• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

43276 RES courses

CompTIA Cybersecurity Analyst (CySA+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of Reconnaissance Incidents Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of System Hacking Attacks Assess the Impact of Web-Based Attacks Assess the Impact of Malware Assess the Impact of Hijacking and Impersonation Attacks Assess the Impact of DoS Incidents Assess the Impact of Threats to Mobile Security Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES Assess Command and Control Techniques Assess Persistence Techniques Assess Lateral Movement and Pivoting Techniques Assess Data Exfiltration Techniques Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION Implement a Vulnerability Management Plan Assess Common Vulnerabilities Conduct Vulnerability Scans Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE Deploy a Security Intelligence Collection and Analysis Platform Collect Data from Network-Based Intelligence Sources Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA Use Common Tools to Analyze Logs Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS Analyze Incidents with Windows-Based Tools Analyze Incidents with Linux-Based Tools Analyze Malware Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS Deploy an Incident Handling and Response Architecture Mitigate Incidents Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS Apply a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES Remediate Identity and Access Management Issues Implement Security During the SDLC Additional course details: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cybersecurity Analyst (CySA+)
Delivered OnlineFlexible Dates
£2,475

CompTIA Project+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Individuals in various job roles who are involved in leading, managing, and participating in small to medium scale projects. Overview Upon successful completion of this course, students will be able to: Identify the fundamentals of project management. Perform the pre-project setup. Initiate a project. Plan project strategies. Develop project schedules. Plan project staffing, communication, and quality. Plan project risk management. Plan project costs. Plan project procurements. Plan for change management and transitions. Manage project execution. Manage project procurement. Control project performance. Monitor and control the triple constraints. Monitor project risks and procurements. Perform the project closure processes. In this course, students will apply recognized practices of project management and understand a project?s life cycle and roles and skills necessary to effectively initiate, plan, execute, monitor and control, and close a project. 1 - Exploring Project Management Fundamentals Examine the Basics of Project Management Describe the Project Life Cycle Examine Organizational Influences on Project Management 2 - Performing the Pre-Project Setup Create a Project Concept Definition Statement Examine Project Selection Determine Strategic and Operational Relevance Perform Project Feasibility Determine Technical Requirements 3 - Initiating a Project Prepare a Project Statement of Work Create a Project Charter Identify Project Stakeholders 4 - Planning Project Strategy Identify Elements of the Project Management Plan and Subsidiary Plans Determine Stakeholder Needs Create a Scope Statement Develop a Work Breakdown Structure 5 - Developing the Project Schedule Create an Activity List Create a Project Schedule Network Diagram Identify Resources Estimate Time Develop a Project Schedule Identify the Critical Path Optimize the Project Schedule Create a Schedule Baseline 6 - Planning Human Resources, Communication, and Quality Create a Human Resource Plan Create a Communications Management Plan Create a Quality Management Plan 7 - Planning Project Risk Management Examine a Risk Management Plan Identify Project Risks and Triggers Perform Qualitative Risk Analysis Perform Quantitative Risk Analysis Develop a Risk Response Plan 8 - Planning Project Costs Estimate Project Costs Estimate the Cost Baseline Reconcile Funding and Costs 9 - Planning Project Procurements Plan Project Procurements Prepare a Procurement Statement of Work Prepare a Procurement Document 10 - Planning for Change Management and Transitions Develop an Integrated Change Control System Develop a Transition Plan 11 - Managing Project Execution Direct Project Execution Execute a Quality Assurance Plan Assemble a Project Team Develop a Project Team Manage a Project Team Distribute Project Information Manage Stakeholder Relationships and Expectations 12 - Managing Project Procurement Obtain Responses from Sellers Determine Project Sellers 13 - Control Project Performance Monitor and Control Project Work Manage Project Changes Report on Project Performance 14 - Monitor and Control the Triple Constraints Control Project Scope Control Project Schedule Control Project Costs Manage Project Quality 15 - Monitoring Project Risks and Procurements Control Project Risks Managing Vendors and Procurements 16 - Performing the Project Closure Processes Deliver the Final Product Close Project Procurements Conduct a Closeout Meeting Close a Project Additional course details: Nexus Humans CompTIA Project Plus Certification (Exam PK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Project Plus Certification (Exam PK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Project+
Delivered OnlineFlexible Dates
£2,475

