• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2176 Testing courses

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered OnlineFlexible Dates
£3,250

Business Analysis Fundamentals

By IIL Europe Ltd

Business Analysis Fundamentals This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals to pass the IIBA® Certification exam to become a Certified Business Analysis Professional (CBAP™). This course teaches participants the overall process of business analysis and where it fits in the bigger picture of the project life cycle and the business context. The course is interactive and combines discussion, active workshops, and demonstrations of techniques. The goal is bottom-line results that cut through the real-world problems facing people seeking to improve the way they operate to develop new and improved systems and products or otherwise deliver results through project performance. What you will Learn At the end of this program, you will be able to: Define the solution scope Work with the development team in the systems testing stage Ensure the solution is usable in the business environment Foundation Concepts Defining the business analyst (BA) function The role of the BA as change agent An introduction to the BABOK® Guide BA roles and relationships through the project life cycle (PLC) Business Analysis Planning and Monitoring Overview of business analysis planning and monitoring (BAP&M) Business analysis planning and monitoring - process and tools Business analysis planning and monitoring - roles and responsibilities Business analysis planning and monitoring - governance, information management, and performance improvement Elicitation and Collaboration Overview of elicitation and collaboration Elicitation and collaboration techniques Requirements Life Cycle Management Overview of requirements life cycle management Requirements life cycle management task details Strategy Analysis Overview of strategy analysis Analyze current state Define future state Assess risks Define change strategy Requirements Analysis and Design Definition Overview of requirements analysis and design definition (RA&DD) The anatomy of requirements RA&DD task descriptions RA&DD techniques Solution Evaluation Overview of solution evaluation Solution evaluation tasks Solution evaluation in development stages Underlying Competencies Overview of underlying competencies (UC) Underlying competencies

Business Analysis Fundamentals
Delivered In-Person in LondonFlexible Dates
£1,495

Business Analysis Fundamentals: In-House Training

By IIL Europe Ltd

Business Analysis Fundamentals: In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals to pass the IIBA® Certification exam to become a Certified Business Analysis Professional (CBAP™). This course teaches participants the overall process of business analysis and where it fits in the bigger picture of the project life cycle and the business context. The course is interactive and combines discussion, active workshops, and demonstrations of techniques. The goal is bottom-line results that cut through the real-world problems facing people seeking to improve the way they operate to develop new and improved systems and products or otherwise deliver results through project performance. What you will Learn At the end of this program, you will be able to: Define the solution scope Work with the development team in the systems testing stage Ensure the solution is usable in the business environment Foundation Concepts Defining the business analyst (BA) function The role of the BA as change agent An introduction to the BABOK® Guide BA roles and relationships through the project life cycle (PLC) Business Analysis Planning and Monitoring Overview of business analysis planning and monitoring (BAP&M) Business analysis planning and monitoring - process and tools Business analysis planning and monitoring - roles and responsibilities Business analysis planning and monitoring - governance, information management, and performance improvement Elicitation and Collaboration Overview of elicitation and collaboration Elicitation and collaboration techniques Requirements Life Cycle Management Overview of requirements life cycle management Requirements life cycle management task details Strategy Analysis Overview of strategy analysis Analyze current state Define future state Assess risks Define change strategy Requirements Analysis and Design Definition Overview of requirements analysis and design definition (RA&DD) The anatomy of requirements RA&DD task descriptions RA&DD techniques Solution Evaluation Overview of solution evaluation Solution evaluation tasks Solution evaluation in development stages Underlying Competencies Overview of underlying competencies (UC) Underlying competencies

Business Analysis Fundamentals: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Certified Virtualization Security Expert (Advanced VMware Security) Training

4.3(43)

