• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2070 Other courses in Newtownbreda delivered Live Online

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

VoIP & IP telephony demystified

5.0(3)

By Systems & Network Training

VoIP and IP Telephony training course description A concise overview course for management covering voice communications using IP networks. The course focuses on how VoIP works at a simplified level enabling delegates to recognise the key decisions to be made when implementing VoIP. What will you learn Describe the key buzzwords used in the VoIP arena. Explain how VoIP and IPT work (at a simplified level). Describe the issues of providing a converged architecture. Recognise the key decisions to be made when implementing VoIP VoIP and IP Telephony training course details Who will benefit: Anyone, although the course is particularly aimed at non-technical personnel needing some knowledge of VoIP. Prerequisites: Network fundamentals Duration 1 day VoIP and IP Telephony training course contents Introduction What is VoIP, brief review of IP, brief review of telephones, voice and signalling. VoIP issues Bandwidth, Delay, Jitter. Voice coding and compression, packetising voice, comparison of techniques, MOS.IP performance and QoS. The need for QoS, prioritising voice. Architectures Hard phones, soft phones, video phones, desktop, backbone, gateway, integrating analog phones and PCs, carriers, Softswitches. VoIP protocol stack RTP, RTCP. H.323 vs SIP, other signalling protocols. H.323 Architecture, Call setup, Gatekeepers. SIP Comparison with H.323, SIP proxy, proxy servers, redirect servers, location servers. MGCP and MegaCo Carrier networks, PSTN breakout, SS7 gateways, MGCP, Megaco. IP PBXs Integrating IP into 'normal' PBXs, IP PBXs, Asterisk. UM, other telephony applications.

VoIP & IP telephony demystified
Delivered in Internationally or OnlineFlexible Dates
£797

Definitive Kerberos for engineers

5.0(3)

By Systems & Network Training

Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.

Definitive Kerberos for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Preventive and Predictive Maintenance

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) Preventive and Predictive maintenance are not new concepts. Both have been used across industry all over the world and when done properly, can yield impressive results (cost reductions of 20% or greater and a leap forward in equipment reliability and performance are very achievable). However, for every company using these concepts effectively, there are many others who are not. This 8 half-day Virtual Instructor Led Training (VILT) course has been derived from the Plant Performance Improvement Road Map developed by practitioners that guarantee the reliability of your operations. The VILT training focuses on how to improve profitability of any business by identifying the right maintenance strategy for any equipment. The aim of the VILT training is to help practitioners run programmes that will deliver real benefits as fast as possible with minimum zero wasted effort. The VILT training will also cover the core principles of Reliability Centred Maintenance, Total Productive Maintenance and Six Sigma and the increasingly important role of operations in achieving optimised asset performance. This is a certified course with the option of sitting for a short exam on the final day of the course to give participants the opportunity to gain a Certificate from petroEDGE and the Carcharodon Maintenance Academy. Training Objectives Master the critical skills by acquiring the following: An understanding of how maintenance can add profit The ability to develop improvement programmes that deliver maximum benefit in the shortest time A fundamental understanding of the principles of Preventive, Predictive and other maintenance types A practical understanding of the latest methods of solving problems at root cause level An appreciation of maintenance methodologies such as Reliability Centred Maintenance Strategies for ensuring your company gets value for money from your Contractors How to use the Maintenance Model of Excellence and Plant Performance Improvement Road Map Target Audience This VILT course has been designed for maintenance managers and engineers, reliability professionals, planners, project engineers, operations team members, and functional specialists. Training Methods The VILT course will be delivered online in 8 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 8 half-day sessions, 4 hours per session (32 hours in total). Trainer Your expert course leader is an award-winning consultant and trainer with 30 years' experience in maintenance and reliability improvement. He has worked across five continents, in a wide variety of environments from the world's largest oil refinery to a small drinks production line. He has 10 years of maintenance management experience in the process industry, so he brings a very practical approach to training. He moved into consulting with ABB Eutech as their global maintenance specialist where he led maintenance and reliability best practice panels, delivered a wide range of maintenance improvement projects and trained other consultants. He is a fully qualified CMRP professional, an approved SMRP* Proctor, authorised to conduct CMRP exams and a globally respected maintenance consultant and best practice trainer. He founded his consultancy and training business in 2002 to focus on maintenance and reliability improvement. As part of this, he developed a range of maintenance 'models of excellence' with inputs from authors, international lecturers and some of the world's leading consultants and operators. His work has been recognised as being at the leading edge of industry best practice, winning independent awards such as the UK Chemical Industries Association 'Excellence in Engineering' award. He remains close to the industry as a respected specialist helping operating companies to achieve changes in performance. This ongoing field work enables him to continue to refine and extend best practice and the learning from this is continually fed into his training. His unique experience of facilitating two major turnarounds when the Coronavirus escalated into lockdown have given him a unique insight into how events of this type can disrupt maintenance. Moreover, his involvement in developing management processes and leading a Coronavirus response on a major industrial asset means he can talk with direct experience about how to cope and innovate in this global pandemic. *SMRP refers to Society of Maintenance and Reliability Professionals. PetroEdge is not affiliated with SMRP POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Preventive and Predictive Maintenance
Delivered in Internationally or OnlineFlexible Dates
£1,642 to £3,099

