Duration 2 Days 12 CPD hours This course is intended for Sales engineers Account managers Networking engineers Technical and non-technical audiences Overview After taking this course, you should be able to: Understand the role that programmable infrastructure is having on the transition to the digital enterprise Describe Cisco DNA, its components and benefits, and explain a few use cases Describe the different technologies and solutions within the Cisco programmable infrastructure portfolio Describe Cisco DNA Center REST APIs Understand the functionality provided by Cisco WebEx Teams Describe Cisco CMX, services, and related APIs Describe the importance of DevOps culture within network operations in the shift to becoming a digital enterprise The Programming Use Cases for Cisco Digital Network Architecture (DNAPUC) v1.0 course highlights the shift toward the digital enterprise and examines the components, benefits, and use cases of Cisco Digital Network Architecture (Cisco DNA?) in an enterprise environment. You will learning about key platforms including Cisco© DNA Center, Cisco WebEx Teams?, Cisco Connected Mobile Experiences (CMX), and their related APIs. This course also covers open standards, tools, and network APIs that you can use to complement the Cisco DNA software portfolio, including Python, JavaScript Object Notation (JSON), Network Configuration Protocol (NETCONF), Representational State Transfer Configuration Protocol (RESTCONF), and Yet Another Next Generation (YANG). Understanding Programmable Infrastructure Digital Enterprise Four Pillars of Digitization Network Programmability and Automation What Should Be Automated? Quantifying Programmability and Automation for the Business Network Programmability and Automation Use Cases Introducing Cisco DNA Cisco DNA Overview Cisco DNA Components Benefits of Cisco DNA Cisco DNA Use Cases Describing Programmable Infrastructure Cisco Programmability Options Data Center Infrastructure Enterprise Network Programmability Streaming Telemetry Collaboration Management, Monitoring, and Analytics Describing Network APIs How APIs Enable Business Automation API Overview Data Encoding with JSON and XML RESTful APIs RESTCONF and NETCONF Overview Data Modeling with YANG Describing Cisco DNA Center APIs Cisco DNA Center Overview Cisco DNA Center Automation Enterprise Benefits Cisco DNA Center Applications and Use Cases Cisco DNA Center REST API Overview Case Study: Network Automation at Symantec Describing Cisco Collaboration APIs Cisco Webex Teams Overview Cisco Webex Teams Business Benefits Cisco Webex Teams API Overview Describing Cisco Mobility APIs Cisco CMX Overview Cisco CMX Programmability Business Benefits Cisco CMX Mobility Services API Overview Case Study: Victoria University and Cisco CMX Implementing DevOps Culture Within Network Operations Transition to DevOps CALMS Model (Culture, Automation, Lean, Measurement, Sharing) Role of Cisco Technology in the Transition to DevOps Additional course details: Nexus Humans Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Channel Partner System Engineers System Administrators Architects Security Professionals Overview Upon successful completion of this course, the student will gain the following knowledge:How to describe and position Cisco UmbrellaDiscuss Secure Internet Gateway and Ransomware ProtectionLearn about DNS & IP layer enforcement & Intelligent ProxyDescribe Command and control callback blockingDiscuss Threat IntelligenceCompare Umbrella PackagesUnderstand Roaming SecurityBasic understanding of Cisco Roaming ClientUnderstand how to use Cisco Umbrella Virtual ApplianceExplain the ease of Integrating Cisco Umbrella into Active DirectoryDiscuss Umbrella ReportingUnderstand Utilize Multi-Organization Tools Cisco Umbrella? is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella? works and what are the features is the key focus of this 2-day Cisco© online IT class. Students who enter the course with a basic understanding of Cisco© products and IT solutions will be able to describe the Cisco Umbrella?, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, use Cisco© Roaming Client. Cisco Umbrella- Security Solution Discuss Security Internet Gateway Explain Ransomware Protection DNS & IP layer enforcement Intelligent Proxy Command & control callback blocking Threat Intelligence Umbrella Packages Implementing Cisco Umbrella Overview of Cisco Umbrella How do you Protect your network Review how to Point your DNS to Cisco Umbrella What are the custom policies? Discuss Intelligent Proxy Umbrella Policy Tester Policy Precedence Roaming Client Introduction to Umbrella Roaming Client Prerequisites Downloading and Installing Adding IP Layer Enforcement Status, States, and Functionality Virtual