• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

116 Business Continuity Management courses

Certified Information Systems Auditor (CISA)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THE INTENDED AUDIENCE FOR THIS COURSE IS INFORMATION SYSTEMS SECURITY PROFESSIONALS, INTERNAL REVIEW AUDITORS, AND OTHER INDIVIDUALS WHO HAVE AN INTEREST IN ASPECTS OF INFORMATION SYSTEMS AUDIT, CONTROLS, AND SECURITY. OVERVIEW UPON SUCCESSFUL COMPLETION OF THIS COURSE, STUDENTS WILL BE ABLE TO: - IMPLEMENT INFORMATION SYSTEMS AUDIT SERVICES IN ACCORDANCE WITH INFORMATION SYSTEMS AUDIT STANDARDS, GUIDELINES, AND BEST PRACTICES. - EVALUATE AN ORGANIZATIONS STRUCTURE, POLICIES, ACCOUNTABILITY, MECHANISMS, AND MONITORING PRACTICES. - EVALUATE INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION. - EVALUATE THE INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT OF AN ORGANIZATION; AND EVALUATE THE BUSINESS CONTINUITY AND DISASTER RECOVERY PROCESSES USED TO PROVIDE ASSURANCE THAT IN THE EVENT OF A DISRUPTION, IT SERVICES ARE MAINTAINED. - DEFINE THE PROTECTION POLICIES USED TO PROMOTE THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF INFORMATION ASSETS. DESCRIPTION IN THIS COURSE, STUDENTS WILL EVALUATE ORGANIZATIONAL POLICIES, PROCEDURES, AND PROCESSES TO ENSURE THAT AN ORGANIZATIONS INFORMATION SYSTEMS ALIGN WITH ITS OVERALL BUSINESS GOALS AND OBJECTIVES. 1 - THE PROCESS OF AUDITING INFORMATION SYSTEMS * ISACA Information Systems Auditing Standards and Guidelines * Fundamental Business Processes * Develop and Implement an Information Systems Audit Strategy * Plan an Audit * Conduct an Audit * The Evidence Life Cycle * Communicate Issues, Risks, and Audit Results * Support the Implementation of Risk Management and Control Practices 2 - IT GOVERNANCE AND MANAGEMENT * Evaluate the Effectiveness of IT Governance * Evaluate the IT Organizational Structure and HR Management * Evaluate the IT Strategy and Direction * Evaluate IT Policies, Standards, and Procedures * Evaluate the Effectiveness of Quality Management Systems * Evaluate IT Management and Monitoring of Controls * IT Resource Investment, Use, and Allocation Practices * Evaluate IT Contracting Strategies and Policies * Evaluate Risk Management Practices * Performance Monitoring and Assurance Practices * Evaluate the Organizations Business Continuity Plan 3 - INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION * Evaluate the Business Case for Change * Evaluate Project Management Frameworks and Governance Practices * Development Life Cycle Management * Perform Periodic Project Reviews * Evaluate Control Mechanisms for Systems * Evaluate Development and Testing Processes * Evaluate Implementation Readiness * Evaluate a System Migration * Perform a Post-Implementation System Review 4 - INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT * Perform Periodic System Reviews * Evaluate Service Level Management Practices * Evaluate Third-Party Management Practices * Evaluate Operations and End User Management Practices * Evaluate the Maintenance Process * Evaluate Data Administration Practices * Evaluate the Use of Capacity and Performance Monitoring Methods * Evaluate Change, Configuration, and Release Management Practices * Evaluate Problem and Incident Management Practices * Evaluate the Adequacy of Backup and Restore Provisions 5 - PROTECTION OF INFORMATION ASSETS * Information Security Design * Encryption Basics * Evaluate the Functionality of the IT Infrastructure * Evaluate Network Infrastructure Security * Evaluate the Design, Implementation, and Monitoring of Logical Access Controls * Risks and Controls of Virtualization * Evaluate the Design, Implementation, and Monitoring of Data Classification Process * Evaluate the Design, Implementation, and Monitoring of Physical Access Controls * Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered Online6 days, May 13th, 13:00 + 2 more
£3250