By John Academy

Description This Certified Virtualization Security Expert (Advanced VMware Security) Training covers everything you need to know becoming a Certified Virtualization Security Expert. In this course you will learn about routing and the security design of VMware, Remote DataStore security, Penetration Testing 101, information gathering, scanning and enumeration, penetration testing and the tools of the trade, DMZ virtualization and common attack vectors, hardening your ESX server, hardening your ESXi server, hardening your vCenter server, and 3rd party mitigation tools. This Advanced course provides a solid understanding of the various components that make up the VMware vSphere environment. You will have the opportunity to study and understand all aspects of the CIA triad as it pertains to the VMware vSphere infrastructure from the virtual CPU to the storage devices attached to your host and everything in and around that network, including the interconnectivity and design of all those components. So, get this course to learn more. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Certified Virtualization Security Expert (Advanced VMware Security) Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge FREE 00:25:00 Virtual Ports 00:21:00 Symmetric vs. Asymmetric Encryption 01:07:00 File System Structure 00:13:00 Accounts and Groups 00:35:00 Routing and the Security Design of VMware Routing and the Security Design of Vmware 00:11:00 Virtualization Layer 00:28:00 Memory Virtualization 00:28:00 Major Benefits of Using VLANs 00:13:00 Remote Data Store Security Remote DataStore Security 00:15:00 Fiber Channel Attacks - The Basics 00:22:00 Penetration Testing 101 Penetration Testing 101 00:33:00 The Evolving Threat 00:40:00 Information Gathering, Scanning and Enumeration Information Gathering, Scanning and Enumeration9 00:30:00 FireFox Fully Loaded 00:14:00 Introduction to Port Scanning 00:30:00 UDP Port Scan 00:42:00 Penetration Testing and the Tools of the Trade Penetration Testing and the Tools of the Trade 00:43:00 Windows Password Cracking 00:24:00 VASTO 00:22:00 DMZ Virtualization and Common Attack Vectors DMZ Virtualization and Common Attack Vectors9 00:21:00 Clearly Label Networks for Each Zone within the DMZ 00:22:00 Schmoo Con 2010 Virtualization Vulnerabilities Found! 00:08:00 Hardening Your ESX Server Hardening Your ESX Server 01:03:00 Configuring the ESX ESXi Host 02:19:00 Establish a Password Policy for Local User Accounts 00:21:00 Secure the SNMP Configuration 00:19:00 Hardening Your ESXi Server Hardening Your ESXi Server 00:20:00 Hardening Your vCenter Server Hardening Your vCenter Server 00:17:00 VMware Converter Enterprise 01:10:00 3rd Party Mitigation Tools 3rd Party Mitigation Tools 00:24:00 Mock Exam Mock Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Final Exam Final Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Virtualization Security Expert (Advanced VMware Security) Training
Delivered Online On Demand17 hours
£24

Coiled Tubing Operations – Equipment, Applications, Well Control, Safety & Emerging Technologies

By EnergyEdge - Training for a Sustainable Energy Future

Dive into the world of coiled tubing operations, equipment, well control, safety, and emerging technologies with EnergyEdge's comprehensive classroom training course. Enroll now to stay ahead.

Coiled Tubing Operations – Equipment, Applications, Well Control, Safety & Emerging Technologies
Delivered In-PersonFlexible Dates
£2,799 to £2,999

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered OnlineFlexible Dates
£2,037

ITIL© 4 Specialist - Create Deliver and Support (CDS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Ideally, candidates should have at least two years of professional experience working in IT Service Management. The ITIL 4 CDS Qualification would most likely suit the following delegates: Individuals continuing their journey in service management ITSM managers and aspiring ITSM managers ITSM practitioners managing the operation of IT-enabled & digital products and services, and those responsible for the end-to-end delivery Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview The course includes core concepts describing how different types of work (value streams) are built, tested and delivered ?end-to-end? from beginning to end and with continual iterations and feedback loops. There is also a focus on areas such as testing, knowledge, customer and employee feedback, new technologies, supplier sourcing, and ways of managing work. During this course, you will: Understand how to plan and build a service value stream to create, deliver and support services Know how relevant ITIL practices contribute to creation, delivery, and support across the SVS and value streams Know how to create, deliver and support services Understand how to integrate different value streams and activities to create, deliver and support IT-enabled products and services, and relevant practices, methods, and tools Understand service performance, service quality, and improvement methods. This course begins your journey toward the ITIL Managing Professional designation. You will acquire insight that will allow you to integrate different value streams and activities to create, deliver and support IT-enabled products and services. Armed with this knowledge and skill set, you will be confident in running those IT-enabled services, teams and workflows successfully. This class includes an exam voucher. Prerequisites ITIL© 4 Foundation 1 - PLANNING AND BUILDING A SERVICE VALUE STREAM Tackling the concepts and challenges related to SVS Using the ?shift left? approach The true value of information and technology across the SVS 2 - CONTRIBUTING TO CREATION, DELIVERY AND SUPPORT Using the value stream to design, develop and transition new services Adding to a value stream by leveraging ITIL practices Providing user support Furthering the value stream for support through ITIL practices 3 - CREATING, DELIVERING AND SUPPORTING SERVICES Coordinate, prioritize and structure activities The value of buy vs. build, sourcing, and service integration and management

ITIL© 4 Specialist - Create Deliver and Support (CDS)
Delivered OnlineFlexible Dates
£2,385

Train the Trainer / Instructor Course in Nasogastric Tube Insertion and Feeding

By Guardian Angels Training

Gain comprehensive knowledge and practical skills for safe and effective nasogastric tube insertion and feeding techniques with our "Promoting Best Practice in Nasogastric Tube Insertion and Feeding Tuition" course. Optimise patient safety, comfort, and outcomes with evidence-based best practices.

