• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4384 PE courses in Cardiff delivered Live Online

BA04 - Eliciting and Writing Effective Requirements

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for beginner to intermediate business and requirements analysts who are looking to improve their elicitation and requirements writing and documentation skills. This course is also a great fit for technical writers, product and software testers, project managers, product owners who work closely with business analysts or who perform some for of business analysis themselves. Overview Understand the role of the business analyst and core competencies for performing successfully Discuss the criticality of business analysis and requirements for successful project outcomes Understand the main professional associations and standards supporting business analysts in the industry Discuss the common problems with requirements and explore approaches to address these issues Obtain a clear understanding of the various requirements types and the significance for eliciting each type Demonstrate your ability to identify stakeholders Explore various methods for understanding and analyzing stakeholders Discuss and apply good planning practices to requirements elicitation efforts Obtain knowledge and understanding of over 15 current and commonly applied elicitation techniques Understand how to progress from elicitation to analysis to documentation Write well-formed and validated requirements Gain understanding of the best practices for writing quality requirements Learn the technical writing techniques that apply directly to writing requirements documents Discuss writing pitfalls, risks that impact requirements, and how to address them Learn best practices for communicating and collaborating with stakeholders, sharing the results of elicitation and the resulting documentation Learn approaches for validating requirements Understand the difference between validating requirements and validating the solution With elicitation serving as a major component of the requirements process, it is imperative that business analysts maintain high competency levels in elicitation practices and technique use to help organizations overcome the requirements related challenges faced on projects. Regardless whether you are a practitioner just starting off your career in business analysis or whether you have been performing the role for some years, this course will provide insight into the latest thoughts on elicitation and writing effective requirements and present a number of current techniques that are being applied on projects across industries today. Review of Foundational Concepts Definition of a business analysis Definition of business analyst BA role vs. PM role Business analysis competencies Benefits of business analysis Purpose for having a BA standard IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Business analysis core concepts Discussion: Project challenges Understanding Requirements Common problems with requirements Understand the problem first Define the business need Situation statements and moving to requirements Understanding requirement types Business requirements Stakeholder/User Requirements Solution Requirements Functional Requirements Non-Functional Requirements Assumptions and Constraints Discussions: Requirement problems, business needs, and identifying non-functional requirements Discovering Stakeholders Definition of a stakeholder Stakeholder types Identifying stakeholders Performing stakeholder analysis Stakeholders and requirements Tips for identifying stakeholders Grouping stakeholders Creating a RACI model Tips for analyzing stakeholders Documenting results of stakeholder analysis Workshop: Discovering stakeholders Preparing for Requirements Elicitation Planning for elicitation Benefits of elicitation planning What do you plan? The elicitation plan Setting objectives for elicitation Determining the scope for elicitation Establishing pre-work Determining the outputs for the session The iterative nature of elicitation Elicitation roles Elicitation planning techniques Discussions: Who to involve in elicitation, planning impacts, and unplanned elicitation Workshop: Planning for elicitation Conduct Requirements Elicitation Elicitation skillset Types of elicitation techniques Using active listening in elicitation Techniques for performing elicitation Benchmarking/Market Analysis Brainstorming Business Rules Analysis Collaborative Games Concept Modeling Data Mining Data Modeling Document Analysis Focus Groups Interface Analysis Interviews Observation Process Modeling Prototyping Survey or Questionnaire Workshops Write Effective Requirements Elicitation and Analysis Requirements related issues Implications of bad requirements Elicitation and documentation Writing skillset Documenting requirements Modeling requirements Defining the project life cycle Impact of project life cycle on documentation Requirements specifications Characteristics of good requirements Guidelines for writing textual requirements Structuring a requirement Writing pitfalls Traceability Requirements attributes Risks associated to requirements Discussions: Project Life Cycle and Correcting Poorly Written Requirements Workshops: Documenting Requirements and Identify Characteristics of Good Requirements Confirm and Communicate Elicitation Requirements Business analysis communication Requirements communication Communication skills The 7 Cs Timing of communication Planning communication Importance of Collaboration Planning collaboration Documenting communication/collaboration needs Confirming elicitation results Verify requirements Characteristics of good requirements (revisited) Requirements checklist Requirements validation Signing off on requirements Discussions: Responsibility for Communication, Eliciting Communication Needs, Validation Signoff Workshops: Communicating Requirements and Obtaining Signoff Evaluate the Solution Business analyst role in solution evaluation Why solutions under perform What we are looking for in solution evaluation When does solution evaluation occur Performing solution evaluation Planning solution evaluation Metrics that might exist Evaluating long term performance Qualitative vs. quantitative measures Tools & techniques used in solution evaluation Comparing expected to actuals When solution evaluation discovers a variance Tools/techniques for analyzing variances Proposing a recommendation Communicating results of solution evaluation Discussion: Addressing Variance Wrap up and Next Steps Useful books and links on writing effective requirements BABOK© Guide Business Analysis for Practitioners: A Practice Guide Additional course details: Nexus Humans BA04 - Eliciting and Writing Effective Requirements training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA04 - Eliciting and Writing Effective Requirements course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA04 - Eliciting and Writing Effective Requirements
Delivered OnlineFlexible Dates
Price on Enquiry

