• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2978 TEC courses in Cardiff delivered Live Online

BA17 - Problem Determination Root Cause Analysis (RCA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to: Identify the different types of tools and techniques available Apply change management successfully Review what to look for when applying business case thinking to Root Cause Analysis Develop a process to systematically approach problems Business success is dependent on effective resolution of the problems that present themselves every day. Often the same or similar problems continue causing repeated losses in time or money and your staff become experts at fixing rather than preventing the problems. Learn to find and fix root causes and develop corrective actions that will effectively eliminate or control these problems. Section 1: RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? What is Root Cause? RCA Benefits and Approaches Event and Casual Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Section Summary and Conclusions Section 2: Enhance use of RCA tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Tool: Cause and Effect Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Tool: Design / Application Review Section 3: Problem Resolution and Prevention Section Objectives The Secret of Solving Problems: -A Note about Statistical Control -A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN): -What is Business Process Modeling Notation (BPMN)? -Benefits of BPMN -Basic Components of BPMN Technique: Business Process Maturity Model Five Levels of Maturity Section 4: Capability Improvement for RCA Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? -Awareness of the need for change -Desire to participate and support the change -Knowledge on how to change -Ability to implement required skills and behaviors -Reinforcement to sustain the change The ADKAR Model: Reinforcement Section 5: Course Summary and Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Resource Guide Questions

BA17 - Problem Determination Root Cause Analysis (RCA)
Delivered OnlineFlexible Dates
Price on Enquiry

Business Analysis - Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The Foundation course is designed for individuals who want to gain an overview of Business Analysis (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding of business analysis principles and techniques. Key areas are: the role and competencies of a business analyst strategy analysis business system and business process modelling stakeholder analysis investigation and modelling techniques requirements engineering business case development The business analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered. The Foundation Seminar gives a good introduction to the spectrum of this responsibility. Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Structure and Benefits of Business Analysis Foundation Exam Details Business Analysis Certification Scheme What is Business Analysis? Intent and Context Origins of business analysis The development of business analysis The scope of business analysis work Taking a holistic approach The role and responsibilities of the business analyst The competencies of a Business Analyst Personal qualities Business knowledge Professional techniques The development of competencies Strategy Analysis The context for strategy The defiition of strategy Strategy development External environmental analysis Internal invironmental analysis SWOT analysis Executing strategy Business Analysis Process Model An approach to problem solving Stages of the business analysis process model Objectives of the process model stages Procedures for each process model stage Techniques used within each process model stage Investigation Techniques Interviews Observation Workshops Scenarios Prototyping Quantitative approaches Documenting the current situation Stakeholder Analysis and Management Stakeholder categories and identification Analysing stakeholders Stakeholder management strategies Managing stakeholders Understanding stakeholder perspectives Business activity models Modelling Business Processes Organizational context An altrnative view of an organization The organizational view of business processes Value propositions Process models Analysing the as-is process model Improving business processes (to-be business process) Defining the Solution Gab analysis Introduction to Business Architecture Definition to Business Architecture Business Architecture techniques Business and Financial Case The business case in the project lifecycle Identifying options Assessing project feasibility Structure of a business case Investment appraisal Establishing the Requirements A framework for requirements engineering Actors in requirements engineering Requirements elicitation Requirements analysis Requirements validation Documenting and Managing the Requirements The requirements document The requirements catalogue Managing requirements Modelling the Requirements Modelling system functions Modelling system data Delivering the Requirements Delivering the solution Context Lifecycles Delivering the Business Solution BA role in the business change lifecycle Design stage Implementation stage Realization stage

