding the most appropriate response to resolve conflicts effectively Determining your default position and understanding why it might not always be right Negotiation The different types of negotiation used in the project environment Determining a simple negotiation process Understanding the principles of effective negotiation – the do’s and don’ts
Emotional Intelligence Training
Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. Prerequisites Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of Active Directory concepts, including users, groups, and role-based access control. Understanding of resilience and disaster recovery, including backup and restore operations. 1 - Configure Microsoft Entra ID Describe Microsoft Entra ID benefits and features Describe Microsoft Entra concepts Compare Active Directory Domain Services to Microsoft Entra ID Select Microsoft Entra editions Implement Microsoft Entra join Implement Microsoft Entra self-service password reset 2 - Configure user and group accounts Create user accounts Manage user accounts Create bulk user accounts Create group accounts Create administrative units 3 - Configure subscriptions Identify Azure regions Implement Azure subscriptions Obtain an Azure subscription Identify Azure subscription usage Implement Microsoft Cost Management Apply resource tagging Apply cost savings 4 - Configure Azure Policy Create management groups Implement Azure policies Create Azure policies Create policy definitions Create an initiative definition Scope the initiative definition Determine compliance 5 - Configure role-based access control Implement role-based access control Create a role definition Create a role assignment Compare Azure roles to Microsoft Entra roles Apply role-based access control Review fundamental Azure RBAC roles 6 - Configure Azure resources with tools Use the Azure portal Use Azure Cloud Shell Use Azure PowerShell Use Azure CLI 7 - Use Azure Resource Manager Review Azure Resource Manager benefits Review Azure resource terminology Create resource groups Create Azure Resource Manager locks Reorganize Azure resources Remove resources and resource groups Determine resource limits 8 - Configure resources with Azure Resource Manager templates Review Azure Resource Manager template advantages Explore the Azure Resource Manager template schema Explore the Azure Resource Manager template parameters Consider Bicep templates Review QuickStart templates 9 - Configure virtual networks Plan virtual networks Create subnets Create virtual networks Plan IP addressing Create public IP addressing Associate public IP addresses Allocate or assign private IP addresses 10 - Configure network security groups Implement network security groups Determine network security group rules Determine network security group effective rules Create network security group rules Implement application security groups 11 - Configure Azure DNS Identify domains and custom domains Verify custom domain names Create Azure DNS zones Delegate DNS domains Add DNS record sets Plan for Azure Private DNS zones Review Azure Private DNS zone scenarios 12 - Configure Azure Virtual Network peering Determine Azure Virtual Network peering uses Determine gateway transit and connectivity Create virtual network peering Extend peering with user-defined routes and service chaining 13 - Configure network routing and endpoints Review system routes Identify user-defined routes Determine service endpoint uses Determine service endpoint services Identify private link uses 14 - Configure Azure Load Balancer Determine Azure Load Balancer uses Implement a public load balancer Implement an internal load balancer Determine load balancer SKUs Create back-end pools Create health probes Create load balancer rules 15 - Configure Azure Application Gateway Implement Azure Application Gateway Determine Azure Application Gateway routing Configure Azure Application Gateway components 16 - Configure storage accounts Implement Azure Storage Explore Azure Storage services Determine storage account types Determine replication strategies Access storage Secure storage endpoints 17 - Configure Azure Blob Storage Implement Azure Blob Storage Create blob containers Assign blob access tiers Add blob lifecycle management rules Determine blob object replication Upload blobs Determine Blob Storage pricing 18 - Configure Azure Storage security Review Azure Storage security strategies Create shared access signatures Identify URI and SAS parameters Determine Azure Storage encryption Create customer-managed keys Apply Azure Storage security best practices 19 - Configure Azure Files and Azure File Sync Compare storage for file shares and blob data Manage Azure file shares Create file share snapshots Implement Azure File Sync Identify Azure File Sync components Deploy Azure File Sync 20 - Configure Azure Storage with tools Use Azure Storage Explorer Use the Azure Import/Export service Use the WAImportExport tool Use the AzCopy tool 21 - Configure virtual machines Review cloud services responsibilities Plan virtual machines Determine virtual machine sizing Determine virtual machine storage Create virtual machines in the Azure portal Connect to virtual machines 22 - Configure virtual machine availability Plan for maintenance and downtime Create availability sets Review update domains and fault domains Review availability zones Compare vertical and horizontal scaling Implement Azure Virtual Machine Scale Sets Create Virtual Machine Scale Sets Implement autoscale Configure autoscale 