CompTIA Network+

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR ENTRY-LEVEL COMPUTER SUPPORT PROFESSIONALS WITH A BASIC KNOWLEDGE OF COMPUTER HARDWARE, SOFTWARE, AND OPERATING SYSTEMS WHO WISH TO INCREASE THEIR KNOWLEDGE AND UNDERSTANDING OF NETWORKING CONCEPTS AND ACQUIRE THE REQUIRED SKILLS TO PREPARE FOR A CAREER IN NETWORK SUPPORT OR ADMINISTRATION, OR WHO WISH TO PREPARE FOR THE COMPTIA NETWORK+ CERTIFICATION. COMPTIA NETWORK+ IS THE FIRST CERTIFICATION IT PROFESSIONALS SPECIALIZING IN NETWORK ADMINISTRATION AND SUPPORT SHOULD EARN. NETWORK+ IS AIMED AT IT PROFESSIONALS WITH JOB ROLES SUCH AS NETWORK ADMINISTRATOR, NETWORK TECHNICIAN, NETWORK INSTALLER, HELP DESK TECHNICIAN, AND IT CABLE INSTALLER. THIS COURSE IS ALSO DESIGNED FOR STUDENTS WHO ARE SEEKING THE COMPTIA NETWORK+ CERTIFICATION AND WHO WANT TO PREPARE FOR THE COMPTIA NETWORK+ N10-008 CERTIFICATION EXAM. OVERVIEW IN THIS COURSE, YOU WILL DESCRIBE THE MAJOR NETWORKING TECHNOLOGIES AND SYSTEMS OF MODERN NETWORKS AND CONFIGURE, MANAGE, AND TROUBLESHOOT MODERN NETWORKS. EXPLAIN THE OSI AND TCP/IP MODELS. EXPLAIN PROPERTIES OF NETWORK TRAFFIC. INSTALL AND CONFIGURE SWITCHED NETWORKS. CONFIGURE IP NETWORKS. INSTALL AND CONFIGURE ROUTED NETWORKS. CONFIGURE AND MONITOR PORTS AND PROTOCOLS. EXPLAIN NETWORK APPLICATION AND STORAGE ISSUES. MONITOR AND TROUBLESHOOT NETWORKS. EXPLAIN NETWORK ATTACKS AND MITIGATIONS. INSTALL AND CONFIGURE SECURITY DEVICES. EXPLAIN AUTHENTICATION AND ACCESS CONTROLS. DEPLOY AND TROUBLESHOOT CABLING SOLUTIONS. IMPLEMENT AND TROUBLESHOOT WIRELESS TECHNOLOGIES. COMPARE AND CONTRAST WAN TECHNOLOGIES. USE REMOTE ACCESS METHODS. IDENTIFY SITE POLICIES AND BEST PRACTICES. DESCRIPTION COMPTIA'S NETWORK+ CERTIFICATION IS A FOUNDATION-LEVEL CERTIFICATION DESIGNED FOR IT PROFESSIONALS WITH AROUND ONE YEAR OF EXPERIENCE, WHOSE JOB ROLE IS FOCUSED ON NETWORK ADMINISTRATION. THE COMPTIA NETWORK+ EXAM WILL CERTIFY THE SUCCESSFUL CANDIDATE HAS THE KNOWLEDGE AND SKILLS REQUIRED TO TROUBLESHOOT, CONFIGURE, AND MANAGE COMMON NETWORK DEVICES; ESTABLISH BASIC NETWORK CONNECTIVITY; UNDERSTAND AND MAINTAIN NETWORK DOCUMENTATION; IDENTIFY NETWORK LIMITATIONS AND WEAKNESSES; AND IMPLEMENT NETWORK SECURITY, STANDARDS, AND PROTOCOLS. THE CANDIDATE WILL HAVE A BASIC UNDERSTANDING OF ENTERPRISE TECHNOLOGIES, INCLUDING CLOUD AND VIRTUALIZATION TECHNOLOGIES. THE OFFICIAL COMPTIA© NETWORK+© (EXAM N10-008): WILL TEACH YOU THE FUNDAMENTAL PRINCIPLES OF INSTALLING, CONFIGURING, AND TROUBLESHOOTING NETWORK TECHNOLOGIES AND HELP YOU TO PROGRESS A CAREER IN NETWORK ADMINISTRATION. IN THIS COURSE, YOU WILL BUILD ON YOUR EXISTING USER-LEVEL KNOWLEDGE AND EXPERIENCE WITH PERSONAL COMPUTER OPERATING SYSTEMS AND NETWORKS TO MASTER THE FUNDAMENTAL SKILLS AND CONCEPTS THAT YOU WILL NEED TO USE ON THE JOB IN ANY TYPE OF NETWORKING CAREER. PREREQUISITES * COMPTIA A+ CERTIFICATION (EXAMS 220-1001 AND 220-1002) 1 - EXPLAINING THE OSI AND TCP/IP MODELS * Topic A: Explain OSI Model Layers * Topic B: Explain the TCP/IP Suite 2 - EXPLAINING PROPERTIES OF NETWORK TRAFFIC * Topic A: Explain Media Types and Access Methods * Topic B: Deploy Ethernet Standards * Topic C: Configure and Monitor Network Interfaces 3 - INSTALLING AND CONFIGURING SWITCHED NETWORKS * Topic A: Install and Configure Hubs and Bridges * Topic B: Install and Configure Switches * Topic C: Compare and Contrast Network Topologies * Topic D: Compare and Contrast Network Types 4 - CONFIGURING IP NETWORKS * Topic A: Configure IPv4 Addressing Components * Topic B: Test IP Interfaces with Command Line Tools * Topic C: Configure IPv4 Subnets * Topic D: Configure Private and Public IPv4 Addressing Schemes * Topic E: Configure IPv6 Addressing Components * Topic F: Configure DHCP Services 5 - INSTALLING AND CONFIGURING ROUTED NETWORKS * Topic A: Explain Characteristics of Routing * Topic B: Install and Configure Routers 6 - CONFIGURING AND MONITORING PORTS AND PROTOCOLS * Topic A: Explain the Uses of Ports and Protocols * Topic B: Use Port Scanners and Protocol Analyzers * Topic C: Explain the Use of Name Resolution Services * Topic D: Configure DNS and IPAM Services 7 - EXPLAINING NETWORK APPLICATION AND STORAGE SERVICES * Topic A: Explain the Uses of Network Applications * Topic B: Explain the Uses of Voice Services and Advanced Networking Devices * Topic C: Explain the Uses of Virtualization and Network Storage Services * Topic D: Summarize the Concepts of Cloud Services 8 - MONITORING AND TROUBLESHOOTING NETWORKS * Topic A: Monitor Network Interfaces and Logs * Topic B: Explain Network Troubleshooting Methodology * Topic C: Troubleshoot Common Network Services Issues 9 - EXPLAINING NETWORKING ATTACKS AND MITIGATIONS * Topic A: Summarize Common Networking Attacks * Topic B: Explain the Characteristics of VLANs * Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - INSTALLING AND CONFIGURING SECURITY DEVICES * Topic A: Install and Configure Firewalls and Proxies * Topic B: Explain the Uses of IDS/IPS and UTM 11 - EXPLAINING AUTHENTICATION AND ACCESS CONTROLS * Topic A: Explain Authentication Controls and Attacks * Topic B: Explain the Uses of Authentication Protocols and Directory Services * Topic C: Explain the Uses of Port Security and NAC * Topic D: Implement Network Device Hardening * Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - DEPLOYING AND TROUBLESHOOTING CABLING SOLUTIONS * Topic A: Deploy Structured Cabling Systems * Topic B: Deploy Twisted Pair Cabling Solutions * Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions * Topic D: Deploy Fiber Optic Cabling Solutions 13 - IMPLEMENTING AND TROUBLESHOOTING WIRELESS TECHNOLOGIES * Topic A: Install and Configure Wireless Technologies * Topic B: Troubleshoot Wireless Performance Issues * Topic C: Secure and Troubleshoot Wireless Connectivity 14 - COMPARING AND CONTRASTING WAN TECHNOLOGIES * Topic A: Compare and Contrast WAN Core Service Types * Topic B: Compare and Contrast WAN Subscriber Service Types * Topic C: Compare and Contrast WAN Framing Service Types * Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - USING REMOTE ACCESS METHODS * Topic A: Use Remote Access VPNs * Topic B: Use Remote Access Management Methods 16 - IDENTIFYING SITE POLICIES AND BEST PRACTICES * Topic A: Manage Networks with Documentation and Diagrams * Topic B: Summarize the Purposes of Physical Security Devices * Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts * Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online6 days, May 13th, 13:00 + 23 more
£2475

