Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp
Duration 5 Days 30 CPD hours This course is intended for Horizon Cloud Service on Microsoft Azure administrators, system integrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of Horizon Cloud Service on Microsoft Azure Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Discuss Horizon Cloud Service on Microsoft Azure networking concepts Discuss Horizon Cloud Service on Microsoft Azure AD requirements and integration best practices Discuss the integration of Workspace ONE Access with Horizon Cloud Service on Microsoft Azure Discuss the requirements for deploying Horizon Cloud Service on Microsoft Azure Demonstrate how to deploy or upgrade Horizon Cloud Service on Microsoft Azure Identify the Horizon Cloud Service console controls that are available to administrators Identify Horizon Cloud upgrade features and benefits List the steps and considerations to take when setting up a primary VM to be used as an assignable image List the steps to install the user software on the primary VM Describe pools and pool groups Explain the creation process and configuration options for single-session and multisession pools and pool groups Create single-session and multisession assignments and entitlements Explain power management options in the multisession pool groups Manage assignable images on Horizon Cloud Service on Microsoft Azure Identify how to access desktops and application from Horizon Cloud Service on Microsoft Azure Describe the integration of VMware Dynamic Environment Manager with Horizon Cloud Service on Microsoft Azure Manage user personalization and application configurations using the VMware Dynamic Environment Manager management console and application profiler Discuss the usage of App Volumes for Horizon Cloud Service on Microsoft Azure Interpret scalability considerations for Horizon Cloud Service on Microsoft Azure Apply troubleshooting techniques relevant to Horizon Cloud Service and Microsoft Azure Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure This five-day, hands-on training provides you with the knowledge, skills, and abilities to successfully deploy and manage VMware Horizon© Cloud Service? on Microsoft Azure. This training also teaches you how to use the VMware Horizon Cloud administration console and Microsoft Azure portal. Through a combination of hands-on labs and interactive lectures, you learn how to import and manage images for single and multisession assignments. You also learn how to configure and use the Universal Broker function, VMware App Volumes?, VMware Workspace ONE© Access?, and VMware Dynamic Environment Manager? in the Horizon Cloud Service on Microsoft Azure deployment. Course Introduction Introduction and course logistics Course objectives Introduction to Horizon Cloud Service on Microsoft Azure Discuss the features and benefits of Horizon Cloud Service on Microsoft Azure Identify the available Horizon Cloud and Microsoft licensing options Identify the system architecture components of Horizon Cloud Service on Microsoft Azure Explain how VMware Dynamic Environment Manager is used in Horizon Cloud profile management Describe Horizon Cloud application management using App Volumes Identify the Microsoft Azure configuration prerequisites for a Horizon Cloud integration Identify the main Microsoft Azure components required for a Horizon Cloud deployment Review the virtual machines supported in Horizon Cloud Service on Microsoft Azure Microsoft Azure Networking Requirements Discuss Horizon Cloud connectivity considerations and tasks Explain the networking concepts for Horizon Cloud Service on Microsoft Azure Identify the ports required for local connections, remote connections, and endpoint OS firewall rules Identity Management Explain computer identity type and user identity type Discuss the best practices for Horizon Cloud Service on Microsoft Azure AD integrations Determine the requirements for Horizon Cloud Service on Microsoft Azure AD Describe the benefits of integrating Horizon Cloud with Workspace ONE Access Explain how a user obtains access to an entitled virtual desktop or application from the VMware Workspace ONE© Intelligent Hub catalog Discuss the importance of binding directory with Workspace ONE Access and setting up custom user attribute synchronization Discuss the importance of configuring the Remote App Access client in Workspace ONE Access Demonstrate how to access an entitled Horizon virtual desktop or application in the Workspace ONE Intelligent Hub catalog Deployment and Upgrades Explain the steps and requirements for deploying Horizon Cloud Service on Microsoft Azure Describe the features and benefits of Horizon Edge Describe the differences between internal and external gateways Outline the Horizon Universal Console controls available for administrators Identify the features and benefits of the Horizon Cloud upgrades Creating Images Outline the process and configuration choices for setting up primary VMs Identify the configuration choices for importing primary VMs List the steps to install the user software on the primary VM Explain how to convert a configured primary VM to an assignable image Describe pools and pool groups List the steps for configuring an image to a pool List the steps for configuring an image to a pool group Pool Groups Compare dedicated assignments to floating assignments Outline the steps for creating single-session and multisession assignment Explain the entitlement of pool groups Outline the