Date: Thursday 25th May Time: 4pm Location: Studio A - Landor Road Event Details: Matt Jones is a British producer and screenwriter who has worked on several television networks across the UK. Beginning his career writing for Doctor Who Magazine in 1995, he got his big break when he became a screen writer for the Channel 4 series Queer as Folk. Matt will share his experience as a television screenwriter and producer, covering: Writing for Television What producers look for How to write a pitch How to pitch in a room Some of the projects Matt has worked on: Skins - producer Shameless - producer Doctor Who - writer The Split - writer This is a free event that all students are welcome to attend (but tickets are limited so be quick!)
All organisations today operate in an environment of constant and rapid change. Managing this change effectively is often achieved through a portfolio of formal projects. Many organisations today have qualified and experienced project management staff to run their projects. Some organisations today have dedicated functions, staff or processes to support their project management teams. The very largest organisations have in-house Enterprise Programme Offices, or project management specialists in corporate audit or risk functions; or organise 'Red Team Reviews' of a project by other staff with project management experience who are not participating in the reviewed project. But for many mid-size businesses and SMEs - and even some larger organisations - these resources are simply not available. For them, having access to external expertise to assure project management disciplines and to coach project managers can be a major contributor to project success. Such reviews can take place at project initiation; at major stage-gates (especially if significant capital is to be committed at the stage-gate); or at any other time if concerns arise concerning project quality, cost or timescales. And it is for those organisations that we offer the necessary expertise, on an ad hoc basis, in reviewing projects and coaching senior project management staff. A document review and workshop led by one of our consultants can help you assess whether: The strategic goals and priorities for the project are clear and being addressed Governance of the project within the business is defined and being effectively executed Project roles and responsibilities are clear and effective The credibility and robustness of the project plan can be enhanced Performance measures and reporting procedures are effective Critical risks are identified and being managed and contingencies are agreed The roles, responsibilities and capabilities of the key players in the project team are fit for purpose Budgets are realistic and costs being managed effectively Communication and change management activities are effectively planned and being executed At your discretion, you can capture the outcomes from the workshop for yourselves, in terms of identifying opportunities for improvement, or you can have our consultant write a report and make recommendations to you.
Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Virtualization Engineers and Managers Cloud Security Managers Overview Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam. The Certified Digital Forensics Examiner, C)DFE certification is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.ÿ This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-ðcustody, and write a findings report. Through the use of a risk-based approach, the C)DFE is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline Computer Forensic Incidents Investigative Theory Investigative Process Digital Acquisition and Analysis Disks and Storages Live Acquisitions Windows Forensics Linux Forensics Mac Forensics Examination Protocols Digital Evidence Protocols Digital Evidence Presentation Laboratory Protocols Specialized Artifact Recovery eDiscovery and ESI Mobile Forensics Incident Handling Reporting Additional course details: Nexus Humans C)DFE - Certified Digital Forensics Examiner Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)DFE - Certified Digital Forensics Examiner Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for existing Python programmers who have at least one year of Python experience and who want to expand their programming proficiency in Python 3. Overview In this course, you will expand your Python proficiencies. You will: Select an object-oriented programming approach for Python applications. Create object-oriented Python applications. Create a desktop application. Create data-driven applications. Create and secure web service-connected applications. Program Python for data science. Implement unit testing and exception handling. Package an application for distribution. Python© continues to be a popular programming language, perhaps owing to its easy learning curve, small code footprint, and versatility for business, web, and scientific uses. Python is useful for developing custom software tools, applications, web services, and cloud applications. In this course, you'll build upon your basic Python skills, learning more advanced topics such as object-oriented programming patterns, development of graphical user interfaces, data management, creating web service-connected apps, performing data science tasks, unit testing, and creating and installing packages and executable applications. Lesson 1: Selecting an Object-Oriented Programming Approach for Python Applications Topic A: Implement Object-Oriented Design Topic B: Leverage the Benefits of Object-Oriented Programming Lesson 2: Creating Object-Oriented Python Applications Topic A: Create a Class Topic B: Use Built-in Methods Topic C: Implement the Factory Design Pattern Lesson 3: Creating a Desktop Application Topic A: Design a Graphical User Interface (GUI) Topic B: Create Interactive Applications Lesson 4: Creating Data-Driven Applications Topic A: Connect to Data Topic B: Store, Update, and Delete Data in a Database Lesson 5: Creating and Securing a Web Service-Connected App Topic A: Select a Network Application Protocol Topic B: Create a RESTful Web Service Topic C: Create a Web Service Client Topic D: Secure Connected Applications Lesson 6: Programming Python for Data Science Topic A: Clean Data with Python Topic B: Visualize Data with Python Topic C: Perform Linear Regression with Machine Learning Lesson 7: Implementing Unit Testing and Exception Handling Topic A: Handle Exceptions Topic B: Write a Unit Test Topic C: Execute a Unit Test Lesson 8: Packaging an Application for Distribution Topic A: Create and Install a Package Topic B: Generate Alternative Distribution Files
