• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

37 Actor courses delivered Live Online

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Business Analysis - Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The Foundation course is designed for individuals who want to gain an overview of Business Analysis (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding of business analysis principles and techniques. Key areas are: the role and competencies of a business analyst strategy analysis business system and business process modelling stakeholder analysis investigation and modelling techniques requirements engineering business case development The business analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered. The Foundation Seminar gives a good introduction to the spectrum of this responsibility. COURSE INTRODUCTION * Let?s Get to Know Each Other * Course Overview * Course Learning Objectives * Course Structure * Course Agenda * Introduction to Business Analysis * Structure and Benefits of Business Analysis Foundation * Exam Details * Business Analysis Certification Scheme WHAT IS BUSINESS ANALYSIS? * Intent and Context * Origins of business analysis * The development of business analysis * The scope of business analysis work * Taking a holistic approach * The role and responsibilities of the business analyst THE COMPETENCIES OF A BUSINESS ANALYST * Personal qualities * Business knowledge * Professional techniques * The development of competencies STRATEGY ANALYSIS * The context for strategy * The defiition of strategy * Strategy development * External environmental analysis * Internal invironmental analysis * SWOT analysis * Executing strategy BUSINESS ANALYSIS PROCESS MODEL * An approach to problem solving * Stages of the business analysis process model * Objectives of the process model stages * Procedures for each process model stage * Techniques used within each process model stage INVESTIGATION TECHNIQUES * Interviews * Observation * Workshops * Scenarios * Prototyping * Quantitative approaches * Documenting the current situation STAKEHOLDER ANALYSIS AND MANAGEMENT * Stakeholder categories and identification * Analysing stakeholders * Stakeholder management strategies * Managing stakeholders * Understanding stakeholder perspectives * Business activity models MODELLING BUSINESS PROCESSES * Organizational context * An altrnative view of an organization * The organizational view of business processes * Value propositions * Process models * Analysing the as-is process model * Improving business processes (to-be business process) DEFINING THE SOLUTION * Gab analysis * Introduction to Business Architecture * Definition to Business Architecture * Business Architecture techniques BUSINESS AND FINANCIAL CASE * The business case in the project lifecycle * Identifying options * Assessing project feasibility * Structure of a business case * Investment appraisal ESTABLISHING THE REQUIREMENTS * A framework for requirements engineering * Actors in requirements engineering * Requirements elicitation * Requirements analysis * Requirements validation DOCUMENTING AND MANAGING THE REQUIREMENTS * The requirements document * The requirements catalogue * Managing requirements MODELLING THE REQUIREMENTS * Modelling system functions * Modelling system data DELIVERING THE REQUIREMENTS * Delivering the solution * Context * Lifecycles DELIVERING THE BUSINESS SOLUTION * BA role in the business change lifecycle * Design stage * Implementation stage * Realization stage