Peering demystified

5.0(3)

By Systems & Network Training

Peering demystified training course description A concise overview course covering The Internet and peering. Particular emphasis is placed on the structure of the Internet, how IXs benefit the Internet, IX architectures, peering and the technical buzzwords behind the IX services. What will you learn Describe the structure of the Internet Explain the role of RIPE, ARIN and IXs in the Internet Explain how IXs connect ISPs and the benefits of using IXs. Describe peering from a technical perspective including the role of BGP and AS's. Peering demystified training course details Who will benefit: Non technical staff working for Internet companies. Prerequisites: None. Duration 1 day Peering demystified training course contents IP and routers IP as glue. What is a router? How routers join networks, benefits and disadvantages of routers, default gateways, routing tables, routing protocols. Addressing IP address format, rules of IP addressing, where to get IP addresses. Subnetting and groups of IP addresses. The Internet What is the Internet? The big picture, IP basics, registering IP addresses, DNS and registering domain names, whois, The IAB, IANA, ICANN, RIPE and other Internet organisations. ISPs Top ISPs, Tier 1, Tier 2 and Tier 3 ISPs, backbone providers, circuit providers, content providers, virtual ISPs, the internal network of ISPs. Customer connections to ISPs (DSL, Leased lines, MPLS…) ISP to ISP connections: Peering points Public peering versus private peering, NAPs, Internet Exchanges, Metropolitan Area Exchanges, LINX, other major peering points, the geography of the Internet. BGP and ASNs. How to peer. IRRs. IX architecture Ethernet switching.

Peering demystified
Delivered in Internationally or OnlineFlexible Dates
£797

Project Communication Skills (Virtual)

By IIL Europe Ltd

Project Communication Skills (Virtual) Communication is the single most critical project success factor. When effective, projects get executed on time, within budget, and with objectives being met. But that isn't all. Strong communication also nurtures healthy team relationships. And in today's highly diverse world, where projects are often fast-paced, complex, and virtual, that is more important than ever. Strong communication skills foster cultural awareness, trust, and empathy. Together, they contribute greatly to project success-and ultimately, to future project success. In this course, participants will actively explore best communication practices from a variety of perspectives: in-person, virtual, electronic, and via formal project documentation. In order to be transformative, however, those perspectives will be filtered further through the lens of their formal, personalized assessment. It is a powerful tool which identifies individuals' internal needs and priorities. It translates those into descriptive profiles and reports, gifting users with valuable information about themselves and others. Paired with the course's real-world activities, it will provide uniquely strategic opportunities for communicating effectively and meaningfully-and with less conflict, both personally and professionally. What you will Learn At the end of this program, you will be able to: Identify basic elements of communication and explain how they affect teams Explore how your assessment style impacts you and how you communicate with people of other styles Infer how your style impacts the way(s) you send and interpret emails and instant messages Analyze real world email and instant messaging practices to determine how they affect communication and relationships Explore best practices for formal project communications and presentations Analyze how your assessment style and global diversity can contribute to both strong team communication and conflict Identify solutions for virtual team work communication challenges Foundation Concepts Communication as a foundation skill Elements of communication Communicating across media Targeting your audience How communication impacts team performance The Assessment Framework Overview of the assessment's approach Exploring assessment report Increasing your effectiveness with other assessment styles Email and Instant Messages Preferred communications and assessment styles The email brands we create Assessment styles and email Emotion and email Email guidelines and best practices Anatomy of an email The seven deadly email sins Instant messages and other interfaces Project Communications and Presentations Communicating across the project lifecycle Project templates Structuring a presentation Delivering a presentation Interpersonal and Team Communication Skills Communication styles and techniques Managing conflict in a project environment Styles and conflict Communication and global team leadership Virtual Communication Leading global virtual teams Virtual processes and technology Virtual team leadership

