Duration 5 Days 30 CPD hours This course is intended for Individuals in various job roles who are involved in leading, managing, and participating in small to medium scale projects. Overview Upon successful completion of this course, students will be able to: Identify the fundamentals of project management. Perform the pre-project setup. Initiate a project. Plan project strategies. Develop project schedules. Plan project staffing, communication, and quality. Plan project risk management. Plan project costs. Plan project procurements. Plan for change management and transitions. Manage project execution. Manage project procurement. Control project performance. Monitor and control the triple constraints. Monitor project risks and procurements. Perform the project closure processes. In this course, students will apply recognized practices of project management and understand a project?s life cycle and roles and skills necessary to effectively initiate, plan, execute, monitor and control, and close a project. 1 - Exploring Project Management Fundamentals Examine the Basics of Project Management Describe the Project Life Cycle Examine Organizational Influences on Project Management 2 - Performing the Pre-Project Setup Create a Project Concept Definition Statement Examine Project Selection Determine Strategic and Operational Relevance Perform Project Feasibility Determine Technical Requirements 3 - Initiating a Project Prepare a Project Statement of Work Create a Project Charter Identify Project Stakeholders 4 - Planning Project Strategy Identify Elements of the Project Management Plan and Subsidiary Plans Determine Stakeholder Needs Create a Scope Statement Develop a Work Breakdown Structure 5 - Developing the Project Schedule Create an Activity List Create a Project Schedule Network Diagram Identify Resources Estimate Time Develop a Project Schedule Identify the Critical Path Optimize the Project Schedule Create a Schedule Baseline 6 - Planning Human Resources, Communication, and Quality Create a Human Resource Plan Create a Communications Management Plan Create a Quality Management Plan 7 - Planning Project Risk Management Examine a Risk Management Plan Identify Project Risks and Triggers Perform Qualitative Risk Analysis Perform Quantitative Risk Analysis Develop a Risk Response Plan 8 - Planning Project Costs Estimate Project Costs Estimate the Cost Baseline Reconcile Funding and Costs 9 - Planning Project Procurements Plan Project Procurements Prepare a Procurement Statement of Work Prepare a Procurement Document 10 - Planning for Change Management and Transitions Develop an Integrated Change Control System Develop a Transition Plan 11 - Managing Project Execution Direct Project Execution Execute a Quality Assurance Plan Assemble a Project Team Develop a Project Team Manage a Project Team Distribute Project Information Manage Stakeholder Relationships and Expectations 12 - Managing Project Procurement Obtain Responses from Sellers Determine Project Sellers 13 - Control Project Performance Monitor and Control Project Work Manage Project Changes Report on Project Performance 14 - Monitor and Control the Triple Constraints Control Project Scope Control Project Schedule Control Project Costs Manage Project Quality 15 - Monitoring Project Risks and Procurements Control Project Risks Managing Vendors and Procurements 16 - Performing the Project Closure Processes Deliver the Final Product Close Project Procurements Conduct a Closeout Meeting Close a Project Additional course details: Nexus Humans CompTIA Project Plus Certification (Exam PK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Project Plus Certification (Exam PK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Have you ever been intrigued by the power behind the most revolutionary software applications? Do you wonder how these applications transform from mere ideas into functional products that ease life's tasks? Dive deep into the world of software development with our comprehensive "Software Development Career Track" bundle of twenty courses! Within this bundle, you'll traverse from the fundamentals of Coding with Scratch to advanced JavaScript Python and even delve into Game Development using Unity 3D. Explore the wonders of Web Design, dive into Data Analytics with SQL, and embrace the intricacies of Kotlin, the Android coding bible. There's no stone left unturned, with courses covering the depths of PHP, the world of AWS SageMaker Canvas, and mastering the essentials of Linux Security. Your software development journey starts here. Unlock the future of software development today! Embark on a journey that transforms your curiosity into skills. Don't just dream, build. Enrol now and shape tomorrow's digital world! Software Development Courses List: Course 1: Coding with Scratch Course 2: C++ Development: The Complete Coding Guide Course 3: Basic HTML 5 Course 4: JavaScript Advanced Training Course 5: Python Advanced Training Course 6: The Complete SQL from Scratch: Bootcamp Course 7: Easy to Advanced Data Structures Course 8: SQL for Data Science, Data Analytics and Data Visualization Course 9: Learn Web Development from Scratch Course 10: Web Design for Beginners: Build Websites in HTML & CSS Course 11: Kotlin Masterclass Programming Course: Android Coding Bible Course 12: jQuery Masterclass Course: JavaScript and AJAX Coding Bible Course 13: Secure Programming of Web Applications - Developers and TPMs Course 14: Developing Game in Unity 3D Course 15: Game Development using Cocos2d-x v3 C++ Course 16: PHP for Beginners 2023 Guide: Develop an