Duration 3 Days 18 CPD hours This course is intended for Data Science for Marketing Analytics is designed for developers and marketing analysts looking to use new, more sophisticated tools in their marketing analytics efforts. It'll help if you have prior experience of coding in Python and knowledge of high school level mathematics. Some experience with databases, Excel, statistics, or Tableau is useful but not necessary. Overview By the end of this course, you will be able to build your own marketing reporting and interactive dashboard solutions. The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you'll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.As you make your way through the course, you'll explore ways to evaluate and select the best segmentation approach, and go on to create a linear regression model on customer value data to predict lifetime value. In the concluding sections, you'll gain an understanding of regression techniques and tools for evaluating regression models, and explore ways to predict customer choice using classification algorithms. Finally, you'll apply these techniques to create a churn model for modeling customer product choices. Data Preparation and Cleaning Data Models and Structured Data pandas Data Manipulation Data Exploration and Visualization Identifying the Right Attributes Generating Targeted Insights Visualizing Data Unsupervised Learning: Customer Segmentation Customer Segmentation Methods Similarity and Data Standardization k-means Clustering Choosing the Best Segmentation Approach Choosing the Number of Clusters Different Methods of Clustering Evaluating Clustering Predicting Customer Revenue Using Linear Regression Understanding Regression Feature Engineering for Regression Performing and Interpreting Linear Regression Other Regression Techniques and Tools for Evaluation Evaluating the Accuracy of a Regression Model Using Regularization for Feature Selection Tree-Based Regression Models Supervised Learning: Predicting Customer Churn Classification Problems Understanding Logistic Regression Creating a Data Science Pipeline Fine-Tuning Classification Algorithms Support Vector Machine Decision Trees Random Forest Preprocessing Data for Machine Learning Models Model Evaluation Performance Metrics Modeling Customer Choice Understanding Multiclass Classification Class Imbalanced Data Additional course details: Nexus Humans Data Science for Marketing Analytics training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Data Science for Marketing Analytics course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This one day course provides a comprehensive overview of macOS, complete with insider tips for getting the most out of the operating system. The course shows how to configure system preferences, navigate around the finder, personalize the interface and as well as achieve fluency with all the operational functions of the macOS. Meet The macOS The User InterfaceUser PreferencesThe Menus and Menu Paths The Toolbar Scroll Bars The Sidebar The Go Menu, Utilities Folder The Clipboard Launching Applications The Finder The Launchpad and Mission Control Finder Essentials The Desktop Quick Look Different Viewing Options Spring Loaded Folders Creating an Archive Customizing your Finder The Desktop Customize your Toolbar Organizing your Desktop Labeling your Documents and Folders Creating Folders Smart Folders The Dock Opening Applications from the Dock Dock Preferences and Customizing your Dock Choosing which Applications appear in the Dock Accessing Folder content using Stacks Your Home Folder Moving, Copying and Deleting Files Emptying the Trash Switching Between Applications Showing and Hiding Applications. Closing Documents vs. Quitting Applications Using Continuity - Mac and iOS Interfacing with your Mac and your Apple mobile devices Messages and answering your iPhone Windows Closing and Minimizing Placing documents in the Dock The Keyboard Control, Option (Alt) and Command Keys Keyboard Shortcuts The Dictation Function Gestures and Voice Mouse and Hand Gestures Using Text-to-Speech Searches Finding Files and documents Advanced Spotlight Searches Widgets & Notifications The Dashboard Enabling and Viewing Widgets Enabling and Viewing Notifications Using Spaces Switching between Spaces Running applications in full screen mode Installing or Upgrading Applications Buying from the Mac App Store Downloading from the Internet Sharing Files Sending files using AirDrop Dropbox File Synchronization Enable File Sharing Getting OnLine Understanding the Apple Airport Connecting wirelessly Using Ethernet Creating a Network Connecting through outside Network Servers and VPN Staying Current with Software Update Troubleshooting Application Crashes Force Quit Deleting Preferences The Key Chain Internet Connections Backing Up Time Machine Setting up Time Machine Performing Backups Shortcuts How to better use and access Files and documents Basic shortcuts for speed and efficiency New User Account Creating a New User Switching Between Multiple User Accounts Additional course details: Nexus Humans Getting Started With the Mac Operating System training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Getting Started With the Mac Operating System course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is relevant to anyone who needs to work with and understand data including: Business Analysts, Data Analysts, Reporting and BI professionals Marketing and Digital Marketing professionals Digital, Web, e-Commerce, Social media and Mobile channel professionals Business managers who need to interpret analytical output to inform managerial decisions Overview This course will cover the basic theory of data visualization along with practical skills for creating compelling visualizations, reports and dashboards from data using Tableau. Outcome: After attending this course delegates will understand - How to move from business questions to great data visualizations and beyond How to apply the fundamentals of data visualization to create informative charts How to choose the right visualization type for the job at hand How to design and develop basic dashboards in Tableau that people will love to use by doing the following: Reading data sources into Tableau