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR SUCCESSFUL STUDENTS HAVE EXPERIENCE AND KNOWLEDGE IN IT OPERATIONS, INCLUDING NETWORKING, VIRTUALIZATION, IDENTITY, SECURITY, BUSINESS CONTINUITY, DISASTER RECOVERY, DATA PLATFORMS, AND GOVERNANCE. STUDENTS ALSO HAVE EXPERIENCE DESIGNING AND ARCHITECTING SOLUTIONS. BEFORE ATTENDING THIS COURSE, STUDENTS MUST HAVE PREVIOUS EXPERIENCE DEPLOYING OR ADMINISTERING AZURE RESOURCES AND STRONG CONCEPTUAL KNOWLEDGE OF: * AZURE COMPUTE TECHNOLOGIES SUCH AS VMS, CONTAINERS AND SERVERLESS SOLUTIONS * AZURE VIRTUAL NETWORKING TO INCLUDE LOAD BALANCERS * AZURE STORAGE TECHNOLOGIES (UNSTRUCTURED AND DATABASES) * GENERAL APPLICATION DESIGN CONCEPTS SUCH AS MESSAGING AND HIGH AVAILABILITY DESCRIPTION THIS COURSE TEACHES AZURE SOLUTION ARCHITECTS HOW TO DESIGN INFRASTRUCTURE SOLUTIONS. COURSE TOPICS COVER GOVERNANCE, COMPUTE, APPLICATION ARCHITECTURE, STORAGE, DATA INTEGRATION, AUTHENTICATION, NETWORKS, BUSINESS CONTINUITY, AND MIGRATIONS. THE COURSE COMBINES LECTURE WITH CASE STUDIES TO DEMONSTRATE BASIC ARCHITECT DESIGN PRINCIPLES. PREREQUISITES BEFORE ATTENDING THIS COURSE, STUDENTS MUST HAVE PREVIOUS EXPERIENCE DEPLOYING OR ADMINISTERING AZURE RESOURCES AND CONCEPTUAL KNOWLEDGE OF: AZURE ACTIVE DIRECTORY AZURE COMPUTE TECHNOLOGIES SUCH AS VMS, CONTAINERS AND SERVERLESS SOLUTIONS AZURE VIRTUAL NETWORKING TO INCLUDE LOAD BALANCERS AZURE STORAGE TECHNOLOGIES (UNSTRUCTURED AND DATABASES) GENERAL APPLICATION DESIGN CONCEPTS SUCH AS MESSAGING AND HIGH AVAILABILITY AZ-104T00 - MICROSOFT AZURE ADMINISTRATOR 1 - DESIGN GOVERNANCE * Design for governance * Design for management groups * Design for subscriptions * Design for resource groups * Design for resource tags * Design for Azure Policy * Design for role-based access control (RBAC) * Design for Azure landing zones 2 - DESIGN AN AZURE COMPUTE SOLUTION * Choose an Azure compute service * Design for Azure Virtual Machines solutions * Design for Azure Batch solutions * Design for Azure App Service solutions * Design for Azure Container Instances solutions * Design for Azure Kubernetes Service solutions * Design for Azure Functions solutions * Design for Azure Logic Apps solutions 3 - DESIGN A DATA STORAGE SOLUTION FOR NON-RELATIONAL DATA * Design for data storage * Design for Azure storage accounts * Design for data redundancy * Design for Azure Blob Storage * Design for Azure Files * Design for Azure managed disks * Design for storage security 4 - DESIGN A DATA STORAGE SOLUTION FOR RELATIONAL DATA * Design for Azure SQL Database * Design for Azure SQL Managed Instance * Design for SQL Server on Azure Virtual Machines * Recommend a solution for database scalability * Recommend a solution for database availability * Design security for data at rest, data in motion, and data in use * Design for Azure SQL Edge * Design for Azure Cosmos DB and Table Storage 5 - DESIGN DATA INTEGRATION * Design a data integration solution with Azure Data Factory * Design a data integration solution with Azure Data Lake * Design a data integration and analytic solution with Azure Databricks * Design a data integration and analytic solution with Azure Synapse Analytics * Design strategies for hot, warm, and cold data paths * Design an Azure Stream Analytics solution for data analysis 6 - DESIGN AN APPLICATION ARCHITECTURE * Describe message and event scenarios * Design a messaging solution * Design an Azure Event Hubs messaging solution * Design an event-driven solution * Design a caching solution * Design API integration * Design an automated app deployment solution * Design an app configuration management solution 7 - DESIGN AUTHENTICATION AND AUTHORIZATION SOLUTIONS * Design for identity and access management (IAM) * Design for Microsoft Entra ID * Design for Microsoft Entra business-to-business (B2B) * Design for Azure Active Directory B2C (business-to-customer) * Design for conditional access * Design for identity protection * Design for access reviews * Design service principals for applications * Design managed identities * Design for Azure Key Vault 8 - DESIGN A SOLUTION TO LOG AND MONITOR AZURE RESOURCES * Design for Azure Monitor data sources * Design for Azure Monitor Logs (Log Analytics) workspaces * Design for Azure Workbooks and Azure insights * Design for Azure Data Explorer 9 - DESIGN NETWORK SOLUTIONS * Recommend a network architecture solution based on workload requirements * Design patterns for