Looking to break into the lucrative world of insurance, finance, banking, or corporate compliance? The Insurance: 8-in-1 Premium Online Courses Bundle gives you the edge employers want — from KYC, AML, and tax compliance to payroll, purchase ledger, and property law. 🚀 Whether you’re applying for a claims analyst, compliance assistant, risk assessor, financial advisor, or insurance administrator role, this bundle helps make your CV stand out fast. With in-demand skills in accounting, financial analysis, anti-money laundering, property legislation, and corporate payroll systems, you’ll be ready for roles in insurance firms, finance departments, legal firms, underwriting, and investment platforms. 🎯 Compete High is rated 4.8 on Reviews.io and 4.3 on Trustpilot — trust the platform built to help you get hired. 📝 Description The insurance industry thrives on precision, regulation, and expertise in risk, regulation, and finance — all covered in this bundle. Whether you’re entering the industry or seeking a pivot into compliance, auditing, or claims management, this qualification helps unlock that next opportunity. Boost your profile in: Payroll processing AML/KYC regulations Property and contract law Financial reporting Insurance accounting 🧾 From brokers to underwriters to claims officers, this bundle ensures you come prepared with the keywords recruiters scan for in today’s financial job market. ❓ FAQ Q: What kinds of jobs can I pursue? A: Roles in insurance administration, claims processing, finance and compliance, property insurance, payroll and accounting, and tax regulation are all viable outcomes. Q: Is this suitable for beginners? A: Yes — no prior experience is required. Perfect for career changers, new entrants, or upskillers. Q: How credible is this training? A: Compete High is trusted with 4.8 on Reviews.io and 4.3 on Trustpilot — join thousands of learners who are now working in the financial sector.
Ready to step into one of the most in-demand roles in business today? The HR Recruiter 8-in-1 Premium Online Courses Bundle is your ultimate launchpad. This job-ready package includes Employment Law, HR, Data Entry, MS Excel, Payroll, MS Outlook, MS Word, and Online Meeting Management. In today’s competitive hiring space, recruiters must know HR, Employment Law, Data Entry, and Payroll systems inside-out. This course gives you that advantage. Enrol now—before another recruiter gets there first. With Compete High rated 4.8 on Reviews.io and 4.3 on Trustpilot, you’re learning with a trusted leader. Description The modern HR Recruiter is a multitasker—juggling resumes, screening interviews, managing compliance, and organising payroll data. That’s why this bundle includes HR, Employment Law, Data Entry, and Payroll. In recruitment, admin matters. That’s where MS Word, MS Excel, and MS Outlook skills come in—giving you the confidence to manage CVs, reports, and internal comms with ease. Remote meetings? Online Meeting Management ensures you can conduct interviews and onboard candidates professionally across platforms. Whether you’re aiming for internal recruitment, agency work, or corporate HR departments, combining Employment Law, Payroll, and MS Excel with HR fundamentals makes your CV stand out. This is the role everyone wants—and this is how you get it. FAQ Q: What roles does this prepare me for? A: Perfect for HR Assistants, Recruiters, HR Administrators, Payroll Officers, and Talent Acquisition Specialists. Q: Is this bundle good for remote roles? A: Absolutely. With Online Meeting Management, MS Outlook, and Data Entry, it’s designed for hybrid or remote HR teams. Q: Can I trust this provider? A: Yes. Compete High holds a 4.8 on Reviews.io and 4.3 on Trustpilot, making it a top-rated course platform.