Duration 1 Days 6 CPD hours This course is intended for It is essential information for beginning IT Asset Managers and other IT professionals involved in asset management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview During this course, students learn best practices in Software Asset Management Reducing Risk Increasing Accountability Uncovering Savings Gaining Control of the IT Environment The IAITAM Certified Software Asset Manager (CSAM) Course is a foundational education program that ensures students are able to manage software assets. Students also learn about the ever-changing variables throughout our industry. From software piracy and compliance issues to legislation and organizational challenges, it is necessary to evaluate both the internal and external influences that bring about change in how organizations manage their IT assets. A successful Software Asset Manager must look at the overall goals of the organization and determine where Software Asset Management will be a strategic influence in achieving those goals. This course also includes the exam for CSAM certification. Course Outline The Scope of Software Strategic License Management Software Harvesting License Documentation The Right to Audit Proactive vs. Reactive SAM Developing Goals Savings Opportunities ITAM Compliance Audit Letter Examples of License Data Documentation Compliance Enforcement Understanding the EULA Due Diligence for Compliance The Art of Negotiation Ts & Cs Advice ITAM Automation Selecting a Discovery Tool ITAM Repository Hardware & Organizational Impacts Additional course details: Nexus Humans Certified Software Asset Manager (CSAM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Software Asset Manager (CSAM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for PRINCE2 Agile Practitioner is designed for those who are already certified in either PRINCE2 or PRINCE2 Agile Foundation levels. Candidates can sit PRINCE2 Agile Practitioner if they hold any of the following project management certifications: PRINCE2 Foundation, PRINCE2 Agile Foundation, Project Management Professional (PMP), Certified Associate in Project Management (CAPM) or IMPA Levels A,B, C and D (Certified Project Director). Overview The PRINCE2 Agile Practitioner course explores practical application of the PRINCE2 Agile method with real-world scenarios. Developed in response to demand from user communities, PRINCE2 Agile provides structure, governance and controls when working with agile concepts, methods and techniques. As a PRINCE2© Accredited Training Organization of PeopleCert, all students attending this training will be provided with the exam voucher as a part of delivery. IntroductionAn Overview of AgileIntroduction to PRINCE2 AgileThe 5 TargetsStarting-Up a Project, Initiating a ProjectAgile and the PRINCE2 ThemesChangeOrganizationPrinciples and BehaviorsPlansQualityControlling a Stage and Managing a StageDirecting a ProjectClosing a ProjectRich Communication Kanban and The Kanban MethodLean Start-UpFurther Guidance IPRINCE2© is a registered trademark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. Additional course details:Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 and PRINCE2 Nexus Humans PRINCE2 Agile Practitioner with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PRINCE2 Agile Practitioner with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours Participants in this course will learn how to update, upgrade, and reinstall the macOS then set up and configure the new macOS. They will also be introduced to the command-line interface and macOS Recovery. Other course topics include: managing user accounts, system resources, Time Machine, user home folders managing file systems, storage, encryption, permissions, using hidden items, shortcuts, file archiving file sharing, metadata, Spotlight, network services, host sharing, and creating a personal firewall and much more. The students will also learn all about macOS security and password changes Installation and Configuration Update, Upgrade, or Reinstall macOS Set Up and Configure macOS Use the Command-Line Interface Use macOS Recovery Update macOS User Accounts Manage User Accounts Manage User Home Folders Manage Security and Privacy Manage Password Changes File Systems Manage File Systems and Storage Manage FileVault Manage Permissions and Sharing Use Hidden Items, Shortcuts, and File Archives Data Management Manage System Resources Use Metadata, Spotlight, and Siri Manage Time Machine Apps and Processes Install Apps Manage Files Manage and Troubleshoot Apps Network Configuration Manage Basic Network Settings Manage Advanced Network Settings Troubleshoot Network Issues Network Services Manage Network Services Manage Host Sharing and Personal Firewall System Management Troubleshoot Peripherals Manage Printers and Scanners Troubleshoot Startup and System Issues Additional course details: Nexus Humans macOS Support Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the macOS Support Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for integration developers who configure service policies on IBM© DataPower Gateways. Overview After completing this course, you should be able to: Describe how DataPower gateways are configured Create and configure cryptographic objects Configure Secure Sockets Layer (SSL) to and from DataPower gateways Configure a multi-protocol gateway (MPGW) to handle multiple