• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

32094 Courses

Essential Skills for Positive Project Leadership

By IIL Europe Ltd

Essential Skills for Positive Project Leadership How can you approach a difficult conversation to achieve the desired outcome? This video addresses the importance of having a plan when a conversation with a project stakeholder may be difficult and involve bad news, major changes, or a performance issue. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

Essential Skills for Positive Project Leadership
Delivered Online On Demand15 minutes
£10

Business Analysis - Requirements Engineering

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of managing requirements (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Requirements Engineering principles and techniques. Key areas are: Requirements Engineering framework The hierarchy of requirements Key stakeholders in the framework Requirements elicitation Requirements modelling Requirements documentation Requirements analysis Requirements validation Requirements management The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The practical course provides in-depth knowledge and practice in Requirements Engineering. Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Structure and Benefits of Business Analysis Foundation Exam Details Business Analysis Certification Scheme What is Business Analysis? Intent and Context Origins of business analysis The development of business analysis The scope of business analysis work Taking a holistic approach The role and responsibilities of the business analyst The competencies of a Business Analyst Personal qualities Business knowledge Professional techniques The development of competencies Strategy Analysis The context for strategy The definition of strategy Strategy development External environmental analysis Internal environmental analysis SWOT analysis Executing strategy Business Analysis Process Model An approach to problem solving Stages of the business analysis process model Objectives of the process model stages Procedures for each process model stage Techniques used within each process model stage Investigation Techniques Interviews Observation Workshops Scenarios Prototyping Quantitative approaches Documenting the current situation Stakeholder Analysis and Management Stakeholder categories and identification Analysing stakeholders Stakeholder management strategies Managing stakeholders Understanding stakeholder perspectives Business activity models Modelling Business Processes Organizational context An altrnative view of an organization The organizational view of business processes Value propositions Process models Analysing the as-is process model Improving business processes (to-be business process) Defining the Solution Gab analysis Introduction to Business Architecture Definition to Business Architecture Business Architecture techniques Business and Financial Case The business case in the project lifecycle Identifying options Assessing project feasibility Structure of a business case Investment appraisal Establishing the Requirements A framework for requirements engineering Actors in requirements engineering Requirements elicitation Requirements analysis Requirements validation Documenting and Managing the Requirements The requirements document The requirements catalogue Managing requirements Modelling the Requirements Modelling system functions Modelling system data Delivering the Requirements Delivering the solution Context Lifecycles Delivering the Business Solution BA role in the business change lifecycle Design stage Implementation stage Realization stage Additional course details: Nexus Humans Business Analysis - Requirements Engineering training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Requirements Engineering course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Analysis - Requirements Engineering
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-303T00 - Microsoft Azure Architect Technologies

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include virtualization, automation, networking, storage, identity, security, data platform, and application infrastructure. This course outlines how decisions in each theses area affects an overall solution. Implement Azure Active Directory Overview of Azure Active Directory Users and Groups Domains and Custom Domains Azure AD Identity Protection Implement Conditional Access Configure Fraud Alerts for MFA Implement Bypass Options Configure Guest Users in Azure AD Configure Trusted IPs Manage Multiple Directories Implement and Manage Hybrid Identities Install and Configure Azure AD Connect Configure Password Sync and Password Writeback Configure Azure AD Connect Health Implement Virtual Networking Virtual Network Peering Implement VNet Peering Implement VMs for Windows and Linux Select Virtual Machine Size Configure High Availability Implement Azure Dedicated Hosts Deploy and Configure Scale Sets Configure Azure Disk Encryption Implement Load Balancing and Network Security Implement Azure Load Balancer Implement an Application Gateway Understand Web Application Firewall Implement Azure Firewall Implement Azure Front Door Implementing Azure Traffic Manager Implement Storage Accounts Storage Accounts Blob Storage Storage Security Managing Storage Accessing Blobs and Queues using AAD Implement NoSQL Databases Configure Storage Account Tables Select Appropriate CosmosDB APIs Implement Azure SQL Databases Configure Azure SQL Database Settings Implement Azure SQL Database Managed Instances High-Availability and Azure SQL Database In this module, you will learn how to Create an Azure SQL Database (single database) Create an Azure SQL Database Managed Instance Recommend high-availability architectural models used in Azure SQL Database Automate Deployment and Configuration of Resources Azure Resource Manager Templates Save a Template for a VM Evaluate Location of New Resources Configure a Virtual Hard Disk Template Deploy from a template Create and Execute an Automation Runbook Implement and Manage Azure Governance Create Management Groups, Subscriptions, and Resource Groups Overview of Role-Based Access Control (RBAC) Role-Based Access Control (RBAC) Roles Azure AD Access Reviews Implement and Configure an Azure Policy Azure Blueprints Manage Security for Applications Azure Key Vault Azure Managed Identity Manage Workloads in Azure Migrate Workloads using Azure Migrate VMware - Agentless Migration VMware - Agent-Based Migration Implement Azure Backup Azure to Azure Site Recovery Implement Azure Update Management Implement Container-Based Applications Azure Container Instances Configure Azure Kubernetes Service Implement an Application Infrastructure Create and Configure Azure App Service Create an App Service Web App for Containers Create and Configure an App Service Plan Configure Networking for an App Service Create and Manage Deployment Slots Implement Logic Apps Implement Azure Functions Implement Cloud Infrastructure Monitoring Azure Infrastructure Security Monitoring Azure Monitor Azure Workbooks Azure Alerts Log Analytics Network Watcher Azure Service Health Monitor Azure Costs Azure Application Insights Unified Monitoring in Azure