creation process and configuration options for multisession pools and pool groups Explain the power management selections in the multisession pool groups Compare the rolling maintenance and loadbalancing options Identify the actions related to the multisession groups page Identify the actions to add and assign applications to a user or group Outline the prerequisites for entitling a multisession assignment Access Desktops and Applications Identify the different versions of Horizon Client Describe how to access desktops and remote applications with Horizon Client Describe how to access desktops and remote applications with a browser Compare the remote display protocols that are available for Horizon Cloud Describe the Blast Extreme display protocol codecs List the ideal applications for each Blast Extreme codec Describe the Blast Extreme policy configurations Managing Images Describe images Explain how to manage images VMware Dynamic Environment Manager on Horizon Cloud Service on Microsoft Azure Identify the functional areas of VMware Dynamic Environment Manager and their benefits Explain how to use the VMware Dynamic Environment Manager console and application profiler to manage user personalization and application configurations App Volumes for Horizon Cloud Service on Microsoft Azure Explain how App Volumes works with Horizon Cloud Service on Microsoft Azure Identify the features and benefits of App Volumes in Horizon Cloud Service on Microsoft Azure Identify the interface elements of App Volumes in Horizon Cloud Service on Microsoft Azure Demonstrate how to configure App Volumes in Horizon Cloud Service on Microsoft Azure Scalability Considerations Recognize the scalability settings for Horizon Cloud Service on Microsoft Azure Troubleshooting Horizon Cloud Service on Microsoft Azure Explain the troubleshooting basics for Horizon Cloud Service on Microsoft Azure Identify the analytics and monitoring capabilities of Horizon Cloud Service on Microsoft Azure Explain the troubleshooting basics for Horizon Cloud Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon Cloud Service Next Gen on Microsoft Azure: Deploy and Manage training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon Cloud Service Next Gen on Microsoft Azure: Deploy and Manage course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Salesforce consultants and administrators Overview When you complete this course, you will be able to:Enable Field Service Lightning.Describe the capabilities and components of Field Service Lightning.Know the right questions to ask prior to implementing Field Service Lightning.Understand the steps to successfully implement Field Service Lightning In this hands-on course, you will learn about Field Service Lightning components and even have the opportunity to implement Field Service Lightning for AW Computing, our fictitious company. What is Field Service Lightning? Define Field Service Lightning Identify the challenges of field service management and how FSL can overcome those challenges Describe what connected field service looks like Explain the main components and capabilities of FSL Meet AW Computing Learn about AW Computing Understand the business reason why AW Computing has purchased FSL Plan for Field Service Lightning Learn the essential questions to ask before setting up FSL Consider FSL limitations Set Up Field Service Lightning (Long Module) Set up FSL Components and Managed Package Walk Through the FSL Process by Role View and perform FSL actions as a Service Agent View and perform FSL actions as a Dispatcher View and perform FSL actions as a Field Resource View and run FSL reports as a Supervisor / Manager
Calling all aspiring screenwriters and creative minds! Join us for an exciting script pitching workshop led by tutor Gemma Mushington. This taster session is designed to unleash your imagination and guide you through the process of coming up with and pitching an original script idea. Gemma Mushington, a talented screenwriter with a BA in Film, Television, and Digital Production, brings her wealth of industry knowledge and experience to this workshop. She is signed with Casarotto Ramsay and was the proud winner of the Neal Street Productions Screenwriting Bursary in 2021. Gemma's impressive credentials also include writing an episode of CBBC's The Dumping Ground, which aired in May 2023. With her current role as our Module Leader for the Major Feature Film module on the BA Screenwriting course, Gemma is the perfect guide to help you develop your script ideas. During this engaging taster session, Gemma will lead you through an exercise focused on generating and refining your own original script idea. Learn the techniques and strategies used by professional screenwriters to create compelling narratives that captivate audiences. Gain valuable insights into the art of pitching as Gemma shares her expertise on how to effectively communicate your ideas and grab the attention of industry professionals. Whether you are a screenwriting student, a budding storyteller, or simply someone with a passion for creative writing, this workshop is a fantastic opportunity to explore the exciting world of script development. No prior experience is necessary, as Gemma will provide guidance and support throughout the session. Don't miss out on this chance to refine your scriptwriting skills and pitch your ideas with confidence. Reserve your spot now and prepare to unleash your creative potential with the guidance of tutor Gemma Mushington!
