• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8812 Courses

Leading Scaled Agile Framework (SAFe)

By Nexus Human

Duration 2 Days 12 CPD hours Overview Lead the transformation to Business Agility with SAFe Become a Lean-Agile Leader Understand customer needs with Design Thinking Enable Agile Product Delivery Implement Lean Portfolio Management During this two-day course, attendees gain the knowledge necessary to lead a Lean-Agile enterprise by leveraging the Scaled Agile Framework© (SAFe©) and its underlying principles derived from Lean, systems thinking, Agile development, product development flow, and DevOps.Participants in the class gain insights into mastering Business Agility in order to thrive in the competitive market. They discuss how to establish team and technical agility and organize and re-organize around the flow of value. They also learn and practice the skills for supporting and executing PI Planning events and coordinating multiple Agile Release Trains (ARTs). Participants in the class explore the importance of adopting a customer-centric mindset and design thinking approach to agile product delivery. Learners also develop an understanding for implementing a Lean Portfolio Management function in their enterprise. During this two-day course, attendees gain the knowledge necessary to lead a Lean-Agile enterprise by leveraging the Scaled Agile Framework (SAFe) and its underlying principles derived from Lean, systems thinking, Agile development, product development flow, and DevOps. Participants in the class gain insights into mastering Business Agility in order to thrive in the competitive market. They discuss how to establish team and technical agility and organize and re-organize around the flow of value. They also learn and practice the skills for supporting and executing PI Planning events and coordinating multiple Agile Release Trains (ARTs). Participants in the class explore the importance of adopting a customer-centric mindset and design thinking approach to agile product delivery. Learners also develop an understanding for implementing a Lean Portfolio Management function in their enterprise.

Leading Scaled Agile Framework (SAFe)
Delivered OnlineFlexible Dates
Price on Enquiry

Leading People through Change (Virtual)

By IIL Europe Ltd

Leading People through Change (Virtual) Research shows that 70% of change initiatives fail in large organizations. The largest factor contributing to this failure rate is leadership - the inability to plan and lead people through change. In many change situations, tremendous focus is put on strategy, processes, and systems, while the issue of changing people's behavior is assumed it will 'just happen'. In this interactive course, you will learn why the people side of change is crucial. We will begin by understanding why and how people resist change, and how important it is to become strong and effective change champions. Next, we will focus on critical change management practices - creating our vision of the future state, planning for acceptance in our change audience and stakeholders, mitigating threats, and capitalizing on opportunities. We will use metrics to plan, show progress, and confirm success. Lastly, we will focus on the need to reinforce and sustain change, and to prevent relapse to old ways and methods. What you will Learn At the end of this program, you will be able to: Realize the nature of change and describe how resistance manifests in people Compare prevalent change models and categorize their similarities Identify and rate the skills, traits, and behaviors of effective change champions Envision the future state and assess stakeholders Plan for change communication, training, and risks Evaluate change effectiveness using feedback and metrics Develop reinforcement practices for benefits and communication Getting Started Foundation Concepts What is Change? Resistance to Change Common Change Management Theories Becoming a Change Champion Plan Envisioning the future state Planning for people Change management plan Do Change communication Training Piloting Risks Study Feedback Metrics Variance analysis Act Benefits realization Change sustainment Reinforcement messaging and communications Summary and Next Steps

Leading People through Change (Virtual)
Delivered OnlineFlexible Dates
Price on Enquiry

Weight Loss Motivation & Mindset: Lose Fat & Keep It Off

5.0(2)

By Institute of Beauty & Makeup

CPD Accredited | Career Oriented Learning Modules | 24x7 Tutor Support | Lifetime Access

Weight Loss Motivation & Mindset: Lose Fat & Keep It Off
Delivered Online On Demand1 hour
£12

Warehouse Management

4.8(9)

By Skill Up

The Warehouse Operative or warehouse management course equips individuals with fundamental competencies crucial for effective warehouse management.