Setting up the roles and data types for your analysis Creating new data fields using a range of calculation types Creating the following types of charts - cross tabs, pie and bar charts, geographic maps, dual axis and combo charts, heat maps, highlight tables, tree maps and scatter plots Creating Dashboards that delight using the all of the features available in Tableau. The use of analytics, statistics and data science in business has grown massively in recent years. Harnessing the power of data is opening actionable insights in diverse industries from banking to tourism. From Business Questions to Data Visualisation and Beyond The first step in any data analysis project is to move from a business question to data analysis and then on to a complete solution. This section will examine this conversion emphasizing: The use of data visualization to address a business need The data analytics process ? from business questions to developed dashboards Introduction to Tableau ? Part 1 In this section, the main functionality of Tableau will be explained including: Selecting and loading your data Defining data item properties Create basic calculations including basic arithmetic calculations, custom aggregations and ratios, date math, and quick table calculations Creating basic visualizations Creating a basic dashboard Introduction to Tableau ? Part 2 In this section, the main functionality of Tableau will be explained including: Selecting and loading your data Defining data item properties Create basic calculations including basic arithmetic calculations, custom aggregations and ratios, date math, and quick table calculations Creating basic visualizations Creating a basic dashboard Key Components of Good Data Visualisation and The Visualisation Zoo In this section the following topics will be covered: Colour theory Graphical perception & communication Choosing the right chart for the right job Data Exploration with Tableau Exploring data to answer business questions is one of the key uses of applying good data visualization techniques within Tableau. In this section we will apply the data visualization theory from the previous section within Tableau to uncover trends within the data to answer specific business questions. The types of charts that will be covered are: Cross Tabs Pie and bar charts Geographic maps Dual axis and combo charts with different mark types Heat maps Highlight tables Tree maps Scatter plots Introduction to Building Dashboards with Tableau In this section, we will implement the full process from business question to final basic dashboard in Tableau: Introduction to good dashboard design Building dashboards in Tableau
Duration 2 Days 12 CPD hours This course is intended for This class is designed for experienced Salesforce Administrators who are responsible for setting up, configuring, and managing Service Cloud. Prior to taking this class, you should have a solid understanding of Salesforce functionality and concepts, at least 6 months of experience using Salesforce, and the Salesforce Administrator credential or equivalent knowledge. Overview Set up the case management process automating the support process with queues, assignment/escalation rules, and Process Builder. Configure Salesforce knowledge to help you manage the creation, publication, and maintenance of knowledge articles. Enable entitlements to set up service contracts. Set up the Salesforce Service Console app to help your support reps work more efficiently. Understand the capabilities of the Softphone Utility in the Lightning Console. Configure online chat with customers using Web Chats. Understand and set up communities. Leverage Service Cloud to scale your support efforts and improve customer service. In this 2-day class, Service Cloud experts will walk you through how to configure and maintain Service Cloud for your organization. Learn how to set up service contracts with milestones and entitlements, set up the Service Console application, add the Softphone Utility to your Lightning Console, and set up Web Chats to provide frictionless customer support. Learn how to configure a Customer Community so you can connect customers to knowledge articles and community members to find answers instantly. Case Escalations and Entitlements Create processes to streamline a support team?s workflow and case management. Customize fields, page layouts, and record types for different kinds of support cases. Define picklist values for each new record type. Create case assignment rules, queues, and escalation rules to push cases to the appropriate support team at the appropriate time. Create and manage entitlements to customize the level of support for each customer. Salesforce Knowledge Enable Lightning Knowledge and assign appropriate user licenses. Customize page layouts and record types to support knowledge article management. Customize access to, permissions for, and visibility of knowledge tools and processes. Create and manage articles to ensure quality of information. Manage and close cases more efficiently using knowledge articles. Lightning Service Console Create your own Service Console app. Customize the Lightning Console pages. Add Utilities to your console. Enable and utilize Chat (formerly Live Agent). Optimize the use of Omni-Channel. Salesforce Self-Service Communities Enable communities in your Salesforce org. Create a permission set for effective administration of communities. Customize the look and layout of the community. Add the Reputation component to the community. Additional course details: Nexus Humans Salesforce Administer and Maintain Service Cloud (ADX261) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Administer and Maintain Service Cloud (ADX261) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs
Duration 5 Days 30 CPD hours This course is intended for ECSS is designed for anyone who wants to enhance their skills and make a career in information security, network security, and computer forensics fields. It can be IT Specialists, Network Administrators, or System Administrators. Overview Upon successful completion of this course, students will learn: Key issues plaguing the information security, network security, and computer forensics. Fundamentals of networks and various components of the OSI and TCP/IP model. Various network security protocols. Various types of information security threats and attacks, and their countermeasures. Social engineering techniques, identify theft, and social engineering countermeasures. Different stages of the hacking cycle Identification, authentication, and authorization concepts Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot. Fundamentals of IDS and IDS evasion techniques. Data backup techniques and VPN security. Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security. Different types of web server and web application attacks, and countermeasures. Fundamentals of ethical hacking and pen testing. Incident handling and response process. Cyber-crime and computer forensics investigation methodology. Different types of digital evidence and digital evidence examination process. Different type of file systems and their comparison (based on limit and features). Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism. Steganography and its techniques. Different types of log capturing, time synchronization, and log capturing tools. E-mails tracking and e-mail crimes investigation. Writing investigation report. This is an entry-level security program covering the fundamental concepts and giving a holistic overview of the key components of information security, computer forensics, and network security. Course Outline Information Security Fundamentals Networking Fundamentals Secure Network Protocols Information Security Threats and Attacks Social Engineering Hacking Cycle Identification, Authentication, and Authorization Cryptography Firewalls Intrusion Detection System Data Backup Virtual Private Network Wireless Network Security Web Security Ethical Hacking and Pen Testing Incident Response Computer Forensics Fundamentals Digital Evidence Understanding File Systems Windows Forensics Network Forensics and Investigating Network Traffic Steganography Analyzing Logs E-mail Crime and Computer Forensics Writing Investigative Report Additional course details: Nexus Humans EC-Council Certified Security Specialist (ECSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Security Specialist (ECSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment
Duration 5 Days 30 CPD hours This course is intended for This course is intended for administrators in a Microsoft-centric environment who want to build reusable units of automation, automate business processes, and enable less-technical colleagues to accomplish administrative tasks. Overview Describe the correct patterns for building modularized tools in Windows PowerShell Build highly modularized functions that comply with native PowerShell patterns Build controller scripts that expose user interfaces and automate business processes Manage data in a variety of formats Write automated tests for tools Debug tools This course covers advanced Windows PowerShell topics, with an emphasis on building reusable tools. Students are introduced to workflow, engage in best practices, and learn a variety of script development and toolmaking techniques. Tool Design Tools do one thing Tools are flexible Tools look native Start with a Command Why start with a command? Discovery and experimentation Build a Basic Function and Module Start with a basic function Create a script module Check prerequisites Run the new command Adding CmdletBinding and Parameterizing About CmdletBinding and common parameters Accepting pipeline input Mandatory-ness Parameter validation Parmeter aliases Emitting Objects as Output Assembling information Constructing and emitting output Quick tests An Interlude: Changing Your Approach Examining a script Critiquing a script Revising the script Using Verbose, Warning, and Informational Output Knowing the six channels Adding verbose and warning output Doing more with verbose output Informational output Comment-Based Help Where to put your help Getting started Going further with comment-based help Broken help Handling Errors Understanding errors and exceptions Bad handling Two reasons for exception handling Handling exceptions in our tool Capturing the actual exception Handling exceptions for non-commands Going further with exception handling Deprecated exception handling Basic Debugging Two kinds of bugs The ultimate goal of debugging Developing assumptions Write-Debug Set-PSBreakpoint The PowerShell ISE Going Deeper with Parameters Parameter positions Validation Multiple parameter sets Value from remaining arguments Help messages Aliases More CmdletBinding Writing Full Help External help Using PlatyPs Supporting online help ?About? topics Making your help updatable Unit Testing Your Code Sketching out the test Making something to test Expanding the test Going further with Pester Extending Output Types Understanding types The Extensible Type System Extending an object Using Update-TypeData Analyzing Your Script Performing a basic analysis Analyzing the analysis Publishing Your Tools Begin with a manifest Publishing to PowerShell Gallery Publishing to private repositories Basic Controllers: Automation Scripts and Menus Building a menu Using UIChoice Writing a process controller Proxy Functions A proxy example Creating the proxy base Modifying the proxy Adding or removing parameters Working with XML Data Simple: CliXML Importing native XML ConvertTo-XML Creating native XML from scratch Working with JSON Data Converting to JSON Converting from JSON Working with SQL Server Data SQL Server terminology and facts Connecting to the server and database Writing a query Running a query Invoke-SqlCmd Thinking about tool design patterns Design tools that use SQL Server for data storage Final Exam Lab problem Break down the problem Do the design Test the commands Code the tool