Free Hypnosis Training: Discover Hypnotherapy with SFTA Join us for an exciting online event where you can explore the fascinating world of hypnotherapy. Hosted by the renowned Solution Focused Training Academy Focused, this workshop session is perfect for anyone curious about the power of hypnosis. Whether you're a beginner or have some experience, this event will provide valuable insights and techniques to enhance your understanding. Starting on Tues 3Oth April 2024, at 7.00 pm, our expert trainers will guide you through the fundamentals of hypnotherapy. Discover how hypnosis works its applications in various fields, and learn practical tips to induce hypnotic states. Through interactive sessions and engaging discussions, you'll gain a deeper understanding of the mind and its potential. Don't miss this unique opportunity to delve into the world of hypnotherapy. Reserve your spot today and embark on a journey of self-discovery and personal growth. Register now for this FREE event and unlock the secrets of hypnosis with SFTA! By attending, you'll: Get a hands-on feel for inducing a trance. Embark on a journey through the rich history of hypnosis. Uncover the magic behind the Solution Focused Approach and why it works. Details on our In-person and Distance learning programmes. You'll receive two Self-hypnosis tracks written by Catherine Eland. But wait, there's more! As a token of our appreciation, you will receive a FREE self-hypnosis download to deepen your understanding and help with sleeping, confidence and motivation. So, mark your calendar for Tuesday, April 30th 2024, at 7.00 pm and get ready for a night of enlightenment, intrigue, and a whole lot of fun on Zoom. Are you itching to take your hypnotherapy journey to the next level with our Six-Month Weekend SFTA Hypnotherapy Training course starting in April 2024? Alternatively, you might like a flexible learning experience with our SFTA distance learning course. Visit our website at www.sfta.co.uk. We've got schools across the UK. Or, if you prefer, give our friendly support team a call at 0345 257 0056. Let's make it an unforgettable journey together!