Coaching for Results (Second Edition)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for working professionals in various job roles, both native and non-native English speakers, who use formal and informal written communications in the course of business, and who seek to improve their grammar usage. Overview In this course, you will develop the skills to coach for results. You will: Define coaching and determine how you want to coach. Build a foundation for coaching. Establish a coaching process. Execute a coaching plan. Coach teams and coach remotely. As a leader in your organization, you're expected to help people meet or exceed expectations and to help ensure productivity and profitability for the organization. Coaching is a leadership tool that is effective in improving performance and contributing to the goals of the organization. In this course, you will build a foundation for coaching, establish a coaching process, execute a coaching plan, and explore strategies for coaching in different business scenarios. Many different factors can affect employee performance. When performance problems arise, people need to be supported to get back on track and do their jobs well. Coaching is an effective way of confirming an employee's value while improving performance. Coaching contributes to employee retention because it offers the opportunity to grow, provides motivation, and supports learning. Coaching also enhances the image and effectiveness of managers and supervisors. Defining Yourself as a Coach Define Coaching Determine a Coaching Approach Developing Core Coaching Skills Evaluate Performance Develop Essential Interpersonal Skills Establishing a Coaching Process Initiate the Coaching Relationship Agree on a Coaching Plan Executing the Coaching Plan Coach Adjust the Coaching Plan Verify That Goals Have Been Met Coaching in Different Business Scenarios Coach a Team Coach Remotely

Coaching for Results (Second Edition)
Delivered OnlineFlexible Dates
Price on Enquiry

SCRUM Foundation (SP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Todas aquellas personas que tengan relaci¢n con proyectos que requieran de una gesti¢n gil: Clientes, Promotores, Project Managers, Proveedores o Subcontratas, Equipo del Proyecto: Perfiles T‚cnicos, Perfiles de apoyo o Staff. En definitiva a cualquier persona que tenga relaci¢n con un proyecto gil. Overview Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?m‚todo??Desde finales del siglo pasado, se viene analizando la gesti¢n de proyectos cl sica conocida como Gesti¢n de Proyectos Predictiva, comprobando que no puede/debe ser aplicada a todo tipo de proyecto. Existen multitud de proyectos donde el nivel de detalle de las caracter¡sticas de los entregables est asociado al concepto IKIWISI (I?ll Know It When I See It -> Lo sabr‚ cuando lo vea), otros proyectos que tienen muy bien definido el objetivo, pero dadas unas necesidades cambiantes, la manera de abordarlo puede ser bien diferente, otros proyectos que? En definitiva se ha puesto de manifiesto que la gesti¢n de proyectos predictiva, no es del todo til para estos tipos de proyecto. Durante este curso, analizaremos otra forma de hacer las cosas. Veremos c¢mo abordar estos otros tipos de proyectos que requieren de una gesti¢n diferente: una Gesti¢n µgil. Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?m‚todo?? Introducci¢n a Agile y Scrum Primeros conceptos Metodolog¡as µgiles Agile Manifesto y Principios µgiles ¨Qu‚ hay bajo el paraguas de Agile? Las 3 grandes aproximaciones a Agile: LEAN, XP y Scrum El entorno de trabajo µgil Roles µgiles Trabajando de forma gil Definir la Visi¢n del Producto Planificar la Release y los Sprints El trabajo del d¡a a d¡a La revisi¢n del producto Preparando la entrega Gestionando de forma gil Gesti¢n del Alcance y los Proveedores Gesti¢n de Tiempos y Costes Gesti¢n del Equipo y las Comunicaciones Gesti¢n de Riesgos y la Calidad Garantizando el ‚xito Construir una base s¢lida Impulsar el cambio