AZ-303T00 - Microsoft Azure Architect Technologies
Delivered OnlineFlexible Dates
Price on Enquiry

JTNOC - Junos Troubleshooting in the NOC

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The course content is aimed at operators of devices running the Junos OS in a NOC environment. These operators include network engineers, administrators, support personnel, and reseller support personnel. Overview After successfully completing this course, you should be able to: Reduce the time it takes to identify and isolate the root cause of an issue impacting your network. Gain familiarity with Junos products as they pertain to troubleshooting. Become familiar with online resources valuable to Junos troubleshooting. Gain familiarity with Junos tools used in troubleshooting. Identify and isolate hardware issues. Troubleshoot problems with the control plane. Troubleshoot problems with interfaces and other data plane components. Describe the staging and acceptance methodology. Troubleshoot routing protocols. Describe how to monitor your network with SNMP, RMON, Junos Traffic Vision (formerly known as JFlow), and port mirroring. Become familiar with JTAC procedures. This instructor-led four-day course is designed to provide introductory troubleshooting skills for engineers in a network operations center (NOC) environment. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention Additional course details: Nexus Humans JTNOC - Junos Troubleshooting in the NOC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JTNOC - Junos Troubleshooting in the NOC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JTNOC - Junos Troubleshooting in the NOC
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP APM : Access Policy Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager. This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Module 3: Exploring the Access Policy Navigating the Access Policy Module 4: Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Module 5: Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Module 6: Understanding Assignment Agents List of Assignment Agents Module 7: Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Module 8: Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Module 9: Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Module 10: Exploring Client-Side Checks Client-Side Endpoint Security Module 11: Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Module 12: Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Module 13: Configuring App Tunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Module 14: Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Module 15: Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Module 16: Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Module 17: Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Module 18: Deploying SAML SAML Conceptual Overview SAML Configuration Overview Module 19: Exploring Webtops and Wizards Webtops Wizards Module 20: Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Module 21: Configuration Project Configuration Project Additional course details: Nexus Humans F5 Networks Configuring BIG-IP APM : Access Policy Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Configuring BIG-IP APM : Access Policy Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Networks Configuring BIG-IP APM : Access Policy Manager
Delivered OnlineFlexible Dates
Price on Enquiry

BA01 - Business Analysis Essentials

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Designed for individuals new to the business analyst role or those who supervise and/or work with business analysts. Overview Understand the role of the business analyst Discuss industry standards/resources for obtaining more information about business analysis Acquire a solid understanding of the various tasks/activities that comprises business analysis Recognize the pre and post project business analysis activities Learn how to plan, elicit, analyze, model, and test requirements This is an introductory course designed to provide students with a basic understanding of the benefits, functions and impact a business analyst has within an organization. The course discusses the business analysis process as it is applied throughout a project as well as the pre-project activities that comprise strategy analysis. Students learn how a business analyst supports the project throughout the solution development life cycle, from defining business needs and solution scope to validating that requirements have been met in the testing phase and ensuring the solution continues to provide value after implementation. Introduction to Business Analysis Business analysis defined The activities that comprise business analysis IIBA/PMI and the goals of a professional association IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Exercise: Requirements challenges The IIBA? and the role of the Business Analyst Business analyst defined BA role vs. PM role Importance of communication/collaboration The deliverables produced as part of business analysis The BA career path Exercise: Review case Study Strategy Analysis and Change The definition of Strategy Analysis Components of Strategy Analysis Identifying stakeholders and business needs Exercises: Business Need development and RACI Stakeholder Identification Understanding and Defining Solution Scope Defining Solution Scope Project scope vs. product scope Defining a problem statement Techniques for defining scope Exercises: Conduct a brainwriting session and create a context diagram Optional exercise: Create a Use Case Diagram Understanding Requirements Define the term requirement Understand requirement types Present the requirements process Requirements vs. specifications and business rules Exercise: Identify Requirements Planning & Eliciting Requirements The Requirements Work Plan (RWP) Components of the RWP Identifying good questions for elicitation Active listening Categories and types of elicitation techniques Exercise: Planning for elicitation Analzying & Documenting Requirements Understanding requirements analysis The Business Requirements Document (BRD) The BRD vs. the functional requirements specification BRD components The purpose of packaging requirements Exercise: Analyzing Requirements Elicitation & Process Modeling Why models are created Objectives of modeling What is process management Understanding process modeling Modeling using BPMN AS-IS vs. TO-BE modeling BPMN subclasses BPMN simple structure Prototyping Business Process Modeling case study Exercises: Modeling and create a Prototype of your application Verifying & Validating Requirements The difference between validation and verification Characteristics of good requirements Risks associated with requirements Types of testing approaches Creating a test plan Requirements traceability matrix Verified and validated requirements Exercise: Testing Requirements Additional Resources Helpful links for obtaining additional business analysis information Additional course details: Nexus Humans BA01 - Business Analysis Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA01 - Business Analysis Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA01 - Business Analysis Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco NSO Essentials for Programmers and Network Architects (NSO201) v4.0

