• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

54262 Courses

Intensive Singing Courses

By LondonSinging

Our intensive singing courses are greatly enjoyed by adults who are eager to boost their vocal abilities within a short period. You can either attend to work on a specific aspect of your voice or your overall vocal technique. Expect tremendous progress in a few days of focused studies.

Intensive Singing Courses
Delivered in London or OnlineFlexible Dates
Price on Enquiry

Salesforce Develop and Customize a B2B Commerce on Classic Store (B2B201)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The audience for B2B Commerce Developer is any individual who will participate in a new implementation who needs working knowledge and experience with B2B Commerce technical components. Attendees should have intermediate skills in: Object Oriented Programming (Apex or Java) Full-Stack Development (VisualForce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships)This class is designed for individuals responsible for implementing the technical components of a new B2B Commerce Cloud storefront. You should have some experience with the following: Object-oriented programming (Apex or Java) Full-stack development (Visualforce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships) Overview Identify where and what events require code extension. Effectively navigate and configure in B2B Commerce on Classic Admin. Implement UI, Logic Class, and Service Class Overrides along with Subscriber Code Integration. Create your own B2B Commerce on Classic solution and troubleshoot problem areas during the development cycle. Take the next step toward a B2B Commerce Developer Accreditation. Explore the Salesforce B2B Commerce platform on Classic and discover how and when to extend your events with code. In this 2-day class, our B2B Commerce Cloud experts will walk you through how to use code to customize the UI and extend functionality in your B2B Commerce Cloud on Classic storefront so you can deliver a buyer experience that satisfies your organization?s unique requirements. Technical Overview Review Key Terms Understand B2B Commerce on Classic Architecture and Technology Stack Take a Tour of the UI Understand B2C Commerce Cloud on Classic Admin Configuration vs. Code Extension Storefront Overview Implement B2B Commerce on Classic Create a Storefront Load Data Enable Buyers User Interface Review UI Best Practices Familiarize Yourself with Key Terms Explore UI Themes Customize UI Layouts Use Subscriber Templates Use Page Includes Manage Subscriber Pages Extensions Override Handlebars Extend My Account Extend B2B Commerce Checkout Flow Explore Global JavaScript Functions Understand B2B Commerce Event Handling Explore Handlebars Functions Explore Localization Functions Extend Utility Functions and Objects Extend Global Extension Points Core Capabilities Handle Cases Using Process Builder Configure Payment Types

Salesforce Develop and Customize a B2B Commerce on Classic Store (B2B201)
Delivered OnlineFlexible Dates
Price on Enquiry

BA09 - Managing Requirements for SharePoint Projects

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders engaged in improving the delivery of products and services that meet user needs through the use of Microsoft SharePoint; Anyone who wants to improve their Business Analysis skills; Project stakeholders concerned with SharePoint requirements. Overview Plan, manage and close requirements for a project in reduced time using good business analysis practices Minimize project uncertainty and risk by applying good techniques Ensure your project delivers required functionality and adds value to the business Create an environment of self-management for your team that will be able to continuously align the delivered product or services with desired business needs, easily adapting to changing requirements throughout the process. Requirements can change frequently during a SharePoint project, and therefore projects need a streamlined, flexible approach to requirements change management. SharePoint professionals want to develop systems and services which are both high-quality and high-value, and the easiest way to achieve this is to implement the highest priority requirements first. This enables the projects to maximize value for their stakeholders. Introduction ? Roles involved in a SharePoint project The opportunities and challenges of a SharePoint project The business analysis process BA role vs. project manager role BA / PM competencies Case Study Exercise Understanding SharePoint Requirements Business, User, Functional, Quality-of-service and implementation requirements Requirements vs. specifications Requirements vs. business rules Risk management and risk response strategies Analyzing requirements Characteristics of effective requirements Case Study Exercise SharePoint Requirements Modeling Identify high level scope Identify initial requirements stack Identify an architectural vision Plan your iteration Iteration modeling Model storming Test driven development Case Study Exercise The Change Management Process Managing the Solution Scope and Requirements Capturing the Requirements Traceability Maintaining the Requirements for re-use Managing Requirements Conflicts Preparing the Requirements Package Building the Requirements communications plan Case Study Exercise Assessing & Validating Requirements Validating and verifying SharePoint Requirements Creating a master test plan Create test scenarios and test cases Case Study Exercise Additional Information Useful books and links on managing requirements and projects for SharePoint initiatives

BA09 - Managing Requirements for SharePoint Projects
Delivered OnlineFlexible Dates
Price on Enquiry

Level 3 Diploma in Sports Coaching and Development

5.0(1)

By Club Doncaster Sports College

Course Overview The qualification is designed for post-16 learners who want to study sports at university, or are interested in a career within the sports industry. It offers a solid foundation on the various aspects of sport that enables students to develop essential skills and knowledge for gaining employment or progressing to Higher Education. The qualification is split into two 1 year courses, and allows learners to gain up to a maximum of 168 UCAS tariff points – this Is the equivalent of three A* A levels. Level: 3 Duration: 2 year full-time Awarding Body: Pearson Fees: Free Example Units and Structure This qualification is studied across a two year programme, with full time weekly study.Units include:Health, Wellbeing and SportAnatomy and PhysiologySports DevelopmentSports NutritionSports PsychologyResearch methods in sports and exerciseSports coachingApplied Sports CoachingCareers in the Sports IndustrySelf Employment in the sports industryFitness Testing Entry Requirements Five GCSEs at grade 4 to 9 (A to C), including Maths and English alongside GCSE P.E or BTEC Sport. Candidates must also possess an interest in pursuing a career within sports.