Kickstart or advance your tech career with the Software Developer & Programmer Career Path: 8-in-1 Premium Online Courses Bundle. Covering Python, Go Lang, UX, Website Development, HTML, CSS, DevOps, and Project Management, this bundle is crafted to make you highly hireable in the software engineering and web development sectors. From building robust backend systems with Python and Go Lang, to crafting intuitive user experiences with UX, HTML, and CSS, this bundle provides a full-stack approach. Add DevOps skills and project management know-how to lead and deliver projects efficiently—skills that employers in startups and enterprises seek in today's fast-evolving tech landscape. With Compete High’s 4.8 rating on Reviews.io and 4.3 on Trustpilot, you’re choosing quality training that aligns with industry needs. 📘 Description The demand for developers who combine coding expertise with design thinking and operational efficiency is skyrocketing. Master Python and Go Lang to build scalable applications, while UX, HTML, and CSS allow you to create seamless, user-friendly websites. DevOps knowledge ensures your code moves smoothly from development to production, while project management skills equip you to oversee timelines and collaborate effectively. This 8-in-1 course bundle prepares you to be a versatile software developer who understands the entire development lifecycle, increasing your value in the job market. ❓FAQ Q: Do I need prior coding experience? A: No, this bundle suits beginners and those looking to expand their programming skills. Q: What industries can I work in after completing this? A: Software development, web design, startups, enterprise IT, and digital agencies. Q: How important are project management skills? A: Crucial. They help you deliver projects on time, communicate with teams, and meet client expectations.
Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to: Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement and administer Active Directory Rights Management Services (AD RMS). Implement synchronization between AD DS and Azure AD. Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. Installing & Configuring DCs Overview of AD DS Overview of AD DS DCs Deploying DCs Lab: Deploying and administering AD DS Managing Objects in AD DS Managing user accounts Managing groups in AD DS Managing computer accounts Using Windows PowerShell for AD DS administration Implementing and managing organizational units Lab: Deploying and administering AD DS Lab: Administering AD DS Advanced AD DS Infrastructure Management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts Lab: Domain and trust management in AD DS Implementing & Administering AD DS Sites & Replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication Lab: Managing and implementing AD DS sites and replication Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs Lab: Implementing a Group Policy infrastructure Lab: Troubleshooting a Group Policy Infrastructure Managing User Settings with GPOs Implementing administrative templates Configuring Folder Redirection and scripts Configuring Group Policy preferences Lab: Managing user settings with GPOs Securing AD DS Securing domain controllers Implementing account security Audit authentication Configuring managed service accounts (MSAs) Lab: Securing AD DS Deploying & Managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs Lab: Deploying and configuring a two-tier CA hierarchy Deploying & Managing Certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards Lab: Deploying certificates Implementing & Administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Overview of Web Application Proxy Lab: Implementing AD FS Implementing & Administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection Lab: Implementing an AD RMS infrastructure Implementing AD DS Synchronization with Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization Lab: Configuring directory synchronization Monitoring, Managing, & Recovering AD DS Monitoring AD DS Managing the AD DS database Recovering AD DS objects Lab: Recovering objects in AD DS
Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to:Install and configure domain controllers.Manage objects in AD DS by using graphical tools and Windows PowerShell.Implement AD DS in complex environments.Implement AD DS sites, and configure and manage replication.Implement and manage Group Policy Objects (GPOs).Manage user settings by using GPOs.Secure AD DS and user accounts.Implement and manage a certificate authority (CA) hierarchy with AD CS.Deploy and manage certificates.Implement and administer AD FS.Implement and administer Active Directory Rights Management Services (AD RMS).Implement synchronization between AD DS and Azure AD.Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. Installing & Configuring DCs Overview of AD DS Overview of AD DS DCs Deploying DCs Lab: Deploying and administering AD DS Managing Objects in AD DS Managing user accounts Managing groups in AD DS Managing computer accounts Using Windows PowerShell for AD DS administration Implementing and managing organizational units Lab: Deploying and administering AD DS Lab: Administering AD DS Advanced AD DS Infrastructure Management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts Lab: Domain and trust management in AD DS Implementing & Administering AD DS Sites & Replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication Lab: Managing and implementing AD DS sites and replication Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs Lab: Implementing a Group Policy infrastructure Lab: Troubleshooting a Group Policy Infrastructure Managing User Settings with GPOs Implementing administrative templates Configuring Folder Redirection and scripts Configuring Group Policy preferences Lab: Managing user settings with GPOs Securing AD DS Securing domain controllers Implementing account security Audit authentication Configuring managed service accounts (MSAs) Lab: Securing AD DS Deploying & Managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs Lab: Deploying and configuring a two-tier CA hierarchy Deploying & Managing Certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards Lab: Deploying certificates Implementing & Administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Overview of Web Application Proxy Lab: Implementing AD FS Implementing & Administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection Lab: Implementing an AD RMS infrastructure Implementing AD DS Synchronization with Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization Lab: Configuring directory synchronization Monitoring, Managing, & Recovering AD DS Monitoring AD DS Managing the AD DS database Recovering AD DS objects Lab: Recovering objects in AD DS
Duration 5 Days 30 CPD hours This course is intended for Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications Identity management specialist or engineer Access management specialist or engineer Web application developer DevOps specialist Overview As a result of attending this course, you will gain an understanding of the architecture of an identity management realm and trusted relationships using both Red Hat Enterprise Linux Identity Management and Microsoft Active Directory. You will be able to create, manage, and troubleshoot user management structures, security policies, local and remote secure access methods, and implementation technologies such as Kerberos, PKI, and certificates. You should be able to demonstrate these skills: Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers. Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies. Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower. This course will empower you with the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat© Enterprise Linux.You will master these skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. This course covers the same material as RH362, but includes the Red Hat Certified Specialist in Identity Management exam (EX362). Install Red Hat Identity Management Describe and install Red Hat Identity Management (IdM). Centralize Identity Management Explain the IdM server services, explore IdM clients access methods, and install an IdM client. Authenticate identities with Kerberos Define the Kerberos protocol and configure services for Kerberos authentication. Integrate IdM with Active Directory Create a trust relationship with Active Directory. Control user access Configure users for authorized access to services and resources. Manage a public key infrastructure Manage certificate authorities, certificates, and storing secrets. Maintain IdM operations Troubleshoot and recover Identity Management. Integrate Red Hat products with IdM Configure major services to share the IdM authentication database. Install scalable IdM Construct a resilient and scalable Identity Management topology.
Duration 2.25 Days 13.5 CPD hours This course is intended for nded for individuals who want to gain basic knowledge of working on Microsoft Server Fundamentals 2016 Overview Upon successful completion of this course students will learn the introductory and fundamental functions and services in a Windows Server domain environment. This includes basic Active Directory principles and structures, Windows Firewall basics and configuration, sharing folders and NTFS permissions, Hyper-V virtualization fundamentals, NPS and RADIUS fundamentals, Windows Server backup, and introductory Group Policy functions and uses. In this course, students will learn about Active Directory Domain Services, Windows Firewall with Advanced Security, Shared Folders, Virtualization, Network Policy Server, Windows Server Backup and Group Policy. IntroductionActive Directory Domain Services Overview Domains OUs Forest Domain Controllers Windows Firewarll with Advanced Security Firewall Rules and the Firewall Applet Connection Security Rules Shared Folders Shared Folder Ideas and Options Sharing A Folder Permissions Virtualization Hyper-V Ideas Virtual Disks and Switches Virtual Networks and MAC Network Policy Server RADIUS Ideas Window Server Backup Backup options and types Backup performance and advanced settings Group Policy Creation of Group Policy Settings for GPOs Applying GPOs