ECommerce Store Course 17: PHP for Beginners: PDO Crash Course 2021 Course 18: Machine Learning Model Using AWS SageMaker Canvas Course 19: WordPress Security Mastery Course 20: Linux Security and Hardening Learning Outcomes: Gain a foundational understanding of programming languages like Scratch, C++, HTML5, JavaScript, Python, and Kotlin. Understand the intricacies of web development and design, ranging from basic website development to e-commerce platform creation. Delve into data structures, SQL's utility in data science, analytics, and visualisation. Master game development techniques using Unity 3D and Cocos2d-x v3 C++. Acquire knowledge on machine learning with AWS SageMaker Canvas. Grasp essential security aspects from WordPress protection to Linux hardening. This dynamic Software Development Career Track bundle serves as a ladder, guiding you through the steps of software development. Starting with the foundational elements, you're introduced to Scratch's simplistic yet effective world, gradually escalating to the dynamic languages like C++ and Kotlin. As you advance, delve into the vibrant realm of web development and design, unlocking the potential to craft and curate seamless websites using HTML & CSS, paired with interactive features facilitated by JavaScript and jQuery. Transition from web design to data with courses focusing on SQL's various applications, be it in straightforward data structures or the vast domains of science, analytics, and visualisation. But software development isn't just about creating - it's also about protecting. Hence, our curated content ensures you grasp the nuances of securing digital entities, from WordPress platforms to entire Linux systems. And for those with a passion for animation and virtual worlds, the game development courses promise a thrilling voyage into Unity 3D and Cocos2d-x v3 C++ realms. CPD 220 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Aspiring software developers keen on understanding the broader spectrum of the field. Web designers and developers aiming to expand their skill set. Data enthusiasts wanting to harness the power of SQL in analytics. Game developers aspiring to master tools like Unity 3D. IT professionals keen on deepening their knowledge in security and hardening. Requirements Without any formal requirements, you can delightfully enrol in this course. Career path Software Developer Web Developer Data Analyst Game Developer Security Specialist WordPress Developer Linux System Administrator Certificates CPD Certificate Of Completion Digital certificate - Included 20 Digital Certificates Are Included With This Bundle CPD Quality Standard Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hardcopy Transcript: £9.99
Wellbeing and Safety in the Workplace (UK) Certification Despite your situation in an association, the support of the wellbeing and security of both you and your labor force is priceless. At the point when laborers become ill, profitability decays, different specialists become wiped out, and the association endures overall. Realizing how to develop legitimate rules, to oversee wellbeing and amplify security is fundamentally significant. A hazardous workplace brings down assurance, however it can likewise leave you, as a business, responsible to cover the deficiency of wages and torment and enduring experienced by a harmed party. Along these lines, showing your colleagues how to keep a working environment safe and dispense with mishaps is an imperative expertise in the present progressively serious work market. This course is offered entirely on the web. This considers the representative to practice total independence to concentrate any place and at whatever point is generally appropriate for them. What You Will Learn: In this course, your colleagues will become familiar with about the accompanying: The gatherings that are liable for keeping up the wellbeing and security of an association; The legitimate necessities that your association should keep, while getting the wellbeing and security of its workers; The instruments accessible to help survey the dangers in a work environment and what should be possible, to limit these dangers; Step by step instructions to perceive the situations in your association that are at the most danger; Why appropriate preparing of representatives with respect to their wellbeing is so imperatively significant, particularly for those that are needed to consistently lift substantial burdens; The dangers related with power and how to maintain a strategic distance from injury when working with power; At the point when mishaps occur, what you ought to do first and how to control emergency treatment, while anticipating the appearance of a crisis clinical group. How Completing This Course Can Benefit Your Employees: There are a scope of advantages that workers can anticipate, when they have effectively finished this course. These advantages include: The capacity to keep a work environment as protected and injury free as could be expected, by ensuring that however many of your representatives as could reasonably be expected are educated in like manner regarding the matter; As an entrepreneur, knowing your possible risk in an assortment of circumstances; The capacity to learn at that point and from the spot that best suits your workers; Endless supply of the course, your staff get an industry-perceived and completely certify certificate that can be sent by means of post or printed out grinding away; Study materials are accessible on all significant gadgets - all that is required is a web association.