Warehouse Management
Delivered Online On Demand3 hours 30 minutes
£13.99

Customer Excellence Training

By Beyond Theory: business training & coaching

leadership management training course customer service training

Customer Excellence Training
Delivered in Northampton or UK Wide or OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
Price on Enquiry

WM103 IBM Technical Introduction to IBM MQ

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This basic course is designed for system administrators, system architects, application developers, quality assurance specialists, and technical sales and marketing professionals. Overview After completing this course, you should be able to: Summarize current business drivers and the need for flexibility Describe enterprise messaging and the capabilities it must provide Identify the main ways that IBM© MQ can impact application design Describe the basic components of IBM© MQ Differentiate between point-to-point and IBM© MQ cluster connectivity Summarize queue manager and queue manager components administrative tasks Contrast the architectural role of IBM© MQ clusters and multiple instance queue managers Describe the security provisions of IBM© MQ and IBM© MQ Advanced Message Security Describe how IBM© MQ is used as part of the communications infrastructure to: Connect application environments, such as the World Wide Web, enterprise transaction systems, and database systems Manage the distribution of publisher information to appropriate subscribers Provide file transfer management with IBM© MQ Managed File Transfer Serve as a JMS provider Interface with WebSphere Application Server Store in-flight messages for IBM© Integration Bus Interact with z/OS applications Facilitate connectivity to mobile environments with IBM© MQ Telemetry Describe the options for deployment to the Cloud In this course, you learn about IBM© MQ V9 basic components and the path that messages follow when they are exchanged between applications. You also learn how IBM© MQ administrative responsibilities can include the management of topic-based publish/subscribe messaging, managed file transfer, and deployments to the cloud. Topics include an overview of the support that IBM© MQ provides for security, publish/subscribe, high availability, administration, logging, auditing, managed file transfer, MQTT, and cloud options. Course introductionIBM© MQ overviewIBM© MQ basicsMessaging styles, topologies, and architecture overviewSystem administration overviewSecurity overviewIntroduction to IBM© MQ Managed File TransferIntroduction to IBM© MQ Telemetry and IBM© MessageSightIntroduction to the IBM© MQ ApplianceExpanding the scope of IBM© MQCourse summary

WM103 IBM Technical Introduction to IBM MQ
Delivered OnlineFlexible Dates
Price on Enquiry

Building Successful Work Relationships (Second Edition)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Professionals desiring to improve working relationships and maximize cooperation and productivity will benefit from this course. Overview After completing this workshop, students will be able to: Describe the importance of effective work relationships Identify the interdependencies between you and your colleagues Communicate effectively to create rapport and connect with others Identify and maintain your network of professional relationships Develop collaborative, trust-based relationships that achieve meaningful results In the interdependent workplace, we rely on each other to get things done. A professional network isn?t something we can take for granted ? mapping work relationships can be a complex task and understanding different behavioral styles takes effort - but it pays off! Good working relationships means more than just reducing conflict and misunderstandings. It also means building trust, increasing influence, and benefitting from the knowledge and advice of co-workers and senior managers. This workshop will help you develop relationship building skills so you can communicate who you are, what you need, and why you need it in a way that builds trust, respect, and a professional reputation. The Importance of Work Relationships Expectations of Work Relationships The Value of Relationships Effects of Work Relationships Mapping Your Work Relationships A Network of Relationships Mapping Work Relationships Languages of Appreciation Identifying Interdependencies Clarifying Purpose Systems Thinking Analyzing Independencies Bridging Work Styles Understanding Behavioral Styles Strengths and Trouble Spots Bridging Different Styles Building Your Network Relationships, Communication, and Results Networking Principles Reputation Management Collaborating For Success Understanding Personalities Aspects of Trust Recognizing Blind Spots Additional course details: Nexus Humans Building Successful Work Relationships (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Successful Work Relationships (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Building Successful Work Relationships (Second Edition)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered OnlineFlexible Dates
Price on Enquiry

DP120 Data Protector 9.x Essentials

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Storage and system administrators using HP Data Protector software, System Engineers, Consultants, Project Managers, Professional Services, and Sales. Overview Upon successful completion of this course, you should be able to:Install and distribute HP Data Protector software in your environmentConfigure the HP Data Protector software productConfigure your tape and disk-based backup solutions for use with HP Data Protector softwareUse HP Data Protector software to run backups and restores, and monitor these sessions from both the Data Protector GUI and command lineManage the HP Data Protector software Internal Database (IDB)Create custom reports and notification proceduresSecure your installation by configuring user access and adding security to the Cell Manager and DP client systemsPrepare your client to recover from a disaster situationUnderstand the Data Protector processes and perform basic troubleshooting of your installation The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations. The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations. Additional course details: Nexus Humans DP120 Data Protector 9.x Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP120 Data Protector 9.x Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP120 Data Protector 9.x Essentials
Delivered OnlineFlexible Dates
Price on Enquiry