Duration 5 Days 30 CPD hours This course is intended for Software Engineers and DevOps professionals working in an Enterprise developing mission critical line of business applications. Overview By the end of this course, students will be able to: Assess the advantages of a containerized software development & deployment Use Docker engine features necessary for running containerized applications Utilize Swarm and Kubernetes orchestrators to deploy, maintain, and scale a distributed application Describe the essential patterns used in a highly distributed EE application Understand how to configure EE applications for different environments without code changes Produce and containerize scalable, accessible, and fault-tolerant EE applications Apply different debugging and testing techniques to containerized EE applications The Docker Fundamentals + Enterprise Operations Bundle includes the full Docker for Enterprise Operations course as well as the prerequisite Docker Fundamentals course run back to back in a single intensive training experience. The Docker Fundamentals training course features the foundational concepts and practices of containerization on a single Docker node. The course offers learners the opportunity to assimilate basic container orchestration and how to scale Docker across multiple nodes in a simple swarm cluster. This course provides essential foundational knowledge for subsequent Docker courses. As the follow-on to the Docker Fundamentals course, Docker for Enterprise Operations is a role-based course is designed for Docker Operations teams to accelerate their Docker journey in the enterprise. The course covers in-depth core advanced features of Docker EE and best practices to apply these features at scale with enterprise workloads. Platform Availability: Linux, Windows (Fundamentals Only). Introducing Docker Containerization Fundamentals Creating Images Docker Volumes Docker Networking Basics Introduction to Docker Compose Introduction to Swarm Mode Introduction to Kubernetes Secrets Fundamentals Signature Assignment Distributed Application Architecture Sample Application Edit and Continue Debugging Docker Compose Testing Service Discovery Defensive Programming Logging and Error Handling Health Checks Secrets Configuration Management Development Pipeline Overview Universal Control Plane Docker Trusted Registry Repository Automation Build Server
Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including Students pursuing a technical degree Current IT professionals Recent college graduates with a technical degree Overview After taking this course, you should be able to Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst's perspective. Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. Explain the data that is available to the network security analyst. Describe the basic concepts and uses of cryptography. Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts. Understand common endpoint security technologies. Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors. Identify resources for hunting cyber threats. Explain the need for event data normalization and event correlation. Identify the common attack vectors. Identify malicious activities. Identify patterns of suspicious behaviors. Conduct security incident investigations. Explain the use of a typical playbook in the SOC. Explain the use of SOC metrics to measure the effectiveness of the SOC. Explain the use of a workflow management system and automation to improve the effectiveness of the SOC. Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT). Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format. The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. Course Outline Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Additional course details: Nexus Humans Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls
***Premium Version*** **Be prepared for the upcoming Hiring Season by enhancing your professional skillsets with Apex Learning! Get Hard Copy + PDF Certificate + Transcript + Student ID Card as a Gift - Enrol Now** Tired of browsing and searching for the course you are looking for? Can't find the complete package that fulfils all your needs? Then don't worry as you have just found the solution. Take a minute and look through this 14-in-1 extensive bundle that has everything you need to succeed in Purchasing and Procurement and other relevant fields! After surveying thousands of learners just like you and considering their valuable feedback, this all in one Purchasing and Procurement bundle has been designed by industry experts. We prioritised what learners were looking for in a complete package and developed this in-demand Purchasing and Procurement course that will enhance your skills and prepare you for the competitive job market. Also, our Purchasing and Procurement experts are available for answering your queries and help you along your learning journey. Advanced audiovisual learning modules of these courses are broken down into little chunks so that you can learn at your own pace without being overwhelmed by too much material at once. Furthermore, to help you showcase your expertise in Purchasing and Procurement, we have prepared a special gift of 1 hardcopy certificate and 1 PDF certificate for the title course completely free of cost. These certificates will enhance your credibility and encourage possible employers to pick you over the rest. This Purchasing and Procurement Bundle Consists of the following Premium courses: Course 01: Purchasing & Procurement Course - Level 3 Course 02: Logistic Management Course 03: Retail Operations Training Level 3 Course 04: Merchandising Course 05: Commercial Law 2021 Course 06: Level 3 Tax Accounting Course 07: Diploma in Lean Process and Six Sigma Course 08: Import/Export Processing Course 09: Quality Management