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System installers System integrators System administrators Network administrators Solutions designers Overview After completing this course, you should be able to: Explain transactional service activation and how it relates to business requirements Explain the benefits and uses of Cisco NSO Explain how Cisco NSO communicates with network devices Understand the NETCONF protocol and be able to read and write simple YANG models Install NSO and describe how NSO uses NETCONF and the Device Manager component Understand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capable Explain the YANG service model structure Describe how YANG is used with NSO, create and deploy a service, and explain NSO FASTMAP Design and manage services with YANG models Perform NSO configuration and basic troubleshooting, and describe the following NSO features: integration options, alarms and reporting, scalability and performance options, and available function packs Use logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devices Explain the mapping logic of service parameters to device models and consequently to device configurations Describe the use of different integration options and APIs Explain the use of Reactive FASTMAP for manipulating and implementing advanced Network Functions Virtualization (NFV) components Describe the use of feature components and function packs Define and explain the European Telecommunications Standards Institute (ETSI) Open Source NFV Management and Orchestration (MANO) principles and solution Work with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures The Cisco NSO Essentials for Programmers and Network Architects (NSO201) v. 4.0 course introduces you to Cisco© Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides an overview of NSO as a network automation solution, as well as introductions to NETCONF, YANG, and XPath. You will learn about managing devices and creating device templates, service management and service package creation, network element drivers, interfacing with other systems using APIs, configuring and troubleshooting system settings, managing alarms and reporting, configuring NSO for scalability and performance, and capabilities that can be added to Cisco NSO. Introduction to Cisco NSO Meeting Challenges with Orchestration Challenges of Network Management Challenges of Network Orchestration NSO Features and Benefits That Meet Challenges Standardized Approach What Is NSO? Logical Architecture Components What Does NSO Do? Orchestration Use Cases How Does NSO Work? Introduction to NETCONF and YANG Packages Mapping Logic Network Element Drivers (NEDs) Resources and Training Resources Training Get Started with Cisco NSO Installing Cisco NSO Setup Overview Cisco NSO Local Installation Installing NEDs Using NetSim NETCONF Overview Challenges of Network Management Introduction to NETCONF NETCONF Operation Device Manager Device Manager Overview Device Configuration Management Device Connection Management Templates and Groups Other Device Management Tools Service Manager Essentials YANG Overview Introduction to YANG Other Representations of YANG Data Types XPath Overview Basic YANG Statements Can You Spot the Error? Using Services Package Architecture Creating a Service Package Sample Service Configuration Service Template YANG Service Model Deploying a Service Model-to-Model Mapping Mapping Introduction Mapping Logic FASTMAP Template Processing Service Design and Cisco NSO Programmability Service Design Service Design Overview Top-Down Approach Bottom-Up Approach Device Configuration Service Model Service Management Service Management Tasks Service Lifecycle Management Guidelines NSO Programmability Introduction NSO Programmability Overview Python Service Skeleton Creating a Service YANG Model Creating a Service Template Template Processing with Python Cisco NSO Flexibility System Configuration and Troubleshooting System Configuration System Troubleshooting Integration Integration Options NETCONF Server Web Integration SNMP Agent Alarm Management and Reporting Alarm Management Reporting Scalability and Performance High Availability High-Availability Cluster Communications Clustering Layered Service Architecture Addressing Performance Limitations Components and Function Packs Function Packs NFV Orchestration Reactive FASTMAP

Cisco NSO Essentials for Programmers and Network Architects (NSO201) v4.0
Delivered OnlineFlexible Dates
Price on Enquiry

Business Continuity Planning

By IIL Europe Ltd

Business Continuity Planning This presentation looks at a framework for defining a workable Business Continuity Plan (BCP) and the nuances required to test and maintain such a plan. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

Business Continuity Planning
Delivered Online On Demand15 minutes
£10

Business Continuity Planning

By IIL Europe Ltd

Business Continuity Planning This presentation looks at a framework for defining a workable Business Continuity Plan (BCP) and the nuances required to test and maintain such a plan. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

Business Continuity Planning
Delivered Online On Demand45 minutes
£10

The Need to Focus on Business Benefits and Value

By IIL Europe Ltd

The Need to Focus on Business Benefits and Value For decades, project managers were trained to focus on the creation of the deliverables defined in the project's requirement, often with little regard for the expected business benefits and business value. This is now changing as companies have a better understanding of business benefits and value and are updating their methodologies and frameworks. Some frameworks, such as Agile and SCRUM, appear to do a better job identifying than traditional project management practices tracking and reporting business benefits and value. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

The Need to Focus on Business Benefits and Value
Delivered Online On Demand15 minutes
£10