SCRUM Foundation (SP)
Delivered OnlineFlexible Dates
Price on Enquiry

PMI Agile Certified Practitioner (PMI-ACP)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for project leaders, scrum masters, coaches, product owners, and team members who intend on taking the PMI-ACP© exam. Overview Upon successful completion of this course, you will know: ? Agile principles and practices that will enhance team productivity and improve customer satisfaction ? How to create transparent communication among stakeholders ? How to manage project's scope, schedule and budget in an Agile environment ? How to maximize business value and deliver most value early in the project ? How to build high-performing team ? How to plan at multiple levels and manage stakeholders' expectations ? How to detect, track and resolve risks in an Agile project This course provides participants with a solid foundation of the PMI-ACP© exam. Participants will be introduced to PMI Agile concepts and practices. Introduction to the PMI-ACP© Course and ExamAgile Principles and Mindset Agile project Management Framework: ? What is Agility ? Agile Manifesto ? Agile Principles ? Agile Methodologies: Scrum, Kanban, Extreme programming (XP), Lean ? Agile leadership ? Agile process overview Value-Driven Delivery What is Value-driven delivery, how to deliver value early and minimize waste Assessing Value - Return on Investment (ROI), net present value (NPV), Internal rate of return (IRR), earned value management, managing risk Value Based prioritization ? Customer-Valued prioritization, prioritization schemes (Kano analysis, MoSCoW, relative prioritization / ranking Delivering incrementally ? Minimal Viable Product (MVP), Minimal marketable Feature (MMF), Work In progress (WIP), WIP Limits, Bottlenecks, Cumulative Flow Diagram (CFD) Contracting in Agile projects Verification and validation Stakeholder Engagement Identifying project stakeholders Managing stakeholder engagement Establishing a shared vision ? Agile chartering, Definition of 'Done' (DoD), Agile modelling, wireframes, personas Communication Management ? face to face communication, two-way communication, knowledge sharing, information radiators, social media Working collaboratively ? workshops, brainstorming, collaboration games Interpersonal skills for Agile success ? emotional intelligence, active listening, facilitation, negotiation, conflict resolution, participatory decision making Team Performance Agile team roles High-performing Agile teams ? stages of team development Adaptive leadership Creating collaborative team spaces ? co-located teams, osmotic communication, distributed teams Tracking team performance in Agile teams ? burn charts, velocity Adaptive Planning Defining adaptive planning Principles of Agile planning Tools for sizing and estimating Releases and Iterations planning Problem Detection ?nd Resolution How problems impact a project Detecting problems ? lead time and cycle time, defects, variance analysis, trend analysis, control limits Managing projects threats and issues ? risk-adjusted backlog, risk severity, risk burndown graphs Solving problems Continuous Improvement Multiple levels of improvement ? processes, product, people Implementing continuous process improvement ? process tailoring, systems thinking, process analysis, value stream mapping, project pre-mortems Working towards continuous product improvement ? product feedback loops and learning cycle Leading continuous people improvement ? retrospectives, team self-assessments PMI-ACP© Exam Preparation PMI-ACP© Exam Particulars Overview PMI-ACP© Exam Particulars PMI-ACP© Candidate Requirements PMI-ACP© Candidate Fees PMI-ACP© Exam Application Process