protocols from a single service Configure a service level monitoring (SLM) policy to control message traffic Use logs and probes to troubleshoot services Use patterns to define and deploy new services Configure message transformation and routing by using style sheets (XSL) and GatewayScripts Handle errors in service policies This course teaches you the essential skills that are required to configure, implement, and troubleshoot services that are developed on the IBM© DataPower Gateways (IDG) with firmware version 7.5.0, regardless of use case. The DataPower Gateways allow an enterprise to simplify, accelerate, and enhance the security capabilities of its XML and web services deployments, and extend the capabilities of its service-oriented architecture (SOA) infrastructure. The gateways also extend these capabilities into the JSON, REST, and Mobile application areas. Through a combination of instructor-led lectures and hands-on lab exercises, you learn how to develop and debug services that are implemented on the DataPower gateways. These skills include WebGUI and Blueprint Console navigation, service type selection, basic multi-protocol gateway configuration, creating and using cryptographic objects, and configuring SSL connections. You also learn how to use various problem determination tools such as logs, monitors, and probes, and techniques for testing DataPower services and handling errors. Hands-on exercises give you experience working directly with a DataPower Gateway. The exercises focus on skills such as creating multi-protocol gateways, working with cryptographic and SSL objects, configuring service level monitoring, troubleshooting services, handling errors in a service policy, and deploying a service from a pattern. Course introductionQuick introduction to developing on DataPowerExercise: First exposure to the DataPower developer environmentServices overviewStructure of a serviceExercise: Creating a BookingService gatewayMulti-protocol gateway serviceProblem determination toolsExercise: Enhancing the BookingService gatewayHandling errors in a service policyExercise: Adding error handling to a service policyDataPower cryptographic tools and SSL setupExercise: Creating cryptographic objects and configuring SSLService level monitoringExercise: Implementing a service level monitor in a multi-protocol gatewayPatterns for service configurationExercise: Using a DataPower pattern to deploy a serviceCourse summary
Duration 5 Days 30 CPD hours This course is intended for Business Process Architects, Developers, Consultants, Systems Administrators, and Technology Consultants Overview This course will prepare you to: Explain the use of SAP Process Integration and the path to SAP Process Orchestration (AEX, BPM and BRM) Explain SAP Process Integration architecture Configure JAVA scenarios Understand and configure the different options with which a back- end system can be connected to the SAP Process Integration (formerly known as SAP Exchange Infrastructure) using JAVA. In this course, students learn how to explain the use of SAP Process Integration and learn how to explain SAP Process Integration architecture. Module 1 SAP Process Integration Architecture Module 2 The System Landscape Directory (SLD) Module 3 Interface Objects in the Enterprise Service Repository Module 4 Object Mapping in the Enterprise Service Repository Module 5 Configuration of Integration Directory Communication Objects Module 6 Configuration of Integration Directory Objects for Java Processing Module 7 Operations of SAP Process Integration Module 8 Connectivity Options for SAP Process Integration Module 9 HTTP Connectivity Options Module 10 File Adapter Configuration Module 11 Intermediate Document Connectivity Options Module 12 Configuration of SAP Business Application Programming Interfaces Connectivity Module 13 Enterprise Services and B2B Connectivity Additional course details: Nexus Humans BIT500 SAP Java Process Integration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT500 SAP Java Process Integration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Die Zertifizierung richtet sich an Fachexperten für Geschäftsprozesse aller Branchen und IT-Experten, die die Blockchain beruflich als kryptographische Lösung oder als Smart Contract (Computerprotokoll zur Abwicklung von Verträgen) einsetzen oder einsetzen wollen. Overview Mit einem EXIN Blockchain Foundation-Zertifikat weisen Sie professionelle Kenntnisse in den folgenden Bereichen nach: Grundlagen der Blockchain-Technologie Blockchain-Herausforderungen Blockchain-Anwendungen Blockchain-Innovationen EXIN Blockchain Foundation ist eine Zertifizierung auf Basisniveau. Mit dem EXIN Blockchain Foundation-Zertifikat wird professionelle Kenntnisse nachgewiesen Âber Blockchain als Transaktionsverzeichnis analog einem Hauptbuch (Ledger), wie das potenziell als weltweites, dezentralisiertes Register zur Aufzeichnung, Bestandsaufnahme und Å¡bertragung von materiellen Werten, wie z. B. Finanzmitteln, Immobilien, Produkten, aber auch immateriellen Werten, wie Wahlstimmen, Software, Gesundheitsdaten und Ideen genutzt werden kann. Die Zertifizierung deckt die Grundbegriffe der Blockchain-Technologie, m'gliche Anwendungsbereiche, den potenziellen Wert fÂr die Organisation und die der Blockchain zugrundeliegende Technologie ab. Grundalgen der Blockchain Die Blockchain-Technologie Zusâtzliche Blockchain-Elemente Aufbau eines Blockchain-Netzwerks Blockchain-Herausforderungen Die Herausforderungen bei einer Blockchain Begrenzung des Blockchain-Risikos Blockchain-Anwendungen Anwendugsfâlle fÂr Blockchains Blockchain-Technologie fÂr Unternehmenswanwendungen Blockchain-Technologie fÂr gesellschaftliche Anwendungen Erweiterung von Blockchain-Anwendungen Blockchain und globale Wirtschaft Blockchain-Innovationen Innovationen in der Blockchain-Technologie Additional course details: Nexus Humans EXIN Blockchain Foundation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EXIN Blockchain Foundation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.