ISO 13485 Foundation training enables you to learn the basic elements to implement and manage a Medical Devices Quality Management System (MDQMS) as specified in ISO 13485. During this training course, you will be able to understand the different modules of a MDQMS, including MDQMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement. After completing this course, you can sit for the exam and gain "Certified ISO 13485 Foundation' Certification. This Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach. About This Course Learning Objectives Understand the elements and operations of a Medical Devices Quality Management System (MDQMS) Acknowledge the correlation between ISO 13485 and other standards and regulatory frameworks Understand the approaches, methods and techniques used for the implementation and management of a MDQMS Course Agenda Day 1: Introduction to Medical Devices Quality Management System (MDQMS) concepts as required by ISO 13485 Day 2: Medical Devices Quality Management System requirements and Certification Exam Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 40 question, multiple choice exam on Day 2 of the course. The overall passing score is 70%, to be achieved within the 60 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Prerequisites None What's Included? Certification fees are included on the exam price Training material containing over 200 pages of information and practical examples will be distributed An attestation of course completion worth 14 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course. Who Should Attend? Individuals involved in Medical Devices Quality Management Individuals seeking to gain knowledge about the main processes of Medical Devices Quality Management Systems (MDQMS) Individuals interested to pursue a career in Medical Devices Quality Management Accreditation Provided by This course is Accredited by NACS and Administered by the IECB
Duration 5 Days 30 CPD hours This course is intended for Tier 1 Operators, administrators, and architects for VMware Horizon Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of VMware Horizon Define a use case for your virtual desktop and application infrastructure Use vSphere to create VMs to be used as desktops for VMware Horizon Create and optimize Windows VMs to create VMware Horizon desktops Install and Configure Horizon Agent on a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure and manage the VMware Horizon Client systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the VMware Horizon environment using the VMware Horizon Console Dashboard and Horizon Help Desk Tool Identify VMware Horizon Connection Server installation, architecture, and requirements Describe the authentication and certificate options for the VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access⢠and Horizon 8 Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in Horizon 8 Discuss scalability options available in Horizon 8 Describe different security options for the Horizon environment This five-day course gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon Introduction to Use Case Convert customer requirements to use-case attributes Define a use case for your virtual desktop and application infrastructure vSphere for VMware Horizon Explain basic virtualization concepts Use VMware vSphere© Client? to access your VMware vCenter System and VMware ESXi? hosts Create a Windows virtual machine using vSphere Create Windows Desktops Outline the steps to install Horizon Agent on Windows virtual machines Install Horizon Agent on a Windows virtual Machine Optimize and prepare Windows virtual machines to set up Horizon desktop VMs Create Linux Desktops Create a Linux VM for Horizon Install Horizon Agent on a Linux virtual machine Optimize and prepare Linux virtual machines to set up Horizon desktop VMs Creating and Managing Desktop Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access the Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of Remote Desktop Session Host farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Monitor the performance of the remote desktop using the Horizon Performance Tracker Horizon Connection Server Recognize the VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD LDS database as a critical {an important component?} component of the Horizon Connection Server installation Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe the BLAST Display Protocol Codecs Summarize the BLAST Codec options List the ideal applications for each BLAST codec Describe the BLAST and PCoIP ADMX GPO common configurations Graphics in Horizon Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a Horizon environment Securing Connections: Network Compare tunnels and direct connections for client access to desktops Discuss the benefits of using Unified Access Gateway List the Unified Access Gateway firewall rules Configure TLS certificates in Horizon Securing Connections: Authentication Compare the authentication options that Horizon Connection Server supports Restrict access to the Horizon remote desktops using restricted entitlements Describe the smart card authentication methods that Horizon Connection Server supports Explain the purpose of permissions, roles, and privileges in VMware Horizon Create custom roles Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a Horizon environment Configure a load balancer for use in a Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication. Explain Horizon Cloud Pod Architecture scalability options Horizon Cloud and Universal Broker Recognize the features and benefits of Horizon Cloud Service Use Universal broker to connect to a Horizon Cloud instance Configure and pair the Horizon Cloud Connector appliance with Horizon Connection Server Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the requirements to install and configure True SSO in a Horizon environment Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon: Deploy and Manage [V8.8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon: Deploy and Manage [V8.8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
