• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2162 Success courses in Cardiff delivered Live Online

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered OnlineFlexible Dates
£2,975

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

M.D.D DATING COACHING COURSE

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

How to improve dating success Learning emotional intelligence Improve social awareness Training on emotional resilience Motivation and Patience training Learn Communication Skills Enhance Patience and Introspection Coping mechanisms for stress Learn how to understand people better Learn Assertive communication Improve observation skills Improve mental and physical attraction Are you tired of going on endless dates with no results? Do you struggle to communicate effectively with potential partners or build the confidence needed to succeed in the dating world? If so, Miss Date Doctor UK’s Dating Coach Course is here to help! Our comprehensive course is designed to provide individuals with the tools and knowledge needed to improve their dating skills and find meaningful relationships. Our expert coaches will guide you every step of the way, from developing your personal brand and building confidence to mastering communication skills and navigating online dating. The Dating Coach Course at Miss Date Doctor UK is ideal for anyone looking to enhance their dating experience, whether you’re single and searching for the right partner, or simply looking to improve your current relationship. Our course is tailored to meet the unique needs of each individual, and our coaches are dedicated to providing personalized support and guidance to help you achieve your goals. At Miss Date Doctor UK, we believe that finding love should be a fun and enjoyable experience. That’s why our Dating Coach Course is designed to help you approach dating with a positive and confident mindset, and to give you the skills and knowledge needed to make informed decisions about your dating life. Our course covers a wide range of topics, including building self-esteem, overcoming fears and anxieties, mastering communication skills, and navigating online dating platforms. Whether you’re looking to improve your social skills, build your confidence, or simply learn more about the dating world, Miss Date Doctor UK’s Dating Coach Course has everything you need to succeed. Our course is packed with the key pillars of improving your dating “personal development”, “relationship advice”, “self-improvement”, “emotional intelligence”, “interpersonal skills”, “communication techniques”, “love coaching”, “dating tips”, “online dating”, “dating apps”, and more! So why wait? Sign up for the Dating Coach Course at Miss Date Doctor UK today and start your journey towards a happier, healthier dating life! https://relationshipsmdd.com/product/dating-coaching-course/

M.D.D DATING COACHING COURSE
Delivered in London or UK Wide or OnlineFlexible Dates
£1,200

Use Cases for Business Analysis: In-House Training

By IIL Europe Ltd

Use Cases for Business Analysis: In-House Training The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?

Use Cases for Business Analysis: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

CPD Accredited Effective Auditing & Inspection Level 3 (1 day)

5.0(1)

By Ask Sonia Limited

CPD accredited Level 3 Effective Auditing & Inspection course. Delivered online (Zoom) by a live tutor. Exam and Certificate fee included in the price.

CPD Accredited Effective Auditing & Inspection Level 3 (1 day)
Delivered Online
£240

Get a Job in Sales: Your Fast Track to Career Success

By NextGen Learning

Get a Job in Sales: Your Fast Track to Career Success Course Overview "Get a Job in Sales: Your Fast Track to Career Success" is an essential course designed to equip you with the skills and strategies needed to break into the competitive sales industry. Covering key topics such as interview preparation, effective communication, and how to navigate the job application process, this course provides a clear roadmap for securing a role in sales. With insights into the expectations of employers and techniques for excelling in interviews, learners will gain the confidence to step into a sales career and make an immediate impact. The course also highlights how to tailor your CV, present yourself professionally, and successfully close the deal in interviews. Upon completion, you will be well-prepared to enter the workforce with a competitive edge. Course Description This course provides in-depth guidance on how to successfully land a job in sales. It covers the core steps of preparing for interviews, understanding the sales process, and learning how to present yourself as an attractive candidate to potential employers. Learners will explore strategies to create an impressive CV, master the art of communication, and develop confidence for sales-related job interviews. The course also provides insight into employer expectations, helping learners understand what sales teams look for in candidates. By completing the course, learners will have the knowledge and tools to effectively navigate the job search, perform well in interviews, and position themselves for success in sales roles across various industries. This is a great starting point for anyone looking to build a rewarding career in sales. Get a Job in Sales: Your Fast Track to Career Success Curriculum Module 01: Introduction to Sales Careers Module 02: Preparing for Job Applications Module 03: Mastering Interview Skills Module 04: Effective Communication in Sales Interviews Module 05: Navigating the Job Market and Employer Expectations Module 06: Closing the Deal: Landing Your Sales Job (See full curriculum) Who is this course for? Individuals seeking to begin a career in sales. Professionals aiming to transition into a sales role. Beginners with an interest in sales and business development. Anyone looking to enhance their job application and interview skills. Career Path Sales Executive Business Development Representative Account Manager Sales Consultant Retail Sales Associate Inside Sales Representative Field Sales Representative