Duration 2 Days 12 CPD hours This course is intended for This certification is appropriate for anyone who is interested in working as a Scrum Master or for someone who is already a Scrum master in his organization. Scrum Master is an important role in any Scrum team and need not be a technology expert to be effective. Moreover, although Scrum is popular in the IT industry, it can be used effectively across different industries. The SBOK Guide, on which the SMC course is based on, can be used as an effective guide for implementation. Overview The participants will be prepared to take SMC⢠certification exam and pass. Also they will be able to apply the concepts in their day to day job. This course guides & teaches Scrum practices to everyone involved in the project; clears impediments for the team; and, ensures that Scrum processes are being followed. Successful candidates will be awarded the Scrum Master Certified (SMC?) certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience. Introduction Course Objectives Course Methodology Certification Schema Exam Format Overview of Agile Agile Manifesto Agile Principles What has Changed Agile Methods Overview of Scrum Definition and brief history of Scrum Why Scrum Scrum vs. Traditional Project Management Benefits of Scrum Overview of A Guide to the Scrum Body of Knowledge (SBOK? Guide) Framework of the SBOK? Guide Who uses the SBOK? Guide How to use the SBOK? Guide Scrum Flow Principles Empirical Process Control Self-organization Collaboration Value-based Prioritization Time-boxing Iterative Development Scrum Aspects Organization Business Justification Quality Change Risk Scrum Phases and Processes Initiate Plan and Estimate Implement Review and Retrospect Release Scaling Scrum Scaling Scrum for Large Projects Scaling Scrum for the Enterprise Transition to Scrum Mapping Traditional Roles To Scrum Maintaining Stakeholder Involvement Importance Of Executive Support
This course looks at the key processes in supply chains and how they interact; the most common supply chain terms and how they are utilised to describe supply chain activities. It will cover the definitions of transport modes and how to select the most appropriate one; the role of logistics partners in the extended supply chain and the definition and use of Incoterms. PARTICIPANTS WILL LEARN HOW TO: Explain the term “Supply Chain” Define main activities in Transport & Freight Management Describe the key principles of Warehousing Interpret INCOTERMS COURSE TOPICS INCLUDE: Freight terminology & global trade terminology Warehouse, logistics and transport operations Transport modes Parties involved in international shipments INCOTERMS Freight calculations
The course helps participants understand the role of demand and inventory planning in the wider context of supply chain management. It aims to demonstrate how to improve the alignment between supply and demand to maintain good levels of customer service and on-shelf availability whilst eliminating excess stock and reducing inventory investment. PARTICIPANTS WILL LEARN HOW TO: • Understand the role of demand management and its benefits • Identify the key demand characteristics and patterns; learn how to use them to improve forecast accuracy • Develop an understanding of key qualitative and quantitative forecasting methods • Learn how to conduct fundamental inventory analyses with a view to achieving the appropriate trade-off between stock and service level COURSE TOPICS INCLUDE: The role of Demand Management • The end-to-end view of Supply Chain Management • Demand Characteristics and the Product Life Cycle • Demand patterns • Push and pull systems Background to forecasting • The forecasting Process • Time-series methods of forecasting • Calculating forecast errors Inventory Analysis • Categorisation of stock • ABC Analysis • Economic order quantity and minimum order quantity • Safety stock and stock cover Inventory Management • Materials requirements planning (MRP) • Stock replenishment systems • Practical inventory management • The cost of managing stock
This intensive course equips senior management with the knowledge and skills to develop a logistics strategy that will consistently support business objectives. PARTICIPANTS WILL LEARN HOW TO: Understand the concept of integrated logistics. Critically analyse and evaluate logistics operations. Apply solutions to problems in line with global best practices. Devise and operate effective performance measures. Learn how to create performance improvement plans. Understand how to support inbound and outbound logistic activities. COURSE TOPICS INCLUDE: Mission, strategy and policies for logistics Costs of non-performance and poor performance Logistics planning Land, air and marine transport services Materials storage, preservation and handling Waste management services HSSE policies Sustainable logistics and transport Risk management in logistics Management controls Performance measurement Sustainability
This course provides exceptional training on the principles and processes required to successfully operate a warehouse. PARTICIPANTS WILL LEARN HOW TO: • Learn about the characteristics of a warehouse and its function • Understand the basic principles of effective layout design and product storage prioritization • Gain an understanding of modern practices in warehouse operations, such as Kanban and 5S • Understand the importance of packaging and data inputs to improve the performance of pick and pack operations • Understand the role of KPIs in warehouse and supply chain management COURSE TOPICS INCLUDE: Material storage as part of supply chain management Evaluation of outsourcing issues Challenges of codification and traceability Performance management Automated and mechanized systems Different storage methodologies Use of Warehouse management systems Optimum cube utilization and labour productivity Picking and packing management systems Goods receipt and dispatch