PMI Agile Certified Practitioner (PMI-ACP)
Delivered OnlineFlexible Dates
Price on Enquiry

Effective Time Management

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Professionals in a variety of fields who are seeking improved time-management skills, so that they can meet their long-term goals and perform more effectively will benefit from this course. Overview State your goals. Analyze how you are currently allocating your most precious resources: energy and time. Identify elements of your personal work style that contribute to your effective use of time. Assemble a collection of time-management tools and strategies that you can use to take control of your time. Create an action plan for your time-management process and identify ways to evaluate and improve your efforts. Time is a form of currency, and the ways you talk about it illustrate its value: people say ?Time is money,? and ?My time was well spent,? or ?It's a waste of time.? Like most professionals, you've probably struggled with managing time effectively. In this course, you will acquire day-to-day time-management tools that will help you more effectively use your time so you can direct your energy towards fulfilling your short- and long-term professional and personal goals. Your time is a precious and limited resource. Too often, you may feel frustrated that there aren't enough hours in the day to accomplish everything you hope to do. Effective time managers enjoy the satisfaction of directing their talents and energy towards productive, goal-centered activities. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. Prerequisites To ensure your success, we recommend you have some level of work experience in any of a variety of organizational settings, and general end-user computer and Internet skills. 1. Defining Goals Define Time Management Describe Your Dreams Identify Regrets State Goals 2. Analyzing Energy Allocation Create a Time Long Analyze Tasks Analyze Time Usage Analyze Energy Flow 3. Identifying Personal Style Review a Successful Day or Project Analyze Your Preferences Identify Personal Strengths Identify Personal Motivators Reduce Time Wasters 4. Assembling the Toolbox Negotiate for Success Delegate Tasks Choose Tools that Work for You 5. Creating a Time-Management Action Plan Create the Action Plan Evaluate the Time-Management Process Additional course details: Nexus Humans Effective Time Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Effective Time Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Effective Time Management
Delivered OnlineFlexible Dates
Price on Enquiry

SCM250 SAP Production Planning in SAP APO

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants and Business Process Owners/Team Leads/Power Users. Overview This course is organized in a fashion that mimics the step by step process planners will undergo in executing production planning tasks on a daily basis. We start with setup up alert profiles to manage the day to day exceptions. Participants will walk through a detailed analysis of the net requirements calculation process that is executed during product heuristics. Gain an understanding of how scheduling is performed as new orders are created. This will include analyzing source determination rules as well as scheduling strategies. Participants will analyze the pegging functionality and the master data parameters that can control the outcome of pegging. Additionally, we will perform an analysis of process, service and REM heuristics. Lastly, perform an overview of the detailed scheduling activities involved in developing an execution schedule. In this course, students gain an in-depth understanding of the advanced topics required to implement production planning in SAP SCM APO. Introduction to Production Planning in SAP Advanced Planning and Optimization (SAP APO) Planning Demand in the Supply Chain Using Production Planning and Detailed Scheduling (PP/DS) Production Planning Results Evaluation Evaluating the Planning Run Results with Alerts Evaluating the Planning Results Evaluating the Planning Run with Advanced Tools Planning Procedure Configuring Basic Parameters for Planning Executing the Production Planning Run Planning a Product Using the Planning Procedure Order Creation with Product Heuristics Using Demand Management in PP/DS Planning Make-to-Order Production Using PP/DS Using Firming in PP/DS Configuring Product Heuristics Managing the Reuse of Procurement Proposals Using the Lot-Size Calculation In Production Planning Scheduling in Production Planning Determining the Source of Supply of the Order Scheduling Operations with the Strategy Profile Scheduling a Planned Order for Production Pegging in Production Planning Configuring Dynamic and Fixed Pegging Additional Heuristics in Production Planning Planning Production Using Process Heuristics Planning Production Using Service Heuristics Configuring Bottom-Up Heuristics Planning Production Using Repetitive Manufacturing (REM) Heuristics Outlining the Integration of Supply Network Planning (SNP) in PP/DS Detailed Scheduling Scheduling Operations with the Detailed Scheduling Planning Board Planning Production with Detailed Scheduling Strategies and Heuristics Managing Setup Times with the Setup Matrix Managing Scheduling with the PP/DS Optimizer Using MRP-Based Detailed Scheduling Additional course details: Nexus Humans SCM250 SAP Production Planning in SAP APO training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM250 SAP Production Planning in SAP APO course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SCM250 SAP Production Planning in SAP APO
Delivered OnlineFlexible Dates
Price on Enquiry