Course 10: Warehouse Course 11: SAP Controlling (CO) - Product Costing S4HANA Course 12: Budgeting and Forecasting Course 13: Business Analysis Level 3 Course 14: Effective Communication Skills Diploma Benefits you'll get choosing Apex Learning: One payment, but lifetime access to 14 CPD courses Certificates, student ID for the title course included in a one-time fee Full tutor support available from Monday to Friday Free up your time - don't waste time and money travelling for classes Accessible, informative modules taught by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Purchasing & Procurement expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn from any place in your own time without travelling for classes. Course Curriculum : Course 01: Purchasing & Procurement Course - Level 3 Supply Chain Basics Role of Procurement in an Organisation The Purchasing Cycle Purchasing Toolkits Managing Competitive Bids Quality Management Supplier Relationship Management Improving Efficiency and Accuracy Category Management How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (For The Title Course) Hard Copy Certificate: Free (For The Title Course) If you want to get hardcopy certificates for other courses, generally you have to pay £20 for each. But this Fall, Apex Learning is offering a Flat 50% discount on hard copy certificates, and you can get each for just £10! P.S. Learners inside the UK will enjoy free delivery of the hardcopy certificate, and learners outside the UK will need to pay a £9.99 postal delivery charge. CPD 140 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Purchasing and Procurement bundle. Requirements Our Purchasing and Procurement course is fully compatible with PCs, Macs, laptops, tablets and Smartphone devices. Career path Having this Purchasing and Procurement expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included
Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains Domain 01 - Governance Define, Implement, Manage, and Maintain an Information Security Governance Program Information Security Drivers Establishing an information security management structure Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures Managing an enterprise information security compliance program Risk Management Risk mitigation, risk treatment, and acceptable risk Risk management frameworks NIST Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) Risk management plan implementation Ongoing third-party risk management Risk management policies and processes Conclusion Domain 2 - Security Risk Management, Controls, & Audit Management INFORMATION SECURITY CONTROLS COMPLIANCE MANAGEMENT GUIDELINES, GOOD AND BEST PRACTICES AUDIT MANAGEMENT SUMMARY Domain 03 - Security Program Management and Operations PROGRAM MANAGEMENT OPERATIONS MANAGEMENT Summary Domain 04 - Information Security Core Concepts ACCESS CONTROL PHYSICAL SECURITY NETWORK SECURITY ENDPOINT PROTECTION APPLICATION SECURITY ENCRYPTION TECHNOLOGIES VIRTUALIZATION SECURITY CLOUD COMPUTING SECURITY TRANSFORMATIVE TECHNOLOGIES Summary Domain 05 - Strategic Planning, Finance, Procurement and Vendor Management STRATEGIC PLANNING Designing, Developing, and Maintaining an Enterprise Information Security Program Understanding the Enterprise Architecture (EA) FINANCE PROCUREMENT VENDOR MANAGEMENT Summary
SAFe® Lean Portfolio Management: In-House Training Create a culture of innovation, flexibility, and speed where all people in the portfolio can effectively execute as one unified team. In this course, you will gain the practical tools and techniques necessary to implement the Lean Portfolio Management functions of Strategy and Investment Funding, Agile Portfolio Operations, and Lean Governance. You will have the opportunity to capture the current and future state of the portfolio with the Portfolio Canvas tool and identify important business initiatives for achieving the future state. You'll be able to establish portfolio flow with the Portfolio Kanban and prioritize initiatives for maximum economic benefit. The course also provides insights on how to establish Value Stream Budgets and Lean Budget Guardrails and measure the Lean portfolio performance. What you will Learn Describe the importance of LPM Connect the portfolio to enterprise strategy Implement Lean budgeting and guardrails Establish portfolio flow with the Portfolio Kanban Support operational excellence with APMO and CoPs Coordinate Value Streams Measure the LPM performance Build a plan for LPM implementation Introducing Lean Portfolio Management (LPM) Establishing Strategy and Investment Funding Applying Agile Portfolio Operations Applying Lean Governance Implementing the LPM function
About this Training Course Time is money in all industries. For the Oil & Gas industry, this is no exception and the ability to maximise return on investment is all related to where the Oil is and how easily and quickly we can get that product to the customer. Whether in a technical, managerial or supporting role, you are a valuable asset in ensuring that project delivery targets are met and profits are realised. As Petroleum Engineering (PE) activities continue to increase, professionals like you must grasp the language and technology of PE operations in order to maximise expenditures throughout the producing life of a well. Petroleum Engineering equipment and procedures have a unique language that must be conquered for maximum benefit. Clear and understandable explanations of rig equipment, completion equipment, operations procedures, and their complex interactions provide an excellent foundation for smooth communication and increased efficiency in inter-department project team efforts. A confident understanding of the technical jargon and a visual appreciation of the various pieces of equipment used provides for an overall 'big picture' of the industry value chain. This serves as an excellent foundation for smooth communication and increased efficiency in inter-department project team efforts. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives By the end of this course, the participants will be able to: Define the role of Petroleum Engineering and its interaction between other departments Describe terms used in the Oil & Gas industry such as Surface/Subsurface, Upstream, Midstream and Downstream Describe the Appraisal of Oil & Gas Discoveries, the Cost Estimations, Economics & Reserves Explain what is the Formation, how do we connect to it, and how do we ensure best value Describe how to construct a well, select the equipment & methods, understand the duration that the well is required to perform for Target Audience This course will benefit those in geology, reservoir engineering, equipment and maintenance, and non-petroleum engineering technical professionals as well as forward-looking executives in the following fields who are interested to enhance their knowledge and awareness of the drilling process for increased productivity and contribution to the team that they're supporting: Accounting Administration Business Development Commercial E & P IT Estimation & Proposal Finance & Administration Finance HSE General Management Joint Ventures Legal Logistics Materials Planning Planning & Budgeting Procurement Sourcing Supply Chain Tender Contract Training Drilling Fluids Course Level Basic or Foundation Trainer Your Expert Course Trainer has over 40 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in well intervention and completions. After a number of years working for intervention service companies (completions, slickline & workovers), he joined Shell as a well service supervisor. He was responsible for the day-to-day supervision of all well intervention work on Shell's Persian/Arabian Gulf platforms. This included completion running, coil tubing, e-line, slickline, hydraulic workovers, well testing and stimulation operations. An office-based role as a senior well engineer followed. He was responsible for planning, programming and organising of all the well engineering and intervention work on a number of fields in the Middle East. He had a brief spell as a Site Representative for Santos in Australia before joining Petro-Canada as Completions Superintendent in Syria, then moved to Australia as Completions Operations Superintendent for Santos, before returning to Shell as Field Supervisor Completions and Well Interventions in Iraq where he carried out the first ever formal abandonment of a well in the Majnoon Field. While working on rotation, he regularly taught Completion Practices, Well Intervention, Well Integrity and Reporting & Planning courses all over the world. In 2014, he started to focus 100% on training and became the Technical Director for PetroEDGE. Since commencing delivering training courses in 2008, he has taught over 300 courses in 31 cities in 16 countries to in excess of 3,500 participants. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Training Course Geomechanical evaluations are about the assessment of deformations and failure in the subsurface due to oil & gas production, geothermal operations, CO2 storage and other operations. All geomechanical evaluations include four types of modelling assumptions, which will be systematically addressed in this training, namely: 1. Geometrical modelling assumption: Impact of structural styles on initial stress and stress redistribution due to operations 2. Formation (or constitutive) behaviour: Linear elastic and non-linear behaviour, associated models and their parameters, and methods how to constrain these using 3. Initial stress: Relation with structural setting and methods to quantify the in-situ stress condition 4. Loading conditions: Changes in pore pressure and temperature on wellbore and field scale This 5 full-day course starts with the determination of the stresses in the earth, the impact of different structural styles, salt bodies, faulting and folding on the orientation of the three main principal stress components. Different (field) data sources will be discussed to constrain their magnitude, while exercises will be made to gain hands-on experience. Subsequently, the concepts of stress and strain will be discussed, linear elasticity, total and effective stress and poro-elasticity in 1D, 2D and 3D, as well as thermal expansion. Participants will be able to construct and interpret a Mohr-circles. Also, different failure mechanisms and associated models (plastic, viscous) will be discussed. All these concepts apply on a material point level. Next, geomechanics on the wellbore scale is addressed, starting with the stress distribution around the wellbore (Kirsch equations). The impact of mudweight on shear and tensile failure (fracturing) will be calculated, and participants will be able to determine the mudweight window stable drilling operations, while considering well deviation and the use of oil-based and water-based muds (pore pressure penetration). Fracturing conditions and fracture propagation will be addressed. Field-scale geomechanics is addressed on the fourth day, focussing on building a 3D geomechanical model that is fit-for-purpose (focussing on the risks that need evaluation). Here, geological interpretation (layering), initial stress and formation property estimation (from petrophysical logs and lab experiments) as well as determining the loading conditions come together. The course is concluded with interpretation of the field-wide geomechanical response to reservoir depletion with special attention to reservoir compaction & subsidence, well failure and fault reactivation & induced seismicity. Special attention is paid to uncertainties and formulating advice that impacts decision-making during development and production stages of a project. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Upon completing of this course, the participants will be able to: Identify potential project risks that may need a geomechanical evaluation Construct a pressure-depth plot based on available field data (density logs, (X)LOT, FIT, RFT) Employ log-based correlation function to estimate mechanical properties Produce a simplified, but appropriate geometrical (layered, upscaled) model that honours contrasts in initial stress, formation properties and loading conditions, including Construct and interpret a Mohr-circle for shear and tensile failure Calculate the mud weight that leads to shear and tensile failure (fracturing conditions) Identify potential lab experiments to measure required formation properties Describe the workflow and data to develop a field-wide fit-for-purpose geomechanical model Discuss the qualitative impact of pressure and temperature change on the risk related to compaction, well failure, top-seal integrity and fault reactivation Target Audience This course is intended for Drilling Engineers, Well Engineers, Production Technologists, Completion Engineers, Well Superintendents, Directional Drillers, Wellsite Supervisors and others, who wish to further their understanding of rock mechanics and its application to drilling and completion. There is no specific formal pre-requisite for this course. However, the participants are requested to have been exposed to drilling, completions and production operations in their positions and to have a recommended minimum of 3 years of field experience. Course Level Intermediate Trainer Your expert course leader has over 30 years of experience in the Oil & Gas industry, covering all geomechanical issues in the petroleum industry for Shell. Some of his projects included doing research and providing operational advice in wellbore stability, sand failure prediction, and oil-shale retortion among others. He guided multi-disciplinary teams in compaction & subsidence, top-seal integrity, fault reactivation, induced-seismicity and containment. He was also involved in projects related to Carbon Capture Storage (CCS). He is the founding father of various innovations and assessment tools, and developed new insights into the root causes seismicity induced by Oil & Gas production. Furthermore, he was the regional coordinator for technology deployment in Africa, and Smart Fields (DOFF, iField) design advisor for Shell globally. He was responsible for the Geomechanical competence framework, and associated virtual and classroom training programme in Shell for the last 10 years. He served as one of the Subject Matter Expert (SME) on geomechanics, provided Technical Assurance to many risk assessments, and is a co-author of Shell's global minimun standard on top-seal integry and containment. He has a MSc and PhD in Civil Engineering and computational mechanics from Delft University of Technology, The Netherlands. Training experience: Developed and delivered the following (between 2010 and 2020): The competence framework for the global geomechanical discipline in Shell Online Geomechanical training programs for petroleum engineers (post-doc level) The global minimum standard for top-seal integrity assessment in Shell Over 50 learning nuggets with Subject Matter Experts Various Shell virtual Geomechanical training courses covering all subjects Developed Advanced Geomechanical training program for experienced staff in Shell Coaching of KPC staff on Geomechanics and containment issues on an internship at Shell in The Netherlands, Q4 2014 Lectured at the Utrecht University summer school (The Netherlands, 2020) on induced seismicity among renowned earthquake experts (Prof. Mark Zoback, Prof. Jean-Philippe Avouac, Prof. Jean-Pierre Ampuero and Prof. Torsten Dahm) (https://www.nwo.nl/onderzoeksprogrammas/deepnl/bijeenkomsten/6-10-juli-2020-deepnl-webinar-series-induced-seismicity) Lectured at the Danish Technical University summer school (Copenhagen, 2021) summer school on Carbon Capture and Storage (https://www.oilgas.dtu.dk/english/Events/DHRTC-Summer-School) Virtual Carbon Capture and Storage (CCS): Project Risks & How to Manage Them training course (October and November 2021) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
SAFe® Lean Portfolio Management: Virtual In-House Training Create a culture of innovation, flexibility, and speed where all people in the portfolio can effectively execute as one unified team. In this course, you will gain the practical tools and techniques necessary to implement the Lean Portfolio Management functions of Strategy and Investment Funding, Agile Portfolio Operations, and Lean Governance. You will have the opportunity to capture the current and future state of the portfolio with the Portfolio Canvas tool and identify important business initiatives for achieving the future state. You'll be able to establish portfolio flow with the Portfolio Kanban and prioritize initiatives for maximum economic benefit. The course also provides insights on how to establish Value Stream Budgets and Lean Budget Guardrails and measure the Lean portfolio performance. What you will Learn Describe the importance of LPM Connect the portfolio to enterprise strategy Implement Lean budgeting and guardrails Establish portfolio flow with the Portfolio Kanban Support operational excellence with APMO and CoPs Coordinate Value Streams Measure the LPM performance Build a plan for LPM implementation Introducing Lean Portfolio Management (LPM) Establishing Strategy and Investment Funding Applying Agile Portfolio Operations Applying Lean Governance Implementing the LPM function
Gain a deep understanding of Production Sharing Contracts (PSC) and related agreements through our expert-led course. Enroll now and excel in your field with EnergyEdge.