Azure network connectivity services * Design outbound connectivity and routing * Design for on-premises connectivity to Azure Virtual Network * Choose an application delivery service * Design for application delivery services * Design for application protection services 10 - DESIGN A SOLUTION FOR BACKUP AND DISASTER RECOVERY * Design for backup and recovery * Design for Azure Backup * Design for Azure blob backup and recovery * Design for Azure files backup and recovery * Design for Azure virtual machine backup and recovery * Design for Azure SQL backup and recovery * Design for Azure Site Recovery 11 - DESIGN MIGRATIONS * Evaluate migration with the Cloud Adoption Framework * Describe the Azure migration framework * Assess your on-premises workloads * Select a migration tool * Migrate your structured data in databases * Select an online storage migration tool for unstructured data * Migrate offline data 12 - INTRODUCTION TO THE MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK * Azure Well-Architected Framework pillars * Cost optimization * Operational excellence * Performance efficiency * Reliability * Security 13 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - COST OPTIMIZATION * Develop cost-management discipline * Design with a cost-efficiency mindset * Design for usage optimization * Design for rate optimization * Monitor and optimize over time 14 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - OPERATIONAL EXCELLENCE * Embrace DevOps culture * Establish development standards * Evolve operations with observability * Deploy with confidence * Automate for efficiency * Adopt safe deployment practices 15 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - PERFORMANCE EFFICIENCY * Negotiate realistic performance targets * Design to meet capacity requirements * Achieve and sustain performance * Improve efficiency through optimization 16 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - RELIABILITY * Design for business requirements * Design for resilience * Design for recovery * Design for operations * Keep it simple 17 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - SECURITY * Plan your security readiness * Design to protect confidentiality * Design to protect integrity * Design to protect availability * Sustain and evolve your security posture 18 - GETTING STARTED WITH THE MICROSOFT CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Common blockers 19 - PREPARE FOR SUCCESSFUL CLOUD ADOPTION WITH A WELL-DEFINED STRATEGY * Customer narrative * Capture strategic motivation * Define objectives and key results * Evaluate financial considerations * Understand technical considerations * Create a business case 20 - PREPARE FOR CLOUD ADOPTION WITH A DATA-DRIVEN PLAN * Customer narrative 21 - CHOOSE THE BEST AZURE LANDING ZONE TO SUPPORT YOUR REQUIREMENTS FOR CLOUD OPERATIONS * Customer narrative * Common operating models * Design areas for Azure landing zones * Design principles for Azure landing zones * Journey to the target architecture * Choose an Azure landing zone option * Deploy the Azure landing zone accelerator * Enhance your landing zone 22 - MIGRATE TO AZURE THROUGH REPEATABLE PROCESSES AND COMMON TOOLS * Customer narrative * Migration process * Migration tools * Common tech platforms 23 - ADDRESS TANGIBLE RISKS WITH THE GOVERN METHODOLOGY OF THE CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Govern methodology * Corporate policies * Governance disciplines * Deploy a cloud governance foundation * The Cost Management discipline 24 - ENSURE STABLE OPERATIONS AND OPTIMIZATION ACROSS ALL SUPPORTED WORKLOADS DEPLOYED TO THE CLOUD * Establish business commitments * Deploy an operations baseline * Protect and recover * Enhance an operations baseline * Manage platform and workload specialization 25 - INNOVATE APPLICATIONS BY USING AZURE CLOUD TECHNOLOGIES * Follow the innovation lifecycle * Azure technologies for the build process * Infuse your applications with AI * Azure technologies for measuring business impact * Azure technologies for the learn process 26 - PREPARE FOR CLOUD SECURITY BY USING THE MICROSOFT CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Methodology * Security roles and responsibilities * Simplify compliance and security * Simplify security implementation * Security tools and policies ADDITIONAL COURSE DETAILS: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered Online5 days, May 14th, 13:00 + 6 more
£2380