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview CCSA Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. CCSE Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. CCSA Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic. CCSE Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat RHCSA Rapid Track Course (RH199)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures, Providing operational support, Managing systems for monitoring system performance and availability, Writing and deploying scripts for task automation and system administration, You will be expected to already understand fundamental Linux computing concepts and be ready to practice the Red Hat Enterprise Linux methods for performing system administration tasks. Significant field experience working with Linux as a system administrator is recommended. If you do not have experience with fundamental Linux computer concepts, we advise you to start with the Red Hat System Administration I (RH124) course instead. Overview You should be able to demonstrate these skills: - Access the command line locally and remotely - Manage files from the command line - Manage local users and groups - Monitor and manage Linux processes - Control services, daemons, and the boot process - Manage tuning profiles for system performance - Control access to files with file system permissions - Analyze and store log files - Configure and secure the OpenSSH service - Install and update software packages and appstreams - Manage Linux file systems and volumes - Manage Linux networking and firewalls This course combines the foundations and applications established and covered in Red Hat System Administration I (RH124) and Red Hat System Administration II (RH134). The rapid pace of review and consolidated course timeline allow you to focus on practical application, making this offering best suited for you if you already have significant experience with Linux© administration. This course is based on Red Hat© Enterprise Linux 8. 1 - Accessing the command line Log in to a Linux system and run simple commands using the shell. 2 - Managing Files from the command line Work with files from the bash shell prompt. 3 - Managing local Linux users and groups Manage Linux users and groups and administer local password policies. 4 - Controlling access to files with Linux file system permissions Set access permissions on files and interpret the security effects of different permission settings. 5 - Managing SELinux security Use SELinux to manage access to files and interpret and troubleshoot SELinux security effects. 6 - Monitoring and managing Linux processes Monitor and control processes running on the system. 7 - Installing and updating software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. 8 - Controlling services and daemons Control and monitor network services and system daemons using systemd. 9 - Managing Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. 10 - Analyzing and storing logs Locate and interpret relevant system log files for troubleshooting purposes. 11 - Managing storage and file systems Create and use disk partitions, logical volumes, file systems, and swap spaces. 12 - Scheduling system tasks Schedule recurring system tasks using cron and systemd timer units. 13 - Mounting network file systems Mount network file system (NFS) exports and server message block (SMB) shares from network file servers. 14 - Limiting network communication with firewalld Configure a basic local firewall. Additional course details: Nexus Humans Red Hat RHCSA Rapid Track Course (RH199) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat RHCSA Rapid Track Course (RH199) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat RHCSA Rapid Track Course (RH199)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 12c Administration II

