Certified ScrumMaster®: In-House Training This course covers Scrum and the principles and tools required to be an effective ScrumMaster. You will come away with a good understanding of the Scrum framework and the underlying principles required to make effective decisions regarding the application of Scrum to different situations. At the end of the course, you will receive membership to the Scrum Alliance for two years and, following completion of an online test, will become a Scrum Alliance Certified ScrumMaster®. Our Certified Scrum Trainers pay the initial, two-year membership fee for each student who successfully completes our Certified ScrumMaster® course. This membership fee also covers the cost of the CSM Test. A link to the test will be sent to you following your course. The CSM test has a passing score of 37 out of 50 questions within a 60-minute timeframe. You will have two attempts within 90 days after you receive your welcome e-mail to pass the test at no cost. After two attempts or 90 days, you will be charged $25 for each additional attempt. What you will Learn At the end of this program, you will be able to: Provide a clear understanding of the fundamental principles of Scrum Use the principles, practices, and tools required to be an effective ScrumMaster Make effective decisions regarding the application of the Scrum framework to different situations, including: Practical, project-proven practices The essentials for getting a project off on the right foot How to write user stories and structure your product backlog How to help both new and experienced teams be more successful How to successfully scale Scrum Tips and tricks from the instructor's many years of using Scrum in a wide variety of environments Getting Started Introduction Course structure Course goals and objectives Agile Principles and Scrum Overview Agile Principles Lean Principles Process control models Incremental and Iterative development Shifting the focus on product management Overview of the Scrum process The Team Dedicated cross-functional teams T-shaped people Sprint Planning Team capacity Facilitating the Sprint Planning meeting The Sprint backlog Sprint Burndown chart Scrum Roles and Responsibilities The team and building effective teams ScrumMaster responsibilities Product Owner responsibilities The Scrum project community What happens to traditional roles in Scrum? Scrum Meetings Daily Scrum Reviews Retrospectives Product Backlog and User Stories Product backlog characteristics User stories Getting your first backlog Getting backlog items ready Slicing User stories Estimation for Forward Planning Why comparative estimation works Planning poker Affinity estimation Release Planning and Tracking Progress Velocity Release planning Tracking release progress Scaling Scrum Scrum of Scrums Scaling the product backlog Scaling across a program and business areas Distributed teams
Writing and Managing Requirements Documents: Virtual In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA™ Certification exam to become a Certified Business Analysis Professional (CBAP™). Learn more at www.iil.com/bacp. Once a business analyst has completed the information gathering and analysis to produce the solution to a business problem, the results must be documented for all stakeholders to see and understand. This course will enhance the skill set needed for writing and managing the complex readership that business analysts interact with on a day-to-day basis. What you will Learn Upon completion, participants will be able to: Write an understood requirements document that is approvable and acceptable Validate a requirements document Manage the changes to requirements documents through the SDLC Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide The business analyst and the product/project life cycle The requirements documentation process Planning for Effective Requirements Documentation Overview of requirements planning Planning for validation Planning for verification: well-formed criteria Planning for verification: understood and usable criteria Writing Effective Requirements Documents Overview of writing requirements documents Using a standard structure / template Applying formatting techniques Meeting the challenge of writing non-functional requirements Baselining Requirements Documents Overview of the requirements baseline process Validation Verification Approval Managing Requirements Change through the Product Life Cycle Overview of requirements change management Establishing a formal change management process Tracing requirements through design and development (build, test, and implementation) Following through to post-implementation (transition and early production)
Duration 4 Days 24 CPD hours This course is intended for Students for AZ-140: Configuring and Operating Microsoft Azure Virtual Desktop are interested in delivering applications on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. As an Azure Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Azure Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Azure Virtual Desktop performance, and automate Azure Virtual Desktop management tasks. This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. Lessons include implementing and managing networking for Azure Virtual Desktop, configuring host pools and session hosts, creating session host images, implementing, and managing FSLogix, monitoring Azure Virtual Desktop performance and health, and automating Azure Virtual Desktop management tasks. Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. Candidates of this course must have solid Azure administration skills. This course assumes prior experience, including virtualization, networking, identity, storage, backup and restore, and disaster recovery. Students should have knowledge of on-premises virtual desktop infrastructure technologies as they relate to migrating to Azure Virtual Desktop. Students are expected to have used the tools common to the Azure environment, such as the Azure PowerShell and Cloud Shell. 1 - Azure Virtual Desktop Architecture Azure Virtual Desktop for the enterprise Azure Virtual Desktop components Personal and pooled desktops Service updates for Azure Virtual Desktop desktops Azure limitations for Azure Virtual Desktop Virtual machine sizing for Azure Virtual Desktop Azure Virtual Desktop pricing 2 - Design the Azure Virtual Desktop architecture Assess network capacity and speed requirements for Azure Virtual Desktop Azure Virtual Desktop Experience Estimator Recommend an operating system for an Azure Virtual Desktop implementation Balancing host pools Recommendations for using subscriptions and management groups Configure a location for the Azure Virtual Desktop metadata Recommend a configuration for performance requirements 3 - Design for user identities and profiles Select an appropriate licensing model for Azure Virtual Desktop based on requirements Personal and multi-session desktop scenarios Recommend an appropriate storage solution Plan for a desktop client deployment Plan for Azure Virtual Desktop client deployment - Remote Desktop Protocol (RDP) Windows Desktop client to multiple devices Hybrid Identity with Azure Active Directory Plan for Azure Active Directory (AD) Connect for user identities 4 - Implement and manage networking for Azure Virtual Desktop Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Azure Virtual Desktop network connectivity Implement and manage network security for Azure Virtual Desktop Configure Azure Virtual Desktop session hosts using Azure Bastion Monitor and troubleshoot network connectivity for Azure Virtual Desktop Plan and implement Remote Desktop Protocol Shortpath Configure Remote Desktop Protocol Shortpath for managed networks Configure Windows Defender Firewall with Advanced Security for RDP Shortpath Plan and implement Quality of Service for Azure Virtual Desktop 5 - Implement and manage storage for Azure Virtual Desktop Storage for FSLogix components Configure storage for FSLogix components Configure storage accounts Create file shares Configure disks 6 - Create and configure host pools and session hosts for Azure Virtual Desktop Automate creation of an Azure Virtual Desktop host pool using PowerShell Configure host pool assignment type Customize Remote Desktop Protocol (RDP) properties for a host pool Manage licensing for session hosts that run Windows client Deploying Azure AD-joined virtual machines in Azure Virtual Desktop 7 - Create and manage session host image for Azure Virtual Desktop Create a managed virtual machine (VM) image Modify a session host image Plan for image update and management Create and use an Azure Compute Gallery using the portal Create an Azure Virtual Desktop image by using VM Image Builder Install Microsoft 365 Apps on a master Virtual Hard Disk image Install language packs in Azure Virtual Desktop 8 - Manage access for Azure Virtual Desktop Role-based access control (RBAC) for Azure Virtual Desktop Plan and implement Azure roles and role-based access control (RBAC) for Azure Virtual Desktop Using Azure Virtual Desktop with Microsoft Intune Configuring screen capture protection for Azure Virtual Desktop 9 - Manage security for Azure Virtual Desktop Plan and implement Conditional Access policies for connections to Azure Virtual Desktop Plan and implement multifactor authentication (MFA) in Azure Virtual Desktop Understand Conditional Access policy components Manage security by using Azure Security Center Security posture management and threat protection 10 - Implement and manage FSLogix Plan for FSLogix FSLogix profile containers and Azure files Install FSLogix Storage options for FSLogix profile containers Profile Container vs Office Container Configure Office Containers Installing Microsoft Office using FSLogix application containers Configure Cloud Cache Configure Profile Containers Create a profile container with Azure NetApp Files and capacity pool Manage Rule Sets and application masking 11 - Configure user experience settings Virtual desktop optimization principles Persistent virtual desktop environments Configure user settings through group policies Configure user settings through Endpoint Manager policies Configure session timeout properties Configure device redirections Configure Universal Print Implement the Start Virtual Machine on Connect feature Troubleshoot user profile issues Troubleshoot Azure Virtual Desktop clients 12 - Install and configure apps on a session host MSIX app attach How MSIX app attach works Set up a file share for MSIX app attach Upload MSIX images to Azure NetApp Files in Azure Virtual Desktop How to configure apps for users Using the OneDrive sync app on virtual desktops Using Microsoft Teams on Azure Virtual desktop Publish built-in apps in Azure Virtual Desktop Troubleshoot application issues for Azure Virtual Desktop 13 - Plan for disaster recovery Disaster recovery for Azure Virtual Desktop Virtual machine replication FSLogix configuration 14 - Automate Azure Virtual Desktop management tasks Scale session hosts using Azure Automation Create or update an Azure Automation account Create an Azure Automation Run As account Create the Azure Logic App and execution schedule 15 - Monitor and manage performance and health Monitor Azure Virtual Desktop by using Azure Monitor Log Analytics workspace for Azure Monitor Monitor Azure Virtual Desktop by using Azure Advisor How to resolve Azure Advisor recommendations Diagnose graphics performance issues Additional course details: Nexus Humans AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
