Duration 2 Days 12 CPD hours This course is intended for People working in an organization aiming to improve performance, especially in response to digital transformation or disruption. Any roles involved in the creation and delivery of products or services: Leadership and CXO, especially CIO, CTO, CPO, and CVO Transformation and evolution leads and change agents Value stream architects, managers, engineers Scrum Masters, agile and DevOps coaches and facilitators Portfolio, product and project managers, and owners Business analysts Architects, developers, and engineers Release and environment managers IT Ops, service and support desk workers Customer experience and success professionals Overview After completing this course, students will be able to: Describe the origins of value stream management and key concepts such as flow, value, and delivery Describe what value stream management is, why it's needed and the business benefits of its practice Describe how lean, agile, DevOps, and ITSM principles contribute to value stream management Identify and describe value streams, where they start and end, and how they interconnect Identify value stream roles and responsibilities Express value streams visually using mapping techniques, define current and target states and hypothesis backlog Write value stream flow and realization optimization hypotheses and experiments Apply metrics such as touch/processing time, wait/idle time, and cycle time to value streams Understand flow metrics and how to access the data to support data-driven conversations and decisions Examine value realization metrics and aligning to business outcomes, and how to sense and respond to them (outcomes versus outputs) Architect a DevOps toolchain alongside a value stream and data connection points Design a continuous inspection and adaptation approach for organizational evolution The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, process, and technology aspects of this way of working and explores how optimizing value streams for flow and realization positively impacts organizational performance. History and Evolution of Value Stream Management and its Application Value stream management?s origins Definitions of value stream management Flow Lean and systems thinking and practices Agile, DevOps and other frameworks Research and analysis Identifying Value Streams What is a value stream? Identifying value streams Choosing a value stream Digital value streams Value stream thinking Mapping Value Streams Types of maps Value stream mapping The fuzzy front end Artifacts 10 steps to value stream mapping Mapping and management VSM investment case Limitations of value stream mapping Connecting DevOps Toolchains CICD and the DevOps toolchain Value stream management processes Value stream management platforms DevOps tool categories Building an end-to-end DevOps toolchain Common data model and tools integrations Value Stream Metrics The duality of VSM Downtime in technology Lean, DORA and Flow metrics Definition of Done Value metrics Benefits hypotheses Value streams as profit centers KPIs and OKRs Inspecting the Value Stream 3 Pillars of Empiricism Organizational performance Visibility When to inspect Data and discovery Insights and trends Organizing as Value Streams Value stream alignment Team types and topologies Project to product Hierarchy to autonomy Target Operating Model Value stream people Value stream roles Value stream funding Evolving Value Streams Why now? Transitions VSM capability matrix VSM culture iceberg Learning Making local discoveries global improvements Managing value stream interdependencies
Duration 2 Days 12 CPD hours This course is intended for This is an introductory-level course for Administrators who are new to Jira (this is NOT for experienced Jira admin or users). Students should have a background in basic administration. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment, exploring several practical use cases that provide context as to where and when to use Jira, students will learn about: user management global and project permissions project roles schemes configuration of issue types, workflows, and screens Tracking issues is a critical component of any project management strategy. JIRA provides a web based single repository for creating, tracking and reporting on feature requests, bugs reported, or managing workflow. Geared for administrators new to Jira, JumpStart to Jira for Administrators | Jira Administration is a two-day, hands-on course that explores the most important tasks required to set up Jira, providing students with ample hands-on experience using common administration tasks. This hands-on course enables the Student to administer a JIRA instance and ?learn by doing?. The focus of this course is on Best Practices, and practical skills. Getting started with JIRA Administration JIRA conceptual review Core concepts Terminology Infrastructure