Project Communication Skills (Virtual)
Delivered OnlineFlexible Dates
£850

Project Communication Skills: Virtual In-House Training

By IIL Europe Ltd

Project Communication Skills: Virtual In-House Training Communication is the single most critical project success factor. When effective, projects get executed on time, within budget, and with objectives being met. But that isn't all. Strong communication also nurtures healthy team relationships. And in today's highly diverse world, where projects are often fast-paced, complex, and virtual, that is more important than ever. Strong communication skills foster cultural awareness, trust, and empathy. Together, they contribute greatly to project success-and ultimately, to future project success. In this course, participants will actively explore best communication practices from a variety of perspectives: in-person, virtual, electronic, and via formal project documentation. In order to be transformative, however, those perspectives will be filtered further through the lens of their formal, personalized assessment. It is a powerful tool which identifies individuals' internal needs and priorities. It translates those into descriptive profiles and reports, gifting users with valuable information about themselves and others. Paired with the course's real-world activities, it will provide uniquely strategic opportunities for communicating effectively and meaningfully-and with less conflict, both personally and professionally. What You Will Learn At the end of this program, you will be able to: Identify basic elements of communication and explain how they affect teams Explore how your assessment style impacts you and how you communicate with people of other styles Infer how your style impacts the way(s) you send and interpret emails and instant messages Analyze real world email and instant messaging practices to determine how they affect communication and relationships Explore best practices for formal project communications and presentations Analyze how your assessment style and global diversity can contribute to both strong team communication and conflict Identify solutions for virtual team work communication challenges Getting Started Foundation Concepts Communication as a foundation skill Elements of communication Communicating across media Targeting your audience How communication impacts team performance The Assessment Framework Overview of the assessment's approach Exploring assessment report Increasing your effectiveness with other assessment styles Email and Instant Messages Preferred communications and assessment styles The email brands we create Assessment styles and email Emotion and email Email guidelines and best practices Anatomy of an email The seven deadly email sins Instant messages and other interfaces Project Communications and Presentations Communicating across the project lifecycle Project templates Structuring a presentation Delivering a presentation Interpersonal and Team Communication Skills Communication styles and techniques Managing conflict in a project environment Styles and conflict Communication and global team leadership Virtual Communication Leading global virtual teams Virtual processes and technology Virtual team leadership

Project Communication Skills: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Maintenance and Reliability Best Practices - Aligned with SMRP* Best Practices and the CMRP Certification

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This 4 full-day Maintenance and Reliability Masterclass course will provide Maintenance and Reliability personnel with a full explanation of the Award-winning Model of Excellence for maintenance. This is top tier training that has also been designed to equip participants with practical skills to take back to work. The course enables participants to develop a strategy to achieve outstanding maintenance and reliability performance for their own workplace. This course is aligned with SMRP* best practices and the CMRP exam. It provides an opportunity for participants to sit for an examination+ on the final day of the course. Your facilitator for this course is a fully qualified CMRP professional, an approved SMRP Proctor, authorised to conduct CMRP exams and a globally respected maintenance consultant and best practice trainer. +Exam fees are not inclusive in the course fees. *SMRP refers to Society of Maintenance and Reliability Professionals. PetroEdge is not affiliated with SMRP. Training Objectives By the end of this course, participants will be able to: Appreciate the content and underlying principles of our maintenance Model of Excellence o How to develop a strategy for outstanding maintenance and reliability performance o Developing reliability methodologies and programmes to drive performance o Options and tools to improve reliability at equipment level o Leadership skills and improving organisation and human performance o Work with management with an overview of the latest practice in planning scheduling and control Describe how maintenance can become a more strategic and influential function Use the Carcharodon model of excellence and class leading methodologies for improving maintenance and reliability Target Audience This course will benefit: Maintenance managers Reliability professionals Experienced supervisors Planners Project engineers Operations managers Functional specialists Course Level Basic or Foundation Training Methods Course methodology of this training course: Other than world-class visuals and slides, this course will include a high level of interaction between the facilitator and participants and group discussion among the participants themselves. There will be a number of case studies to demonstrate key points and also a minimum of one workshop exercise each day to give participants the chance to apply learning and appreciate key aspects of best practice. Participants will also have the chance to share examples from their own experience, discuss real problems they are facing and develop actions for improvement when they return to work. Examples of the exercises that are used in this course are as follows: Exercise: Understanding the challenges and seeing the opportunities Exercise: Developing a strategy Group Exercise: Selecting maintenance plans Group exercise: Case study failure Group exercise: Planning work Trainer Your expert course leader is an award-winning consultant and trainer with 30 years' experience in maintenance and reliability improvement. He has worked across five continents, in a wide variety of environments from the world's largest oil refinery to a small drinks production line. He has 10 years of maintenance management experience in the process industry, so he brings a very practical approach to training. He moved into consulting with ABB Eutech as their global maintenance specialist where he led maintenance and reliability best practice panels, delivered a wide range of maintenance improvement projects and trained other consultants. He is a fully qualified CMRP professional, an approved SMRP* Proctor, authorised to conduct CMRP exams and a globally respected maintenance consultant and best practice trainer. He founded his consultancy and training business in 2002 to focus on maintenance and reliability improvement. As part of this, he developed a range of maintenance 'models of excellence' with inputs from authors, international lecturers and some of the world's leading consultants and operators. His work has been recognised as being at the leading edge of industry best practice, winning independent awards such as the UK Chemical Industries Association 'Excellence in Engineering' award. He remains close to the industry as a respected specialist helping operating companies to achieve changes in performance. This ongoing field work enables him to continue to refine and extend best practice and the learning from this is continually fed into his training. His unique experience of facilitating two major turnarounds when the Coronavirus escalated into lockdown have given him a unique insight into how events of this type can disrupt maintenance. Moreover, his involvement in developing management processes and leading a Coronavirus response on a major industrial asset means he can talk with direct experience about how to cope and innovate in this global pandemic. He is also the expert course leader for the following courses offered by PetroEdge: Preventive and Predictive Maintenance Effective Plant Turnaround Management POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Maintenance and Reliability Best Practices - Aligned with SMRP* Best Practices and the CMRP Certification
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