23 - Configure Azure App Service plans Implement Azure App Service plans Determine Azure App Service plan pricing Scale up and scale out Azure App Service Configure Azure App Service autoscale 24 - Configure Azure App Service Implement Azure App Service Create an app with App Service Explore continuous integration and deployment Create deployment slots Add deployment slots Secure your App Service app Create custom domain names Back up and restore your App Service app Use Azure Application Insights 25 - Configure Azure Container Instances Compare containers to virtual machines Review Azure Container Instances Implement container groups Review the Docker platform 26 - Configure file and folder backups Describe Azure Backup benefits Implement Backup Center for Azure Backup Configure Azure Recovery Services vault backup options Use the Microsoft Azure Recovery Services (MARS) agent Configure on-premises file and folder backups 27 - Configure virtual machine backups Explore options to protect virtual machine data Create virtual machine snapshots in Azure Backup Set up Azure Recovery Services vault backup options Back up your virtual machines Restore your virtual machines Implement System Center DPM and Azure Backup Server Compare the MARS agent and Azure Backup Server Implement soft delete for your virtual machines Implement Azure Site Recovery 28 - Configure Azure Monitor Describe Azure Monitor key capabilities Describe Azure Monitor components Define metrics and logs Identify monitoring data and tiers Describe activity log events Query the activity log 29 - Configure Azure alerts Describe Azure Monitor alerts Manage Azure Monitor alerts Create alert rules Create action groups 30 - Configure Log Analytics Determine Log Analytics uses Create a Log Analytics workspace Create Kusto (KQL) queries Structure Log Analytics queries 31 - Configure Network Watcher Describe Azure Network Watcher features Review IP flow verify diagnostics Review next hop diagnostics Visualize the network topology
Overview In the not-so-distant past, a bank teller regularly performed dozens of routine transactions during each and every shift. With the advent of online banking, gradually consumers realized they could do much of the work themselves and perform a range of simple tasks without having to darken the doors of their local branch.
Many organizations seek competent auditors to determine whether their policies, procedures, and controls adhere to ISO 37301 requirements. This training course aims to help you complete these tasks successfully and intends to reflect the importance of effective CMS audits. In addition, this training course aims to strengthen your knowledge and skills to plan and carry out CMS audits based on the guidelines for auditing management systems provided in ISO 19011 and the certification process described in ISO/IEC 17021-1. This training course can potentially qualify you to conduct audits on behalf of conformity assessment bodies. The exercises, quizzes, and case studies provided in this training course are designed to help you practice the most important aspects of a CMS audit: ISO 37301 requirements, auditing principles, tools and techniques used to obtain evidence, leading a team of auditors, conducting interviews with auditee, reviewing documented information, drafting nonconformity reports, and preparing the final audit report. After successfully completing the training course, you can sit for the exam and gain the "Certified ISO 37301 Lead Auditor' credential. This credential validates your professional capabilities and demonstrates that you have the knowledge and skills to audit a CMS based on ISO 37301. About This Course This training course enables you to: Understand the main concepts of a compliance management system (CMS) and its processes based on ISO 37301 Acknowledge the relationship between ISO 37301 and other standards and regulatory frameworks Understand the auditor's role in planning, leading, and following up on a CMS audit in accordance with ISO 19011 Interpret the requirements of ISO 37301 in the context of a CMS audit Plan an audit, lead a team of auditors, draft nonconformity reports, and follow up on an audit Act with due professional care during an audit Course Agenda Day 1: Introduction to the compliance management system (CMS) and ISO 37301 Day 2: Audit principles and the preparation for and initiation of an audit Day 3: On-site audit activities Day 4: Closing of the audit and the Exam. Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Prerequisites A fundamental understanding of ISO 37301 requirements (or ISO 19600 guidelines) for a CMS and a comprehensive knowledge of audit principles. What's Included? Certification fees are included in the exam price. Training material of over 450 pages of information and practical examples. An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to participants who have attended the training course. In case of exam failure, the candidate can retake the exam once for free within 12 months following the initial exam date. Who Should Attend? The ISO 37301 Lead Auditor training course is intended for: Auditors seeking to perform and lead CMS audits Managers or consultants seeking to master the CMS audit process Individuals responsible for maintaining conformity to ISO 37301 requirements in an organization Technical experts seeking to prepare for a CMS audit Expert advisors and compliance officers Accreditation Provided by This course is Accredited by NACS and Administered by the IECB.