Business Analysis - Foundation
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including Students pursuing a technical degree Current IT professionals Recent college graduates with a technical degree Overview After taking this course, you should be able to Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst's perspective. Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. Explain the data that is available to the network security analyst. Describe the basic concepts and uses of cryptography. Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts. Understand common endpoint security technologies. Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors. Identify resources for hunting cyber threats. Explain the need for event data normalization and event correlation. Identify the common attack vectors. Identify malicious activities. Identify patterns of suspicious behaviors. Conduct security incident investigations. Explain the use of a typical playbook in the SOC. Explain the use of SOC metrics to measure the effectiveness of the SOC. Explain the use of a workflow management system and automation to improve the effectiveness of the SOC. Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT). Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format. The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. COURSE OUTLINE * Defining the Security Operations Center * Understanding Network Infrastructure and Network Security Monitoring Tools * Exploring Data Type Categories * Understanding Basic Cryptography Concepts * Understanding Common TCP/IP Attacks * Understanding Endpoint Security Technologies * Understanding Incident Analysis in a Threat-Centric SOC * Identifying Resources for Hunting Cyber Threats * Understanding Event Correlation and Normalization * Identifying Common Attack Vectors * Identifying Malicious Activity * Identifying Patterns of Suspicious Behavior * Conducting Security Incident Investigations * Using a Playbook Model to Organize Security Monitoring * Understanding SOC Metrics * Understanding SOC Workflow and Automation * Describing Incident Response * Understanding the Use of VERIS * Understanding Windows Operating System Basics * Understanding Linux Operating System Basics ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Salesforce Build Application Architect Expertise (ARC901)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce Application Architect credential, or for application architects looking to get more hands-on experience. Overview Design data models that scale gracefully Leverage Salesforce sharing mechanisms at an advanced level Evaluate the nuances of field types and pick the right one for the circumstances Make data model decisions that minimize record locking and other performance degradations Dive into the two cornerstone domains of being an Application Architect: Data Architecture and Management, and Sharing and Visibility. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. APPLICATION ARCHITECT OVERVIEW * Assess the Requirements to Become an Application Architect * Understand the Real-World Expectations of Application Architects * Review the Core Characteristics of Successful Application Architects SCENARIO INTRODUCTION * Review the Application Architecture Scenario * Identify Scenario Problem Areas * Identify Scenario Actors and Licensing ARCHITECTURE DOCUMENTATION * Understand Key Architecture Documentation Requirements * Learn About Best Practices for Artifact Documentation * Produce Architecture Documents DATA MODELING * Identify Relationship Types and Their Impact on Record Access, User Interface, and Reporting * Review the Considerations for Changing Field Types * Review the Considerations for Modifying Data Models with Schema Builder * Review the Considerations for Importing and Exporting Data * Identify Use Cases of External Objects * Determine an Appropriate Data Model * Understand Design Implications with Complex Environments and Large Data Volumes (LDV) DATA MANAGEMENT * Review the Considerations for Working with LDV * Review Data Lifecycle Concepts and Mechanisms * Review Master Data Management and System of Record Concepts * Review Data Migration, Planning, Preparation, and Execution * Identify Potential LDV and Calculate Expected Volumes * Go Further with Indexes Standard and Custom Skinny Tables * Lock Records SECURITY MODEL * Review the Considerations for Working with Internal and External Sharing Models * Restrict and Extend Object and Field Access * Determine Sharing Solutions * Identify Record Sharing Mechanisms (Declarative, Programmatic, Implicit) * Understand Teams Concepts (Account, Opportunity, Case) * Understand Person Accounts and Its Implication on Sharing * Encrypt Data SHARING IN COMMUNITIES * Understand Community Security Mechanisms * Secure Integration Endpoints * Integrate and Specify Connected Apps and Named Credentials ADVANCED SECURITY & VISIBILITY CONCEPTS * Implement Security & Visibility Controls with Apex and Visualforce * Review Territory Management and Its Implication on Data Management, Sharing, and Visibility * Review Divisions and Its Implication on Data Management, Sharing, and Visibility * Understand Security and Visibility Controls on 'Special' Objects SOLUTION DESIGN * Determine When to Leverage Standard Products Functionality vs. Custom Build vs. AppExchange * Understand Declarative and Programmatic Configuration * Get to Know the Order of Execution * Automate Business Processes * Consider Reporting and Analytics Needs * Consider How to Store and Access Content/Files * Apply Solution Design Concepts to Real-World Problems and Scenarios DEPLOYMENT & INTEGRATION BEST PRACTICES * Review the Application Lifecycle * Understand How Sandboxes Should Be Used * Review Deployment Options * Identify Integration Patterns WRAP-UP * Review a Practice Scenario * Review What Was Covered ADDITIONAL COURSE DETAILS: Nexus Humans Salesforce Build Application Architect Expertise (ARC901) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Application Architect Expertise (ARC901) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Build Application Architect Expertise (ARC901)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Business Analysis - Requirements Engineering

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of managing requirements (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Requirements Engineering principles and techniques. Key areas are: Requirements Engineering framework The hierarchy of requirements Key stakeholders in the framework Requirements elicitation Requirements modelling Requirements documentation Requirements analysis Requirements validation Requirements management The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The practical course provides in-depth knowledge and practice in Requirements Engineering. COURSE INTRODUCTION * Let?s Get to Know Each Other * Course Overview * Course Learning Objectives * Course Structure * Course Agenda * Introduction to Business Analysis * Structure and Benefits of Business Analysis Foundation * Exam Details * Business Analysis Certification Scheme WHAT IS BUSINESS ANALYSIS? * Intent and Context * Origins of business analysis * The development of business analysis * The scope of business analysis work * Taking a holistic approach * The role and responsibilities of the business analyst THE COMPETENCIES OF A BUSINESS ANALYST * Personal qualities * Business knowledge * Professional techniques * The development of competencies STRATEGY ANALYSIS * The context for strategy * The definition of strategy * Strategy development * External environmental analysis * Internal environmental analysis * SWOT analysis * Executing strategy BUSINESS ANALYSIS PROCESS MODEL * An approach to problem solving * Stages of the business analysis process model * Objectives of the process model stages * Procedures for each process model stage * Techniques used within each process model stage INVESTIGATION TECHNIQUES * Interviews * Observation * Workshops * Scenarios * Prototyping * Quantitative approaches * Documenting the current situation STAKEHOLDER ANALYSIS AND MANAGEMENT * Stakeholder categories and identification * Analysing stakeholders * Stakeholder management strategies * Managing stakeholders * Understanding stakeholder perspectives * Business activity models MODELLING BUSINESS PROCESSES * Organizational context * An altrnative view of an organization * The organizational view of business processes * Value propositions * Process models * Analysing the as-is process model * Improving business processes (to-be business process) DEFINING THE SOLUTION * Gab analysis * Introduction to Business Architecture * Definition to Business Architecture * Business Architecture techniques BUSINESS AND FINANCIAL CASE * The business case in the project lifecycle * Identifying options * Assessing project feasibility * Structure of a business case * Investment appraisal ESTABLISHING THE REQUIREMENTS * A framework for requirements engineering * Actors in requirements engineering * Requirements elicitation * Requirements analysis * Requirements validation DOCUMENTING AND MANAGING THE REQUIREMENTS * The requirements document * The requirements catalogue * Managing requirements MODELLING THE REQUIREMENTS * Modelling system functions * Modelling system data DELIVERING THE REQUIREMENTS * Delivering the solution * Context * Lifecycles DELIVERING THE BUSINESS SOLUTION * BA role in the business change lifecycle * Design stage * Implementation stage * Realization stage ADDITIONAL COURSE DETAILS: Nexus Humans Business Analysis - Requirements Engineering training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Requirements Engineering course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Analysis - Requirements Engineering
Delivered on-request, onlineDelivered Online
Price on Enquiry

