Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Ideally candidates should have at least two years professional experience working in IT Service Management. The ITIL 4 HVIT Qualification would most likely suit the following delegates: Individuals continuing of their journey in service management ITSM managers and aspiring ITSM managers IT managers and practitioners involved in digital services or working in digital transformation projects, working within or towards high velocity environments Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This course has been created to help IT service management practitioners working in organizations that are becoming more digitally enabled. The practitioners are familiar with traditional IT service management concepts, and now want to be able to discuss ?digital? with more confidence, to develop practical competences, and to be valued contributors in the digital domain. They want to improve how they and their co-workers: Help get customers? jobs done ? helping customers become who they seek to become Keep raising the bar ? taking things to a significantly higher level Trust and are trusted ? as professional knowledge workers in a healthy workplace Accept ambiguity and uncertainty - not scared of not knowing an answer Commit to continual learning ? all as part of their daily work The scope of the course is the primary activities in the digital value chain. In other words, what the practitioner does and which resources they use across the lifecycle of digital products, in order to: Make the right digital investments Realize and deliver digital products and services quickly Provide digital products and services that are highly resilient to disruption Ensure that the service consumer realizes value from the digital products and services Assure conformance of activities with governance, risk and compliance requirements. Understand and know how to use the key principles and methods of Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in directing, planning and improvement Understand and know how to direct, plan and improve value streams and practices ITIL 4 is a framework for quality IT service management (ITSM) through proven best practice, providing practical and flexible guidance to support your organization on its journey to digital transformation while empowering your IT teams to continue to play a crucial role in the wider business strategy. This course highlights the ways in which digital organizations and digital operating models function in high-velocity environments, including the use of working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing. This class includes an exam voucher. Prerequisites ITIL© 4 Foundation 1 - THE NATURE OF HIGH-VELOCITY IN A DIGITAL WORLD Overview of the key ITIL 4 high-velocity terminology Understand when the transformation to high velocity IT is desirable and feasible Understand the five objectives associated with digital products ? to achieve: Valuable investments ? strategically innovative and effective application of IT Fast development - quick realization and delivery of IT services and IT-related products Resilient operations - highly resilient IT services and IT-related products Co-created value - effective interaction between service provider and consumer Assured conformance - to governance, risk and compliance (GRC) requirements. 2 - ITIL OPERATING MODEL ? DIGITAL PRODUCT LIFECYCLE Understand how high velocity IT relates to: The four dimensions of service management The ITIL service value system The service value chain The digital product lifecycle 3 - FUNDAMENTAL CONCEPTS FOR DELIVERING HVIT Understand the following concepts: Ethics Safety culture Toyota Kata Lean / Agile / Resilient / Continuous Service-dominant logic Design thinking Complexity thinking Use the principles, models and concepts to contribute to: Help get customers? jobs done Trust and be trusted Commit to performance Deal with uncertainty Improve by being inquisitive 4 - ACHIEVING VALUE WITH DIGITAL PRODUCTS Know how the service provider ensures valuable investments are achieved. Know how to use the following practices to contribute to achieving valuable investments: Portfolio management Relationship management Know how the service provider ensures fast deployment is achieved Know how to use the following practices to contribute to achieving fast deployment: Architecture management Business analysis Deployment management Service validation and testing Software development and management Know how the service provider ensures resilient operations are achieved Know how to use the following practices to contribute to achieving resilient operations: Availability management Capacity and performance management Monitoring and event management Problem management Service continuity management Infrastructure and platform management Know how the service provider ensures co-created value is achieved Know how to use the following practices to contribute to achieving co-created value with the service consumer: Relationship management Service design Service desk Know how the service provider ensures assured conformance is achieved Know how to use the following practices to contribute to achieving assured conformance: Information security management Risk management
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site 2 - Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot 3 - Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections 4 - Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations 5 - Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence 6 - Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points 7 - Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying and managing Windows apps 8 - Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates 9 - Implementing Defender Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies 10 - Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access 11 - Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service 12 - Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance and Management Insights Backing up and recovering a Configuration Manager site Updating the Configuration Manager infrastructure 13 - What?s new in Microsoft Endpoint Configuration Manager Whats new in Microsoft Endpoint Manager covering each semi annual release Additional course details: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Introduction: “Co-ordinating the temporary works process” This two day course is designed to assist those on site who have responsibility for managing all forms of temporary works. It is also designed to give confidence to senior management and those who engage contractors have reached an assessed standard of knowledge. The course has the support of a number of organisations: Temporary Works Forum CECA, UKCG, HSE and FMB. The support of these organisations offers transferability of the course within industry.Temporary works are usually safety and business-critical and require careful co-ordination. An accepted way of achieving this is through the adoption of the management process outlined in BS5975, which introduces the temporary works co-ordinator (TWC) as a key figure. This course explains the role and the overall management context within which it sits.High risk can occur on small as well as larger sites