Duration 3 Days 18 CPD hours This course is intended for This course is designed for any individual who might need to perform project management activities in their job role on either a formal or informal basis, or any individual who wants to build upon their current project management knowledge to be more productively involved on a project team. This course is not specifically designed for students who are seeking project management-related certification. Rather, it is designed to introduce a structure to help students more effectively manage projects as well as participate fully on a project team. Overview In this course, you will apply recognized practices of project management to manage a project from start to finish. You will: - Identify the basic concepts of project management. - Launch a project. - Estimate project work. - Create a project schedule. - Plan project costs. - Plan for project risks. - Plan for project quality and compliance. - Manage human and physical resources for the project. - Manage project procurements. - Plan for change management and monitor the project scope. - Monitor and optimize project schedule and cost. - Monitor the quality of the project work and the risks involved. - Plan communication strategies and manage stakeholder relationships. - Close a project. If you are taking this course, you probably have some exposure to managing projects, or you may be considering embarking on a career as a professional project manager. Your ability as a project manager to demonstrate best practices in project management on the job is becoming the standard to compete in today's fast-paced and highly technical workplace. In this course, you will apply the generally recognized practices of project management to successfully manage projects. Project managers are always under severe pressure to complete projects on time and within budget. However, most projects fail to meet these demands, and, as a result, many projects are terminated early. Successful project management requires knowledge and experience. This course is designed to provide you with the skills needed to be a successful project manager in today's rapidly changing world. The skills and knowledge you gain in this course will help you avoid making costly mistakes and increase your competitive edge in the project management profession. Getting Started with Project Management Define Project Management Basics Identify Influencing Factors Define Project Management Certifications Launching Projects How Organizations Choose the Right Project Identify Project Stakeholders and Their Expectations Authorize a Project Identify the Project Scope Estimating Project Work Develop a WBS Identify the Relationships Between Work Packages Identify Resources Estimate Time Creating a Project Schedule Develop a Project Schedule Create a Schedule Baseline Planning Project Costs Establish Project Costs Establish the Cost Baseline Reconcile Funding and Costs Planning for Risk Create a Risk Management Plan Identify Risks and Their Causes Analyze Risks Develop a Risk Response Plan Planning for Quality and Compliance Deliver the Desired Project Results Verify Compliance Requirements Managing the Project Team Plan Your Project Team Assemble the Team Develop the Team Manage the Team Managing Project Procurements Plan for Project Procurements Obtain Responses from Vendors Select the Right Vendor Manage Vendors and Procurements Managing Change During Project Execution Prepare for Project Execution Manage Project Changes Monitor the Project Scope Monitoring and Controlling Project Schedule and Cost Monitor and Control the Project Schedule Optimize the Project Schedule Monitor and Control Project Cost Monitoring and Controlling Risk and Quality Monitor and Control Risks Put Quality Plans into Action Control Project Quality Communicating and Reporting Communicate During a Project Distribute Project Information Manage Stakeholder Relationships and Expectations Report on Project Performance Closing the Project Deliver the Final Product Close Project Procurements Close the Project
Duration 2 Days 12 CPD hours This course is intended for This is an introductory-level course for Administrators who are new to Jira (this is NOT for experienced Jira admin or users). Students should have a background in basic administration. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment, exploring several practical use cases that provide context as to where and when to use Jira, students will learn about: user management global and project permissions project roles schemes configuration of issue types, workflows, and screens Tracking issues is a critical component of any project management strategy. JIRA provides a web based single repository for creating, tracking and reporting on feature requests, bugs reported, or managing workflow. Geared for administrators new to Jira, JumpStart to Jira for Administrators | Jira Administration is a two-day, hands-on course that explores the most important tasks required to set up Jira, providing students with ample hands-on experience using common administration tasks. This hands-on course enables the Student to administer a JIRA instance and ?learn by doing?. The focus of this course is on Best Practices, and practical skills. Getting started with JIRA Administration JIRA conceptual review Core concepts Terminology Infrastructure JIRA roles Groups vs Roles Overview Project roles Creating a role Project scaling JIRA User management Project Resolution Project status Resolved status Resolution date Schemes Overview Project scope schemes Adding users to schemes Issue type schemes Notification schemes Permission schemes Issue security schemes working with schemes JIRA as a Platform Overview What can be configured Basic JIRA project setup Advanced project setup Workflows Overview Designing a workflow Defining a workflow Implementing a workflow Deploying workflows Workflow events Transitions and sub-tasks Custom Fields Overview Field types Field context Limiting contexts Adding contexts Screens and field configuration Best practices for custom fields User Lifecycle Overview Adding users Adding third-party users Modifying users Deactivating users Remote JIRA Access Overview Emails SQL REST Webhooks XML and RSS Command Line Interface Integrating JIRA with other applications Migrating Data into JIRA Overview Migration steps The CSV importer JIRA cloud migration Summary and Best Practices Looking back at the ?Big Picture? Optional - Jira Certification Prep Review Additional course details: Nexus Humans JumpStart to Jira for Administrators | Jira Administration (TTDV7540) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JumpStart to Jira for Administrators | Jira Administration (TTDV7540) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.