Hyperledger Training - Developing on Hyperledger Fabric

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers Administrators Overview Understand why Blockchain is needed and where Explore the major components of Blockchain Learn about Hyperledger Fabric v1.1 and the structure of the Hyperledger Architecture Lean the features of the Fabric model including chaincode, SDKs, Ledger, Security and Membership Services Perform comprehensive labs on writing chaincode Explore the architecture of Hyperledger Fabric v1.1 Understand and perform in depth labs on Bootstrapping the Network Gain a detailed understanding of the benefits, components and architecture of Hyperledger Composer Learn Hyperledger Explorer and Hyperledger Composer Playground Perform comprehensive labs to integrate/develop an application with Hyperledger Fabric running a smart contract Build applications on Hyperledger Fabric v1.1 This instructor-led Hyperledger training course is designed for developers and administrators who want to take a comprehensive deep dive on Hyperledger Fabric and Hyperledger Composer. This Hyperledger training course has several comprehensive labs, giving you real world experience.In 3 days, you will learn the need for blockchain applications, where blockchain is used, and about Hyperledger Fabric, the open source framework for developing blockchain applications and solutions with a modular architecture. INTRODUCTION TO BLOCKCHAIN * Introduction to Blockchain * What is Blockchain * Types of network * Public network * Permissioned network * Private network * Need for Blockchain Components of Blockchain * Consensus * Provenance * Immutability * Finality * Where can Blockchain be used * Example on Blockchain HOW BLOCKCHAIN WORKS * How Blockchain Works * Structure of Blockchain * Block * Hash * Blockchain * Distributed * Lifecycle of Blockchain * Smart Contract * Consensus Algorithm * Proof of Work * Proof of Stake * Practical Byzantine * Fault Tolerance * Actors of Blockchain * Blockchain developer * Blockchain operator * Blockchain regulator * Blockchain user * Membership service provider * Building A Small Blockchain Application INTRODUCTION TO HYPERLEDGER FABRIC V1.1 * Introduction to Hyperledger * What is Hyperledger * Why Hyperledger * Where can Hyperledger be used * Hyperledger Architecture * Membership * Blockchain * Transaction * Chaincode * Hyperledger Fabric * Features of Hyperledger * Fabric Installation of prerequisite GETTING STARTED WITH FABRIC MODEL * The Fabric Model * Features of Fabric Model * Chaincode * SDKs * Ledger * Privacy through channels * Security and Membership services * Assets * Consensus * Components of Fabric Model * Peer * Orderer * Certificate Authority * Building your network CHAINCODE * Chaincode * Chaincode API * How to write a Chaincode * Lab Work ARCHITECTURE OF HYPERLEDGER FABRIC V1.1 * Architecture of Hyperledger Fabric * Transaction * Ledger * Nodes * Peer * Endorser * Ordering Nodes * Channels * Certificate Authority * Transaction Flow * Lab Work BOOTSTRAPPING * Bootstrapping the Network * Introduction * Lab Work * Task 1 - Generate the crypto material for the various participants. * Task 2 - Generate the genesis block for the Orderer node and start ordering service (solo node). * Task 3 - Generated the configuration transaction block to create a new channel. * Task 4 - Sign the configuration block and create the new channel. * Task 5 - Make peers of all the organizations join the channel that we created in Task 4 INTRODCUTION TO HYPERLEDGER EXPLORER * Introduction To Hyperledger Explorer * Block Details Peer List * Chaincode List * Transaction Details * Installation of Hyperledger Explorer * Starting the Explorer App INTRODUCTION TO HYPERLEDGER COMPOSER * Introduction * Components of Hyperledger Composer * Benefits of Hyperledger Composer * Key Concepts * Hyperledger Composer Solution * Installation HYPERLEDGER COMPOSER PLAYGROUND * Hyperledger Composer Playground * Introduction * Playground Overview Lab Work ADDITIONAL COURSE DETAILS: Nexus Humans Hyperledger Training - Developing on Hyperledger Fabric training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Hyperledger Training - Developing on Hyperledger Fabric course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Hyperledger Training - Developing on Hyperledger Fabric
Delivered on-request, onlineDelivered Online
Price on Enquiry