A CMS provides organizations a structured approach to meet all compliance obligations, i.e., requirements that they mandatorily have to comply with such as laws, regulations, court rulings, permits, licenses, as well as those that they voluntarily choose to comply with such as internal policies and procedures, codes of conduct, standards, and agreements with communities or NGOs. About This Course The benefits of implementing a compliance management system (CMS) based on ISO 37301 are manifold: helping the organization avoid or mitigate the costs, risks, and damage of noncompliance, ensuring the long-term sustainability of the organization, promoting trust and confidence, encouraging good governance practices, due diligence, and ethically sound business dealings, etc. The ISO 37301 Lead Implementer training course provides the knowledge needed to establish, implement, manage, maintain, and continually improve a CMS. It aims to provide an in-depth understanding of ISO 37301 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of the compliance management system. The training course enables you to help organizations establish processes needed to adhere to all compliance obligations and establish controls that proactively prevent noncompliance and contribute to the creation of a culture of integrity, transparency, and openness. The training course is followed by the certification exam. If you pass, you gain the 'Certified ISO 37301 Lead Implementer' credential. This credential validates your professional capabilities and competences to implement a CMS in an organization based on the requirements of ISO 37301. This training course will help you: Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of a CMS Acknowledge the correlation between ISO 37301 and other standards and regulatory frameworks Gain the ability to interpret the requirements of ISO 37301 in the specific context of an organization Develop the necessary knowledge and expertise to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a CMS Acquire the expertise to advise an organization in implementing CMS best practices Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Prerequisites The main requirements for participating in this training course are a basic knowledge of ISO management system standards, as well as a general understanding of ISO 37301 (or ISO 19600 guidelines) and the MS implementation principles. What's Included? Certification fees are included in the exam price. Training material of over 450 pages of information and practical examples will be provided. An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to participants who have attended the training course. In case of exam failure, candidates can retake the exam once for free within 12 months following the initial exam date. Who Should Attend? Managers, consultants, and compliance officers wishing to develop a thorough understanding of ISO 37301 requirements for a compliance management system Managers and consultants seeking a comprehensive CMS implementation framework Compliance officers responsible for practicing due diligence with regard to compliance risks Individuals wishing to contribute in maintaining organizational integrity by supporting ethical behaviour Managers and members of governance, risk management, and compliance teams Individuals aspiring to become compliance officers or compliance management consultant Accreditation Provided by This course is Accredited by NACS and Administered by the IECB
Duration 2 Days 12 CPD hours This course is intended for This course is designed for professionals in a variety of job roles who are currently using Tableau to perform numerical or general data analysis, visualization, and reporting. They need to provide data visualizations from multiple data sources, or combine data to show comparisons, manipulate data through calculations, create interactive visualizations, or create visualizations that showcase insights from statistical analysis. This course is also designed for students who plan to obtain Tableau Desktop Certified Associate certification, which requires candidates to pass the Tableau Desktop Certified Associate exam. Overview Blend data multiple sources. Join data. Access data in PDFs. Refine visualizations with sets and parameters. Analyze data with calculations. Visualize data with advanced calculations. Perform statistical analysis and forecasting. Create geographic visualizations. Get answers with Ask and Explain The advent of cloud computing and storage has ushered in the era of "big data." With the abundance of computational power and storage, organizations and employees with many different roles and responsibilities can benefit from analyzing data to find timely insights and gain competitive advantage. Data-backed visualizations allow anyone to explore, analyze, and report insights and trends from data. Tableau© software is designed for this purpose. Tableau was built to connect to a wide range of data sources and allows users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Beyond the fundamental capabilities of creating data driven visualizations, Tableau allows users to manipulate data with calculations to show insights, make visualizations interactive, and perform statistical analysis. This gives users the ability to create and share data driven insights with peers, executives, and clients. Prerequisites Tableau Desktop: Part 1 Lesson 1: Blending Data