JIRA roles Groups vs Roles Overview Project roles Creating a role Project scaling JIRA User management Project Resolution Project status Resolved status Resolution date Schemes Overview Project scope schemes Adding users to schemes Issue type schemes Notification schemes Permission schemes Issue security schemes working with schemes JIRA as a Platform Overview What can be configured Basic JIRA project setup Advanced project setup Workflows Overview Designing a workflow Defining a workflow Implementing a workflow Deploying workflows Workflow events Transitions and sub-tasks Custom Fields Overview Field types Field context Limiting contexts Adding contexts Screens and field configuration Best practices for custom fields User Lifecycle Overview Adding users Adding third-party users Modifying users Deactivating users Remote JIRA Access Overview Emails SQL REST Webhooks XML and RSS Command Line Interface Integrating JIRA with other applications Migrating Data into JIRA Overview Migration steps The CSV importer JIRA cloud migration Summary and Best Practices Looking back at the ?Big Picture? Optional - Jira Certification Prep Review Additional course details: Nexus Humans JumpStart to Jira for Administrators | Jira Administration (TTDV7540) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JumpStart to Jira for Administrators | Jira Administration (TTDV7540) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many other of F5's BIG-IP instructor-led training courses. Overview Getting started with the BIG-IP system Traffic processing with BIG-IP Local Traffic Manager (LTM) Using the TMSH (TMOS Shell) command line interface Using NATs and SNATs Monitoring application health and managing object status Modifying traffic behavior with profiles, including SSL offload and re-encryption Modifying traffic behavior with persistence, including source address affinity and cookie persistence Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump User roles and administrative partitions vCMP concepts Customizing application delivery with iRules This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Configuring the Management Interface Activating the Software License Provisioning Modules and Resources Importing a Device Certificate Specifying BIG-IP Platform Properties Configuring the Network Configuring Network Time Protocol (NTP) Servers Configuring Domain Name System (DNS) Settings Configuring High Availability Options Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Traffic Processing Building Blocks Identifying BIG-IP Traffic Processing Objects Configuring Virtual Servers and Pools Load Balancing Traffic Viewing Module Statistics and Logs Using the Traffic Management Shell (TMSH) Understanding the TMSH Hierarchical Structure Navigating the TMSH Hierarchy Managing BIG-IP Configuration State and Files BIG-IP System Configuration State Loading and Saving the System Configuration Shutting Down and Restarting the BIG-IP System Saving and Replicating Configuration Data (UCS and SCF) Using NATs and SNATs Address Translation on the BIG-IP System Mapping IP Addresses with NATs Solving Routing Issues with SNATs Configuring SNAT Auto Map on a Virtual Server Monitoring for and Mitigating Port Exhaustion Monitoring Application Health Introducing Monitors Types of Monitors Monitor Interval and Timeout Settings Configuring Monitors Assigning Monitors to Resources Managing Pool, Pool Member, and Node Status Using the Network Map Modifying Traffic Behavior with Profiles Introducing Profiles Understanding Profile Types and Dependencies Configuring and Assigning Profiles Introducing SSL Offload and SSL Re-Encryption Managing Object State Modifying Traffic Behavior with Persistence Understanding the Need for Persistence Introducing Source Address Affinity Persistence Managing Object State Administering the BIG-IP System Configuring Logging Legacy Remote Logging Introducing High Speed Logging (HSL) High-Speed Logging Filters HSL Configuration Objects Configuring High Speed Logging Using TCPDUMP on the BIG-IP System Leveraging the BIG-IP iHealth System Viewing BIG-IP System Statistics Defining User Roles and Administrative Partitions Leveraging vCMP Configuring High Availability Introducing Device Service Clustering (DSC) Preparing to Deploy a DSC Configuration Configuring DSC Communication Settings Establishing Device Trust Establishing a Sync-Failover Device Group Synchronizing Configuration Data Exploring Traffic Group Behavior Understanding Failover Managers and Triggers Achieving Stateful Failover with Mirroring
This comprehensive training program covers many concepts in Microsoft Power BI. From beginner to advanced levels, learn data visualization, advanced DAX expression, Python integration, custom visuals, data preparation, and collaboration in Power BI service. Develop expertise in Power BI and position yourself for a successful career in data analytics.
Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Use the features in project to report effectively on your plans. Course overview Duration: 4 hours Our Project – Reporting course is aimed at experienced users of Project who need to create reports in their project plans. It looks at using the different types of report in Project, exporting data to other packages, building new reports and sharing reports between projects. Experience of using Project to create and resource plans is required. Objectives By the end of the course you will be able to: Print and PDF data from your project Use timelines Setup filters and groups Import and export data Create and share dashboard reports Content Printing and reporting Setup and Printing Creating PDFs Visual reports Using the Timeline Filtering and grouping Applying filters Applying grouping Creating your own filters and groups Importing and exporting data Importing data into Project Exporting data Creating and saving data maps Dashboard reports Using dashboard reports Creating dashboard reports Adding widgets Customising data shown
Youth workers plan, organise and supervise community programs for young people. It enables young people to naturally develop their voice, influence, and place in society, allowing them to reach their full potential. Young people need to develop strong interpersonal and social skills. This Level 2 Youth Work Certificate course will teach you how to organise youth work and youth engagement activities. The fundamentals of outdoor management and the skills and responsibilities of youth workers will be discussed. In addition, you will learn how to plan, organise, and supervise community programs aimed at young people. You will be introduced to various methodologies and models that have influenced modern youth work practices through both practical and theoretical training. This Level 2 Youth Work Certificate course's lessons have been designed so that anyone with no prior knowledge of the subject can easily dive into them. So enrol now and successfully start your career. Why choose this Level 2 Youth Work Certificate course from the School of Health Care? Self-paced course, access available from anywhere in the world. High-quality study materials that are easy to understand. Course developed by industry experts. After each module, there will be an MCQ quiz to assess your learning. Assessment results are generated automatically and instantly. 24/7 support is available via live chat, phone call, or email. Free PDF certificate after completing the course. >> Main Course: Level 2 Youth Work Certificate >> Free Courses*** Course 01: Social Worker Course 02: Adults Support Worker Course 03: Mental Health Support Worker >> Others benefit Included with This Level 2 Youth Work Certificate Course Free 4 PDF Certificate Access to Content - Lifetime Exam Fee - Totally Free Free Retake Exam [ Note: Free PDF certificate as soon as completing the Level 2 Youth Work Certificate Course] Learning Objectives After completing this Level 2 Youth Work Certificate course, the learner will be able to: Understand the fundamentals of youth work. Recognise who are youth workers. Know the role and approaches of youth workers. Explain the ethical conduct and principles in youth work. Describe the social change in youth development work. Know the National Youth Agency (NYA). Explain youth work according to the EU. Know the mental health of youth workers. Deal with stress. Describe youth justice and social work Course Curriculum >> Level 2 Youth Work Certificate Module 01: Overview to Youth Work Module 02: Youth Workers: Who Are They? Module 03: Role and Approaches of Youth Worker Module 04: Ethical Conduct and Principles in Youth Work Module 05: Career as a Youth Worker (Social Work) Module 06: Social Influences on Youth Worker Module 07: The National Youth Agency (NYA) Module 08: The EU on Youth Work Module 09: Mental Health of Youth Worker Module 10: Dealing with Stress Module 11: Youth Justice and Social Work Assessment Method After completing Level 2 Youth Work Certificate Course, you will get quizzes to assess your learning. You will do the later modules upon getting 60% marks on the quiz test. Apart from this, you do not need to sit for any other assessments. Certification After completing the Level 2 Youth Work Certificate course, you can instantly download your certificate for FREE. The hard copy of the certification will also be delivered to your doorstep via post, which will cost £13.99. Who is this course for? This Level 2 Youth Work Certificate is open to people of all backgrounds. Individuals in related professions can also enrol in this course to refresh or strengthen their skills. In addition, students can take this course to gather professional knowledge besides their study or for the future. Requirements There are no particular requirements for this Level 2 Youth Work Certificate Course because it doesn't call for any specialized training. To enroll in this Level 2 Youth Work Certificate course, students must fulfill the following requirements: Good Command over English language Be energetic and self-motivated Basic computer Skill You must be at least 15 years old Career path Enrol in the Level 2 Youth Work Certificate course today to learn the skills and knowledge required to work with young people and organise youth activities. Opportunities in this field are: Youth Worker Working within a community organisation PE Teacher Social Worker