CompTIA Cloud+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who wish to develop cloud computing skills to enable them to move IT workloads to the cloud and integrate products and services from different providers and industries. Their focus is to ensure that cloud deployments are secure, that automation and orchestration are used effectively to bring business value from the cloud, and that costs are controlled through effective management of cloud vendors. This course is also designed for students who are preparing to take the CompTIA Cloud+ certification exam CV0-003, or who plan to use Cloud+ as the foundation for more advanced cloud certifications or career roles. Overview In this course, you will deploy, test, secure, manage, optimize, and troubleshoot a cloud solution. You will: - Prepare to deploy cloud solutions - Deploy a pilot project - Test a pilot project deployment - Design a secure network for cloud deployment - Determine CPU and memory sizing for cloud deployments - Determine storage requirements for cloud deployments - Plan Identity and Access Management for cloud deployments - Analyze workload characteristics to ensure successful migration to the cloud - Secure systems to meet access requirements - Maintain cloud systems - Implement backup, restore, and business continuity measures - Analyze cloud systems for required performance - Analyze cloud systems for anomalies and growth forecasting - Troubleshoot deployment, capacity, automation, and orchestration issues - Troubleshoot connectivity issues - Troubleshoot security issues In this course, you will learn how to implement, maintain, and deliver cloud technologies including network, storage, and virtualization technologies to create cloud solutions. 1 - PREPARING TO DEPLOY CLOUD SOLUTIONS Describe Interaction of Cloud Components and Services Describe Interaction of Non-cloud Components and Services Evaluate Existing Components and Services for Cloud Deployment Evaluate Automation and Orchestration Options Prepare for Cloud Deployment 2 - DEPLOYING A PILOT PROJECT Manage Change in a Pilot Project Execute Cloud Deployment Workflow Complete Post-Deployment Configuration 3 - TESTING PILOT PROJECT DEPLOYMENTS Identify Cloud Service Components for Testing Test for High Availability and Accessibility Perform Deployment Load Testing Analyze Test Results 4 - DESIGNING A SECURE AND COMPLIANT CLOUD INFRASTRUCTURE Design Cloud Infrastructure for Security Determine Organizational Compliance Needs 5 - DESIGNING AND IMPLEMENTING A SECURE CLOUD ENVIRONMENT Design Virtual Network for Cloud Deployment Determine Network Access Requirements Secure Networks for Cloud Interaction Manage Cloud Component Security Implement Security Technologies 6 - PLANNING IDENTITY AND ACCESS MANAGEMENT FOR CLOUD DEPLOYMENTS Determine Identity Management and Authentication Technologies Plan Account Management Policies for the Network and Systems Control Access to Cloud Objects Provision Accounts 7 - DETERMINING CPU AND MEMORY SIZING FOR CLOUD DEPLOYMENTS Determine CPU Size for Cloud Deployment Determine Memory Size for Cloud Deployment 8 - DETERMINING STORAGE REQUIREMENTS FOR CLOUD DEPLOYMENTS Determine Storage Technology Requirements Select Storage Options for Deployment Determine Storage Access and Provisioning Requirements Determine Storage Security Options 9 - ANALYZING WORKLOAD CHARACTERISTICS TO ENSURE SUCCESSFUL MIGRATION Determine the Type of Cloud Deployment to Perform Manage Virtual Machine and Container Migration Manage Network, Storage, and Data Migration 10 - MAINTAINING CLOUD SYSTEMS Patch Cloud Systems Design and Implement Automation and Orchestration for Maintenance 11 - IMPLEMENTING BACKUP, RESTORE, DISASTER RECOVERY, AND BUSINESS CONTINUITY MEASURES Back Up and Restore Cloud Data Implement Disaster Recovery Plans Implement Business Continuity Plans 12 - ANALYZING CLOUD SYSTEMS FOR PERFORMANCE Monitor Cloud Systems to Measure Performance Optimize Cloud Systems to Meet Performance Criteria 13 - ANALYZING CLOUD SYSTEMS FOR ANOMALIES AND GROWTH FORECASTING Monitor for Anomalies and Resource Needs Plan for Capacity Create Reports on Cloud System Metrics 14 - TROUBLESHOOTING DEPLOYMENT, CAPACITY, AUTOMATION, AND ORCHESTRATION ISSUES Troubleshoot Deployment Issues Troubleshoot Capacity Issues Troubleshoot Automation and Orchestration Issues 15 - TROUBLESHOOTING CONNECTIVITY ISSUES Identify Connectivity Issues Troubleshoot Connectivity Issues 16 - TROUBLESHOOTING SECURITY ISSUES Troubleshoot Identity and Access Issues Troubleshoot Attacks Troubleshoot Other Security Issues Additional course details: Nexus Humans CompTIA Cloud Plus Certification (Exam CV0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cloud Plus Certification (Exam CV0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cloud+
Delivered OnlineFlexible Dates
£2,475