Duration 4 Days 24 CPD hours This course is intended for This course is appropriate for anyone who wants to create applications or modules to automate and simplify common tasks with Perl. Overview Working within in an engaging, hands-on learning environment, guided by our expert web development, PHP practitioner, students will learn to: Create a working script that gets input from the command line, the keyboard, or a file Use arrays to store and process data from files Create formatted reports Use regular expressions Use the appropriate types of variables and data structures Refactor duplicate code into subroutines and modules What is available in the standard library Use shortcuts and defaults, and what they replace Introduction to Perl Programming Essentials is an Introductory-level practical, hands-on Perl scripting training course that guides the students from the basics of writing and running Perl scripts to using more advanced features such as file operations, report writing, the use of regular expressions, working with binary data files, and using the extensive functionality of the standard Perl library. Students will immediately be able to use Perl to complete tasks in the real world. Session: An Overview of Perl What is Perl? Perl is compiled and interpreted Perl Advantages and Disadvantages Downloading and Installing Perl Which version of Perl Getting Help Session: Creating and running Perl Programs Structure of a Perl program Running a Perl script Checking syntax and warnings Execution of scripts under Unix and Windows Session: Basic Data and I/O Numeric and Text literals Math operators and expressions Scalar variables Default values Writing to standard output Command line arguments Reading from the standard input Session: Logic and Loops About flow control The if statement and Boolean values Using unless and elsif Statement modifiers warn() and die() The conditional construct Using while loop and its variants Using the for loop Exiting from loops Session: Lists and Arrays The list data type Accessing array elements Creating arrays List interpolation Arrays and memory Counting elements Iterating through an array List evaluation Slices and ranges Session: Reading and writing text files File I/O Overview Opening a file Reading text files Writing to a text file Arrays and file I/O Using the <> operator Session: List functions Growing and shrinking arrays The split() function Splitting on whitespace Assigning to literal lists The join() function The sort() function Alternate sort keys Reversing an array Session: Formatting output Using sprintf() and printf() Report formatting overview Defining report formats The write() function Advanced filehandle magic Session: Hashes Hash overview Creating hashes Hash attributes Traversing a hash Testing for existence of elements Deleting hash elements Session: References What is a reference? The two ways to create references References to existing data References to anonymous data Dereferencing scalar, array, and ash references Dereferencing elements of arrays and hashes Multidimensional arrays and other data structures Session: Text and Regular Expressions String length The substr() function The index() and rindex() functions String replication Pattern matching and substitution Regular expressions Session: Raw file and data access Opening and closing raw (binary) files Reading raw data Using seek() and tell() Writing raw data Raw data manipulation with pack() and unpack() Session: Subroutines and variable scope Understanding packages Package and Lexical variables Localizing builtin variables Declaring and calling subroutines Calling subroutines Passing parameters and returning values Session: Working with the operating system Determining current OS Environment variables Running external programs User identification Trapping signals File test operators Working with files Time of day Session: Shortcuts and defaults Understanding $_ shift() with no array specified Text file processing Using grep() and Using map() Command-line options for file processing Session: Data wrangling Quoting in Perl Evaluating arrays Understanding qw( ) Getting more out of the <> operator Read ranges of lines Using m//g in scalar context The /o modifier Working with embedded newlines Making REs more readable Perl data conversion Session: Using the Perl Library The Perl library Old-style library files Perl modules Modules bundled with Perl A selection of modules Getting modules from ActiveState Getting modules from CPAN Using Getopt::Long Session: Some Useful Tools Sending and receiving files with Net::FTP Using File::Find to search for files and directories Grabbing a Web page Some good places to find scripts Perl man pages for more information Zipping and unzipping files