This hands-on Docker certification training is aligned with the Docker Certified Associate (DCA) examination. Learn the core Docker technologies such as Docker Hub, Docker Compose, Docker Swarm, Dockerfile, Docker Containers, Docker Engine, Docker Images, Docker Network, Docker Daemon, and Docker Storage in this Docker course.
About this Course Batteries are going to play an increasingly important role in the energy grid. An increasing number of developers are looking to add battery storage systems (BESS) into their existing projects. However future cash flows are highly uncertain and they are often unsure exactly how battery technology can be monetised. A strong revenue model requires stacking of different revenue sources. As the share of variable renewable sources in electricity systems further increase, battery systems are expected to play a growing role by providing frequency control and operational reserves as well as for wholesale arbitrage, while helping reduce grid integration costs. The more volatile electricity prices are, the greater the earning potential of batteries trading electricity on various electricity markets. BESS can generate revenue streams in several different ways; through a frequency response contract with the TSO, by providing grid services in other ways or by arbitrage through buying cheap power and selling power for a higher price in a liquid wholesale market. Because batteries are efficient, the round trip efficiency is also high. They can spread arbitrage trading much better than other storage types and in many cases, other asset classes. For companies that combine a battery with other tasks, for example to store power from their own panels, or to avoid a costly heavy power connection, the investment is less risky than for those that purely focus on arbitrage trading. It is uncertain whether electricity prices will fluctuate more violently in the coming years, or whether the peaks will actually level off. During this highly interactive training, the trainer will provide you with the latest insights and best practices on how to obtain the maximum economic beneï¬ts when participating with BESS in the electricity market. Training Objectives By the end of this course, the participants will be able to: Discover the different BESS battery technologies and their impact on the grid Understand the role of storage in providing flexibility to the power system Examine the potential revenue streams from BESS models Learn how profit can generated with BESS trading strategies Determine how to optimize the value from BESS projects Find out how to combine BESS with renewable PPAs Target Audience Professionals and executives from Power Utilities, Energy Companies, Financial & Investment Banks, Renewable Power Project Developers, Transmission System Operators and Energy Industry Regulators will find this training course useful. Electricity Marketing and Traders New Venture or Business Development Executives Corporate Finance and Treasury Executives Audit and Risk Management Executives Power or Utility Market Research Analysts Investment Managers for Renewable Power Projects Origination Professionals Regulation, Compliance and Documentation Officers Lawyers and Accountants Power Transmission and Distributions Engineers Trainer Our key expert is a skilled and accomplished professional with over 25 years' of extensive senior management / board level experience in the energy markets worldwide. Next to advising energy companies, banks, consultants and regulators regarding PPAs, our key expert has also conducted several highly successful training courses about Power Purchase Agreements, Power Project Finance, IPPs, and Project Risk Management to over 1,000 high level participants from Asia, Africa, Europe and Middle East. He was a member of the expert commission of the Dutch Government for 2 offshore wind parks, Hollandse Kust (zuid) Wind Farm Zone Sites 3 and 4 that advised on which of the 5 applicants did provide the best security and solutions associated with the electricity and green certificate prices, the construction and operational risks of the project. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Sharps Injuries Awareness Certification Consistently, more than 100,000 individuals support sharps wounds at work. Most of these people work in wellbeing and social consideration settings, however representatives in different fields are likewise in danger. Sharps wounds can have dependable physical and mental impacts, so it is imperative to kill or diminish the probability of injury at every possible opportunity. In this course, you will figure out how wellbeing and security enactment ought to be carried out when working with sharps, how to establish a more secure workplace that diminishes the danger of injury and how to react to a sharps injury. What You Will Learn What sharps wounds are, the reason they are hazardous, who is in danger and key bits of wellbeing and security enactment applicable to their avoidance and the executives. How the Health and Safety (Sharp Instruments in Healthcare) Regulations 2013 shield laborers from sharps wounds. How, why and when preparing representatives in the protected utilization of sharps can diminish their danger of injury. What to do in case of a sharps injury and what data businesses need to record following an occurrence. Advantages of Taking This Course In the event that you are a business or boss in a setting where sharps are utilized, this course will help you meet your commitments under wellbeing and security law. Any individual who works with sharps will profit by the data on safe working given in this course. Anybody liable for medical aid at work will profit by seeing how sharps wounds happen and how they ought to be dealt with. Anybody answerable for directing danger evaluations in the working environment will profit by understanding the dangers presented by sharps and how they can be diminished.