Business Analysis - Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Security Specialist (ECSS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for ECSS is designed for anyone who wants to enhance their skills and make a career in information security, network security, and computer forensics fields. It can be IT Specialists, Network Administrators, or System Administrators. Overview Upon successful completion of this course, students will learn: Key issues plaguing the information security, network security, and computer forensics. Fundamentals of networks and various components of the OSI and TCP/IP model. Various network security protocols. Various types of information security threats and attacks, and their countermeasures. Social engineering techniques, identify theft, and social engineering countermeasures. Different stages of the hacking cycle Identification, authentication, and authorization concepts Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot. Fundamentals of IDS and IDS evasion techniques. Data backup techniques and VPN security. Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security. Different types of web server and web application attacks, and countermeasures. Fundamentals of ethical hacking and pen testing. Incident handling and response process. Cyber-crime and computer forensics investigation methodology. Different types of digital evidence and digital evidence examination process. Different type of file systems and their comparison (based on limit and features). Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism. Steganography and its techniques. Different types of log capturing, time synchronization, and log capturing tools. E-mails tracking and e-mail crimes investigation. Writing investigation report. This is an entry-level security program covering the fundamental concepts and giving a holistic overview of the key components of information security, computer forensics, and network security. Course Outline Information Security Fundamentals Networking Fundamentals Secure Network Protocols Information Security Threats and Attacks Social Engineering Hacking Cycle Identification, Authentication, and Authorization Cryptography Firewalls Intrusion Detection System Data Backup Virtual Private Network Wireless Network Security Web Security Ethical Hacking and Pen Testing Incident Response Computer Forensics Fundamentals Digital Evidence Understanding File Systems Windows Forensics Network Forensics and Investigating Network Traffic Steganography Analyzing Logs E-mail Crime and Computer Forensics Writing Investigative Report Additional course details: Nexus Humans EC-Council Certified Security Specialist (ECSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Security Specialist (ECSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Security Specialist (ECSS)
Delivered OnlineFlexible Dates
Price on Enquiry

Getting Started with Programming, OO and Basic Java for Non-Developers (TT2000)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This basic course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of the fundamentals of coding and basics of Java and object-oriented programming concepts. Attendees might include: Technically-minded attendees who want or who want to begin the process of becoming an OO application developer Technical team members from non-development roles, re-skilling to move into software and application development roles within an organization Recent college graduates looking to apply their college experience to programming skills in a professional environment, or perhaps needing to learn the best practices and standards for programming within their new organization Technical managers tasked with overseeing programming teams, or development projects, where basic coding knowledge and exposure will be useful in project oversight or communications needs Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in basic coding with Java, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn: The steps involved in the creation and deployment of a computer program What OO programming is and what the advantages of OO are in today's world To work with objects, classes, and OO implementations The basic concepts of OO such as encapsulation, inheritance, polymorphism, and abstraction The basic constructs that all programming languages share The basic Java constructs supporting processing as well as the OO orientation How to use Java exception handling About and how to use classes, inheritance and polymorphism About use collections, generics, autoboxing, and enumerations How to take advantage of the Java tooling that is available with the programming environment being used in the class Getting Started with Programming, OO and Java Basics for Non-Developers is a skills-focused, hands-on coding course that teaches students the fundamentals of programming object oriented (OO) applications with Java to a basic level, using sound coding skills and best practices for OO development. This course is presented in a way that enables interested students to embrace the fundamentals of coding as well as an introduction to Java, in a gentle paced environment that focuses on coding basics.Students are introduced to the application development cycle, structure of programs, and specific language syntax. The course introduces important algorithmic constructs, string and character manipulation, dynamic memory allocation, standard I/O, and fundamental object-oriented programming concepts. The course explains the use of inheritance and polymorphism early on so the students can practice extensively in the hands-on labs. Structured programming techniques and error handling are emphasized. The course includes the processing of command line arguments and environment variables, so students will be able to write flexible, user-friendly programs. Students will leave this course armed with the required skills to begin their journey as a Java programmer using modern coding skills and technologies. Introduction to Computer Programming Introduction to Programming Programming Tools Programming Fundamentals Thinking About Objects Program Basics Programming Constructs Java: A First Look The Java Platform Using the JDK The Eclipse Paradigm Writing a Simple Class OO Concepts Object-Oriented Programming Inheritance, Abstraction, and Polymorphism Getting Started with Java Adding Methods to the Class Language Statements Using Strings Specializing in a Subclass Essential Java Programming Fields and Variables Using Arrays Java Packages and Visibility Advanced Java Programming Inheritance and Polymorphism Interfaces and Abstract Classes Exceptions Java Developer's Toolbox Utility Classes Enumerations and Static Imports Formatting Strings Collections and Generics Introduction to Generics Collections

Getting Started with Programming, OO and Basic Java for Non-Developers (TT2000)
Delivered OnlineFlexible Dates
Price on Enquiry

