The aim of this course is to provide project managers, project engineers and project support staff with a toolkit they can use on their projects. The tools range from the simple that can be used on all projects to the advanced that can be used where appropriate. This programme will help the participants to: Identify and engage with stakeholders Use tools for requirements gathering and scope management Produce better estimates using a range of techniques Develop more reliable schedules Effectively manage delivery DAY ONE 1 Introduction Overview of the programme Review of participants' needs and objectives 2 Stakeholder management Using PESTLE to aid stakeholder identification Stakeholder mapping The Salience model Stakeholder engagement grid 3 Requirements management Using prototypes and models to elucidate requirements Prioritising techniques Roadmaps Requirements traceability 4 Scope management Work breakdown structures Responsibility assignment matrix 5 Delivery approaches Sequential Agile 6 Estimating Comparative estimating Parametric Bottom-up Three-point estimating Delphi and Planning Poker Creating realistic budgets DAY TWO 7 Scheduling Critical path analysis Smoothing and levelling Timeboxing Team boards Monte Carlo simulations Probability of completion 8 People management Situational Leadership The Tuckman model Negotiation Conflict management Belbin 9 Monitoring and control Earned value management 10 Course review and action planning Identify actions to be implemented individually Conclusion PMI, CAPM, PMP and PMBOK are registered marks of the Project Management Institute, Inc.
Overview With the ever-increasing demand for Construction in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in Construction may be. Learning about Construction or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in Construction. That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on Construction is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates. The self-paced online learning methodology by Compete High in this Construction Industry Scheme course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course! Instead of searching for hours, enrol right away on this Construction Industry Scheme course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run. Who is this course for? While we refrain from discouraging anyone wanting to do this Construction Industry Scheme course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of Construction, Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in Construction, Anyone looking for a certificate of completion on doing an online training on this topic, Students of Construction, or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity Career Path This Construction Industry Scheme course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams. Course Curriculum Module 1-Construction Industry Scheme (CIS) Construction Industry Scheme (CIS) 00:00 Module 2-Coverage of the Construction Industry Scheme (CIS) Coverage of the Construction Industry Scheme (CIS) 00:00 Module 3-Contractors and Registration for the Construction Industry Scheme (CIS) Contractors and Registration for the Construction Industry Scheme (CIS) 00:00 Module 4-Verification Process for Construction Industry Scheme Verification Process for Construction Industry Scheme 00:00 Module 5-The Construction Industry Scheme (CIS) Returns The Construction Industry Scheme (CIS) Returns 00:00 Module 6-Record Keeping and Construction Industry Scheme (CIS) Certificates Record Keeping and Construction Industry Scheme (CIS) Certificates 00:00 Module 7-Penalties Involved in the Construction Industry Scheme (CIS) Penalties Involved in the Construction Industry Scheme (CIS) 00:00
Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks should attend this course. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course. Overview After completing this course, the successful student should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Collect and interpret log entries Identify the characteristics of the Fortinet Security Fabric In this three-day course, you will learn how to use the most common FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. Product Version FortiOS 7.2 Course Outline 1. Introduction and Initial Configuration 2. Firewall Policies 3. Network Address Translation 4. Firewall Authentication 5. Logging and Monitoring 6. Certificate Operations 7. Web Filtering 8. Application Control 9. Antivirus 10. Intrusion Prevention and Denial of Service 11. Security Fabric
Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence
Duration 2 Days 12 CPD hours This course is intended for Administrators Overview Please refer to course overview This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration. Introduction to IBM Cognos Analytics administration IBM Cognos Analytics components Administration workflow IBM Cognos Administration IBM Cognos Configuration Identify IBM Cognos Analytics architecture Features of the IBM Cognos Analytics architecture Examine the multi-tiered architecture, and identify logging types and files Examine IBM Cognos Analytics servlets Performance and installation planning Balance the request load Configure IBM Cognos Analytics Secure the IBM Cognos Analytics environment Identify the IBM Cognos Analytics security model Define authentication in IBM Cognos Analytics Define authorization in IBM Cognos Analytics Identify security policies Secure the IBM Cognos Analytics environment Administer the IBM Cognos Analytics server environment Administer IBM Cognos Analytics servers Monitor system performance Manage dispatchers and services Tune system performance, and troubleshoot the server Audit logging Dynamic cube data source administration workflow Manage run activities View current, past, and upcoming activities Manage schedules Manage content in IBM Cognos Administration Data sources and packages Manage visualizations in the library Deployment Other content management tasks Examine departmental administration capabilities Create and manage team members Manage activities Create and manage content and data Manage system settings Manage Themes, Extensions, and Views Share services with multiple tenants
