Duration 1 Days 6 CPD hours This course is intended for This course is designed for all levels of experience in using Microsoft Project, as well as all levels of experience in project management. In particular, this course is designed for persons who need to author Microsoft Project work schedules including Project Managers and Project Assistants. Overview To be properly introduced, or reintroduced, to Microsoft Project. To gain an understanding of a proven mindset Microsoft Project users should possess each time they open and work Microsoft Project schedules. To gain an understanding of globally accepted project management principles. To be able to effectively apply Microsoft Project into the Initiation and Planning phases of a normal project life cycle. MS Project: Project Initiation and Planning (part 1 of a 3 part series) course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects. MS Project: Project Initiation and Planning (part 1 of a 3 part series) course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects.
Duration 3 Days 18 CPD hours This course is intended for Java Developers with a minimum of 2 years of experience and individuals who want to become application security engineers/analysts/testers Individuals involved in the role of developing, testing, managing, or protecting wide area of applications. Overview In-depth understanding of secure SDLC and secure SDLC models Knowledge of OWASP Top 10, threat modelling, SAST and DAST Capturing security requirements of an application in development Defining, maintaining, and enforcing application security best practices The Certified Application Security Engineer (CASE) training and certification program provides a comprehensive application security approach which encompasses security activities involved in all the phases of Software Development Lifecycle (SDLC). Understanding Application Security, Threats, and AttacksSecurity Requirements GatheringSecure Application Design and ArchitectureSecure Coding Practices for Input ValidationSecure Coding Practices for Authentication and AuthorizationSecure Coding Practices for CryptographySecure Coding Practices for Session ManagementSecure Coding Practices for Error HandlingStatic and Dynamic Application Security Testing (SAST & DAST)Secure Deployment and Maintenance
Duration 1 Days 6 CPD hours This course is intended for This course is designed for all levels of experience in using Microsoft Project, as well as all levels of experience in project management. In particular, this course is designed for persons who need to author Microsoft Project work schedules including Project Managers and Project Assistants, and for management personnel in charge of setting standards for baselining and tracking project data. Overview To gain an understanding of a proven mindset Microsoft Project users should possess each time they open and work Microsoft Project schedules. To gain an understanding of globally accepted project management principles. To be able to effectively apply Microsoft Project into the Execution phase of a normal project life cycle. To gain an understanding of Microsoft Project's baseline capabilities in preparation for analysis and reporting of project data. MS Project: Project Validation, Baseline, and Tracking using Microsoft Project course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects. MS Project: Project Validation, Baseline, and Tracking using Microsoft Project course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects.
Duration 1 Days 6 CPD hours This course is intended for This class is intended for individuals with some level of experience overseeing, managing, or working on projects. Overview Project Management FrameworkInitiatingPlanningExecutingMonitoring and ControllingClosing This one-day course introduces the senior managers, department managers, and other key stakeholders to the principles and processes of project management. Project Management Framework What is a Project? What is Project Management? Role of a Project Manager Project, Program, and Portfolio Management Strategy, Portfolio, Program, and Project Management Organizational Goals Project Selection Criteria The Project Life Cycle Overview Case Study Selection Initiating Initiating Process Group Overview Develop Project Charter Identify Stakeholders Planning Planning Process Group Overview Develop Project Management Plan Collect Requirements Define Scope and Create WBS Determine Project ROI Schedule Processes Cost Management Processes Plan Quality Management Plan Human Resource Management Project Human Resource Difficulties Plan Communications Management Risk Management Activities Plan Procurement Management Executing Executing Process Group Overview Team Building Lessons Learned Monitoring & Controlling Monitoring and Controlling Process Group Overview Perform Integrated Change Control Monitoring and Controlling Processes Verify Scope Closing Closing Process Group Overview Close Project or Phase Close Procurements