Get a Job in Sales: Your Fast Track to Career Success
Delivered OnlineFlexible Dates
£7.99

EPCIC Contract Drafting and Management: With Essential Elements of International Contract Laws

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course In turbulent times for the entire Energy Sector, Oil & Gas E & P segments are coming under tremendous pressure to reinvigorate. Oil Majors like Shell Plc are no longer termed as Oil & Gas Company but also branded as SHELL Energy, with technology at its forefront. The Risks, Scope and Context of Engineering, Procurement, Construction, Installation and Commissioning (EPCIC) Projects is evolving rapidly. Thus, the success of a project is dependent on the practical 'know how' in scoping, contract drafting, negotiation and execution competencies. Understanding the essential ingredients of contracts and mastering the international contracting principles will equip the participants to identify vague and ambiguous clauses, avoid dangerous and often hidden terms, and better understand the controlling position in a project. In this 3 full-day course, the participants will find out how to negotiate legacy contracts where parties are not allowed to edit any clauses during the bidding process. The participants will learn from the Case Law Reports and analysis to take home lessons learned from bitter experiences of their peers in the industry. It is designed to help those who need a solution to manage current contractual issues or those who execute contracts regularly and want to be more proficient in managing their contracts and projects, with changing contexts. The course is developed with the underlying objectives for the participants to: Enhance their current knowledge of the legal principles governing international Contracts from formation, execution to breaches, redresses and dispute resolution either as a party or as a consortium member or as a coverture. Manage Consortium and Joint Venture Partners inter-relationship and contractual responsibilities. Identify dangerous exposures due to joint and severally liable requirements of consortium-based contracts. Effectively Manage Risks of Projects, with Enforceable Contract Documents, by learning the purpose and potential benefits of maintaining evidence in compliance to the contract clauses. Learn the Contract Enforcement Nuggets of Owners and the Variation Claims Strategies of the Contractors. Allocation of contract management related roles / assignments and WBS within consortium partners for effective project management and profitable results. Use of Contract Terms & Conditions for enhancing project performance, monitoring, reporting, and achieving timely completion, thereby avoiding delays and disputes. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Upon completion of the course, the participants will have learnt: Project management strictly in accordance with the contract and the corporate strategies. How to ensure that Variations Order claims are appropriately managed in turnkey and lump-sum contracts. Manage contemporary challenges and market factors with direct or indirect impact on the contracts. Managing all members of the Supply Chain from vendors to logistics services providers. Cost Engineering and Performance Management. How to manage Consortium Partners, Contractors, and Owner's representatives. When and how to obtain / grant extension of time (EOT) and costs. Ability to identify rights and obligations of each party to a contract instead of making subjective decisions. Ability to be firm in negotiations without violating terms of the agreements. Ability to spot different legal systems, contract laws and arbitration rules. Ability to negotiate and avoidance of disputes and resolution in amicable manner, in accordance with the provisions of the contract. Competency in developing and maintaining documentary evidence and traceability for all works executed during the project. Target Audience This course is specially curated for professionals from International Oil & Gas Industries including Offshore & Marine Sectors. They include the heads of strategic business units, contracts managers, project directors, project managers, general managers, corporate legal counsels, procurements and supply chain managers, lawyers and legal professionals engaged in the EPCIC Segments of the Oil & Gas Industry.   