SAP Courses Overview SAP is one of the largest ERP(Enterprise Resource Planning) software in the world. It provides end to end solution for Financials, Manufacturing, Logistics, Distributions etc. SAP applications, built around their latest R/3 system, provide the capability to manage financial, asset, and cost accounting, production operations and materials, personnel, plants, and archived documents. The R/3 system runs on a number of platforms including Windows and MAC and uses the client/server model. SAP Business Cases/ Live Project Our SAP training courses are designed in a way which gives the students maximum exposure of real-life scenario through no of business cases and guidance on implementation by professional SAP Consultants. Certificate of Attendance- You receive a certificate once you finish the course from Osborne Training, SAP Certification During the training, you get access to the SAP sandbox which continues even after training finishes until the completion of the Internship. You can also do an external exam to receive certification from SAP (Optional), for details on exam booking you may visit the SAP website. SAP Training Modules Available Financial & Controlling (FICO) High-Performance Analytic Appliance (HANA) Supply Relationship Management (SRM) Customer Relationship Management (CRM) Free SAP Access Free SAP Sandbox Access provided for 6 months so that you can practice even after your SAP training course.
Safe Handling of Medicines Course Overview: The "Safe Handling of Medicines" course provides learners with a comprehensive understanding of the legal, professional, and safety considerations involved in handling medications. This course covers essential topics such as legislation, safe administration practices, patient involvement, and the safe handling of hazardous drugs. By the end of the course, learners will gain the knowledge required to manage medication in a safe and efficient manner while ensuring compliance with UK regulations. The course is designed to equip learners with the skills necessary to contribute to safer healthcare practices and improve medication management in various settings. Course Description: This course dives into the core aspects of safe medicine handling, exploring key principles such as medication management, storage, disposal, and the importance of communication in ensuring safety. Learners will explore legislation and licensing requirements, alongside strategies for administering medications safely, including the handling of hazardous substances. They will also gain insights into the role of patient involvement in medication safety and learn about the audit process and record-keeping. Additionally, learners will review how medication use was managed during the COVID-19 pandemic. Upon completion, participants will be well-prepared to implement safe medication practices in a variety of healthcare environments while ensuring regulatory compliance. Safe Handling of Medicines Curriculum: Module 01: Introduction to Medicines Module 02: Legislation and Licensing Module 03: Key Principles of Medication Management Module 04: Professional Communication and Medication Safety Module 05: Safe Administration of Medicines Module 06: Patient Involvement in Medication Safety Module 07: Storage, Supply and Disposal of Medication Module 08: Safe Handling of Hazardous Drugs Module 09: Record-Keeping and Audit Process Module 10: The Safe Use of Medication during the COVID-19 Pandemic (See full curriculum) Who is this course for? Individuals seeking to enhance their knowledge in medication safety. Professionals aiming to advance in healthcare settings or roles. Beginners with an interest in healthcare and medication management. Healthcare workers responsible for medication administration. Career Path: Healthcare Assistant Pharmacy Technician Medication Safety Officer Clinical Pharmacist Healthcare Administrator Medical Records Specialist
Warehouse Safety Course Overview: This Warehouse Safety course is designed to equip learners with essential knowledge and skills for ensuring safety in warehouse environments. The course covers critical safety practices, identifying hazards, managing risks, and applying appropriate health and safety measures to maintain a safe workplace. Learners will gain a comprehensive understanding of warehouse safety protocols, including safe handling of materials, equipment usage, and site safety. By the end of the course, learners will be well-prepared to implement safety standards and reduce risks, ensuring compliance with industry regulations and creating safer working conditions in warehouses. Course Description: The course delves into the key aspects of warehouse safety, focusing on managing health and safety risks, identifying hazards, and complying with regulatory standards. Topics include an introduction to warehouse safety, health and safety management systems, common warehouse hazards, manual and mechanical handling, and site-specific safety requirements. Learners will explore best practices for creating a safe warehouse environment, from proper handling techniques to ensuring equipment is used safely. The course is structured to foster a deep understanding of warehouse safety protocols, with content delivered through clear, accessible modules designed to support learners in applying these practices effectively. Upon completion, learners will be equipped to contribute to safer, more efficient warehouse operations. Warehouse Safety Curriculum: Module 01: The Role of Warehouse Module 02: Introduction to Warehouse Safety Module 03: Health and Safety Management in Warehouses Module 04: General Warehouse Hazards Module 05: Manual and Mechanical Handling Module 06: Site Safety (See full curriculum) Who is this course for? Individuals seeking to enhance their warehouse safety knowledge. Professionals aiming to improve safety practices in warehouse operations. Beginners with an interest in warehouse safety and risk management. Warehouse staff and supervisors looking to update their safety skills. Career Path: Warehouse Safety Officer Health and Safety Manager Warehouse Supervisor Logistics Coordinator Risk Management Consultant Warehouse Operations Manager