Microsoft Project Orange Belt 2016: In-House Training

By IIL Europe Ltd

Microsoft Project Orange Belt® 2016: In-House Training This workshop gives participants a full insight into creating effective schedules using Microsoft® Project 2016, allowing you to estimate, coordinate, budget, staff, and control projects and support other users. This workshop gives participants a full insight into creating effective schedules using Microsoft® Project 2016, allowing you to estimate, coordinate, budget, staff, and control projects and support other users. This workshop provides the eBook Dynamic Scheduling with Microsoft® Project 2013, and is kept up to date with the framework of knowledge outlined by the Project Management Institute's PMBOK® Guide and the Practice Standard for Scheduling. What you Will Learn You'll learn how to: Understand what's new in Project 2016 Explain where Project 2016 fits in the Microsoft® EPM solution Initialize Project 2016 to start project planning Create a well-formed project schedule Understand task types and the schedule formula Assign resources and costs to tasks Analyze resource utilization and optimize the schedule Set a baseline and track progress Create and manage project reports Customize views and fields Apply Earned Value Management Understand the basics of managing multiple projects Getting Started Introductions Course structure Course goals and objectives Concepts of Project Management Getting Started with Project 2016 Project 2016: What's New and General Overview Setting Up a New Project Schedule (templates, options, save, etc.) Setting the Project Calendar Entering Tasks The planning processes Importing tasks (Word, Excel, SharePoint) Synchronizing with SharePoint Tasks List Creating and managing the WBS (include tasks, manually scheduled tasks, summary tasks, milestones, and custom WBS coding) Entering Estimates Tendencies in estimating The rolling wave approach Entering duration and work estimates Types of tasks Entering Dependencies The principle of dynamic scheduling Choosing the right Type of dependency Entering dependencies in Project 2016 Different applications of dependencies Entering Deadlines, Constraints, and Task Calendars Use of deadlines and constraints Entering deadlines and constraints in Project 2016 Entering Resources and Costs Types of resources Entering resources in Project 2016 Calendars and resources Entering costs in Project 2016 Entering Assignments Assignments in a schedule Assignments and task types Entering assignments in Project 2016 Assignments, budgets, and costs Optimizing the Schedule The critical path method (CPM) and the resource critical path (RCP) Resource leveling Optimizing time, cost, and resources in Project 2016 Updating the Schedule The baseline Updating strategies and situations Prepare the status and forecast report in Project 2016 Reporting Using reports Using Visual Reports Formatting and printing in Project 2016 Customizing fields in Project 2016 Earned Value Management (EVM) Overview of EVM Applying EVM with Project 2016 Evaluating the Project Evaluating the project performance Project benefits and results Templates for future projects Summary and Next steps Tools and checklist Best practices checklist Certification options

Microsoft Project Orange Belt 2016: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,695

Online Postgraduate Certificate Business of Motorsport

5.0(1)

By National Motorsport Academy

The Postgraduate Certificate (PG Cert.) consists of the first four modules from the MA Business of Motorsport Master’s Degree. You can then achieve a Postgraduate Diploma (PG Dip.) Business of Motorsport by studying the PG Dip. Top-Up, a further three modules from the MA.

Online Postgraduate Certificate Business of Motorsport
Delivered OnlineFlexible Dates
£3,950 to £5,925