Certified Data Center Facilities Operations Manager (CDFOM)

By Nexus Human

DURATION 3 DAYS 18 CPD HOURS THIS COURSE IS INTENDED FOR THE PRIMARY AUDIENCE FOR THIS COURSE IS SOMEONE WHO WORKS, OR HAS AMBITION TO WORK, IN A LEADERSHIP ROLE IN DATA CENTER OPERATIONS SUCH AS A DATA CENTER FACILITIES MANAGER, DATA CENTER OPERATIONS MANAGER, WHO HAS THE RESPONSIBILITY TO ACHIEVE AND IMPROVE THE HIGH-AVAILABILITY AND MANAGEABILITY OF THE DATA CENTER OPERATIONS. OVERVIEW AFTER COMPLETION OF THE COURSE THE PARTICIPANT WILL BE ABLE TO: PERFORM THE NEEDS ANALYSIS TRANSLATING BUSINESS REQUIREMENTS TO DATA CENTER SERVICES SET-UP AND MANAGE THE DATA CENTER OPERATIONS TEAM IMPLEMENT AND MONITOR SAFETY- AND SECURITY PRACTICES IDENTIFY A SUITABLE MAINTENANCE PROGRAM FOR THE DATA CENTER FACILITY AND ITS EQUIPMENT SELECT THE APPROPRIATE POLICIES AND PROCEDURES REQUIRED FOR DATA CENTER OPERATIONS MONITOR THE DATA CENTER AVAILABILITY, CAPACITY AND CAPABILITY MANAGE AND IMPLEMENT BASIC DATA CENTER PROJECTS SET-UP AND IMPLEMENT AN ENVIRONMENTAL SUSTAINABILITY PROGRAM SELECT AN APPROPRIATE BACK-UP SITE TO SUPPORT ORGANIZATIONAL RESILIENCE IDENTIFY AND RESPOND TO RISK IN THE DATA CENTER MANAGE AND SUPPORT THE DOCUMENT LIFE CYCLE CREATE A BASIC BUDGET PROPOSAL SELECT AND MANAGE VENDORS AND MEASURE THEIR PERFORMANCE MANAGE DATA CENTER ASSETS DESCRIPTION MANAGING THE FACILITIES OF TODAY?S HIGH-END AND HIGH-AVAILABILITY DATA CENTERS IS AN EXTREMELY DEMANDING AND COMPLEX TASK WHICH IS OFTEN UNDERESTIMATED. THERE IS OFTEN VERY LITTLE APPRECIATION AND UNDERSTANDING OF THE COMPLEXITIES OF MANAGING TODAY'S MISSION-CRITICAL DATA CENTERS WHERE DOWNTIME IS NOT AN OPTION, ESPECIALLY SINCE MANY OF THE DATA CENTERS ARE OPERATING AT, OR NEAR, THEIR DESIGN LIMITS. OPERATIONS MANAGEMENT AT THE FACILITIES LAYER MAKES ALL THE DIFFERENCE. EVEN A DATA CENTER DESIGNED TO THE HIGHEST REDUNDANCY LEVEL AS PER THE ANSI/TIA-942 STANDARD COULD STILL EXPERIENCE MANY UNSCHEDULED DOWNTIME EVENTS DUE TO POOR PLANNING, OPERATIONS, MAINTENANCE AND MANAGEMENT PROCESSES. SERVICE LEVEL MANAGEMENT * Service Level Management * Needs analysis * Capability assessment * Service portfolio * Service catalogue * Service Level Agreements (SLAs) * Availability measurement * Data points in SLA * Service reporting * Complaint procedure * Customer satisfaction measurement * Service Improvement Process (SIP) * SLA content THE DATA CENTER ORGANIZATION * Operational issues * Organization chart * Roles and responsibilities * Skills matrix * Contingency / backup roles * Shift management * Performance management * Career development * Training and assessment * Job rotation * Succession planning * Disciplinary program MANAGING SAFETY & STATUTORY REQUIREMENTS * Safety policies and regulations * Occupational Health and Safety (OH&S) * Safety awareness training * Permit to Work (PTW) * Lock-out / Tag-out * Personal Protective Equipment (PPE) * Testing and tagging of equipment * Emergency preparedness and response * Reporting of safety issues * Reviews / internal audit / external audit MANAGING PHYSICAL SECURITY * Security policies and procedures * Security standards and guidelines * Security staff * Security awareness * Security incident management * Disciplinary program * Reviews, internal and external audits FACILITIES MANAGEMENT * Maintenance policies and procedures * Various maintenance programs * Outsourcing of maintenance activities * Maintenance contract options * Warranty * Maintenance schedule * Service situations * Spart part management * Contamination control DATA CENTER OPERATIONS * Policies and procedures for data center operations * Service operations and the daily data center operations MONITORING / REPORTING / CONTROL * Monitoring requirements * Escalation procedures * Reporting * Trend analysis * Reviews PROJECT MANAGEMENT * Project management * Project organization * Project manager * Project phases ENVIRONMENT SUSTAINABILITY * The importance of sustainability * Sustainability policies * Environmental management * Power efficiency indicators - * Waste management - * Water management * ICT utilisation management * Environmental performance measurements * Renewable energy factor (REF) ORGANIZATIONAL RESILIENCE * Business continuity * Data center facility options * Business Impact Analysis * Type of facility * Human resources * Facility, equipment and consumables GOVERNANCE, RISK AND COMPLIANCE * Management commitment * Coordination, collaboration and integration * Compliance * Risk management * Document management * Financial management * Vendor management * Asset management ADDITIONAL COURSE DETAILS: Nexus Humans Certified Data Center Facilities Operations Manager (CDFOM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Center Facilities Operations Manager (CDFOM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Center Facilities Operations Manager (CDFOM)
Delivered Online4 days, May 15th, 07:00 + 2 more
£2050

Business Continuity Management Level 3

By Course Cloud

The innovative Business Continuity Management Level 3 has been compiled with the assistance and expertise of industry professionals. It has been carefully crafted to meet the business requirements needed for an outstanding contribution to this role and the career path beyond it. By enrolling in this tutorial, a significant advantage can be gained by the student for securing their dream job and building an excellent reputation in this sector.  This popular Business Continuity Management Level 3 has been designed to help dedicated individuals train to become the absolute best in this business field. Many other entrepreneurs and talented students have already completed this course, and others like it, empowering them to move onto satisfying and rewarding careers. This unique Business Continuity Management Level 3 course is perfectly suited for those dedicated and ambitious individuals who are committed to genuinely becoming the best in the business.  The Business Continuity Management Level 3 is recognised and accredited by CPD standards, so all contents are guaranteed to be accurate and reputable, adding valuable competencies and qualifications to a CV, making anyone stand out from other potential candidates or business rivals. For added convenience, the Business Continuity Management Level 3 consists of a range of educational modules that allow study sessions to be organised at any time and any place. When the final assessment of the Business Continuity Management Level 3 has been completed, a certificate of completion is supplied to evidence newly acquired skills and knowledge. This will provide a significant boost for job-seeking or entry into a new and exciting career path. The valuable qualification from the Business Continuity Management Level 3 course can help to make all the difference in a dynamic employment sector and can also be validated on our website. We are aware that a student's lifestyles and work ethics may not allow much time for a dedicated study session, so the Business Continuity Management Level 3 has been specifically designed to be taken at a personally selected pace, and the hours that are suited to each individual. Full access is immediately available after registration, and this can be achieved via any online device, and at any global location you are sighted at.   Our fully-trained tutors are committed to helping you throughout the course, and will instantly respond to any queries that are sent to them via email.