from Multiple Sources Topic A: Blend Data Topic B: Refine Blends to Visualize Key Information Lesson 2: Joining Data Topic A: Create Joins Topic B: Troubleshoot Joins Topic C: Merge Data with Unions Lesson 3: Accessing Data in PDFs Topic A: Connect to PDFs Topic B: Clean Up and Organize PDF Data Lesson 4: Refining Visualizations with Sets and Parameters Topic A: Create Sets Topic B: Analyze Data with Sets Topic C: Apply Parameters to Refine Visualizations Topic D: Create Advanced Visualizations Lesson 5: Analyzing Data with Calculations Topic A: Create Calculated Fields to Analyze Data Topic B: Manipulate Data with Functions Topic C: Analyze Data with Table Calculations Lesson 6: Visualizing Data with Advanced Calculations Topic A: Create Groups and Bins with Calculations Topic B: Analyze Data with LOD Expressions Lesson 7: Performing Statistical Analysis and Forecasting Topic A: Perform Statistical Analysis Topic B: Forecast Data Trends Lesson 8: Creating Geographic Visualizations Topic A: Create Maps Topic B: Customize Mapped Data Lesson 9: Getting Answers with Ask and Explain Topic A: Ask Data Topic B: Explain Data Additional course details: Nexus Humans Tableau Desktop - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Tableau Desktop - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an organizational incident management plan. The compatibility of this training course with ISO/IEC 27035 also supports the ISO/IEC 27001 by providing guidance for Information Security Incident Management. After mastering all the necessary concepts of Information Security Incident Management, you can sit for the exam and gain "Certified ISO 27035 Lead Incident Manager" Certification. By holding this certification, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Information Security Incidents. About This Course Learning objectives Master the concepts, approaches, methods, tools and techniques that enable an effective Information Security Incident Management according to ISO/IEC 27035 Acknowledge the correlation between ISO/IEC 27035 and other standards and regulatory frameworks Acquire the expertise to support an organization to effectively implement, manage and maintain an Information Security Incident Response plan Acquire the competence to effectively advise organizations on the best practices of Information Security Incident Management Understand the importance of establishing well-structured procedures and policies for Incident Management processes Develop the expertise to manage an effective Incident Response Team Course Agenda Day 1: Introduction to Information Security Incident Management concepts as recommended by ISO/IEC 27035 Day 2: Designing and preparing an Information Security Incident Management plan Day 3: Enacting the Incident Management process and handling Information Security incidents Day 4: Monitoring and continual improvement of the Information Security Incident Management plan and the Exam. Additional Information Certification fees are included in the exam price. An attendance record worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course. In case candidates fail the exam, they can retake it within 12 months of the initial attempt for free. Accreditation Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Our Guarantee We are an Accredited Training Provider of the IECB. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam. Prerequisites A fundamental understanding of ISO/IEC 27035 and comprehensive knowledge of Information Security. What's Included? Delegates will be provided with; Course Slide deck Questions and Answers Bank Participant Guide Who Should Attend? Information Security Incident managers IT Managers IT Auditors Managers seeking to establish an Incident Response Team (IRT) Managers seeking to learn more about operating effective IRTs Information Security risk managers IT system administration professionals IT network administration professionals Members of Incident Response Teams Individuals responsible for Information Security within an organization Provided by This course is Accredited by NACS and Administered by the IECB
Implementing Scrum for Teams: Virtual In-House Training Scrum is an iterative, incremental framework for developing products. It allows the team to deliver a potentially shippable set of functionalities for each iteration, providing the agility needed to respond to rapidly changing requirements. These characteristics have led to Scrum becoming the most popular method in the world of Agile projects. This two-day course provides a practical approach to implementing the Scrum method on your projects. You will learn how to initiate a Scrum project, how to build a Product Backlog, containing user stories, and how to plan and estimate releases and iterations. You will learn how to conduct Scrum events, such as the Sprint Planning Meeting, and how to track progress during an iteration. You will apply what you learn in a series of hands-on, team-based activities and simulations that take you through the entire Scrum process. The overall goal of the course is to enable you to successfully apply the Scrum method on appropriate projects in your environment. What you will Learn At the end of this program, you will be able to: Teach-back Agile and Scrum foundation concepts Initiate a Scrum Project Conduct Team Sprint Planning and Sprint Review meetings Develop Release Plans (including effective user stories and priorities) Build a Sprint plan (including effective estimates) Executive a Sprint (including essential Scrum ceremonies) Implement Scrum in your environment Foundation Concepts Agile Mindset, Values, and Tenets Agile Benefits and Methods Scrum Overview Teams: Self-Managing, Self-Organizing, and Self-Improving Initiating a Scrum Project 'Sprint Zero' Activities Defining the Vision The Product Backlog and User Stories Acceptance Criteria Story Map Planning Releases Planning releases Estimating user stories Prioritizing user stories Selecting a Sprint length Estimating velocity Creating a release plan Planning a Sprint The Sprint Planning Meeting Building the Sprint Backlog Creating a Sprint Plan Running a Sprint Conduct a Sprint Burn-down and Burn-up Charts Negotiating Changes During a Sprint The Sprint Review Meeting Sprint Retrospective Releasing into Production Closing the Scrum Project Implementing Scrum Scrum Simulation Exercise Conditions of Success for Implementing Scrum