Appliances Internal Domains Umbrella Roaming Security AnyConnect: Cisco Umbrella Roaming Security Client Administrator Guide Cisco Umbrella Dashboard at a glance Cisco Certificate Import Virtual Appliance Setup Guide Discuss Deployment Guidelines How to Deploy the VAs Review via VMware Review via Hyper-V Understand Your VAs Local DNS Forwarding Overview of DNS Explain Sites and Internal Networks Sizing Active Directory Overview of Active Directory Discuss Up DNS Forwarding with your VAs Active Directory Environment Route DNS Traffic Communication Flow Multiple Active Directory and Umbrella Sites Reporting Overview Reporting Basics Understanding Security Categories Scheduled Reports: Overview Security Overview Report Activity Search Report Security Activity Report Destinations Report Identities Report Cloud Services Report Admin Audit Log Report Umbrella Multi-Org Overview Cisco Umbrella Multi-Org Overview Centralized Settings Centralized Reports: Service Status Centralized Reports: Cloud Services Additional course details: Nexus Humans Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco integrators, resellers, and partners Network administrators Security administrators Security consultants Systems engineers Technical support personnel Overview After taking this course, you should be able to: Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors. Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 is a 3-day course that shows you how to deploy and use Cisco© AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification.This class will help you:Learn how to deploy and manage Cisco AMP for EndpointsSucceed in today?s high-demand security operations roles Course Outline This course will cover the following topics: Introducing to Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts
Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Consultants, Support, System Administrators Overview Upon completion of the course, students will be able to: Run a business process. Create a business process using the Graphical Process Modeler. Explain how to create a service configuration. Explain how to track an executable business process. Discuss the basics of Sterling B2B Integrator. This course teaches students techniques, tools, and recommended practices that can be used to run a business process, create a business process using the Graphical Process Modeler, explain how to create a service configuration, explain how to track an executable business process, and discuss the basics of Sterling B2B Integrator through a combination of lecture and hands-on labs. About IBM Sterling B2B Integrator High level overview of the Admin Console with an exercise to start the application XML and XPath Basics Review the basics of XML and XPath which is heavily used in the application Basic Business Process Concepts Reviewing what XML and XPath components are used to build business processes Reviewing how to manually execute a business process within the application Tracking and Troubleshooting Business Processes Exercises to demonstrate how to work with business process instances Graphical Process Modeler (GPM) Overview of the Graphical Process Modeler Exercises to walk through the development of a business process in the GPM Exercises for checking in, executing, and modifying business processes Introduction to Service Management Several exercises showcasing specific services/adapters and other functionality Best Practices Covers specific business process development methods that are best practice Mapping Introduction to the Map Editor and Standards Exercises to build and use an XML Encoder Map Typing Map Exercises to build and use a Typing Map Case Study Exercise to build an end-to-end solution using what was learned in previous exercises Tracking System Health Review of archiving, migrating, and deleting business processes Additional course details: Nexus Humans IBM Sterling B2B Integrator Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the IBM Sterling B2B Integrator Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Introduction to carrier Ethernet Describe the function of an Ethernet LAN Describe Ethernet frame filtering Implement VLAN tagging Implement IRB Implement a virtual switch Describe interconnecting routing instances Describe provider bridging Configure and monitor provider bridging Configure and monitor provider backbone bridging Explain the purpose of the Spanning Tree Protocol (STP) Configure and monitor the STP, the RSTP, the MSTP, and the VSTP Explain the purpose of bridge protocol data unit (BPDU), loop, and root protection Describe the basic operation of link fault management (LFM) Describe the basic operation of connectivity fault management (CFM) Configure and monitor Ethernet OAM Describe and configure Ethernet Ring Protection (ERP) The Junos Service Provider Switching course is a two-day course that provides students with intermediate switching knowledge and configuration examples that are most common in a Service provider implementation. Course Outline Course Introduction Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Backbone Bridging Configuring and Monitoring Provider Backbone Bridging Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring OAM Ethernet Ring Protection ERP Overview Configuring and Monitoring ERP LAG Overview Configuring and Monitoring a LAG