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475

About this Virtual Instructor Led Training (VILT) A large amount of geological data is acquired at a substantial cost when carrying out a drilling operation. Ensuring optimal quality of this information and effective reporting plays a key role during well design and drilling operations. In addition, there is much to benefit from the later usage of the data in field studies. A critical component that ensures favourable and positive results is the close co-operation between geological, drilling and well engineering departments. Comprising 5 half-day sessions, this Virtual Instructor Led Training (VILT) course aims to provide the required knowledge in order for the collaboration to be most effective and successful. This VILT course will comprise lectures interspersed with practical and interactive exercises and quizzes to promote better understanding. Training Objectives At the end of this VILT course, participants will be able to: Understand the techniques used by wellsite geologists in formation evaluation via: Quick-look analysis to assess reservoir and hydrocarbons Mudlog data (lithology/cutting description, gas readings) Grasp the application of wellsite data in exploration and development Be able to read, assess and use drilling reports Acquire an understanding of drilling problems caused by subsurface conditions Understand the role and contributions of the geologist to the well maturation process Target Audience This VILT course is intended for geologists and other subsurface staff involved in drilling operations who would like to work and communicate more effectively with wellsite staff.  Please note that this VILT course is not a preparation course for a wellsite assignment. To be able to work independently on the wellsite, a more hands-on or on-site training would be required. Training Methods This VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your expert course leader has close to 20 years of experience as a geologist in the Oil & Gas industry. Her main interest and passion is in well planning and operations. She had previously worked as a production geologist and technical authority in NAM (Netherlands), and as a discipline advisor tasked to coach young staff in Bangalore. She has been active in internal training sessions on drilling hazards, mudwindow assessment and project management. She obtained an MSc in hard rock structural geology from the University in Utrecht, a PhD at Brown University (RI, USA) and a post-doctoral at the RWTH Aachen. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Wellsite Geology & Operations
Delivered in Internationally or OnlineFlexible Dates
£2,493 to £2,899

Introduction to Carbon Capture and Storage (CCS) for Non-Technical Professionals

By EnergyEdge - Training for a Sustainable Energy Future

About this training Carbon Capture and Storage (CCS) is an upcoming new technology that has a vital place within global efforts to decarbonise. It has a unique set of challenges, opportunities and risks to be understood and accommodated within appropriate legal, regulatory, and social and public license frameworks. The course has a strong international and global south emphasis with case studies on CCS projects and will touch on the role of CCS in developing country energy transition. The course satisfies a part of the market that is not currently catered for - the wider science, risks, financing, regulation, planning and social license aspects of CCS. These are issues that are as important as the technical issues in the sense that any of them can be a show-stopper for CCS. Training Objectives Upon completion of this course, participants will be able to: Place CCS within the context of the global geological carbon cycle and the contribution to could make to carbon abatement Explore the basic engineering and other challenges and solutions of CO2 transport and capture Recognize the geological challenges and solutions of CO2 storage Learn the methods of geological and environmental monitoring of CCS sites and why monitoring is important Understand the policy and finance challenges and solutions of CCS projects Know the importance of social license to operate and how to gain a social license to operate Target Audience This course will cater for in-company legal specialists, finance, project managers, marketing and communications specialists; as well as geologists, planners and environmental scientists in regulatory or government roles in regions considering the development of CCS. The course will provide up to date and relevant information to help in understanding opportunities and in managing risk. Geoscientists Government energy regulators and policy makers Financiers and investors Government natural resource and planning department Environmental scientists Finance professionals Marketing and communication professionals Legal specialists Project managers Course Level Basic or Foundation Trainer Your expert course leader is one of the most influential figures in British geoscience. He has 25 years' experience in geological, energy, and palaeontological science and research, including 8 years national level science leadership as the UK's chief geologist (Executive Chief Scientist and Director of Science and Technology of the British Geological Survey). He has been providing geoscience advice to Government for almost 15 years and has an excellent overview of Government policy, industrial activity and funding landscape in applied and energy geoscience, including CCUS and shale gas. He is a well-known communicator of science and has published three single-author popular science books (one award-winning), including the best introductory book on CCS 'Returning Carbon to Nature' Elsevier 2013. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Introduction to Carbon Capture and Storage (CCS) for Non-Technical Professionals
Delivered in Internationally or OnlineFlexible Dates
£2,493 to £2,899