Business Continuity Management Level 3
Delivered Online On Demand
£25

Business Continuity Management

4.7(160)

By Janets

Register on the Business Continuity Management today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Business Continuity Management is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! WHAT YOU GET WITH THE BUSINESS CONTINUITY MANAGEMENT  * Receive a e-certificate upon successful completion of the course * Get taught by experienced, professional instructors * Study at a time and pace that suits your learning style * Get instant feedback on assessments  * 24/7 help and advice via email or live chat * Get full tutor support on weekdays (Monday to Friday) COURSE DESIGN The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of * Video lessons * Online study materials CERTIFICATION After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. WHO IS THIS COURSE FOR: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. REQUIREMENTS: The online training is open to all students and has no formal entry requirements. To study the Business Continuity Management, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. COURSE CONTENT Module 01: Introduction - Course Overview Introduction 00:18:00 Module 02: Risk, The Need For BCP & Some Examples First Up A Word on Risk 01:11:00 Business Continuity Planning & Crisis Management. What is The Difference? 00:18:00 Do I Really Need a Business Continuity Plan? 00:27:00 Examples of Incidents, Crises and a Response 01:31:00 Module 03:Important BCP Program Considerations Electronic Risk Monitoring Platforms 00:25:00 The Obstacles to Business Continuity Planning 00:22:00 Beware 'The Human Factor' 00:08:00 Putting an Effective Business Continuity Plan Together 00:38:00 Communicating in a Crisis 00:52:00 Module 04:Guidance on Program Structure, Ownership and Evaluation A Brief Look at The International Standard 00:34:00 The PDCA Model 00:18:00 Context of The Organisation 00:36:00 Ownership, Accountability & Leadership 00:34:00 Planning 00:18:00 Support 00:48:00 Operation 00:38:00 Performance Evaluation & Improvement 01:02:00 Module 05: Bringing It All Together Bringing It All Together - A Template For Action 00:53:00 Pointers on Bouncing Back After Covid-19 or Any Other Crisis 01:01:00 The 'Fast-Track' Business Continuity Plan 00:58:00 Resources Resources - Business Continuity Management 00:00:00 FREQUENTLY ASKED QUESTIONS Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Business Continuity Management
Delivered Online On Demand
£25

Level 6 Diploma in Business Continuity Management - QLS Endorsed

By Kingston Open College

QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support | All-Inclusive Cost

Level 6 Diploma in Business Continuity Management - QLS Endorsed
Delivered Online On Demand
£105

ISO 22301 Lead Implementer Course

By Cognicert Limited

The “ISO 22301:2019 Lead Implementer ” course provides comprehensive training in the ISO 22301:2019 standard and all its requirements from the Implementer ’s point of view, as well as basic skills necessary to execute the requirements. It’s a practical-oriented training that should be considered “a must” for every ISO 22301:2019 Implementer. This intensive course is specifically designed to participants to serve as ISO 22301:2019 Lead Implementers. The interactive training program, complete with quizzes, will provide the necessary technical knowledge and understanding of all ISO 22301:2019 requirements to implement the requirement of the standard.

ISO 22301 Lead Implementer Course
Delivered In-Person in East Ham,5 days, Jun 17th, 08:00 + 1 more
£900

Certified Information Security Systems Professional (CISSP)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR EXPERIENCED IT SECURITY-RELATED PRACTITIONERS, AUDITORS, CONSULTANTS, INVESTIGATORS, OR INSTRUCTORS, INCLUDING NETWORK OR SECURITY ANALYSTS AND ENGINEERS, NETWORK ADMINISTRATORS, INFORMATION SECURITY SPECIALISTS, AND RISK MANAGEMENT PROFESSIONALS, WHO ARE PURSUING CISSP TRAINING AND CERTIFICATION TO ACQUIRE THE CREDIBILITY AND MOBILITY TO ADVANCE WITHIN THEIR CURRENT COMPUTER SECURITY CAREERS OR TO MIGRATE TO A RELATED CAREER. THROUGH THE STUDY OF ALL EIGHT CISSP COMMON BODY OF KNOWLEDGE (CBK) DOMAINS, STUDENTS WILL VALIDATE THEIR KNOWLEDGE BY MEETING THE NECESSARY PREPARATION REQUIREMENTS TO QUALIFY TO SIT FOR THE CISSP CERTIFICATION EXAM. ADDITIONAL CISSP CERTIFICATION REQUIREMENTS INCLUDE A MINIMUM OF FIVE YEARS OF DIRECT PROFESSIONAL WORK EXPERIENCE IN TWO OR MORE FIELDS RELATED TO THE EIGHT CBK SECURITY DOMAINS, OR A COLLEGE DEGREE AND FOUR YEARS OF EXPERIENCE. OVERVIEW #NAME? DESCRIPTION IN THIS COURSE, STUDENTS WILL EXPAND UPON THEIR KNOWLEDGE BY ADDRESSING THE ESSENTIAL ELEMENTS OF THE 8 DOMAINS THAT COMPRISE A COMMON BODY OF KNOWLEDGE (CBK)© FOR INFORMATION SYSTEMS SECURITY PROFESSIONALS. PREREQUISITES * COMPTIA NETWORK+ CERTIFICATION 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, May 20th, 13:00 + 9 more
£3395