ISO 37001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Anti-bribery Management System (ABMS) based on ISO 37001 About This Course During this training course, you will also gain a thorough understanding of the global anti-corruption best practices of Anti-bribery Management Systems and effectively prevent, detect and address bribery before it negatively impacts an organization's reputation and profits. After mastering all the necessary concepts of Anti-bribery Management Systems, you can sit for the exam and gain "Certified ISO 37001 Lead Implementer' credential. By holding this Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO 37001 in an organization. Learning objectives Acknowledge the correlation between ISO 37001 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ABMS Learn how to interpret the ISO 37001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ABMS Acquire the expertise to advise an organization in implementing Anti-bribery Management System best practices Educational approach This training is based on both theory and best practices used in the implementation of an ABMS Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practice tests are similar to the Certification Exam Prerequisites A foundational understanding of ISO 37001 and knowledge of implementation principles. What's Included? Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Guides CPD Certificate The Exam Accreditation Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Provided by This course is Accredited by NACS and Administered by the IECB. Who Should Attend? Professionals looking to implement and maintain an Anti-Bribery Management System Compliance officers
Overview Effective decision-making requires the adoption of decision approaches that fit the complexities of these situations and the efficient management of decision-making processes. It also requires the ability to think strategically in highly interactive markets and acute insights into the psychology behind people's behaviour. Objectives Develop critical thinking skills, sharpening your intuition in the face of risk and uncertainty Learn ways to discover, manage, mitigate and avoid decision-making traps Learn to leverage the power of 'nudges' - a light-touch way to influence human behaviour and improve decision-making Boost your ability to build high-performing teams by understanding what conditions enable teams to make better decisions than individuals Become a more strategic leader and decision-maker by understanding the long-term impact your decisions can have on your organisation
About this Virtual Instructor Led Training (VILT) This 5 half-day Virtual Instructor Led Training (VILT) course will assist energy professionals in the planning and operation of a power system from renewable energy sources. The VILT course will discuss key operating requirements for an integrated, reliable and stable power system. The unique characteristics of renewable energy are discussed from a local, consumer centric and system perspective, bringing to life the ever-changing paradigm in delivering energy to customers. The course will explore the technical challenges associated with interconnecting and integrating hundreds of gigawatts of solar power onto the electricity grid in a safe and reliable way. With references to international case studies, the VILT course will also demonstrate the state of the art methodologies used in forecasting solar power. The flexibility of the invertor-based resources will facilitate higher penetrations of photovoltaic, battery electricity storage systems and demand response while co-optimizing customer resources. The contribution of inverter-based generators that provides voltage support, frequency response and regulation (droop response), reactive power and power quality with a high level of accuracy and fast response will be addressed. Furthermore, this VILT course will also describe how microgrids' controllers can allow for a fully automated energy management. Distributed energy resources are analyzed in detail from a technical and financial aspect and will address the best known cost based methodologies such as project financing and cost recovery. Training Objectives Upon completion of this VILT course, participants will be able to: Learn about renewable energy resources, their applications and methods of analysis of renewable energy issues. Review the operational flexibility of renewable energy at grid level, distribution network and grid edge devices. Understand and analyze energy performance from main renewable energy systems. Get equipped on the insights into forecasting models for solar energy. Predict solar generation from weather forecasts using machine learning. Explore operational aspects of a complex power system with variability from both the supply & demand sides. Manage the impact of the design of a Power Purchase Agreement (PPA) on the power system operation. Target Audience Engineers, planners and operations professionals from the following organizations: Energy aggregators who would like to understand the system operations of renewable energy power plants Renewable energy power system operator Energy regulatory agencies who aim to derive strategies and plans based on the feedback obtained from the power system operations Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your