At Black & Gold Audio we offer beginner, intermediate, advanced and expert sessions for anyone aged 14 and over. The sessions are carried out either within our studios in Truro, Cornwall or remotely using ZOOM. They are designed around you the learner and your own specific wants and needs. Our tutor is an expert in the fields of acoustics, recording, traditional and electronic music composition, music production, sequencing, sound design, mixing and mastering, film, TV and game audio. Who is this course for? Candidates who are interested in a more one to one based learning program remotely or within a professional industry standard environment, tuition is flexible regarding days, hours and regularity. Most importantly the tutor can design a program that it suited to you and your requirements, a meeting with the tutor can be arranged beforehand to discuss a learning plan for you. Flexible 1 to 1 tutoring is a great way to learn at your own pace with no pressures and with the support of an industry expert. You may also be interested in the RSL Music Production Grades 1-8 which we deliver on a 1 to 1 basis too, see HERE. What will I learn? This is a very open ended question for these types of sessions, its about what you want to learn and our tutor will talk with you to figure out the a suitable program for your needs. We cater for beginners, intermediates, advanced and expert students. How will I learn? The aim of these courses is to build a basic to advanced knowledge and understanding in various specialist areas of the industry, each tailor made course will support your learning through progress tracking and access to some amazing learning resources provided by our tutor. Each session will focus and build upon the last so that you are eventually able to meet your desired end goal. What equipment do I use on the course? The Black & Gold Studio is equipped with a huge range of both industry standard recording equipment, hardware synthesizers, drum machines, fx processing and control surfaces, and that’s before we even get inside the computer!! You can be taught to use DAW’s such as Logic Pro X, Cubase, Pro Tools & Ableton Live as well as explore other 3rd party softwares such as NI Komplete, Izotope, Fabfilter, Waves and so many more.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for System administrators who are either new to JBoss or have experience with JBoss Enterprise Application Platform 5. Base experience with system administration on Microsoft Windows, UNIX, or Linux© operating systems. Understanding of hardware and networking. Note: No prior knowledge of Java, scripting, or JBoss Developer Studio is required. Overview Upon successful completion of this course, students will be able to take the Red Hat Certified JBoss Administration (RHCJA) Exam. In this course, you'll discover the best practices for installing and configuring Red Hat© JBoss© Enterprise Application Platform (JBoss EAP) 7. Through hands-on labs, you'll learn the essential, real-world tasks that you need to know as a system administrator to effectively deploy and manage applications on JBoss EAP. This course will help prepare you to take the Red Hat Certified Specialist in Enterprise Application Server Administration exam. 1 - OVERVIEW OF JBOSS ENTERPRISE APPLICATION PLATFORM Learn the concepts and terminology of JBoss© Enterprise Application Platform 6, and install and run a JBoss Enterprise Application Platform instance. 2 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN STANDALONE MODE Understand the directory structure of standalone mode and the standalone.xml configuration file, and deploy an application onto a standalone server. 3 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN DOMAIN MODE Set up a domain, including a domain controller managing multiple host controllers. Also learn how to deploy an application onto a domain. 4 - CONFIGURE SERVERS Define a server group on a host, add servers to a server group, and deploy an application to a server group. 5 - USE THE CLI TOOL Learn how the command-line Interface tool can be used to script administrative tasks. 