Duration 4 Days 24 CPD hours This course is intended for Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers Overview This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow. The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course. The Cortex? XSOAR 6.8: Automation and Orchestration (EDU-380) course is four days of instructor-led training that will help you: Configure integrations, create tasks, and develop playbooks Build incident layouts that enable analysts to triage and investigate incidents efficiently Identify how to categorize event information and map that information to display fields Develop automations, manage content, indicator data, and artifact stores, schedule jobs, organize users and user roles, oversee case management, and foster collaboration This class is powered by Cloud Harmonics. Course Outline Module 1 - Core Functionality and Feature Sets Module 2 - Enabling and Configuring Integrations Module 3 - Playbook Development Module 4 - Classification and Mapping Module 5 - Layout Builder Module 6 - Solution Architecture Module 7 - Docker Module 8 - Automation Development and Debugging Module 9 - The Marketplace and Content Management Module 10 - Indicators and Threat Intelligence Management Module 11 - Jobs and Job Scheduling Module 12 - Users and Role-Based Access Controls (RBAC) Module 13 - Integration Development Additional course details: Nexus Humans Palo Alto Networks: Cortex XSOAR 6.8: Automation and Orchestration(EDU-380) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks: Cortex XSOAR 6.8: Automation and Orchestration(EDU-380) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
In today’s security-focused digital climate, knowing how to secure your applications isn't optional—it’s essential. This course zeroes in on Spring Boot 3 and JSON Web Tokens (JWT), showing you how to protect your APIs by implementing robust authentication and authorisation techniques using JWTs. You’ll learn how token-based security works, how to integrate it seamlessly into your Spring Boot applications, and why it’s becoming the go-to choice for developers who want to keep things lean, stateless, and secure. Built with developers in mind, this course balances clarity with depth, avoiding the clutter and fluff. From setting up the Spring Security configuration to generating and validating JWTs, you’ll follow a well-defined route that aligns with current best practices in secure application development. If you’re building APIs or microservices and want to ensure they don’t become an open invitation for vulnerabilities, this course will walk you through the right doors—figuratively speaking, of course. Learning Outcomes: Gain a comprehensive understanding of the JWT token authentication process. Learn how to implement JWT token authentication in your Spring Boot applications. Understand how to create an application user and authenticate them using JWT tokens. Discover the advanced concepts of implementing the JWT authentication filter and authentication controller. Learn how to test your application to ensure that everything is working correctly. The Spring Boot 3 Securing Your Application with JWT Token course is designed to provide you with the skills and knowledge you need to secure your Spring Boot applications using JWT token authentication. From the basics of creating an application user to the advanced concepts of implementing the JWT authentication filter and authentication controller, this course covers everything you need to know to ensure that your applications are protected from unauthorised access. You'll also learn how to test your application to ensure that everything is working correctly, giving you peace of mind that your applications are secure. Spring Boot 3 Securing Your Application with JWT Token Course Curriculum Section 01: Introduction Section 02: Bootstrap the Application Section 03: Create an Application User Section 04: Implementing the JWT Authentication Filter Section 05: Implement the Authentication Controller Section 06: Test the Application How is the course assessed? Upon completing an online module, you will immediately be given access to a specifically crafted MCQ test. For each test, the pass mark will be set to 60%. Exam & Retakes: It is to inform our learners that the initial exam for this online course is provided at no additional cost. In the event of needing a retake, a nominal fee of £9.99 will be applicable. Certification Upon successful completion of the assessment procedure, learners can obtain their certification by placing an order and remitting a fee of __ GBP. £9 for PDF Certificate and £15 for the Hardcopy Certificate within the UK ( An additional £10 postal charge will be applicable