hence understanding the essentials of good safety risk management, as outlined in BS5975, is relevant for projects of all sizes. This course will give the delegate thorough knowledge of the Temporary Works Co-ordinator role however this does not alone make a delegate competent, as this requires other attributes e.g. experience. Aims and Objectives: This course is not a temporary works awareness course. It is only concerned with the process of co-ordination of temporary works, commonly expressed through the role of the Temporary Works Co-ordinator. Attendance does not confer competency as a Temporary Works Co-ordinator.The course gives emphasis, throughout, to: – The importance of communication, co-ordination, co-operation and competency. The ‘4Cs’. – Risk management: safety and also business relatedAllowing the Temporary Works Co-ordinator (TWC) to: – Understand the need for and duties of a TWC – Understand the role of others – Have a detailed knowledge and understanding of BS5975 in respect of this role. Assessment: The method of assessment will be by multiple-choice questions at the end of the course as well as being expected to be interactive during the course.Course Attendance:Delegates are required to attend both sessions, since without full attendance and achievement in the examination the Temporary Works Co-ordinator Training Course cannot be made.Delegates must attend the days in order and, where not on consecutive days, must complete the course within two weeks. Delegates unable to attend both days due to extenuating circumstances (e.g. certificated sickness) will need to enrol onto a new course in order to maintain continuity of learning outcomes and attend both days again. It is expected that experienced and competent Temporary Works Co-ordinators will attend this course. Competence comes from a mixture of education, training and experience and should be judged by an appropriate senior individual, usually referred to as the Designated Individual (DI). Training is considered an essential element of Temporary Works Co-ordinator competence. Background Publications: This course, including its group work and exercises, is constructed around BS5975:2008 +A1:2011. For Open Courses Delegates should bring a copy with them in order not to be significantly disadvantaged. For in house courses it is expected that the Tutor will tailor the course around the organisation procedures,providing they are comprehensive and follow the philosophy of BS5975. In these cases delegates will need a copy of their own procedures. In the absence of adequate procedures delegates will need a copy of the BS itself.Although the following is not mandatory, delegates may find the following useful– BS EN12811-1:20031 Temporary works equipment. Scaffolds. Performance requirements and general design– BS EN12812:2008. Falsework ‐ performance requirements and general design– BS EN12813:2004. Temporary works equipment. Load bearing towers of prefabricated components. Particular methods of structural design– NASC TG20/13 plus supplement 1– NASC TG9:12
Epilepsy awareness Buccal medication training Seizure management course Epilepsy education program Neurological disorder training Emergency response to seizures Epilepsy care for healthcare professionals CPD accredited epilepsy course Nursing revalidation hours Healthcare professional seizure training Hands-on buccal administration practice Seizure recognition techniques Epilepsy management for caregivers Practical skills in epilepsy care Interactive epilepsy training sessions Expert instructors in epilepsy awareness Epilepsy impact on patients and families Effective communication in epilepsy care Real-life scenarios in epilepsy training High-quality epilepsy care certification
Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score
Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company
https://www.valuex2.com/agile-hr-certification/ https://www.linkedin.com/company/80563537/
Gastrostomy tube care Gastrostomy tube management Gastrostomy tube training Enteral feeding care Gastrostomy tube complications Gastrostomy site care Gastrostomy tube insertion Gastrostomy tube feeding techniques Gastrostomy tube nursing Gastrostomy care for healthcare professionals Gastrostomy tube education CPD accredited course Nursing revalidation hours Practical gastrostomy care training Hands-on gastrostomy tube practice Patient education in gastrostomy care Ethical considerations in gastrostomy tube care Cultural sensitivity in gastrostomy care Gastrostomy tube complications prevention High-quality gastrostomy care certification PEG
QA Level 2 Award In Food Safety (Refresher) (RQF) Face to Face: Half day course Virtual Classroom: Spread over 2 sessions of 2½ hr duration Suitable for those who have previously done an Ofqual regulated course in Food Safety in Catering, for Retail and for Manufacturing Reminds learners about the importance of Food Safety and how to ensure food is safe for consumption Course Contents: Responsibilities of food handlers Types of contamination Causes of cross contamination Types of Contamination and the Associated Risks Keeping the work area and equipment clean and tidy Pest control Sources of food poisoning People at higher risk of food poisoning High risk foods Hazard Analysis and Critical Control Point (HACCP) Personal hygiene in food safety Safe temperatures for food processing Food spoilage Storage and deliveries Benefits of this course: Businesses have a duty to their customers to produce food that is safe for consumption. There are one million cases of food poisoning in the UK each year. How much can you remember from when you did your original course? From our experience, people remember very little one year later - let alone longer than that The Food Standards Agency says that 'Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely’. Our QA Level 2 Award in Food Safety (Refresher) (RQF) is a nationally accredited qualification especially suitable for people working in, or planning to work in, the food retail industry, and complies with the training regulations. Doing this Ofqual regulated, nationally accredited course ensures that nothing of importance is left out of your memory, and that you are able to produce or sell food that is fit for human consumption Accredited, Ofqual regulated qualification: Our Food Safety in Catering training course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards. This means that you can be rest assured that your Food safety in Catering certificate fulfils the legal requirements and is a very good way to make sure your employees are trained in Food Safety. The Ofqual Register number for this course is 603/4311/4
Awareness of Legislation including Health and Safety at Work Act, PUWER, LOLER, Manual Handling Regulations Operations (1992) About this event Awareness of Legislation including Health and Safety at Work Act, PUWER, LOLER, Manual Handling Regulations Operations (1992) Duties and Responsibilities of Employer and Employee Anatomy of Spine Risk Assessment using safe principles E.L.I.T.E Reducing risk and removing hazards Understanding R.I.D.D.O.R Safe use of correct equipment Knowledge of dangerous moves Ability Test Chair Moves to stand and chair to chair transfer Slings – inserting whilst in bed/in a wheelchair Hoist – bed to chair transfer