PMI Agile Certified Practitioner (PMI-ACP)® Exam Preparation Course Course Overview The PMI Agile Certified Practitioner (PMI-ACP)® Exam Preparation Course is designed to provide learners with the essential knowledge and tools to successfully prepare for the PMI-ACP® exam. This course focuses on the core concepts of agile methodologies, including Scrum, Kanban, Lean, and XP. Learners will engage with real-world scenarios and case studies to deepen their understanding of agile practices and principles. By completing this course, learners will develop the competencies required to become agile practitioners, improve project delivery, and excel in the PMI-ACP® certification exam. Course Description This course is specifically tailored to help learners grasp agile project management principles and pass the PMI-ACP® exam. It covers a wide range of topics, including agile frameworks, value-driven delivery, stakeholder engagement, adaptive planning, and continuous improvement. Learners will explore various agile approaches, methodologies, and tools, with a strong focus on team collaboration and delivering high-quality results. The course includes interactive lessons, quizzes, and self-assessment opportunities, ensuring a thorough understanding of the subject. Upon completion, learners will gain the confidence and expertise necessary to apply agile practices and pass the PMI-ACP® exam, enhancing their professional credentials in the field of agile project management. PMI Agile Certified Practitioner (PMI-ACP)® Exam Preparation Course Curriculum Module 01: Module 02: Module 03: Module 04: Module 05: Module 06: Module 07: Module 08: Module 09: (See full curriculum) Who is this course for? Individuals seeking to pass the PMI-ACP® exam and gain certification. Professionals aiming to advance their career in agile project management. Beginners with an interest in learning agile practices and methodologies. Project managers and team leaders seeking to enhance their agile knowledge. Career Path Agile Project Manager Scrum Master Agile Coach Project Management Consultant Agile Team Leader PMI-ACP® Certified Practitioner
Legal Secretary and Office Skills Diploma Course Overview The Legal Secretary and Office Skills Diploma is a comprehensive course designed for those aiming to pursue a career as a legal secretary or administrative professional. This course covers a wide range of essential office skills and legal secretarial duties, offering a strong foundation in the tools and techniques needed to succeed in the office environment. Learners will gain proficiency in Microsoft Office tools, including Word, PowerPoint, Outlook, and Excel, as well as essential knowledge of legal office practices. Upon completion, learners will be well-equipped to manage office operations, handle legal documentation, and assist with legal professionals' administrative tasks, enhancing their career prospects in both the legal and administrative fields. Course Description This diploma provides a structured learning experience, covering essential topics such as legal secretary duties, and Microsoft Office tools, including Word, PowerPoint, Outlook, and Excel. Learners will explore essential office management techniques, including document preparation, managing correspondence, organising meetings, and understanding legal terminology. The course also introduces top Excel keyboard shortcuts to boost efficiency in document management and office tasks. As learners progress through the modules, they will gain key skills required to assist legal teams in their day-to-day operations. The course is designed for those looking to enter the legal, administrative, or office management fields and offers in-depth exposure to both the technical and professional skills that employers seek. Legal Secretary and Office Skills Diploma Curriculum Module 01: Legal Secretary Module 02: Microsoft Word Essentials Module 03: Microsoft PowerPoint Essentials Module 04: Microsoft Outlook Essentials Module 05: Microsoft Excel - Top 50 Keyboard Shortcuts (See full curriculum) Who is this course for? Individuals seeking to become proficient in legal secretary and office management roles. Professionals aiming to advance in administrative careers within the legal sector. Beginners with an interest in learning essential office skills and legal office practices. Those who wish to work in law firms or corporate legal departments. Career Path Legal Secretary Office Administrator Executive Assistant Paralegal Administrative Assistant in Law Firms Office Manager in Corporate Settings
Excel Vlookup, Xlookup, Match and Index Course Overview: This comprehensive course covers essential Excel functions such as VLOOKUP, XLOOKUP, MATCH, and INDEX, which are integral for efficient data management and analysis. Learners will gain a clear understanding of how to use these functions to simplify complex data tasks, enhance productivity, and improve decision-making. Throughout the course, students will master how to search, match, and retrieve data from large datasets, preparing them for real-world scenarios in finance, marketing, HR, and more. The course is designed to equip learners with the necessary skills to perform advanced Excel functions with confidence, contributing to their professional growth and data analysis expertise. Course Description: In this course, learners will explore the powerful functions of Excel, including VLOOKUP, XLOOKUP, MATCH, and INDEX, enabling them to perform efficient data