Virtual Agile Teams: Virtual In-House Training Agile teams are a must in this world of intense competition, marketing demands, and changing expectations. Global virtual teaming has become a necessity as organizations become increasingly distributed, with suppliers and clients actively engaged in joint projects. Agile Teams now work across geographical, organizational, and cultural boundaries to deliver solutions and services to global users. Distance and differences may amplify the effect of issues and factors that are relatively straightforward for co-located Agile teams. This workshop delivers practical concepts and techniques that participants will start using immediately with their virtual Agile teams. The goal of the course is to enable you to successfully execute your preferred Agile or Scrum methods in a virtual project team environment. What you will Learn At the end of this program, you will be able to: Explain the characteristics of a virtual team and how they differ from a co-located team Build an effective virtual Agile team using a Team Charter approach Develop Release Plans, including prioritizing user stories, with a virtual Agile Team Construct a Sprint plan, including effective user story estimates, virtually Execute a Sprint, including essential Agile or Scrum ceremonies, virtually Conduct effective virtual meetings in an environment supportive of Agile and Scrum methods Foundation Concepts Agile Mindset and Values Agile Benefits and Methods Scrum Overview Co-located vs. Virtual Teams Forming Virtual Agile Teams Exploring Virtual Leadership Focusing on Virtual Agile Leaders Developing a Virtual Agile Team Charter Meeting Team Challenges in a Virtual Environment Planning Releases with a Virtual Agile Team Planning releases overview Estimating user stories Prioritizing user stories Setting release parameters Getting consensus on the release plan Planning a Sprint for a Virtual Project Sprint Planning Overview Confirming Sprint Scope with Virtual Agile Teams Developing a Sprint Delivery Plan for Virtual Agile Teams Running a Sprint in a Virtual Environment Self-organizing a Sprint for a Virtual Agile Team Using Scrum tools in a Virtual Environment Conducting End of Sprint Meetings in a Virtual Environment Iterating as a Virtual Agile Team Creating an Environment for Success Piloting a virtual Agile team Creating an Agile-friendly virtual environment
Project Estimating and Scheduling: Virtual In-House Training Establishing realistic estimates and goals for projects that support business objectives and meet client expectations is one of the most challenging aspects of project planning. Delivering those results within the agreed-upon time, cost, and quality constraints is also challenging. Attempting to meet impossible deadlines with limited budgets often leads to unplanned product shortfalls, causing long-term support and utilization problems. We have all anguished about this recurring problem, but without having the skills or knowledge to take action, we are unable to break the cycle! The goal of this course is for you to be able to support business objectives and meet client expectations by selecting the right planning approach for realistic and cost effective schedules, as well as project budgets. To achieve that, you will focus on gaining the necessary knowledge, skills, and techniques. What You Will Learn At the end of this program, you will be able to: Use the work breakdown structure (WBS) as the basis for effective estimating of project resources Estimate effort and duration using a variety of techniques Develop preliminary schedules using the critical path method Apply a variety of optimization techniques to refine preliminary schedules Establish realistic schedule and cost baselines, with appropriate contingency reserves Explain how earned value management (EVM) contributes to control time and cost performance Foundation Concepts Project management basic definitions and concepts PES Key driver: competing constraints PES Process and success factors Project Definition and the WBS Project definition overview Work Breakdown Structure (WBS) Decomposition: WBS development technique Resource Planning Resource planning overview Identifying resource requirements Identifying and filling resource gaps Applying resource planning tools Effort and Duration Estimating Estimating overview Estimating perspectives and approaches Estimating techniques Effort and duration estimating best practices Project Scheduling Overview of project scheduling Dependencies and the project network diagram Critical path method (CPM) Optimizing the schedule Budget, Risk, and Contingency Planning Overview of budget, risk, and contingency planning Estimating costs Determining the budget Project risk management processes Planning contingency reserves Project Baseline and Control Overview of project baseline Negotiating and the project baseline Earned value management (EVM) Project variances and actions Project control
This programme is aimed at helping participants to manage their time more effectively and to be more productive with the time available to them.