Decarbonisation Of Shipping & Marine Ports

By EnergyEdge - Training for a Sustainable Energy Future

Dive into the world of decarbonization in shipping and marine ports with EnergyEdge's comprehensive course. Gain valuable knowledge and skills today!

Decarbonisation Of Shipping & Marine Ports
Delivered In-PersonFlexible Dates
£2,699 to £2,899

Certified Business Relationship Manager (CBRM): In-House Training

By IIL Europe Ltd

Certified Business Relationship Manager (CBRM®): In-House Training: In-House Training The CBRM® Practitioner Qualification is intended for the intermediate-to-advanced Business Relationship Manager, as it focuses on advancing to the role of Strategic Business Relationship Manager. As such, the primary focus is on strategic business relationship management, leveraged to optimize business value to the enterprise. The purpose of the Practitioner qualification is to confirm whether the candidate has achieved sufficient understanding and competence to perform the role of Strategic Business Relationship Manager. To pursue the CBRM® certification, a candidate must be a certified Business Relationship Management Professional (BRMP®). What You Will Learn The successful candidate will demonstrate deep understanding and ability to perform the Strategic BRM role. Specifically, the candidate will: Effectively communicate the purpose and objectives of the Strategic BRM role and how to optimally position that role for maximum effectiveness within the enterprise Understand how to use their personal power and influence to build business relationships and foster a culture that excels at business value results Apply the Strategic Relationship Management processes and techniques to build and sustain trust relationships spanning Business Partner and Provider networks Be able to assess Business Demand Maturity and Business Relationship Maturity and how these might evolve over time Be able to assess Provider Capability Maturity and BRM Competencies and identify key areas needing improvement Be able to apply cross-organization communication techniques to clearly articulate real Provider / business value delivered to the organization Be able to influence executive leaders in their use of Provider Capabilities and Assets based upon potential business value and convergence with business strategy Promote and catalyze business innovation in the Provider's sphere of influence Be able to use the Business Value Management process, techniques, and metrics to define, realize, and optimize the value of Provider capabilities and assets Apply Business Partner Experience Management so as to foster a positive Business Partner perception of Provider capabilities as an essential element of building and sustaining trust relationships Shape strategic agendas for optimum business value, with due consideration of external compliance requirements and potential risks to the business Understand the implications of Lean / Agile methods for the BRM role and capability Influence the development and deployment of available Provider capabilities based upon business need and potential to enable or create business value. Apply Business Capability Management to determine and acquire enabling capabilities pursuant to strategic outcomes Apply Business Capability Management to determine and acquire enabling capabilities pursuant to strategic outcomes Contribute to Business Transition Management in order to foster organizational understanding, support, adoption, and business value results of investments in new business capabilities Course Introduction Explain the House of BRM, recalling the BRM Core Disciplines, competencies required for the BRM role, and necessary conditions for protecting the integrity of the role Recall the key BRM concepts, processes, and techniques Understand the Business Relationship Maturity Model and the Five Relationship Maturity Levels Understanding Business Relationship Maturity and Value The Strategic BRM Role and Capability BRM Impact on Business Value Introduction to the ACME Leisurewear Case Scenario that is used through the course Assessing BRM Context Clarifying Issues Conducting a Business Demand Maturity Assessment Conducting a Business Relationship Maturity Assessment Conducting a Provider Capability Maturity Assessment Shaping the Business Partner's experience with the Provider The BRM role in Service Management Developing Strategic Relationships How to assess Strategic Relationships and plan for their improvement How to achieve business impact through influence and persuasion How to plan and execute BRM formal communications Organizational considerations for BRM deployment How to determine appropriate BRM performance measurement Optimizing Business Value Formulating and Clarifying Business Strategy Catalyzing Business Innovation Business Capability Management Value Management Planning Portfolio Management Business Transition Planning Business Value Optimization Summary and CBRM Exam Preparation Course Summary CBRM Syllabus Review Format and structure of the CBRM® Practitioner Exam Exam hints and tips Sample Exam