for international delivery). CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Software developers who want to enhance their skills and knowledge in application security. Professionals who want to stay up-to-date with the latest trends and best practices in application security. Individuals who are new to the field and want to learn about application security. Entrepreneurs who want to build secure and reliable applications using Spring Boot and JWT token authentication. Anyone who wants to develop their skills in the software development industry. Career path Full-Stack Developer: £27,000 - £71,000 Security Engineer: £35,000 - £92,000 Senior Security Engineer: £53,000 - £100,000 Security Architect: £61,000 - £130,000 Chief Security Officer: £90,000 - £200,000 Certificates Certificate of completion Digital certificate - £9 You can apply for a CPD Accredited PDF Certificate at the cost of £9. Certificate of completion Hard copy certificate - £15 Hard copy can be sent to you via post at the expense of £15.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server. This course will help them update their knowledge and skills related to storage and compute for Windows Server. Overview Prepare and install Windows Server and plan a server upgrade and migration strategy. Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes. Describe enterprise storage solutions, and select the appropriate solution for a given situation. Implement and manage Storage Spaces and Data Deduplication. Install and configure Microsoft Hyper-V, and configure virtual machines. Deploy, configure, and manage Windows and Hyper-V containers. Describe the high availability and disaster recovery technologies in Windows Server. Plan, create, and manage a failover cluster. Implement failover clustering for Hyper-V virtual machines. Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation. Create and manage deployment images. Manage, monitor, and maintain virtual machine installations. This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites A basic understanding of networking fundamentals. An awareness and understanding of security best practices. An understanding of basic Active Directory concepts. Basic knowledge of server hardware. Experience supporting and configuring Windows client operating systems such as Windows 10 or Windows 11. 1 - Installing, upgrading, and migrating servers and workloads Introducing Windows Server Preparing and installing Server Core Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models 2 - Configuring local storage Managing disks in Windows Server Managing volumes in Windows Server 3 - Implementing enterprise storage solutions Overview of DAS, NAS, and SANs Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet Understanding iSNS, DCB, and MPIO Configuring sharing in Windows Server 4 - Implementing Storage Spaces and Data Deduplication Implementing Storage Spaces Managing Storage Spaces Implementing Data Deduplication 5 - Installing and configuring Hyper-V and virtual machines Overview of Hyper-V Installing Hyper-V Configuring storage on Hyper-V host servers Configuring networking on Hyper-V host servers Configuring Hyper-V virtual machines Managing virtual machines 6 - Deploying and managing containers Overview of containers in Windows Server Deploying Windows Server and Hyper-V containers Installing, configuring, and managing containers by using Docker 7 - High availability and disaster recovery Defining levels of availability Planning high availability and disaster recovery solutions with Hyper-V virtual machines Backing up and restoring by using Windows Server Backup High availability with failover clustering in Windows Server 8 - Implementing failover clustering Planning a failover cluster Creating and configuring a new failover cluster Maintaining a failover cluster Troubleshooting a failover cluster Implementing site high availability with stretch clustering 9 - Implementing failover clustering with Windows Server Hyper-V Overview of the integration of Hyper-V with failover clustering Implementing Hyper-V VMs on failover clusters Key features for VMs in a clustered environment 10 - Implementing Network Load Balancing Overview of NLB Configuring an NLB cluster Planning an NLB implementation 11 - Creating and managing deployment images Introduction to deployment images Creating and managing deployment images by using MDT Virtual machine environments for different workloads 12 - Managing, monitoring, and maintaining virtual machine installations WSUS overview and deployment options Update management process with WSUS Overview of Windows PowerShell DSC Overview of Windows Server monitoring tools Using Performance Monitor Monitoring event logs