Train the Trainer / Instructor Course in Nasogastric Tube Insertion and Feeding
Delivered In-Person in InternationallyFlexible Dates
£1,875

Agile Practices for All Projects: Virtual In-House Training

By IIL Europe Ltd

Agile Practices for All Projects: Virtual In-House Training Agile methods are becoming increasingly prevalent, and have facilitated projects in reducing time to market, being adaptive to changing customer requirements, and increasing value to customers and organizations. These benefits have been implemented in both IT and non-IT environments to help all types of projects. This course will present key Agile techniques and processes that can be readily incorporated into your projects to enable greater flexibility and higher productivity, while maintaining the traditional project lifecycle framework. The overall goal of the course is for learners to be able to integrate appropriate Agile elements and/or techniques into any project in any environment. What you will Learn Course participants will understand the basic Agile approach, and the various methods for achieving agility and will be able to: Recall project management principles and methodologies Explain Agile practices and compare several Agile methods Apply Agile software development techniques in a project lifecycle framework Employ Agile processes in a project management framework Foundation Concepts Project Lifecycles What is Agile? Agile Benefits Agile Methods Agile Roles Agile Requirement Techniques Agile Requirements User Stories Just in Time (JIT) Requirements Agile Software Development Techniques Agile Design Agile Development Agile Testing Agile Deployment Agile Initiating & Planning Processes Agile Initiating Agile Planning Agile Delivery Processes Agile Execution Agile Monitoring & Control Agile Closing Implementing Agile Practices Agile Approaches Outside of Software Development Dispelling Agile Myths Applying Agile Techniques & Processes Summary and Next Steps What did we learn, and how can we implement this in our work environments?

Agile Practices for All Projects: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Online Gas Safety Training

4.3(43)

By John Academy

Overview Accidents caused by related issues can have serious consequences. That is why, from our homes to gas stations and industrial factories, gas safety management is vital. So, to ensure the safety of your home or workplace, learn the essentials of the safety measures from the Online Gas Safety Training course.  This is a course with 13 modules packed with vital information about gas safety. Here, you will learn about the gas safety legislation, combustion, ventilation, transmission systems and more. The course will help you understand the process of gas warning labeling. You will also develop the skills for managing gas safety devices and be able to ensure gas appliance safety.  Upon completion of the course, you will receive a certificate of achievement. This certificate will demonstrate your expertise in this area and help you get employed in the relevant fields. Join now! Course Preview Learning Outcomes Familiarise yourself with gas safety legislation. Learn about the transmission system Enhance your knowledge of combustion, ventilation and tightness testing Understand the basics of gas warning labeling Know how to ensure the safety of gas appliances safety Get introduced to gas safety devices Why Take This Course From John Academy? Affordable, well-structured and high-quality e-learning study materials Meticulously crafted engaging and informative tutorial videos and materials Efficient exam systems for the assessment and instant result Earn UK & internationally recognised accredited qualification Easily access the course content on mobile, tablet, or desktop from anywhere, anytime Excellent career advancement opportunities Get 24/7 student support via email What Skills Will You Learn from This Course? Gas safety Warning labeling Tightness Testing Who Should Take This Online Gas Safety Training? Whether you're an existing practitioner or an aspiring professional, this course is an ideal training opportunity. It will elevate your expertise and boost your CV with key skills and a recognised qualification attesting to your knowledge. Are There Any Entry Requirements? This Online Gas Safety Training is available to all learners of all academic backgrounds. But learners should be aged 16 or over to undertake the qualification. And a good understanding of the English language, numeracy, and ICT will be helpful. Online Gas Safety Training Certification After completing and passing the Online Gas Safety Training successfully, you will be able to obtain a Recognised Certificate of Achievement. Learners can obtain the certificate in hard copy at £14.99 or PDF format at £11.99. Career Path​ This exclusive Online Gas Safety Training will equip you with effective skills and abilities and help you explore career paths such as  Gas Safe Registered engineer Heating engineer Gas safety inspector Property manager Facilities manager Health and safety officer Module 01: Gas Safety Legislation Gas Safety Legislation 00:39:00 Module 02: Combustion Combustion 00:27:00 Module 03: Transmission System: Pipes And Flues Transmission System Pipes and Flues 00:34:00 Module 04: Ventilation Ventilation 00:25:00 Module 05: Tightness Testing Tightness Testing 00:36:00 Module 06: Meter Regulator Check Meter Regulator Check 00:26:00 Module 07: Appliance Pressures And Gas Rates Appliance Pressures and Gas Rates 00:24:00 Module 08: Emergency Isolation Controls And Valves Emergency Isolation Controls and Valves 01:13:00 Module 09: Gas Safety Devices And Controls Gas Safety Devices and Controls 00:39:00 Module 10: Gas Warning Labelling Gas Warning Labelling 00:32:00 Module 11: Emergency And Evacuation Procedures Emergency and Evacuation Procedures 00:31:00 Module 12: Chimney Standards, Inspection And Testing Chimney Standards, Chimney Inspection and Testing 00:36:00 Module 13: Gas Appliances And Safety Gas Appliances and Safety 00:58:00 Assignment Assignment - Gas Safety 00:00:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Online Gas Safety Training
Delivered Online On Demand8 hours
£24.99