Duration 3 Days 18 CPD hours This course is intended for Built for experienced IT Professionals who want to be familiar with Citrix ADC. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC. Overview Understand the functionality and capabilities of the Citrix ADC Complete the initial setup and configuration of the Citrix ADC appliance Understand Citrix ADC Load Balancing and High Availability configuration options and management Employ recommended tools and techniques to troubleshoot common ADC network and connectivity issues Learn the skills required to implement Citrix ADC Essential components includingsecure Load Balancing, High Availability, and Citrix ADC Management. At the endof the course, students will be able to configure their Citrix ADC environments toaddress traffic delivery and management requirements including Load Balancing,Availability, and ADC Operation Management. Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Security Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting
Duration 2 Days 12 CPD hours This course is intended for Administrators Overview Please refer to course overview This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration. Introduction to IBM Cognos Analytics administration IBM Cognos Analytics components Administration workflow IBM Cognos Administration IBM Cognos Configuration Identify IBM Cognos Analytics architecture Features of the IBM Cognos Analytics architecture Examine the multi-tiered architecture, and identify logging types and files Examine IBM Cognos Analytics servlets Performance and installation planning Balance the request load Configure IBM Cognos Analytics Secure the IBM Cognos Analytics environment Identify the IBM Cognos Analytics security model Define authentication in IBM Cognos Analytics Define authorization in IBM Cognos Analytics Identify security policies Secure the IBM Cognos Analytics environment Administer the IBM Cognos Analytics server environment Administer IBM Cognos Analytics servers Monitor system performance Manage dispatchers and services Tune system performance, and troubleshoot the server Audit logging Dynamic cube data source administration workflow Manage run activities View current, past, and upcoming activities Manage schedules Manage content in IBM Cognos Administration Data sources and packages Manage visualizations in the library Deployment Other content management tasks Examine departmental administration capabilities Create and manage team members Manage activities Create and manage content and data Manage system settings Manage Themes, Extensions, and Views Share services with multiple tenants
Duration 2 Days 12 CPD hours This course is intended for Storage and virtual infrastructure administrators who want to be able to perform initial troubleshooting on their software-defined storage with vSAN Overview By the end of the course, you should be able to meet the following objectives: Describe the software components of vSAN and their roles Diagram how the components relate to each other Use Skyline Health to investigate and help determine failure conditions Use the command-line tools to help determine failure conditions In this two-day course, you focus on learning the tools and skills necessary to troubleshoot VMware vSAN? 7 implementations. You gain practical experience with vSAN troubleshooting concepts through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives vSAN Architecture Describe the vSAN architecture and components Describe the policy-driven, object-based vSAN storage environment Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Explain the relationships between the vSAN software components Explain the relationship between objects and components Determine how specific storage policies affect components Describe component placement Troubleshooting Methodology Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Troubleshooting Tools Discuss the improvements and added capabilities in Skyline Health for vSAN Use Skyline Health for vSAN to identify and correct issues in vSAN Discuss the ways to run various command-line tools Discuss the ways to access VMware vSphere© ESXi? Shell Use commands to view, configure, and manage your vSphere environment Discuss the esxcli vsan namespace commands Discuss when to use Ruby vSphere Console (RVC) commands Explain which log files are useful for vSAN troubleshooting Use log files to help troubleshoot vSAN problems
Are you a manager in Early Years? Do you need some new skills to help manage your teams and be the best you can be? Then have a look at what this course covers and get in touch to book. Week 1. Exploring the role of a Manager in Early Years. Characteristics of an effective manager. Exploring different Leadership Styles and identifying your own. Looking after your own wellbeing. Week 2. How to manage difficult Conversations Exploring different personality types. Developing resillience. 4 Step process for managing a difficult conversation. Week 3. Creating Connection & Belonging within your team The importance of Connecting with a Diverse team. How to create a culture of connection & belonging. An introduction to Leading with Emotional Intelligence. We deliver this session on a one to one virtual platform or face to face. We can deliver to small groups but please contact us separately for costings. This specific course is for training one person at a time.
Welcome to our comprehensive video on "Stereotactic Radiosurgery Applications for the Treatment of Arteriovenous Malformations (AVM)" and an introduction to Gamma Knife radiosurgery treatment. Join us for an insightful session as leading experts in the field share their knowledge and experiences.