Course Level Intermediate Trainer Principal Management Consultant Chartered Valuer and Appraiser (CVA) FACICA | FAMTAC | FAIADR | M.S.I.D | Member, AIEN LL.M. (IP Law), M. Sc. (Maritime Studies), M. Tech (Knowledge Engineering), MBA, First Class CoC (MCA, UK), B. E. (Elect) Your expert course leader, during the last 47 year period, has worked and consulted in the industry verticals encompassing: Technology, Oil & Gas Exploration & Production, Petrochemical Process Plants and Power Plant Construction Projects, Logistics & Warehousing, Marine, Offshore, Oil & Gas Pipelines, Infrastructure Development Projects (Ports, Offshore Supply Bases, Oil & Gas Terminals and Airports etc), EPCIC Contracts, and Shipyards, in South East Asia, Africa, Middle East, Americas and Europe. He serves as the Principal Management Consultant with a management consultancy in Hong Kong and Singapore, specialising in the fields of corporate management consultancy, international contracts reviews and alternative dispute resolutions services. He undertakes special assignments for conducting audits and valuation of intangible properties involving proprietary processes for licensed production, and licensing of intellectual property rights (IP Rights) in patents, trademarks, and industrial designs. He is frequently engaged for assignments like due diligence, acquisitions, mergers, resolving various operational issues, technology transfer and agency services contracts reviews, cost controls, and enhancement of Supply Chain Management. He has been conferred the credentials of Chartered Valuer & Appraiser (CVA) by SAC and IVAS, in accordance with the international valuation standards setting body IVSC. His consulting experience includes Charterparty Management, Business Process Re-engineering, Diversifications, Corporate Development, Marketing, Complex Project Management, Feasibility Studies, Dispute Resolutions and Market Research. He has successfully assisted Marine and offshore E & P clients in managing contractual disputes arising from various international contracts for upgrading & conversion projects. He continues to be actively engaged in claims reviews, mediation, arbitration, litigation, and expert witness related assignments, arising from international contracts and Charterparty Agreements. He graduated with a Bachelor's degree in Electrical Engineering, MBA in General Management, Master of Technology in Knowledge Engineering, Master of Science in Maritime Studies, and LL.M. (IP Law). He also holds professional qualifications in Business Valuations and Appraisers for CVA, arbitration, law, and marine engineering, including the Chief Engineer's First-Class Certificate of Competency (MCA, UK). He is further qualified and accredited as Certified International Arbitrator, Chartered Arbitrator, Sports arbitrator under CAS Rules, WIPO Neutral, Australian Communications and Media Authority (ACMA) Bargaining Code Arbitrator, Accredited Adjudicator and Accredited Mediator (Malaysia). He is admitted to the international panels of arbitrators and neutrals with WIPO, Geneva; ACICA, AMTAC and ACMA, Australia; BVIAC (British Virgin Islands); JIAC (Jamaica); HKIAC Hong Kong; AIAC, Malaysia; AIADR, Malaysia; KCAB, Seoul, South Korea; ICA, Delhi, India; ICC (Singapore); SISV, Singapore; SCMA, Singapore; SCCA, Saudi Arabia; VIAC Vienna, Austria; Thailand Arbitration Centre (THAC), and Mediator with AIAC Malaysia, CMC, and SIMI Singapore. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

EPCIC Contract Drafting and Management: With Essential Elements of International Contract Laws
Delivered in Internationally or OnlineFlexible Dates
£2,407 to £2,799

Business Coaching for Creatives

By EMILY MAGUIRE

If you're just starting a business, looking to re-energise a current business, need small business help and support or are seeking to take your business to the next level, together, we can develop strategies towards achieving your goals.