Youth Work: Youth Work Diploma Level 2 Course Online Youth workers plan, organise and supervise community programs for young people. It enables young people to naturally develop their voice, influence, and place in society, allowing them to reach their full potential. Young people need to develop strong interpersonal and social skills. This Youth Work Diploma Level 2 course will teach you how to organise youth work and youth engagement activities. The fundamentals of outdoor management and the skills and responsibilities of youth workers will be discussed. In addition, you will learn how to plan, organise, and supervise community programs aimed at young people. You will be introduced to various methodologies and models that have influenced modern youth work practices through both practical and theoretical training. This Youth Work Diploma Level 2 course's lessons have been designed so that anyone with no prior knowledge of the subject can easily dive into them. So enrol now and successfully start your career. Why choose this Youth Work Diploma Level 2 course from the School of Health Care? Unlimited access to the course. Instant e-certificate and hard copy dispatch by next working day. Course material developed by qualified professionals. Self-paced learning is accessible via laptop, tablet and smartphone. 24/7 Learning assistance and tutor support. No hidden fees or exam charges. Discounts on bulk purchases. Main Course: Youth Work Diploma Level 2 Free Courses Course 01: Level 2 Award in Suicide Awareness Course 02: Adults Support Worker Course 03: Mental Health Support Worker Others benefit Included with This Youth Work Diploma Level 2 Course Free 4 PDF Certificate Access to Content - Lifetime Exam Fee - Totally Free Free Retake Exam [ Note: Free PDF certificate as soon as completing the Youth Work Diploma Level 2 Course] Youth Work: Youth Work Diploma Level 2 Course Online This Youth Work: Youth Work Diploma Level 2 Course consists of 11 modules. Course Curriculum of Youth Work Diploma Level 2 Module 01: Overview to Youth Work Module 02: Youth Workers: Who Are They? Module 03: Role and Approaches of Youth Worker Module 04: Ethical Conduct and Principles in Youth Work Module 05: Career as a Youth Worker (Social Work) Module 06: Social Influences on Youth Worker Module 07: The National Youth Agency (NYA) Module 08: The EU on Youth Work Module 09: Mental Health of Youth Worker Module 10: Dealing with Stress Module 11: Youth Justice and Social Work Assessment Method of Youth Work Diploma Level 2 After completing Youth Work Diploma Level 2 Course, you will get quizzes to assess your learning. You will do the later modules upon getting 60% marks on the quiz test. Apart from this, you do not need to sit for any other assessments. Certification of Youth Work Diploma Level 2 After completing the Youth Work Diploma Level 2 course, you can instantly download your certificate for FREE. The hard copy of the certification will also be delivered to your doorstep via post, which will cost £13.99. Who is this course for? Youth Work: Youth Work Diploma Level 2 Course Online This Youth Work Diploma Level 2 is open to people of all backgrounds. Individuals in related professions can also enrol in this course to refresh or strengthen their skills. In addition, students can take this course to gather professional knowledge besides their study or for the future. Requirements Youth Work: Youth Work Diploma Level 2 Course Online To enrol in this Youth Work: Youth Work Certificate Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Youth Work: Youth Work Certificate Course. Be energetic and self-motivated to complete our Youth Work: Youth Work Certificate Course. Basic computer Skill is required to complete our Youth Work: Youth Work Certificate Course. If you want to enrol in our Youth Work: Youth Work Certificate Course, you must be at least 15 years old. Career path Youth Work: Youth Work Diploma Level 2 Course Online Enrol in the Youth Work Diploma Level 2 course today to learn the skills and knowledge required to work with young people and organise youth activities. Opportunities in this field are: Youth Worker Working within a community organisation PE Teacher Social Worker