Duration 4 Days 24 CPD hours This course is intended for This course is aimed at IT professionals who support Windows 11 desktops, devices, users, and associated network and security resources. The secondary audience for this course is Desktop/Device Support Technicians (DSTs) who provide Tier 2 support to users with computers that are running the Windows 11 operating system (OS) in a on-premises environment. Overview After completing this course, you will be able to: Install and configure Windows 11 desktops and devices in a Windows Server domain corporate environment Install and customize Windows 11 operating systems and apps Configure local and remote network connectivity and storage Configure data security, device security, and network security Maintain, update, and recover Windows 11. This is a 4-day ILT course designed to provide you with the knowledge and skills required to install and configure Windows 11 desktops and devices in an on-premises Windows Server Active Directory domain environment. Module 1: Installing Windows 11 Introducing Windows 11 Installing Windows 11 Module 2: Upgrading and updating Windows 11 Upgrading to Windows 11 Migrating user state Managing Windows 11 updates Module 3: Configuring Windows 11 devices Local configuration tools in Windows 11 Using Windows Admin Center Using Windows PowerShell Implementing Remote Management Module 4: Configuring network connectivity Configuring network connectivity Implementing name resolution Implementing remote access Module 5: Managing storage Overview of storage options Managing local storage Managing Storage Spaces Module 6: Managing resources Configuring and managing file access Configuring and managing shared folders Implementing Work Folders Managing printers Module 7: Managing apps in Windows 11 Deploying apps Managing access to the Microsoft Store Configuring Microsoft Edge Module 8: Implementing and managing security Managing user and group accounts Configuring User Account Control Implementing BitLocker Implementing Windows 11 security features Securing against network threats Module 9: Monitoring Windows 11 Monitoring Windows 11 Optimizing Windows 11 performance Module 10: Troubleshooting Windows 11 Managing Windows 11 startup Recovering Windows 11 Managing devices and drivers Understanding the registry Recovering files
Practical Advice on Working from HomePractical Advice on Working from Home The goal of this course is to help those working from home to be more productive and effective. Working from home may be the new normal for many employees, but it will require employees to make adjustments and modifications to their approach to work. Many companies embrace working remotely while other companies and bosses are a bit more hesitant. If employees take an organized and disciplined approach to working from home, they can be extremely productive. So, what does it take to be successful, and happy, when working from home? This course will suggest ideas for managing distractions and staying focused while working from home and will explain the importance of having a healthy lifestyle and positive approach to working remotely. It will also provide some advice on: organize the workplace and daily schedule for maximum effectiveness, manage distractions and stay focused while working from home, recognize the necessity of taking a proactive approach to team building, communication, and keeping the boss informed and to understand the importance of a healthy lifestyle and positive approach to working from home. What You Will Learn At the end of this program, you will be able to: Suggest ideas for managing distractions and staying focused while working from home Explain the importance of a healthy lifestyle and positive approach to working from home Getting set up for success Organizing a daily routine Excelling while working at home Not losing sight of the bigger picture
Project managers should be mindful of an organization's strategic direction and supporting portfolio(s) when making project decisions. But, is this truly understood by project managers? This enterprise-wide thinking turns an average project manager into a value-added resource within any organization. Management considers these insightful project managers as promotion-worthy and deserving of 'plum' organizational opportunities. While it is certain that project resource assignment, risk and issue management, budgeting, and scheduling all have an effect on the project, can they also affect the portfolio? How do you know that? By attending this course, you will understand why project managers must 'think forward' the ramifications of their decisions, or lack thereof, on the project as well as the portfolio.