ð Unlock the power to protect! Introducing our comprehensive course: 'Infection Control'! ð¦ In today's world, where global health concerns are at the forefront, there's never been a more crucial time to prioritize infection control. Our dynamic course equips you with the knowledge and skills needed to mitigate the spread of infectious diseases effectively. Whether you're a healthcare professional, caregiver, or simply passionate about safeguarding public health, this course is your gateway to becoming a proactive force against infections. ðª ð Benefits of Taking 'Infection Control' Course: Stay Ahead of the Curve: With ever-evolving pathogens and infectious diseases, staying updated on best practices for infection control is essential. Our course provides you with the latest insights and strategies to tackle emerging threats head-on. Enhance Your Expertise: Gain a comprehensive understanding of infection control principles, protocols, and procedures. From hand hygiene to environmental cleaning, you'll acquire the expertise needed to maintain a safe and sterile environment in any setting. Protect Yourself and Others: By mastering infection control techniques, you not only safeguard your own well-being but also contribute to the health and safety of those around you. Empower yourself to be a frontline defender against infections in your community. Boost Professional Credentials: Whether you're seeking career advancement in healthcare or aiming to enhance your resume, completing our 'Infection Control' course demonstrates your commitment to excellence in infection prevention and control. Peace of Mind: Equip yourself with the knowledge and skills to navigate public health challenges with confidence. With our course, you'll gain peace of mind knowing that you're equipped to handle infection control scenarios effectively. ð©âï¸ Who is this for? Healthcare Professionals: Nurses, doctors, pharmacists, and other healthcare professionals can benefit from reinforcing their infection control knowledge to provide optimal patient care. Caregivers: Whether you work in a nursing home, daycare, or home care setting, understanding infection control measures is crucial for protecting vulnerable populations. Students: Aspiring healthcare professionals and students pursuing degrees in health-related fields can gain a competitive edge by acquiring foundational knowledge in infection control early in their academic journey. Public Health Advocates: Individuals passionate about promoting public health and preventing the spread of infectious diseases will find our course instrumental in driving positive change in their communities. ð Career Path: Healthcare Settings: Hospitals, clinics, long-term care facilities, and other healthcare settings prioritize infection control to ensure patient safety and prevent healthcare-associated infections. Completing our course can open doors to various roles, including infection control nurse, epidemiologist, or infection preventionist. Public Health Agencies: Governmental organizations and public health agencies rely on skilled professionals to develop and implement infection control policies and initiatives. Graduates of our course may pursue opportunities in public health departments, CDC, WHO, and other global health organizations. Research and Academia: For those interested in advancing the field of infection control through research and education, our course serves as a solid foundation for pursuing academic or research-oriented careers in universities, research institutes, or pharmaceutical companies. Don't wait for the next outbreak to take action! Enroll in our 'Infection Control' course today and become a vital player in safeguarding public health. Together, let's combat infections and build a healthier, safer future! ð¼ð FAQ (Frequently Asked Questions) - Infection Control Q1. What is infection control? Infection control refers to the measures and practices implemented to prevent the spread of infections in various settings, including healthcare facilities, workplaces, schools, and communities. These measures aim to reduce the risk of transmitting infectious agents, such as bacteria, viruses, fungi, and parasites, from one person to another. Infection control strategies include hand hygiene, proper use of personal protective equipment (PPE), cleaning and disinfection of surfaces, safe handling and disposal of medical waste, and adherence to standard precautions and protocols. Q2. Why is infection control important? Infection control is essential for maintaining public health and preventing the spread of infectious diseases. Effective infection control measures can reduce the incidence of healthcare-associated infections (HAIs), protect healthcare workers and patients, minimize the burden on healthcare systems, and contribute to overall well-being and productivity in various environments. By preventing the transmission of pathogens, infection control measures also play a crucial role in containing outbreaks and pandemics. Q3. How can I practice infection control in my daily life? You can practice infection control in your daily life by adopting simple yet effective habits. These include: Regular handwashing with soap and water or using alcohol-based hand sanitizers. Covering your mouth and nose with a tissue or your elbow when coughing or sneezing. Avoiding close contact with sick individuals. Keeping commonly touched surfaces clean and disinfected. Using personal protective equipment, such as masks or gloves, when necessary. Following recommended vaccination schedules. Adhering to public health guidelines and regulations, especially during outbreaks or pandemics. Q4. How