Certified Business Relationship Manager (CBRM): In-House Training
Flexible Dates
£2,950

Certified Business Relationship Manager (CBRM): Virtual In-House Training

By IIL Europe Ltd

Certified Business Relationship Manager (CBRM®): Virtual In-House Training The CBRM® Practitioner Qualification is intended for the intermediate-to-advanced Business Relationship Manager, as it focuses on advancing to the role of Strategic Business Relationship Manager. As such, the primary focus is on strategic business relationship management, leveraged to optimize business value to the enterprise. The purpose of the Practitioner qualification is to confirm whether the candidate has achieved sufficient understanding and competence to perform the role of Strategic Business Relationship Manager. To pursue the CBRM® certification, a candidate must be a certified Business Relationship Management Professional (BRMP®). What You Will Learn The successful candidate will demonstrate deep understanding and ability to perform the Strategic BRM role. Specifically, the candidate will: Effectively communicate the purpose and objectives of the Strategic BRM role and how to optimally position that role for maximum effectiveness within the enterprise Understand how to use their personal power and influence to build business relationships and foster a culture that excels at business value results Apply the Strategic Relationship Management processes and techniques to build and sustain trust relationships spanning Business Partner and Provider networks Be able to assess Business Demand Maturity and Business Relationship Maturity and how these might evolve over time Be able to assess Provider Capability Maturity and BRM Competencies and identify key areas needing improvement Be able to apply cross-organization communication techniques to clearly articulate real Provider / business value delivered to the organization Be able to influence executive leaders in their use of Provider Capabilities and Assets based upon potential business value and convergence with business strategy Promote and catalyze business innovation in the Provider's sphere of influence Be able to use the Business Value Management process, techniques, and metrics to define, realize, and optimize the value of Provider capabilities and assets Apply Business Partner Experience Management so as to foster a positive Business Partner perception of Provider capabilities as an essential element of building and sustaining trust relationships Shape strategic agendas for optimum business value, with due consideration of external compliance requirements and potential risks to the business Understand the implications of Lean / Agile methods for the BRM role and capability Influence the development and deployment of available Provider capabilities based upon business need and potential to enable or create business value. Apply Business Capability Management to determine and acquire enabling capabilities pursuant to strategic outcomes Apply Business Capability Management to determine and acquire enabling capabilities pursuant to strategic outcomes Contribute to Business Transition Management in order to foster organizational understanding, support, adoption, and business value results of investments in new business capabilities Course Introduction Explain the House of BRM, recalling the BRM Core Disciplines, competencies required for the BRM role, and necessary conditions for protecting the integrity of the role Recall the key BRM concepts, processes, and techniques Understand the Business Relationship Maturity Model and the Five Relationship Maturity Levels Understanding Business Relationship Maturity and Value The Strategic BRM Role and Capability BRM Impact on Business Value Introduction to the ACME Leisurewear Case Scenario that is used through the course Assessing BRM Context Clarifying Issues Conducting a Business Demand Maturity Assessment Conducting a Business Relationship Maturity Assessment Conducting a Provider Capability Maturity Assessment Shaping the Business Partner's experience with the Provider The BRM role in Service Management Developing Strategic Relationships How to assess Strategic Relationships and plan for their improvement How to achieve business impact through influence and persuasion How to plan and execute BRM formal communications Organizational considerations for BRM deployment How to determine appropriate BRM performance measurement Optimizing Business Value Formulating and Clarifying Business Strategy Catalyzing Business Innovation Business Capability Management Value Management Planning Portfolio Management Business Transition Planning Business Value Optimization Summary and CBRM Exam Preparation Course Summary CBRM Syllabus Review Format and structure of the CBRM® Practitioner Exam Exam hints and tips Sample Exam