6 - THE DATASOURCE SUBSYSTEM Understand database connection pools in JBoss Enterprise Application Platform and how to configure the datasource subsystem. Learn how to deploy a Java? Database Connectivity (JDBC) driver and define a datasource. 7 - THE LOGGING SUBSYSTEM Configure the logging subsystem, including configuring the built-in handlers and loggers. 8 - THE MESSAGING SUBSYSTEM Understand JMS and HornetQ, including how to define and configure connection factories and destinations (topics and queues). 9 - THE SECURITY SUBSYSTEM Configure the security subsystem, including securing the management interfaces, securing an application, and securing a JMS destination. Also learn how to define an Lightweight Directory Access Protocol (LDAP) and database security realm. 10 - JVM CONFIGURATION Configure the JVM for both standalone and domain modes. 11 - MIGRATING APPLICATIONS TO JBOSS ENTERPRISE APPLICATION PLATFORM 6 Understand classpath and module dependencies, JPA issues, updating security settings, and other tips on how to migrate an application to JBoss Enterprise Application Platform 6. 12 - THE WEB SUBSYSTEM Configure the HTTP and HTTPS Connectors, set up an SSL connection, and configure an AJP Connector. 13 - INTRODUCTION TO CLUSTERING Set up JBoss Enterprise Application Platform 6 in a cluster in both standalone and domain mode. Additional course details: Nexus Humans Red Hat JBoss Application Administration I with Exam (AD249) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat JBoss Application Administration I with Exam (AD249) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Individuals responsible for maintaining and improving the workplace safety, Occupational health and safety officers, consultants, and advisors, Professionals wishing to acquaint themselves with PECB's IMS2 Methodology for implementing an OH&S MS, Individuals responsible for maintaining the conformity of OH&S MS to ISO 45001 requirements, Members of OH&S teams, Individuals aspiring to pursue a career as OH&S MS implementers, consultants, or officers Overview Explain the fundamental concepts and principles of an occupational health and safety management system (OH&S MS) based on ISO 45001 Interpret the ISO 45001 requirements for an OH&S MS from the perspective of an implementer Initiate and plan the implementation of an OH&S MS based on ISO 45001, by utilizing PECB's IMS2 Methodology and other best practices Support an organization in operating, maintaining, and continually improving an OH&S MS based on ISO 45001 Prepare an organization to undergo a third-party certification audit This course is designed to equip you with the competence to establish, implement, manage, and maintain an occupational health and safety management system (OH&S MS) in accordance with ISO 45001:2018 requirements and guidance. This training course aims to provide an in-depth understanding of ISO 45001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of an OH&S MS. The ultimate ambition of this training course is to enable you to create the conditions for a safer workplace. Introduction to ISO 45001 and initiation of an OH&S MS implementation Training course objectives and structure Standards and regulatory frameworks Fundamental concepts and principles of OH&S Initiation of the OH&S MS implementation The organization and its context Implementation plan of an OH&S MS Leadership and worker participation OH&S MS scope OH&S policy and objectives Hazard identification and assessment of risks and opportunities Implementation of an OH&S MS Resource management Awareness and communication Documented information management Operations management Emergency preparedness and response OH&S MS performance evaluation, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit Management review Treatment of nonconformities and incidents Continual improvement Preparation for the certification audit Closing of the training course
Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for a wide range of managers and staff members who need to successfully manage small- to medium-sized projects. Overview Upon successful completion of this course, students will be able to: - plan the project and its parameters, including its scope, requirements, resources, and constraints. - implement the project plan, which includes putting the work of the project in motion and delegating tasks, and then monitoring the progress of the project and managing changes as they arise. In this course, students will identify methods of effectively managing small- to medium-sized projects and achieving their stated objectives. Planning the Project Define the Project Requirements Create Your Project Plan Implementing the Project Plan Execute the Project Plan Monitor the Progress of the Project Negotiate for Success Evaluate the Process