In this training course, you will be acquainted with the various aspects of a QMS based on ISO 9001, such as the role of top management, risks and opportunities, quality policy, processes that shape product and service provision activities, requirements for performance evaluation, and the importance of continual improvement. After completing this course, you can sit for the exam and gain the "Certified ISO 9001 Foundation" credential. In holding this credential, you demonstrate that you have a general knowledge of ISO 9001 requirements for a QMS and enables you to be part of QMS implementation projects. About This Course Learning objectives Upon successful completion of this training course, the participants will be able to: Describe the quality management concepts, principles, and definitions Explain the main ISO 9001 requirements for a quality management system Identify potential actions and approaches that organizations can use to achieve conformity to ISO 9001 Educational approach The training course is participant centered and contains: Lecture sessions are illustrated with graphics, examples, and discussions Interactions between participants by means of questions and suggestions Quizzes with similar structure to the exam Accreditation Prerequisites There are no prerequisites to participate in this training course. What's Included? Certificate and examination fees are included in the price of the training course. Over 200 pages of instructional materials containing explanations, guidance, and practical examples. An attestation of course completion worth 14 CPD (Continuing Professional Development) credits will be issued. In case of exam failure, you can retake the exam within 12 months for free. Who Should Attend? The ISO 9001 Foundations training course is intended for: Managers and consultants seeking knowledge about the basic concepts of quality management Professionals wishing to get acquainted with ISO 9001 requirements for a QMS Personnel responsible for maintaining and improving the quality of products and services of their organization Individuals wishing to pursue a career in quality management Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 40 question, multiple choice type exam on Day 2 of the course. The overall passing score is 70%, to be achieved within the 60 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Provided by This course is Accredited by NACS and Administered by the IECB
Writing and Managing Requirements Documents: In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA™ Certification exam to become a Certified Business Analysis Professional (CBAP™). Learn more at www.iil.com/bacp. Once a business analyst has completed the information gathering and analysis to produce the solution to a business problem, the results must be documented for all stakeholders to see and understand. This course will enhance the skill set needed for writing and managing the complex readership that business analysts interact with on a day-to-day basis. What you will Learn Upon completion, participants will be able to: Write an understood requirements document that is approvable and acceptable Validate a requirements document Manage the changes to requirements documents through the SDLC Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide The business analyst and the product/project life cycle The requirements documentation process Planning for Effective Requirements Documentation Overview of requirements planning Planning for validation Planning for verification: well-formed criteria Planning for verification: understood and usable criteria Writing Effective Requirements Documents Overview of writing requirements documents Using a standard structure / template Applying formatting techniques Meeting the challenge of writing non-functional requirements Baselining Requirements Documents Overview of the requirements baseline process Validation Verification Approval Managing Requirements Change through the Product Life Cycle Overview of requirements change management Establishing a formal change management process Tracing requirements through design and development (build, test, and implementation) Following through to post-implementation (transition and early production)
What past delegates said: "I started looking for a course in education and training when I was offered a chance to help deliver some health & safety training in my local area - I was incredibly lucky to have found Ottilia Pochat Training. Ottilia has a wealth of experience in teaching, and she managed to share those skills and techniques with us in a way that was both incredibly informative and fun! I can’t recommend Ottilia Pochat Training highly enough - why wouldn’t you want to learn how to teach from the best?" This course is fully tutor-led and teaches you how to become a good, quality trainer Virtual Classroom, this course is run over 8 weeks: 16 sessions of 2½ hour duration, from 10:00 -12:30 and 13:30 - 16:00 The virtually run course starting on Friday 7 July will be held over 8 consecutive Fridays Face to Face: Five-day course Run by a Dutch teacher who spent 4 years learning to teach and has international teaching experience in working with all age groups Course Contents Roles and responsibilities in education and training Ways to maintain a safe and supportive learning environment Relationships between teachers and other professionals Boundaries between the teaching role and other professionals Points of referral to meet the individual needs of learners Inclusive teaching, including:Ways to create an inclusive teaching and learning environmentCreating an inclusive teaching and learning planJustifying own selection of teaching and learning approaches, resources and assessment methods in relation to individual learner needsUsing teaching and learning approaches to meet learner needsEvaluating the delivery of inclusive teaching and learning including areas for improvementDelivering inclusive teaching and learning to meet individual needs Communicating with learners in a way that meets their needs Understanding assessment in education and training, including:Different methods of assessment and how they can be adapted to meet individual learner needsHow to involve learners and others in the assessment processThe role and use of constructive feedbackRecord keeping of assessments Benefits of this course: This Ofqual regulated course will allow you to work in adult education Or even, run online training sessions With this course, you'll also be able to run professional workshops Accredited, Ofqual regulated qualification Our QA Level 3 Award in Education and Training (RQF) Course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards. This means that you can rest assured that your level 3 Award in Education and Training fulfils the legal requirements to kick-start your own career in Education and Training. The Ofqual Register number for this course is 603/2770/4
The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles. Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you. The CIPT certification also holds accreditation under ISO 17024: 2012 About This Course What will you learn? Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to pre-empt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal. This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice. MODULE 1: Fundamentals of Information Privacy Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. MODULE 2: Privacy in Technology Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments. Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams. Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle. Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them. Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data. Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection. Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use. Prerequisites There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. What's Included? 1 years membership of the IAPP Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees Who Should Attend? The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialists Accreditation Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.
Gain expertise in IFRS accounting for the oil and gas sector with our industry-focused training course. Enroll today with EnergyEdge.