Certified Business Relationship Manager (CBRM): Virtual In-House Training
Delivered OnlineFlexible Dates
£2,950

CompTIA Linux+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals whose primary job responsibility is the management of servers and other devices running the Linux operating system. A typical student in this course should have at least nine months of hands-on Linux experience and at least one and a half years of IT experience in other computing environments. The target student should wish to expand their skillset to support their career in Linux system administration and operation. This course is also designed for students who are seeking the CompTIA Linux+ certification and who want to prepare for Exam XK0-005. The Linux+ certification can validate the student's understanding and skill in configuring, monitoring, and supporting Linux systems. Overview In this course, you will configure, operate, and troubleshoot Linux systems. You will: - Perform basic Linux tasks. - Manage users and groups. - Manage permissions and ownership. - Manage storage. - Manage files and directories. - Manage kernel modules. - Manage the Linux boot process. - Manage system components. - Manage devices. - Manage networking. - Manage packages and software. - Secure Linux systems. - Write and execute Bash shell scripts. - Automate tasks. - Plan and perform a Linux installation. The Official CompTIA© Linux+© courseware builds on your existing experience with systems operations and administration to provide you with the knowledge and skills required to configure, manage, operate, and troubleshoot a Linux environment by using security best practices, scripting, and automation. This course will also prepare you for the Exam XKO-005. 1 - PERFORMING BASIC LINUX TASKS Identify the History and Development of Linux Enter Shell Commands Get Help Using Linux 2 - MANAGING USERS AND GROUPS Assume Superuser Privileges Create, Modify, and Delete Users Create, Modify, and Delete Groups Query Users and Groups Configure Account Profiles 3 - MANAGING PERMISSIONS AND OWNERSHIP Modify File and Directory Permissions Modify File and Directory Ownership Configure Special Permissions and Attributes Troubleshoot Permissions Issues 4 - MANAGING STORAGE Create Partitions Manage Logical Volumes Mount File Systems Manage File Systems Navigate the Linux Directory Structure Troubleshoot Storage Issues 5 - MANAGING FILES AND DIRECTORIES Create and Edit Text Files Search for Files Perform Operations on Files and Directories Process Text Files Manipulate File Output 6 - MANAGING KERNEL MODULES Explore the Linux Kernel Install and Configure Kernel Modules Monitor Kernel Modules 7 - MANAGING THE LINUX BOOT PROCESS Configure Linux Boot Components Configure GRUB 2 8 - MANAGING SYSTEM COMPONENTS Configure Localization Options Configure GUIs Manage Services Troubleshoot Process Issues Troubleshoot CPU and Memory Issues 9 - MANAGING DEVICES Identify the Types of Linux Devices Configure Devices Monitor Devices Troubleshoot Hardware Issues 10 - MANAGING NETWORKING Identify TCP/IP Fundamentals Identify Linux Server Roles Connect to a Network Configure DHCP and DNS Client Services Configure Cloud and Virtualization Technologies Troubleshoot Networking Issues 11 - MANAGING PACKAGES AND SOFTWARE Identify Package Managers Manage RPM Packages with YUM Manage Debian Packages with APT Configure Repositories Acquire Software Build Software from Source Code Troubleshoot Software Dependency Issues 12 - SECURING LINUX SYSTEMS Implement Cybersecurity Best Practices Implement Identity and Access Management Methods Configure SELinux or AppArmor Configure Firewalls Implement Logging Services Back Up, Restore, and Verify Data 13 - WORKING WITH BASH SCRIPTS Customize the Bash Shell Environment Identify Scripting and Programming Fundamentals Write and Execute a Simple Bash Script Incorporate Control Statements in Bash Scripts 14 - AUTOMATING TASKS Schedule Jobs Implement Version Control Using Git Identify Orchestration Concepts 15 - INSTALLING LINUX Prepare for Linux Installation Perform the Installation Additional course details: Nexus Humans CompTIA Linux Plus Certification (Exam XK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Linux Plus Certification (Exam XK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Linux+
Delivered OnlineFlexible Dates
£2,475