DevSecOps Practitioner (DevOps Institute)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The target audience for the DevSecOps Practitioner course are professionals including: Anyone focused on implementing or improving DevSecOps practices in their organization Anyone interested in modern IT leadership and organizational change approaches Business Managers Business Stakeholders Change Agents Consultants DevOps Practitioners IT Directors IT Managers IT Team Leaders Product Owners Scrum Masters Software Engineers Site Reliability Engineers System Integrators Tool Providers Overview After completing this course, students will be able to: Comprehend the underlying principles of DevSecOps Distinguish between the technical elements used across DevSecOps practices Demonstrate how practical maturity concepts can be extended across multiple areas. Implement metric-based assessments tied to your organization. Recognize modern architectural concepts including microservice to monolith transitions. Recognize the various languages and tools used to communicate architectural concepts. Contrast the options used to build a DevSecOps infrastructure through Platform as a Service, Server-less construction, and event-driven mediums Prepare hiring practices to recognize and understand the individual knowledge, skills, and abilities required for mature Dev Identify the various technical requirements tied to the DevSecOps pipelines and how those impact people and process choices. Review various approaches to securing data repositories and pipelines. Analyze how monitoring and observability practices contribute to valuable outcomes. Comprehend how to implement monitoring at key points to contribute to actionable analysis. Evaluate how different experimental structures contribute to the 3rd Way. Identify future trends that may affect DevSecOps The DevSecOps Practitioner course is intended as a follow-on to the DevSecOps Foundation course. The course builds on previous understanding to dive into the technical implementation. The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing DevSecOps practices to their organizational structure, building better pipelines in distributed systems, and having a common technological language. This course positions learners to successfully complete the DevSecOps Practitioner certification exam. DevSecOps Advanced Basics Why Advance Practices? General Awareness People-Finding Them Core Process Technology Overview Understanding Applied Metrics Metric Terms Accelerating People-Reporting and Recording Integrating Process Technology Automation Architecting and Planning for DevSecOps Architecture Basics Finding an Architect Reporting and Recording Environments Process Accelerating Decisions Creating a DevSecOps Infrastructure What is Infrastructure? Equipping the Team Design Challenges Monitoring Infrastructure Establishing a Pipeline Pipelines and Workflows Engineers and Capabilities Continuous Engagement Automate and Identify Observing DevSecOps Outcomes Observability vs. Monitoring Who gets which Report? Setting Observation Points Implementing Observability Practical 3rd Way Applications Revisiting 3rd Way Building Experiments Getting the Most from the Experiment The Future of DevOps Looking Towards the Future Staying Trained Innovation What, and from Who? Post-Class Assignments/Exercises Extended advanced reading associated with Case Stories from the course Additional course details: Nexus Humans DevSecOps Practitioner (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevSecOps Practitioner (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevSecOps Practitioner (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

Blockchain - An Overview for Business Professionals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Technical leaders Overview This course provides general overview of Blockchain technology and is specifically designed to answer the following questions:What is Blockchain? (What exactly is it?)Non-Technical Technology Overview (How does it work?)Benefits of Blockchain (Why should anyone consider this?)Use Cases (Where and for what apps is it appropriate?)Adoption (Who is using it and for what?)Implementation (How do I get started?)Future of Blockchain (What is its future?) This instructor-led 1 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks Additional course details: Nexus Humans Blockchain - An Overview for Business Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Blockchain - An Overview for Business Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Blockchain - An Overview for Business Professionals
Delivered OnlineFlexible Dates
Price on Enquiry

BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Designed for individuals interested in obtaining information about the CBAP and CCBA exam process especially potential exam candidates interested in pursuing business analysis certification from IIBA in the next 3 to 6 months. Overview Review the 6 Knowledge Areas of the BABOK Guide and discuss the business analysis tasks performed in each. Understand the relationships between the business analysis processes and how each defines an important aspect of the business analysis discipline. Review key terms, business analysis techniques, and competencies important to business analysis. Discuss the 5 business analysis Perspectives presented in BABOK Guide, v3. Complete simulated exam questions to assess personal readiness for taking the exam. Obtain key tips and techniques for effectively preparing for and successfully completing the CBAP or CCBA exam. This course provides you with a clear and detailed understanding of the concepts covered within the CBAP© and CCBA© exams. You will gain valuable tips and techniques to help prepare, study, and assess your personal readiness. In addition, you will earn valuable professional development hours toward meeting the exam criteria. CBAP© and CCBA© Overview Discuss the benefits of professional certification Present the CBAP©/CCBA© eligibility requirements Explain the exam process Discuss the exam blueprints Understand the recertification process Introduction to BABOK© Guide v3 Define the purpose of A Guide to the Business Analysis Body of Knowledge© (BABOK© Guide) Present the structure/components of the BABOK© Guide Identify the six business analysis Knowledge Areas Discuss the supporting areas of the BABOK© Guide BABOK© Guide Key Concepts Define key concepts from the BABOK© Guide Present the Business Analysis Core Concept Model? Discuss the requirements classification scheme Explain Requirements and Designs Present the 5 Business Analysis Perspectives Business Analysis Planning and Monitoring Identify the 5 tasks in Business Analysis Planning and Monitoring Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Elicitation and Collaboration Identify the 5 tasks in Elicitation and Collaboration Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Life Cycle Management Identify the 5 tasks in Requirements Life Cycle Management Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Strategy Analysis Identify the 5 tasks in Strategy Analysis Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Analysis and Design Definition Identify the 6 tasks in Requirements Analysis and Design Definition Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Solution Evaluation Identify the 6 tasks in Solution Evaluation Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Underlying Competencies Describe and understand the importance of the underlying competencies (UCs) Understand how to prepare for questions about UCs on the exam Business Analysis Techniques More clearly understand the 50 techniques presented in the BABOK© Guide Understand how to study techniques for the exam Assess Your Readiness 1 hour mock-exam to assess personal readiness Strategies for Success Utilize 8 strategies for preparing for the CBAP© or CCBA© certification exams Develop study tools and a plan to assist you in preparing for the exams Understand the tools and resources available to help you be successful Wrap-up Take Your Questions Next Steps Additional course details: Nexus Humans BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

BA17 - Advanced Root Cause Analysis

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to:Identify the different types of tools and techniques availableApply change management successfullyReview what to look for when applying business case thinking to Root Cause AnalysisDevelop a process to systematically approach problems Problem determination skills cannot be acquired by reading a book. They mostly come from experience. After this course, you will have a general understanding of a structured problem determination approach, which you can then apply in your daily work. RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? Exercise 1a: Why is RCA important What is Root Cause? RCA Benefits and Approaches Exercise 1b: Why are multiple approaches important? Event and Casual Analysis Exercise 1c: Apply Event and Causal Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Exercise 1D: Prepare for Case Study Section Summary and Conclusions Enhance Use of RCA Tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Exercise 2a: Apply Change Analysis Exercise 2b: Change Analysis Worksheet Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Exercise 2b: Apply 5 Why?s Sequence-of-Events Exercise 2b: Worksheet Tool: Cause and Effect Exercise 2c: Apply Cause and Effect Exercise 2c: Cause and Effect Worksheet Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Exercise 2D: Apply Fault Tree Analysis Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Exercise 2E: Apply FMEA Tool: Design / Application Review Exercise 2d: Apply Design/Application Review Section summary & conclusions Problem Resolution & Prevention Section Objectives The Secret of Solving Problems A Note about Statistical Control A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Exercise 3A: Problem as IGOE Exercise 3A: IGOE Template Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Exercise 3B: Apply Lean Six Sigma Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN) What is Business Process Modeling Notation (BPMN)? Benefits of BPMN Basic Components of BPMN Exercise 3C: Use BPMN to Document a Current State Technique: Business Process Maturity Model Five Levels of Maturity Exercise 3D: Appraise Business Process Maturity Level Section Summary and Conclusions Capability Improvement for RCA Section Learning Objectives Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Exercise 4A: Apply RCA to RCA Process Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey Exercise 4B: Apply Strengths, Weakness, Opportunities and Threats (SWOT) to RCA SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? Awareness of the need for change Desire to participate and support the change Knowledge on how to change Ability to implement required skills and behaviors Reinforcement to sustain the change Exercise 4C: Create an Ability Checklist The ADKAR Model: Reinforcement Exercise 4D: Find two examples of how ADKAR will be different Section Summary and Conclusions Course Summary & Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Exercise 5A: Creating Action Plans Resource Guide Questions Additional course details: Nexus Humans BA17 - Advanced Root Cause Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA17 - Advanced Root Cause Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA17 - Advanced Root Cause Analysis
Delivered OnlineFlexible Dates
Price on Enquiry