Architecting on AWS

By Nexus Human

DURATION 3 DAYS 18 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR SOLUTIONS ARCHITECTS, SOLUTION-DESIGN ENGINEERS, DEVELOPERS SEEKING AN UNDERSTANDING OF AWS ARCHITECTING AND INDIVIDUALS SEEKING THE AWS SOLUTIONS ARCHITECT-ASSOCIATE CERTIFICATION. OVERVIEW IDENTIFY AWS ARCHITECTING BASIC PRACTICES. EXPLORE USING THE AWS MANAGEMENT TOOLS: THE AWS CONSOLE, COMMAND LINE INTERFACE (CLI), AND CLOUDFORMATION IN A LAB ENVIRONMENT. EXAMINE THE ENFORCEMENT OF ACCOUNTS SECURITY USING POLICIES. IDENTIFY THE ELEMENTS THAT BUILD AN ELASTIC, SECURE, VIRTUAL NETWORK THAT INCLUDES PRIVATE AND PUBLIC SUBNETS. PRACTICE BUILDING AN AWS CORE NETWORKING INFRASTRUCTURE. DETERMINE STRATEGIES FOR A LAYERED SECURITY APPROACH TO VIRTUAL PRIVATE CLOUD (VPC) SUBNETS. IDENTIFY STRATEGIES TO SELECT THE APPROPRIATE COMPUTE RESOURCES BASED ON BUSINESS USE-CASES. PRACTICE BUILDING A VPC AND ADDING AN ELASTIC CLOUD COMPUTE (EC2) INSTANCE IN A LAB ENVIRONMENT. PRACTICE INSTALLING AN AMAZON RELATIONAL DATABASE SERVICE (RDS) INSTANCE AND AN APPLICATION LOAD BALANCER (ALB) IN THE VPC YOU CREATED. COMPARE AND CONTRAST AWS STORAGE PRODUCTS AND SERVICES, BASED ON BUSINESS SCENARIOS. COMPARE AND CONTRAST THE DIFFERENT TYPES OF AWS DATABASE SERVICES BASED ON BUSINESS NEEDS. PRACTICE BUILDING A HIGHLY AVAILABLE, AUTO-SCALING DATABASE LAYER IN A LAB. EXPLORE THE BUSINESS VALUE OF AWS MONITORING SOLUTIONS. IDENTIFY THE ROLE OF MONITORING, EVENT DRIVEN LOAD BALANCING, AND AUTO SCALING RESPONSES, BASED ON USAGE AND NEEDS. IDENTIFY AND DISCUSS AWS AUTOMATION TOOLS THAT WILL HELP YOU BUILD, MAINTAIN AND EVOLVE YOUR INFRASTRUCTURE. DISCUSS NETWORK PEERING, VPC ENDPOINTS, GATEWAY AND ROUTING SOLUTIONS BASED ON USE-CASES. DISCUSS HYBRID NETWORKING CONFIGURATIONS TO EXTEND AND SECURE YOUR INFRASTRUCTURE. DISCUSS THE BENEFITS OF MICROSERVICES AS AN EFFECTIVE DECOUPLING STRATEGY TO POWER HIGHLY AVAILABLE APPLICATIONS AT SCALE. EXPLORE AWS CONTAINER SERVICES FOR THE RAPID IMPLEMENTATION OF AN INFRASTRUCTURE-AGNOSTIC, PORTABLE APPLICATION ENVIRONMENT. IDENTIFY THE BUSINESS AND SECURITY BENEFITS OF AWS SERVERLESS SERVICES BASED ON BUSINESS EXAMPLES. PRACTICE BUILDING A SERVERLESS INFRASTRUCTURE IN A LAB ENVIRONMENT. DISCUSS THE WAYS IN WHICH AWS EDGE SERVICES ADDRESS LATENCY AND SECURITY. PRACTICE BUILDING A CLOUDFRONT DEPLOYMENT WITH AN S3 BACKEND IN A LAB ENVIRONMENT. EXPLORE AWS BACKUP, RECOVERY SOLUTIONS, AND BEST PRACTICES TO ENSURE RESILIENCY AND BUSINESS CONTINUITY. BUILD A HIGHLY AVAILABLE AND SECURE CLOUD ARCHITECTURE BASED ON A BUSINESS PROBLEM, IN A PROJECT-BASED FACILITATOR-GUIDED LAB. DESCRIPTION ARCHITECTING ON AWS IS FOR SOLUTIONS ARCHITECTS, SOLUTION-DESIGN ENGINEERS, AND DEVELOPERS SEEKING AN UNDERSTANDING OF AWS ARCHITECTING. IN THIS COURSE, YOU WILL LEARN TO IDENTIFY SERVICES AND FEATURES TO BUILD RESILIENT, SECURE AND HIGHLY AVAILABLE IT SOLUTIONS ON THE AWS CLOUD. ARCHITECTURAL SOLUTIONS DIFFER DEPENDING ON INDUSTRY, TYPES OF APPLICATIONS, AND BUSINESS SIZE. AWS AUTHORIZED INSTRUCTORS EMPHASIZE BEST PRACTICES USING THE AWS WELL-ARCHITECTED FRAMEWORK, AND GUIDE YOU THROUGH THE PROCESS OF DESIGNING OPTIMAL IT SOLUTIONS, BASED ON REAL-LIFE SCENARIOS. THE MODULES FOCUS ON ACCOUNT SECURITY, NETWORKING, COMPUTE, STORAGE, DATABASES, MONITORING, AUTOMATION, CONTAINERS, SERVERLESS ARCHITECTURE, EDGE SERVICES, AND BACKUP AND RECOVERY. AT THE END OF THE COURSE, YOU WILL PRACTICE BUILDING A SOLUTION AND APPLY WHAT YOU HAVE LEARNED WITH CONFIDENCE. PREREQUISITES * AWS CLOUD PRACTITIONER ESSENTIALS CLASSROOM OR DIGITAL TRAINING, OR * WORKING KNOWLEDGE OF DISTRIBUTED SYSTEMS * FAMILIARITY WITH GENERAL NETWORKING CONCEPTS * FAMILIARITY WITH IP ADDRESSING * WORKING KNOWLEDGE OF MULTI-TIER ARCHITECTURES * FAMILIARITY WITH CLOUD COMPUTING CONCEPTS 0 - INTRODUCTIONS & COURSE MAP REVIEW * Welcome and course outcomes 1 - ARCHITECTING FUNDAMENTALS REVIEW * AWS Services and Infrastructure * Infrastructure Models * AWS API Tools * Securing your infrastructure * The Well-Architected Framework * Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - ACCOUNT SECURITY * Security Principals * Identity and Resource-Based Policies * Account Federation * Introduction to Managing Multiple Accounts 3 - NETWORKING, PART 1 * IP Addressing * Amazon Virtual Private Cloud (VPC), Patterns and Quotas * Routing * Internet Access * Network Access Control Lists (NACLs) * Security Groups 4 - COMPUTE * Amazon Elastic Cloud Compute (EC2) * EC2 Instances and Instance Selection * High Performance Computing on AWS * Lambda and EC2, When to Use Which * Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - STORAGE * Amazon S3, Security, Versioning and Storage Classes * Shared File Systems * Data Migration Tools 6 - DATABASE SERVICES * AWS Database Solutions * Amazon Relational Database Services (RDS) * DynamoDB, Features and Use Cases * Redshift, Features, Use Cases and Comparison with RDS * Caching and Migrating Data * Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - MONITORING AND SCALING * Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs * Invoking Events 8 - AUTOMATION * CloudFormation * AWS Systems Manager 9 - CONTAINERS * Microservices * Monitoring Microservices with X-Ray * Containers 10 - NETWORKING PART 2 * VPC Peering & Endpoints * Transit Gateway * Hybrid Networking * Route 53 11 - SERVERLESS ARCHITECTURE * Amazon API Gateway * Amazon SQS, Amazon SNS * Amazon Kinesis Data Streams & Kinesis Firehose * Step Functions * Hands-on Lab: Build a Serverless Architecture 12 - EDGE SERVICES * Edge Fundamentals * Amazon CloudFront * AWS Global Accelerator * AWS Web Application Firewall (WAF), DDoS and Firewall Manager * AWS Outposts * Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - BACKUP AND RECOVERY * Planning for Disaster Recovery * AWS Backup * Recovery Strategie ADDITIONAL COURSE DETAILS: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS
Delivered Online4 days, May 20th, 08:30 + 6 more
£2025