searches, cross-referencing, and information retrieval. The course includes step-by-step lessons on how to apply these functions to real-world datasets, making it highly relevant for anyone working with large volumes of data. Learners will become proficient in building dynamic spreadsheets that streamline decision-making processes and improve data accuracy. Additionally, this course emphasises problem-solving techniques, empowering individuals to handle complex data-related tasks with ease. By the end of the course, learners will have a strong command of these Excel functions, boosting their data management and analytical capabilities. Excel Vlookup, Xlookup, Match and Index Curriculum: Module 01: Excel VLOOKUP Module 02: Excel XLOOKUP Module 03: Excel MATCH Module 04: Excel INDEX Module 05: Advanced VLOOKUP Techniques Module 06: Combining VLOOKUP, MATCH, and INDEX Module 07: Practical Applications of XLOOKUP (See full curriculum) Who is this course for? Individuals seeking to enhance their Excel skills for data analysis. Professionals aiming to improve their data management capabilities. Beginners with an interest in learning advanced Excel functions. Anyone looking to improve their problem-solving abilities in data-heavy tasks. Career Path: Data Analyst Financial Analyst Marketing Analyst HR Specialist Business Intelligence Specialist Excel Expert for Administrative or Management Roles
Airport Customer Service and Operations Course Overview This course provides a comprehensive introduction to airport customer service and operational functions essential for smooth airport management. Learners will explore key areas such as passenger service, airport facilities, security protocols, emergency procedures, and weather-related operations. Designed to enhance understanding of both customer-facing roles and behind-the-scenes airport activities, the course equips participants with the knowledge to contribute effectively in a dynamic aviation environment. Upon completion, learners will be confident in identifying airport components, handling security operations, managing emergency situations, and appreciating sustainability initiatives, preparing them for diverse roles within the airport industry. Course Description Delving deeper into the multifaceted operations of airports, this course covers vital topics from the fundamentals of customer service to the complexities of airport infrastructure and security management. Learners will gain insight into the coordination required for effective security operations and the protocols followed during aircraft and airport emergencies. The course also addresses the impact of weather control and the growing importance of sustainable practices in airport operations. Through a structured and detailed learning experience, participants will develop the skills to support operational efficiency and deliver exceptional service within the fast-paced aviation sector, enhancing both personal competence and career potential. Airport Customer Service and Operations Curriculum Module 01: Airport Customer Service Module 02: Airport Components Module 03: Security Operations Module 04: Airport and Aircraft Emergency Situations Module 05: Weather Control Operations Module 06: Sustainable Airport Operation (See full curriculum) Who Is This Course For? Individuals seeking to build a career in airport customer service and operations. Professionals aiming to enhance their knowledge of airport management and security. Beginners with an interest in aviation and airport industry roles. Those planning to work in airport administration, passenger assistance, or related sectors. Career Path Airport Customer Service Agent Airport Operations Coordinator Security Officer in Aviation Emergency Response Officer Weather Operations Specialist Sustainability Coordinator in Airport Management
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
Duration 1 Days 6 CPD hours This course is intended for This course is designed primarily for IT leaders and company executives who are responsible for complying with incident response legislation. This course focuses on the knowledge, resources, and skills necessary to comply with incident response, and incident handling process requirements. Overview In this course, you will understand, assess and respond to security threats and operate a system and network security analysis platform. You will: Explain the importance of best practices in preparation for incident response Given a scenario, execute incident response process Explain general mitigation methods and devices Assess and comply with current incident response requirements. This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT?s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response. This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. Assessment of Information Security Risks The Importance of Risk Management Integrating Documentation into Risk Management Response to Cybersecurity Incidents Deployment of Incident Handling and Response Architecture Containment and Mitigation of Incidents Preparation for Forensic Investigation as a CSIRT Investigating Cybersecurity Incidents Use a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation Complying with Legislation Examples of Legislation (if this is covered in above topics, no need to include here) GDPR, HIPPA, Elections Case study: Incident Response and GDPR (Using GDPR legislation, create a response that is compliant with it ? this could be discussion-based activity as well.) State Legislation Resources and Example Search terms to find state legislation Using NYS as example use the NYS Privacy Response act or other legislation to create a similar case study as previous. Provide answers on when to use federal versus state and do you have to follow both?
Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.