Looker Bootcamp: Analyzing and Visualizing Data with Looker (TTDVLK02)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The audience for this course includes professionals who are new to Looker who are interested in leveraging Looker for data analysis, visualization, and reporting. The course is designed for individuals seeking to gain a comprehensive understanding of Looker's functionalities and apply these skills in their organizations to drive data-driven decision-making. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you'll explore and gain: Comprehensive understanding of Looker's platform: Gain a solid foundation in Looker's key features, functionality, and interface, enabling you to navigate and utilize the platform effectively for your data analysis and visualization needs. Mastery of LookML and data modeling: Develop proficiency in Looker's unique data modeling language, LookML, to create customized and efficient data models that cater to your organization's specific requirements. Expertise in creating insightful Explores: Learn to build, customize, and save Explores with dimensions, measures, filters, and calculated fields, empowering you to analyze your data and uncover valuable insights. Proficiency in dashboard design and sharing: Acquire the skills to design visually appealing and informative dashboards, share them with different user roles, and schedule exports to keep stakeholders informed and up-to-date. Enhanced content organization with folders and boards: Understand how to effectively use folders and boards to organize, manage, and discover content within Looker, making it easily accessible for you and your team. Optional: Advanced visualization techniques for impactful storytelling: Master advanced visualization techniques, including customizations with HTML, CSS, and JavaScript, and interactive visualizations using Looker's API, to create compelling data stories that resonate with your audience. Discover the power of data analytics and visualization with our hands-on, two-day introductory course Looker Bootcamp: Analyzing and Visualizing Data with Looker. Designed for professionals who want to unlock valuable insights from their data, this immersive training experience will guide you through Looker's cutting-edge features and provide you with the essential skills to create engaging, interactive, and insightful reports and dashboards. Our experienced trainers will take you on a journey from the fundamentals of Looker and its unique data modeling language, LookML, to advanced visualization techniques and content organization strategies, ensuring you leave the course equipped to make data-driven decisions with confidence. Throughout the course, you will have the opportunity to participate in practical exercises and workshops that will help you apply the concepts and techniques learned in real-world scenarios. You will explore the potential of Looker's Explores, dive into LookML's capabilities, and master the art of dashboard design and sharing. Learn how to organize and manage your content with folders and boards and harness the power of advanced visualization techniques to make your data come alive. Getting Started with Looker Overview of Looker and its key features Navigating the Looker interface Looker terminology and basic concepts Connecting to Data Sources Setting up and managing data connections Exploring database schemas Understanding LookML: Looker's data modeling language Creating and Customizing Explores Building and customizing Explores Adding dimensions, measures, and filters Creating calculated fields Saving and organizing Explores Data Visualization Creating visualizations using Looker's visualization library Customizing chart types, colors, and labels Displaying visualizations in dashboards Introduction to Looker's API for custom visualizations Advanced Explores and LookML LookML refresher and best practices Creating derived tables and data transformations Managing access controls and data permissions Organizing and Sharing Content with Folders and Boards Introduction to folders and boards in Looker Creating and managing folders for organizing content Setting up boards for easy content discovery Sharing folders and boards with different user roles and permissions Dashboard Design and Sharing Best practices for dashboard design Adding, arranging, and resizing visualizations Scheduling and exporting dashboard data Advanced Visualization Techniques Customizing visualizations with HTML, CSS, and JavaScript Creating interactive visualizations using Looker's API Integrating Looker visualizations with other tools Hands-on Workshop and Project Participants work on a guided project to apply the skills learned Trainer provides individual support and guidance Project Presentations, Q&A, and Training Wrap-up Additional course details: Nexus Humans Looker Bootcamp: Analyzing and Visualizing Data with Looker (TTDVLK02) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Looker Bootcamp: Analyzing and Visualizing Data with Looker (TTDVLK02) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Looker Bootcamp: Analyzing and Visualizing Data with Looker (TTDVLK02)
Delivered OnlineFlexible Dates
Price on Enquiry