Educators matching "Business Continuity Management"

Show all 183
NQA Certification Ltd

nqa certification ltd

4.6(13)

Dunstable

NQA is part of NTS, the leading independent provider of environmental simulation testing, inspection and certification services in the USA. NTS serves a broad range of industries, including the civil aviation, space, defence, nuclear, telecommunications, industrial, electronics, medical and automotive markets. See more at www.nts.com or watch the NTS corporate video. Our services NQA provides accredited certification, training and support services to help you improve processes, performance and products and services. We have issued over 50,000 certificates to clients in over 90 countries. We help organizations of all sizes perform better in quality, environment, energy, sustainability and health and safety management. Moreover, we make sure that these improvements continue year in, year out. Often, we will work in close partnership with consultants who can play a crucial role in helping to implement these management systems. We specialise in management systems certification for: quality (including automotive and aerospace sectors) energy & environment health & safety information security Our philosophy - Never stop improving Every business can do better, consistently, continually and sustainably. That’s what we believe at NQA and it’s what we’re here to help achieve. Our assessment, certification and training services enable businesses to implement change, improve management systems and build for future success. What makes us different We are passionate about helping our clients to improve their products, processes and people so they can deliver excellent customer satisfaction. Our approach is pragmatic and supportive whilst meeting the rigorous technical demands and integrity of accredited certification. You can expect: Practical advice. We help you understand the technical requirements and stages of the certification process in plain English Improvement focus. We not only assess your compliance with your chosen standard, we aim to identify opportunities for improvement at every audit Comprehensive service. We provide a complete range of certification services with global coverage enabling you to integrate certification for greater efficiency Different ways to learn. Online, class-room and in-house courses; we think it’s important that you can gain new technical skills your way Great value. No hidden fees, competitive rates and access to world-class technical support The latest technical advice. Our worldwide network of experts participate in technical committees and standards writing; we help you keep up with developments

Royale Business College UK

royale business college uk

5.0(4)

London

Welcome to RBC. You are joining a world-class organisation, you are joining RB College of the United Kingdom On behalf of RB College, we extend a warm welcome to everyone accessing this page, particularly students planning to undertake graduate studies. We also welcome partners aspiring to collaborate with our quest for setting up a leading center of learning excellence all over the world. We share the British concept of education as a source of opportunities, and the mission of achieving excellence. Happy student smiling on the stairs of her university Happy student smiling on the stairs of her university We are committed to providing a world-class graduate level of education to a select group of students, who will gain advanced theoretical and practical knowledge and understanding in Business Administration whilst receiving training to become business professionals and community leaders. RB College deliver high caliber qualifications with our alumni excelling in many diverse fields. RB College is considered as the leading business school in UK & EU and the Middle East region, thus making its graduates highly sought after. Our aim is to provide students with strong research and practical skills that will allow them to better understand human behaviour, make significant contributions to the field, and develop solutions to individual, societal, and organisational problems. We invite students keen to take part in this unique adventure and apply for RB College graduate programme. Our mission is to provide internationally accredited, high quality educational programmes to our students, through a panel of ambitious, well-qualified teachers who naturally inspire students to be self-motivated in their approach to learning and to reach beyond textbooks by applying their understanding to the outside world. Our teaching staff come from different backgrounds and have been hand-picked through a highly demanding recruitment process. All are keen to provide unlimited support to each and every student, whenever it is needed. RB College looks forward to you choosing us as your course provider and wish you the very best of luck in your future studies, and hope that you will make the most of the learning and training experiences we provide, as well as the numerous opportunities your success with us will open up to you.