Highlights of the Course Course Type: Online Learning Duration: 35 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about safeguarding Understand the core competencies and principles of safeguarding Explore the various areas of safeguarding Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert safeguarding officer Safeguarding Diploma Course Master the skills you need to propel your career forward in safeguarding. This course will equip you with the essential knowledge and skillset that will make you a confident safeguarding officer and take your career to the next level. This comprehensive safeguarding course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this safeguarding course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective safeguarding practice and equip you with the essential skills, confidence and competence to assist you in the safeguarding industry. You'll gain a solid understanding of the core competencies required to drive a successful career in safeguarding. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for safeguarding officer or for people who are aspiring to specialize in safeguarding. Enroll in this safeguarding course today and take the next step towards your personal and professional goals. Earn industry-recognized credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive safeguarding course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this safeguarding can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This safeguarding course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This safeguarding course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This safeguarding course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Safeguarding A Guide to Safeguarding 00:27:00 Introduction to Safeguarding vulnerable groups 00:05:00 What does this mean for Service Providers 00:03:00 Documents relating to Safeguarding 00:02:00 Registration of New Service Users 00:03:00 Identification of Concerns 00:01:00 Proactive Analysis of Issues 00:01:00 Collaborative Review 00:02:00 Audit of Effectiveness 00:01:00 Embedding Safeguarding Procedures 00:04:00 Key Learning Points 00:02:00 Assessment Assessment - Safeguarding 00:10:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
The Role of an Agile PM within a Digital Transformation Program Historically, we have associated project managers with traditional delivery efforts, so is the term 'Agile Project Manager' an oxymoron? Do we need Agile PMs within our organization? If yes, what does an Agile Project Manager do within a digital transformation initiative? Agile is no longer a development framework or methodology used solely by software teams; ever since the pandemic, more organizations are using Agile principles in their digital transformation efforts. How an Agile PM becomes critical to align team members to deliver on digital transformation goals Ways an Agile PM demonstrates servant leadership to build a self-organized and self-sufficient delivery team Mental model differences to embrace agility in the project manager role Success traits needed to serve as an effective Agile project manager
Time Management Approved Online Training
Highlights of the Course Course Type: Online Learning Duration: 1 Hour Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about General Data Protection Regulation or GDPR Understand the core competencies and principles of General Data Protection Regulation or GDPR Explore the various areas of General Data Protection Regulation or GDPR Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert data controller or data protection officer GDPR - How to apply the General Data Protection Regulation Course Master the skills you need to propel your career forward in General Data Protection Regulation or GDPR. This course will equip you with the essential knowledge and skillset that will make you a confident data controller or data protection officer and take your career to the next level. This comprehensive GDPR course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this GDPR course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective General Data Protection Regulation or GDPR practice and equip you with the essential skills, confidence and competence to assist you in the General Data Protection Regulation or GDPR industry. You'll gain a solid understanding of the core competencies required to drive a successful career in General Data Protection Regulation or GDPR. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for data controller or data protection officer or for people who are aspiring to specialise in General Data Protection Regulation or GDPR. Enrol in this GDPR course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive GDPR course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this General Data Protection Regulation or GDPR can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This GDPR course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This GDPR course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This GDPR course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Introduction Trainer Introduction and Course Outline 00:02:00 Why Data Protection? What Exactly is Why Deal with Data Protection Anyway. 00:02:00 How is the Protection of Data Guaranteed. 00:04:00 The Five Basic Principles of Data Protection Introduction 00:01:00 Principle 1: Prohibition of Data Processing and Exceptions to Consent 00:01:00 Principle 2: Purpose of Data Collection 00:03:00 Principle 3: Data Collection Limits 00:02:00 Principle 4: Data Security 00:01:00 Principle 5: Transparency 00:02:00 Summary 00:02:00 The Foundations of Data Processing introduction 00:01:00 Data Processing with Consent 00:03:00 Data Processing without Consent 00:03:00 Rights of Data Subjects Rights of Data Subjects 00:05:00 Responsibility of Data Controller or Processor Introduction 00:01:00 Maintaining a Record of Processing Activities 00:03:00 Technical and Organizational Measures (TOM) 00:01:00 Data Processing 00:02:00 Data Breaches 00:02:00 Summary 00:01:00 The Data Protection Officer The Data Protection Officer 00:02:00 Summary Summary 00:02:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
Duration 3 Days 18 CPD hours This course is intended for Business application consultant Data Consultant / Manager Database Administrator Application developer BI specialist Overview This course will prepare you to: Understand and put into practice the main advanced modeling capabilities of SAP HANA 2.0 SPS04 in the areas of text search and analysis, graph modeling, spatial analysis and predictive modeling. Promote these advanced modeling capabilities to extend the core SAP HANA Modeling features. Broaden your experience with the modern SAP HANA tooling in XS Advanced (SAP Web IDE for SAP HANA) This course provides advanced knowledge and practical experience on several topics that are included in, or connected to, the scope of the modeler role. Its purpose is to take a step further, beyond the core modeling knowledge from HA300, and to demonstrate how applications powered by SAP HANA can benefit from innovations such as Spatial Data Storage and Processing, Text Search and Analysis, Predictive Analysis and Graph Modeling.The course is supported by many demos and exercise, which demonstrate the advanced modeling capabilities in several scenarios. For example, working with classical schemas or HDI containers in XS Advanced, using the SQL console, developing graphical models. Some of the proposed case studies blend together several modeling capabilities, such as text with spatial, or text with graph.An introduction to SAP HANA Series Data is also provided. Introduction to Advanced ModelingSAP HANA Predictive Analysis Library (PAL) Describing SAP HANA PAL Using PAL in Flowgraphs Calling PAL Functions in Calculation Views Calling PAL Procedures in SQL Scripts Exploring the PAL Library SAP HANA Spatial Introducing SAP HANA Spatial Working with Spatial Data Types Importing and Exporting Spatial Data Accessing and Manipulating Spatial Data Using Spatial Clustering SAP HANA Graph Defining SAP HANA Graph Workspace Describing the Different Graph Algorithms Using the Graph Node in Calculation Views Using GraphScript Procedures SAP HANA Text Understanding Full Text Search Understanding Text Analysis Understanding Text Mining SAP HANA Series Data Getting Started with SAP HANA Series Data
Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment
Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study