Duration 2 Days 12 CPD hours This course is intended for This course is designed for all project managers and project team leaders. Overview At course completion, students will be able to identify, analyze, respond to, and control project risks. This course focuses on improving the project manager?s risk management expertise, from initial planning through project closure. Participants will apply all course principles to a work-related case study taken directly from their work environment. Risk Management Overview Risk Management Benefit and Uses Project Risk Management Project Management Life Cycle Initiating Process Group Initiating Process Group Overview Develop Project Charter Identify Stakeholders Project Selection Criteria ROI Analysis ROI Methods Risk Complexity Index Project Selection Planning Process Group Planning Process Group Overview Scope Risks Schedule Risks Resource Risks Plan Risk Management Identify Risks Delphi Technique Subject Matter Expert Input Brainstorming Fishbone Diagrams Process Analysis Five Whys Influence Diagrams Risk Breakdown Structure (RBS) Risk Register Perform Qualitative Risk Analysis Probability and Impact Assessment Probability and Impact Chart Perform Quantitative Risk Analysis Three point estimates PERT Triangular Distributions Outlier Considerations Geometric Mean Normal Distributions Methods Tornado Diagrams Expected Monetary Value (EMV) Monte Carlo Plan Risk Responses Risk Response Strategies Overall Project Risk Checklists Executing, Monitoring and Controlling Process Groups Executing Process Group Overview Monitoring and Controlling Process Group Overview Control Risks Project Monitoring Longer Projects Closing Process Group Closing Process Group Overview Close Project or Phase Risk Activities During Closing Process Group Post-Project Risk Assessment
Duration 4.375 Days 26.25 CPD hours This course is intended for The target audience for this course is all Oracle professionals. Among the specific groups for whom this course will be helpful are: Application designers and database developers Database administrators Web server administrators Overview This eTextbook begins with an explanation of the intent and usage of the PL/SQL programming language for database applications. Important reasons why one should incorporate PL/SQL modules within the application architecture right from the initial design and planning phase are presented. Next one learns how to begin building executable PL/SQL program units. One learns about each of the major segments of a working program and how these interact with each other during program execution, including the important error or exception handling capabilities of the language. The final section goes beyond the basics and begins to explore advanced topics that will be useful later in the Sideris Oracle PL/SQL developer textbook series. One learns techniques and features that allow modular and reusable programs to be developed, increasing productivity and maintainability of database applications. his eTextbook introduces one to Oracle database programming using the PL/SQL programming language. One will learn the syntax, structure and features of the language. This textbook will also lay the foundation for the entire Sideris Oracle PL/SQL programming series, allowing one to progress from introductory topics to advanced application design and programming and finally onto writing complex high-performance applications. his eTextbook introduces one to Oracle database programming using the PL/SQL programming language. One will learn the syntax, structure and features of the language. This textbook will also lay the foundation for the entire Sideris Oracle PL/SQL programming series, allowing one to progress from introductory topics to advanced application design and programming and finally onto writing complex high-performance applications.
Duration 3 Days 18 CPD hours This course is intended for Data center architects Cloud infrastructure architects Network engineers System administrators Storage administrators System engineers who work in data center solutions and manage data center management policies Cisco integrators and partners Overview After taking this course, you should be able to: Understand Cisco UCS Director architecture Understand deployment models of Cisco UCS Director Configure virtual data centers, policies, and catalogs Understand the unified infrastructure management capabilities of Cisco UCS Director Understand orchestration and build advanced workflows Understand application containers The Cisco UCS Director Foundation (UCSDF) v6.6 course helps you understand concepts, architecture, and deployment use cases for Cisco UCS© Director. You will gain hands-on experience in deploying basic Cisco UCS Director solutions. You will also practice using core features that most implementations require, such as services design, using the self-service portal for provisioning services, creating workflows that enable cloud automation and standardize IT services, and more. Introducing Cisco UCS Director Understanding Data Center Challenges Understanding the Benefits of Cisco UCS Director Understanding Cisco UCS Director Components Explaining Cisco UCS Director Architecture Explaining Bare-Metal Agent Understanding Cisco UCS Director Deployment Explaining Cisco UCS Director Deployment Explaining Global System Settings Understanding Site and Pod Management Understanding Cisco UCS Director Infrastructure Management Understanding Cisco UCS Director Deployment Understanding the Design Phase Understanding Policies Understanding vDC and Groups Use Case Understanding Deployment Through the Self-Service Portal Understanding the Self-Service Provisioning Portal Understanding Service Request Introducing Orchestration Understanding Orchestration Reporting and Monitoring in Cisco UCS Director Understanding Chargeback in Cisco UCS Director Understanding Reports in Cisco UCS Director Introducing Application Containers Understanding Application Containers