RPA Boot Camp / Hands-On Robotic Process Automation (RPA) (TTAI4000)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The ideal audience for the RPA and UiPath Boot Camp is beginners in the field of RPA and individuals in roles such as developers, project managers, operation analysts, and tech enthusiasts looking to familiarize themselves with automation technologies. It's also perfectly suited for business professionals keen on understanding and implementing automated solutions within their organizations to optimize processes. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Working in a hands-on learning environment, led by our Automation Learning expert instructor, students will explore: Gain a thorough understanding of Robotic Process Automation (RPA) and its applications using UiPath, setting a solid foundation for future learning and application. Learn to record and play in UiPath Studio, a key skill that enables automating complex tasks in a user-friendly environment. Master the art of designing and controlling workflows using Sequencing, Flowcharting, and Control Flow, helping to streamline and manage automation processes effectively. Acquire practical skills in data manipulation, from variable management to CSV/Excel and data table conversions, empowering you to handle data-rich tasks with confidence. Develop competence in managing controls and exploring various plugins and extensions, providing a broader toolkit for handling diverse automation projects. Get hands-on experience with exception handling, debugging, logging, code management, and bot deployment, fundamental skills that ensure your automated processes are reliable and efficient. How to deploy and control Bots with UiPath Orchestrator The Hands-on Natural Language Processing (NLP) Boot Camp is an immersive, three-day course that serves as your guide to building machines that can read and interpret human language. NLP is a unique interdisciplinary field, blending computational linguistics with artificial intelligence to help machines understand, interpret, and generate human language. In an increasingly data-driven world, NLP skills provide a competitive edge, enabling the development of sophisticated projects such as voice assistants, text analyzers, chatbots, and so much more. Our comprehensive curriculum covers a broad spectrum of NLP topics. Beginning with an introduction to NLP and feature extraction, the course moves to the hands-on development of text classifiers, exploration of web scraping and APIs, before delving into topic modeling, vector representations, text manipulation, and sentiment analysis. Half of your time is dedicated to hands-on labs, where you'll experience the practical application of your knowledge, from creating pipelines and text classifiers to web scraping and analyzing sentiment. These labs serve as a microcosm of real-world scenarios, equipping you with the skills to efficiently process and analyze text data. Time permitting, you?ll also explore modern tools like Python libraries, the OpenAI GPT-3 API, and TensorFlow, using them in a series of engaging exercises. By the end of the course, you'll have a well-rounded understanding of NLP, and will leave equipped with the practical skills and insights that you can immediately put to use, helping your organization gain valuable insights from text data, streamline business processes, and improve user interactions with automated text-based systems. You?ll be able to process and analyze text data effectively, implement advanced text representations, apply machine learning algorithms for text data, and build simple chatbots. What is Robotic Process Automation? Scope and techniques of automation Robotic process automation About UiPath The future of automation Record and Play UiPath stack Downloading and installing UiPath Studio Learning UiPath Studio Task recorder Step-by-step examples using the recorder Sequence, Flowchart, and Control Flow Sequencing the workflow Activities Control flow, various types of loops, and decision making Step-by-step example using Sequence and Flowchart Step-by-step example using Sequence and Control flow Data Manipulation Variables and scope Collections Arguments ? Purpose and use Data table usage with examples Clipboard management File operation with step-by-step example CSV/Excel to data table and vice versa (with a step-by-step example) Taking Control of the Controls Finding and attaching windows Finding the control Techniques for waiting for a control Act on controls ? mouse and keyboard activities Working with UiExplorer Handling events Revisit recorder Screen Scraping When to use OCR Types of OCR available How to use OCR Avoiding typical failure points Tame that Application with Plugins and Extensions Terminal plugin SAP automation Java plugin Citrix automation Mail plugin PDF plugin Web integration Excel and Word plugins Credential management Extensions ? Java, Chrome, Firefox, and Silverlight Handling User Events and Assistant Bots What are assistant bots? Monitoring system event triggers Monitoring image and element triggers Launching an assistant bot on a keyboard event Exception Handling, Debugging, and Logging Exception handling Common exceptions and ways to handle them Logging and taking screenshots Debugging techniques Collecting crash dumps Error reporting Managing and Maintaining the Code Project organization Nesting workflows Reusability of workflows Commenting techniques State Machine When to use Flowcharts, State Machines, or Sequences Using config files and examples of a config file Integrating a TFS server Deploying and Maintaining the Bot Publishing using publish utility Overview of Orchestration Server Using Orchestration Server to control bots Using Orchestration Server to deploy bots License management Publishing and managing updates

RPA Boot Camp / Hands-On Robotic Process Automation (RPA) (TTAI4000)
Delivered OnlineFlexible Dates
Price on Enquiry