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to perform many of the day-to-day administration tasks required of an Oracle database administrator. This course introduces many of the powerful capabilities of the Oracle database. In this course, students will learn about day-to-day administration tasks. It will also address administration sub-specialties. Introduction: Managing the Database Instance The Database Management Tools EM Database Express EM Cloud Control SQL Developer Database Administrator Introduction: Database Architecture Review Database Instance Configurations Memory Structures Process Structures Storage Architecture Introduction: Starting & Stopping Databse Services Start & Stop the Database Listener ABOUT DATABASE STARTUP/SHUTDOWN SYSOPER SYSDBA DATABASE STATE & STAGES STARTUP WITH EM CLOUD CONTROL STARTUP WITH SQL*PLUS SHUTDOWN WITH EM CLOUD CONTROL SHUTDOWN WITH SQL*PLUS USING MS WINDOWS SERVICES Introduction: Oracle Network Environment Oracle Net Services Architecture ORACLE NET CONFIGURATION ASSISTANT ORACLE NET MANAGER USING EM CLOUD CONTROL ADVANCED NETWORK COMPRESSION TROUBLESHOOTING NETWORK PROBLEMS Introduction: Diagnostics & Oracle Support About Database Diagnostics Fault Diagnosability Infrastructure DATABASE INSTANCE HEALTH SNAPSHOT THE SUPPORT WORKBENCH PROACTIVE DATABASE HEALTH CHECKS PACKAGE DIAGNOSTIC DATA WORKING WITH THE KNOWLEDGE BASE Storage: Tablespace Management Starter Tablespaces CREATE TABLESPACE WITH EM CC CREATE TABLESPACE WITH SQL MANAGE TABLESPACES WITH EM CC MANAGE TABLESPACES WITH EM DE MANAGE TABLESPACES WITH SQL DROP TABLESPACE ALTER TABLESPACE Storage: Advanced Tablespace Management Managing Temporary Tablespaces TEMP TABLESPACE GROUPS WITH EM TEMP TABLESPACE GROUPS WITH SQL DEFAULT PERMANENT TABLESPACES BIGFILE TABLESPACES MANAGING THE SYSAUX TABLESPACE Storage: Data Files & Temp Files Management Manage Data Files with EM ACCESS METADATA WITH SQL MANAGE DATA FILES WITH SQL MANAGE TEMP FILES ORACLE-MANAGED FILES (OMF) Storage: UNDO Data & UNDO Tablespaces About UNDO Space Management GUARANTEE UNDO RETENTION MONITOR UNDO SPACE WITH SQL USE THE EM UNDO ADVISOR Security & Schemas: Security Overview & Database Privileges Database Security Principles DATABASE SYSTEM PRIVILEGES DATABASE OBJECT PRIVILEGES SUPER ADMINISTRATOR ROLES PRIVILEGE ANALYSIS Security & Schemas: User Security Create & Manage User Accounts MANAGE USERS WITH EM MANAGE USERS WITH SQL CREATE USER ALTER USER DROP USER GRANT & REVOKE PRIVILEGES RESOURCE LIMITS VIA PROFILES ALTER PROFILE DROP PROFILE PASSWORD MANAGEMENT VIA PROFILES ROLE-BASED SECURITY MANAGEMENT ALTER USER...DEFAULT ROLE SET ROLE DELEGATING PRIVILEGE AUTHORIZATION WITH ADMIN OPTION & System Privileges WITH GRANT OPTION & Object Privileges PRINCIPLE OF LEAST PRIVILEGE CHECKLIST Security & Schemas: Database Auditing Auditing Database Activity Traditional Auditing Unified Auditing Create Audit Policy Security & Schemas: SQL Loader Loader Concepts Loader From the Command Line control File Options Load Methods Loader Express Mode Loader From EM Security & Schemas: Export & Import Manage Directory Objects The Data Pump Architecture Data Pump Export Data Pump Import Data Pump Dictionary Views Using the EM CC Interface Performance & Availability: Managing Performance & SQL Tuning Management Advisory Framework Performance Monitoring & AWR The SQL Tuning Advisor Monitoring Exceptions with Metrics Performance & Availability: Data Concurrency About System & User Locks Monitor & Manage User Locks Moitor Locks with Data Dictionary Manage Locks with EM Performance & Availability: Backup & Recovery Concepts Backup & Recovery Structures Managing REDO Data Configuring for Recoverability Instance Recovery Recoverability Checklist Additional course details: Nexus Humans Oracle 12c Administration II training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c Administration II course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 12c Administration II
Delivered OnlineFlexible Dates
Price on Enquiry