Intercultural management

By Underscore Group

Why cultural differences exist, what you can do to understand and respect these differences and then implement strategies to build effective intercultural relationships.Learn the skills, knowledge and have the confidence to tackle difficult conversations in a productive way. -------------------------------------------------------------------------------- COURSE OVERVIEW Duration: 1 day (6.5 hours) This workshop is designed for those who deal on a regular basis with fellow employees, suppliers or customers from different cultural backgrounds. The workshop will focus on understanding why cultural differences exist, what you can do to understand and respect these differences and then implement strategies to build effective intercultural relationships. The one day session will use professional actors in the afternoon so that you can practice real-life situations involving intercultural challenges. OBJECTIVES  By the end of the course you will be able to: * Understand what makes us different from people from other cultures * Appreciate why we form impressions of other cultures * Use strategies to communicate effectively with those from different cultural backgrounds * Build trust with those we work with from a different cultural background CONTENT INTERCULTURAL CHALLENGES * What challenges do you face with dealing with people from different cultures? * Why do these challenges exist? UNDERSTANDING CULTURE  * What is culture? * Trompenaars’ Model of Culture – what determines our understanding of different cultures CULTURAL THEORIES  * Hall and Hall: * Three Systems of Time * The Importance of Context – Data vs Dialogue * Hofstede – 6 Cultural Dimensions * Trompenaars – 7 Cultural Dimensions * Chart your intercultural business relationships against these dimensions STRATEGIES AND INTERCULTURAL MANAGEMENT * Trompenaar’s 3 step approach – Recognise, Respect, Reconcile * How to foster and maintain trust * Effective intercultural communication strategies PRACTICAL ACTIVITIES * Professional actors will work with you in small groups in the afternoon to practice real-life challenging conversations.

Intercultural management
Delivered in-person, on-request, onlineDelivered Online & In-Person in Horsham
Price on Enquiry

Handling challenging conversations

By Underscore Group

Learn the skills, knowledge and have the confidence to tackle difficult conversations in a productive way. -------------------------------------------------------------------------------- Course overview Duration: 1 day (6.5 hours) Do you worry about how to give negative feedback or deal with performance issues? Are you concerned about giving bad news? This workshop is designed to give you the skills, knowledge and confidence to tackle these scenarios in a productive way. If you are a people manager, team leader or supervisor looking to make those challenging conversations less stressful and more effective, this workshop is for you. Lots of practical sessions will ensure you have the opportunity to relate your learning to your real life work situations. The one day session will use professional actors in the afternoon so that you can practice handling real-life challenging conversations. Objectives  By the end of the course you will be able to: * Deal with a wide range of challenging conversations * Describe the preferred behavioural style for giving feedback * State the most appropriate influencing technique to use in your situations * Explain how to give successful constructive feedback CONTENT WHAT ARE CHALLENGING CONVERSATIONS * What type of challenging conversations occur? * Why do we find them challenging? COMMUNICATION  * Practical exercise to demonstrate and act as a refresher of the fundamentals of communication * Barriers to communication especially in a difficult discussion CHOOSING THE RIGHT BEHAVIOURAL STYLE * Refresher of assertiveness and why it is important in this context * Practical exercise demonstrating how behaviour breeds behaviour, and the impact of choosing an inappropriate style * Steps to using assertive behaviour INFLUENCING * Cialdini’s model for influence * How to use influencing techniques in handling challenging conversations * Practical application FEEDBACK  * Understanding feedback – positive vs. negative * Using the ABCBC model for feedback * Using the basics of emotional intelligence to give effective feedback * Practical application PRACTICAL ACTIVITIES * Professional actors will work with you in small groups in the afternoon to practice real-life challenging conversations.

Handling challenging conversations
Delivered in-person, on-request, onlineDelivered Online & In-Person in Horsham
Price on Enquiry

Educators matching "Actor"

Show all 320