Level 3 Diploma in Sports Coaching and Development
Delivered In-PersonFlexible Dates
FREE

Influencing for Leadership and Management

By Dickson Training Ltd

We often find ourselves working in fast-paced matrix environments, working in/with virtual teams or simply trying to get something done by someone in another part of the business. This common aspect of our working lives has a common challenge: how to influence other people to help us or do something for us, when they don't report to us. Pulling rank or strong nudging might work once, but we need to build a supportive and collaborative relationship over the long term. What Does This Course Offer? Fortunately, there are really effective tips for influencing, and our program offers an influencing model in detail. Through activity and discussion we explore how you can apply these principles and use it when you need help from other people. Even when we are not in a leadership position it can sometimes be extremely difficult to get people's help, especially when we have no authority over them. This is where an approach and an influencing model can help us identify what we and other people value in a given influencing situation. We can then explore that information so that everyone can view and pursue a common purpose. This course will enhance and promote the skill set necessary for any leader or manager, allowing our in-depth influencing knowledge to be applied into your working environment. From an employer's perspective this award can be a significant long-term return on investment by developing your leaders and managers. Our learning experiences are successful because the outcomes are quickly embedded and demonstrate an immediate visible impact on the day-to-day working environment. Our engaging learning inspires employees to want to personally add value to the companies they work for. We also offer our Paradigm Trait-Map™ online assessment and report as a frame of reference for your own influencing styles and that of others. This assessment should be completed before attending the program, and will be expanded upon during the program delivery. Course Content The Influencing for Leadership and Management course covers the following topics: Two key influencing models that you can apply back in your daily work Different types of influencing How to create the right environment for influencing Barriers you may face and how to overcome these barriers Accreditation Activity Our accredited tutors deliver training that encourages delegates to confidently and practically apply all they have learnt as soon as they get back into the business. To achieve this award, delegates need to prepare and deliver a 3 minute presentation* on the highlights of their learning and immediate application avenues when back in their working environment. *Participants will be given 30 minutes during the program to prepare for their 3 min presentation at the end of the program. Scheduled Course Dates Unfortunately this course is not currently scheduled as an open course as it is primarily run as an in-house programme. For more information, please contact us. In-House Courses This is our own management training course which has been developed and refined over the many years we have been providing it to delegates from organisations in virtually every industry. This means that the course syllabus is extremely flexible and can be tailored to your specific requirements. If you would like to discuss how we can tailor this management training course for you and/or run it at your premises, please contact us.

Influencing for Leadership and Management
Delivered in Bardsey + 3 more or UK Wide or OnlineFlexible Dates
Price on Enquiry

Architecting Hybrid Cloud Infrastructure with Anthos

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation

Architecting Hybrid Cloud Infrastructure with Anthos
Delivered OnlineFlexible Dates
Price on Enquiry

Warehousing and Storage Fundamentals For Inventory Managers

4.3(43)

By John Academy

Elevate your expertise in warehousing and storage with our comprehensive course for inventory managers. Explore fundamental principles, efficient warehouse design, streamlined operations, inventory control strategies, safety protocols, performance metrics, and emerging trends. Gain the knowledge to optimize your warehouse for success in the ever-evolving world of logistics and supply chain management.

Warehousing and Storage Fundamentals For Inventory Managers
Delivered Online On Demand
FREE

Feeling overloaded? It's not one bad day. It's a consistent feeling of being overwhelmed everyday. This course will help you understand why you might be feeling overloaded and what you can do about it.

Overload
Delivered Online On Demand1 hour
FREE

SCRUM Foundation (SP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Todas aquellas personas que tengan relaci¢n con proyectos que requieran de una gesti¢n gil: Clientes, Promotores, Project Managers, Proveedores o Subcontratas, Equipo del Proyecto: Perfiles T‚cnicos, Perfiles de apoyo o Staff. En definitiva a cualquier persona que tenga relaci¢n con un proyecto gil. Overview Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?m‚todo??Desde finales del siglo pasado, se viene analizando la gesti¢n de proyectos cl sica conocida como Gesti¢n de Proyectos Predictiva, comprobando que no puede/debe ser aplicada a todo tipo de proyecto. Existen multitud de proyectos donde el nivel de detalle de las caracter¡sticas de los entregables est asociado al concepto IKIWISI (I?ll Know It When I See It -> Lo sabr‚ cuando lo vea), otros proyectos que tienen muy bien definido el objetivo, pero dadas unas necesidades cambiantes, la manera de abordarlo puede ser bien diferente, otros proyectos que? En definitiva se ha puesto de manifiesto que la gesti¢n de proyectos predictiva, no es del todo til para estos tipos de proyecto. Durante este curso, analizaremos otra forma de hacer las cosas. Veremos c¢mo abordar estos otros tipos de proyectos que requieren de una gesti¢n diferente: una Gesti¢n µgil. Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?m‚todo?? Introducci¢n a Agile y Scrum Primeros conceptos Metodolog¡as µgiles Agile Manifesto y Principios µgiles ¨Qu‚ hay bajo el paraguas de Agile? Las 3 grandes aproximaciones a Agile: LEAN, XP y Scrum El entorno de trabajo µgil Roles µgiles Trabajando de forma gil Definir la Visi¢n del Producto Planificar la Release y los Sprints El trabajo del d¡a a d¡a La revisi¢n del producto Preparando la entrega Gestionando de forma gil Gesti¢n del Alcance y los Proveedores Gesti¢n de Tiempos y Costes Gesti¢n del Equipo y las Comunicaciones Gesti¢n de Riesgos y la Calidad Garantizando el ‚xito Construir una base s¢lida Impulsar el cambio

SCRUM Foundation (SP)
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional
Delivered OnlineFlexible Dates
Price on Enquiry