does infection control apply in healthcare settings? In healthcare settings, infection control is particularly critical due to the high risk of transmitting infections between patients, healthcare workers, and visitors. In addition to standard infection control practices, healthcare facilities implement additional measures, such as: Isolation precautions for patients with contagious diseases. Strict adherence to hand hygiene protocols. Use of specialized equipment and environmental controls to prevent cross-contamination. Staff education and training on infection control guidelines and procedures. Surveillance and monitoring of healthcare-associated infections to identify and address potential risks. By prioritizing infection control in healthcare settings, providers can ensure the safety and well-being of both patients and staff while maintaining the quality of care delivered. Course Curriculum Module 1-Introduction to Infection Introduction to Infection 00:00 Module 2-Chain of Infection Chain of Infection 00:00 Module 3- Foodborne & Waterborne infections Foodborne & Waterborne infections 00:00 Module 4- Skin Infection and Control Skin Infection and Control 00:00 Module 5-Bone Infection and it's control Bone Infection and it's control 00:00 Module 6-Nosocomial Infections and Control Nosocomial Infections and Control 00:00 Module 7-Infection prevention and control Infection prevention and control 00:00 Module 8-Good Hygiene Practices Good Hygiene Practices 00:00 Module 9-Maintaining personal hygiene Maintaining personal hygiene 00:00
Duration 2 Days 12 CPD hours This course is intended for People working in an organization aiming to improve performance, especially in response to digital transformation or disruption. Any roles involved in the creation and delivery of products or services: Leadership and CXO, especially CIO, CTO, CPO, and CVO Transformation and evolution leads and change agents Value stream architects, managers, engineers Scrum Masters, agile and DevOps coaches and facilitators Portfolio, product and project managers, and owners Business analysts Architects, developers, and engineers Release and environment managers IT Ops, service and support desk workers Customer experience and success professionals Overview After completing this course, students will be able to: Describe the origins of value stream management and key concepts such as flow, value, and delivery Describe what value stream management is, why it's needed and the business benefits of its practice Describe how lean, agile, DevOps, and ITSM principles contribute to value stream management Identify and describe value streams, where they start and end, and how they interconnect Identify value stream roles and responsibilities Express value streams visually using mapping techniques, define current and target states and hypothesis backlog Write value stream flow and realization optimization hypotheses and experiments Apply metrics such as touch/processing time, wait/idle time, and cycle time to value streams Understand flow metrics and how to access the data to support data-driven conversations and decisions Examine value realization metrics and aligning to business outcomes, and how to sense and respond to them (outcomes versus outputs) Architect a DevOps toolchain alongside a value stream and data connection points Design a continuous inspection and adaptation approach for organizational evolution The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, process, and technology aspects of this way of working and explores how optimizing value streams for flow and realization positively impacts organizational performance. History and Evolution of Value Stream Management and its Application Value stream management?s origins Definitions of value stream management Flow Lean and systems thinking and practices Agile, DevOps and other frameworks Research and analysis Identifying Value Streams What is a value stream? Identifying value streams Choosing a value stream Digital value streams Value stream thinking Mapping Value Streams Types of maps Value stream mapping The fuzzy front end Artifacts 10 steps to value stream mapping Mapping and management VSM investment case Limitations of value stream mapping Connecting DevOps Toolchains CICD and the DevOps toolchain Value stream management processes Value stream management platforms DevOps tool categories Building an end-to-end DevOps toolchain Common data model and tools integrations Value Stream Metrics The duality of VSM Downtime in technology Lean, DORA and Flow metrics Definition of Done Value metrics Benefits hypotheses Value streams as profit centers KPIs and OKRs Inspecting the Value Stream 3 Pillars of Empiricism Organizational performance Visibility When to inspect Data and discovery Insights and trends Organizing as Value Streams Value stream alignment Team types and topologies Project to product Hierarchy to autonomy Target Operating Model Value stream people Value stream roles Value stream funding Evolving Value Streams Why now? Transitions VSM capability matrix VSM culture iceberg Learning Making local discoveries global improvements Managing value stream interdependencies