first expert course leader is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Your second expert course leader is the co-founder and Director of Research at Xesto Inc. Xesto is a spatial computing AI startup based in Toronto, Canada and it has been voted as Toronto's Best Tech Startup 2019 and was named one of the top 10 'Canadian AI Startups to Watch' as well as one of 6th International finalists for the VW Siemens Startup Challenge, resulting in a partnership. His latest app Xesto-Fit demonstrates how advanced AI and machine learning is applied to the e-commerce industry, as a result of which Xesto has been recently featured in TechCrunch. He specializes in both applied and theoretical machine learning and has extensive experience in both industrial and academic research. He is specialized in Artificial Intelligence with multiple industrial applications. At Xesto, he leads projects that focus on applying cutting edge research at the intersection of spatial analysis, differential geometry, optimization of deep neural networks, and statistics to build scalable rigorous and real time performing systems that will change the way humans interact with technology. In addition, he is a Ph.D candidate in the Mathematics department at UofT, focusing on applied mathematics. His academic research interests are in applying advanced mathematical methods to the computational and statistical sciences. He earned a Bachelor's and MSc in Mathematics, both at the University of Toronto. Having presented at research seminars as well as instructing engineers on various levels, he has the ability to distill advanced theoretical concept to diverse audiences on all levels. In addition to research, our key expert is also an avid traveler and plays the violin. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
The NCSP® Foundation accredited (APMG International), certified (NCSC/GCHQ-UK) and recognized (DHS-CISA-USA) certification course introduces business, technology, auditing, and management professionals to the fundamentals of digital business, its risks, and the NIST Cybersecurity Framework's role in helping organizations manage and mitigate digital risk. This course also introduces candidates to an Affordable, Pragmatic, and Scalable Digital Value Management System (DVMS) Create, Protect, and Deliver (CPD) model designed to enable any size organization to quickly adopt and adapt the frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory) and cyber threat landscape changes. The DVMS enables enterprises to become adaptive, cyber-resilient organizations capable of creating, protecting, and delivering trusted digital business value to their stakeholders.
QA Level 2 Award In Health And Safety In The Workplace (RQF) Health and Safety Training Courses QA Level 2 Award In Health And Safety In The Workplace (RQF) Free CPD! Book an Ofqual Regulated course with us, and receive a FREE CPD accredited training course! Course Contents: Roles and responsibilities of employers and employees Health and safety laws Risk assessments and risk control hierarchy Identifying and controlling risks from common workplace hazards, including:Slips, Trips and FallsManual HandlingFireWorking from HeightElectricityHazardous SubstancesWorkplace conditionsErgonomicsEquipmentNoise and vibrationTransport and vehiclesViolenceSmoking, alcohol and drugsStress Procedures for responding to accidents and incidents Recording incidents, accidents and ill health Benefits of this course: In 2018/19, 1.4 million people suffered from a work-related illness 581,000 sustained an injury 147 People lost their lives The estimated cost of injuries and ill health last year was £15 billion 28.2 million working days, or 108,045 working years, were lost due to work-related illnesses and injuries It is an employer's duty to protect the health, safety and welfare of their employees and other people who might be affected by their business. This includes providing sufficient information, instruction and training of employees, so they can work in a way that does not put themselves or others at risk This QA Level 2 Award in Health and Safety in the Workplace (RQF) course helps employees gain an understanding of health and safety issues and their own role within that Accredited, Ofqual regulated qualification: This Health and Safety Training Course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Health and Safety Certificate fulfils the legal requirements and is an excellent way to make sure you and your employees are trained in Health and Safety.The Ofqual Register number for this course is 603/2687/6
Network DevOps course description This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. What will you learn Evaluate network automation tools. Automate tasks with ansible. Use git for version control. Use Python to manage network devices. Use Python libraries for network devices. Network DevOps course details Who will benefit: Administrators automating tasks. Prerequisites: TCP/IP Foundation Duration 5 days Network DevOps course contents What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. Ansible templating and roles aConfiguration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. Programming with Python Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip instal. Hands on Python programming with pyping. More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install. Hands on Python programming with pyping. Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.
https://www.valuex2.com/icagile-business-agility-foundations-certification-training/ https://www.linkedin.com/company/80563537/