Duration 2 Days 12 CPD hours This course is intended for Professionals involved in internal and/or external negotiations will benefit from this course. Overview Develop the necessary skills to negotiate like a pro Prepare for a negotiation applying best practices Utilize industry-standard tools and techniques Create your Best Alternative to a Negotiated Agreement (BATNA) Build common ground and consensus in your negotiation strategies Negotiate with experts to develop your skills for success Students will learn the essential strategies and techniques needed to guide negotiations from opening discussions through to a positive result. Students will leave with practical solutions to negotiating effectively. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Negotiation Introduced Identifying Integrative and Distributive Negotiation Types Understanding the Three Phases of Negotiation Strengthening Negotiation Skills 2. Preparing for Your Negotiation Establishing Personal Boundaries Deciding on Your WATNA and BATNA and Negotiating Based on Them Preparing and Sticking to Your Plan Negotiation Strategies 3. Negotiation Process for Success Setting the Time and Place Avoiding Negative Environments Establishing Common Ground and Building Momentum Creating a Negotiation Framework, Agreeing on Issues, and Maintaining a Positive Framework Working through the Five Steps of Negotiation 4. Best Practices Starting Off on the Right Foot What to Share and What to Keep to Yourself Knowing What to Expect Utilizing the Top Ten Negotiation Techniques Managing an Impasse 5. Negotiation Tools & Techniques Reviewing the Three Ways to See Your Options Creating a Mutual Gain Solution Agreeing on Wants - Working with What You Want and What They Want 6. Consensus & Agreement Building Consensus Consolidating and Finalizing an Agreement Controlling Your Emotions and Dealing with Personal Attacks Walking Away When Necessary
Duration 2 Days 12 CPD hours This course is intended for Anyone working within leadership, or aspiring to transition into leadership, who would like to professionalize their skills and competencies will benefit from this course. Overview Learn to thrive in a volatile and changing world Build employee engagement in a precarious work environment Leverage fundamental values to build a better workplace Develop a culture of change Plan a path to the future Change is both inevitable and necessary, yet potentially disruptive. Leading change efforts requires building credibility, communicating effectively, developing trust, making decisions, and demonstrating confidence. This course will help you to cultivate the leadership skills that you need to influence others and guide them through times of change. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Building a Sustainable Organization Seeing the Need for a New Type of Leadership Choosing to Be an Authentic Leader Rebuilding Confidence Decentralizing Power 2. Values and Engagement in a New Reality Engaging in the 21st Century Measuring Employee Engagement Developing Highly Engaged Employees Tapping into Discretionary Energy Embracing Differences Building a Sustainable Organization Integrating Engagement into Your Culture Building a Passion for Excellence Inspiring Trust Reaping the Benefits of Trust 3. Making Change the New Normal Facing Complexities Navigating Fluid Environments Harnessing the Power of Change Applying Intuition Creating Profound and Sustainable Change Understanding the Phases of Change Engaging Stakeholders Leading Through the Transition 4. Planning for the Road Ahead Managing Issues of the 21st Century Working Within the New Cultural Reality Avoiding Traps and Pitfalls Challenging How Teams Are Managed Building a Vision Managing with Purpose
Duration 1 Days 6 CPD hours This course is intended for This course provides an introductory overview of the CMMC program for organizational decision makers. Business and IT leaders and IT staff might consider taking this course to learn about the CMMC Model to get a sense of what's required for a successful assessment, and the various ways they can start preparing. Overview In this course, you will identify the key elements and potential impacts of the Cybersecurity Maturity Model Certification (CMMC) program. You will: Identify the crucial elements that are driving the CMMC initiative. Describe the architecture of the CMMC Model and the rationale behind it. Prepare your organization for a successful CMMC Assessment. Identify the roles and responsibilities in the CMMC ecosystem and describe the phases of an Assessment. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices. This course provides a complete review of the key elements of this important program and will entitle you to a CMMC Trailblazer badge.Important: This curriculum product is not considered CMMC-AB Approved Training Material (CATM). This course is not intended as certification preparation and does not qualify students to sit for the CMMC CP certification exam. Identifying What's at Stake Topic A: Identify the Threats and Regulatory Responses Topic B: Identify Sensitive Information Describing CMMC Topic A: Describe the CMMC Model Architecture Topic B: Describe the CMMC Program Getting Ready for a CMMC Assessment Topic A: Scope Your Environment Topic B: Analyze the CMMC Assessment Guides Topic C: Foster a Mature Cybersecurity Culture Topic D: Identify Helpful Documents Topic E: Evaluate Your Readiness Interacting with the CMMC Ecosystem Topic A: Identify the CMMC Ecosystem Topic B: Describe a CMMC Assessment