Business Coaching for Creatives
Delivered OnlineFlexible Dates
£150

Certified Data Centre Professional (CDCP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and who has the responsibility to achieve and improve the availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Choose an optimum site for mission-critical data centre based on current and future needs? Describe all components that are important for high availability in a data centre and how to effectively setup the data centre? Name and apply the various industry standards? Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc, and to select and apply them effectively to cost-efficiently enhance the high-availability of the data centre.? Review the electrical distribution system to avoid costly downtime? Enhance cooling capabilities and efficiency in the data centre by using existing and new techniques and technologies for the increased cooling requirements of the future? Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques? Create effective maintenance contracts with equipment suppliers ensuring the best return on investment? Setup effective data centre monitoring ensuring the right people get the right message? Ensure proper security measures, both procedural and technical, are established to safeguard your company's valuable information in the data centre The course will address how to setup and improve key aspects such as power, cooling, security, cabling, safety, etc., to ensure a high available data centre. It will also address key operations and maintenance aspects. The Data Centre, it?s Importance and Causes for DowntimeData Centre Standards and Best PracticesData Centre Location, Building and Construction Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup Raised Floor/Suspended Ceiling Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements Light Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) Power Infrastructure Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics Electro Magnetic Fields Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions Equipment Racks Rack standards, properties and selection criteria Security considerations Power rail/strip options Cooling Infrastructure Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment Water Supply Importance of water supply and application areas Backup water supply techniques Designing a Scalable Network Infrastructure The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements Fire Suppression Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices Data Centre Monitoring Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations Operational Security and Safety Practices Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage Labelling Choosing a labelling scheme Recommended labelling practices Network labelling Documentation How to setup proper documentation Document management policies and procedures Cleaning Cleaning practices for the data centre MTBF/MTTR Standards and definitions Calculation models The ?real? value Maintenance Contracts/SLA/OLAEXAM: Certified Data Centre Professional Additional course details: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Professional (CDCP)
Delivered OnlineFlexible Dates
£1,500

M.D.D DATING PROFILE CONSULTANT (SINGLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Introducing the Dating Profile Consultant Package: Expert Guidance for an Outstanding Online Dating Presence Are you looking to maximize the impact of your online dating profile and improve your chances of connecting with compatible matches? Miss Date Doctor’s Dating Profile Consultant Package offers you personalized support and insights from experienced consultants who specialize in optimizing online dating profiles. Crafting an effective online dating profile requires a strategic approach and understanding of what resonates with potential matches. Our dedicated dating profile consultants are here to assist you in creating a profile that showcases your unique qualities and attracts genuine connections. Here’s how the Dating Profile Consultant Package can support you: Personalized Evaluation: Our dating profile consultants will conduct a thorough evaluation to understand your personality, preferences, and dating objectives. Strategic Profile Enhancement: We’ll collaborate with you to strategically enhance your profile text, photos, and overall presentation. Photo Selection and Arrangement: Our experts will guide you in selecting and arranging photos that project a genuine and appealing image. Compelling Bio Creation: We’ll assist you in creating a compelling and authentic bio that piques the interest of potential matches. Showcasing Your Uniqueness: Our consultants will work with you to emphasize your unique qualities and values that make you stand out. Initiating Engaging Conversations: We’ll provide insights into starting conversations and maintaining engaging communication with your matches. Boosting Self-Confidence: The Dating Profile Consultant Package aims to boost your confidence by helping you create a polished and attractive profile. Attracting Compatible Matches: We’ll focus on attracting matches who align with your dating preferences and aspirations. The Dating Profile Consultant Package at Miss Date Doctor is designed to empower you with a refined and attention-grabbing online dating profile. Our experienced dating profile consultants offer personalized guidance and practical tips to help you make a lasting impression in the online dating world. Invest in your online dating success and take the first step towards an optimized dating profile with the Dating Profile Consultant Package. Embrace the opportunity to present your best self and attract matches that resonate with your personality and interests. Let our consultants guide you towards an elevated online dating experience filled with meaningful connections. 15 pictures AI approved dating app high standard excellence photos 4×1 hour sessions https://relationshipsmdd.com/product/dating-profile-consultant/

M.D.D DATING PROFILE CONSULTANT (SINGLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£950