• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

124 Courses

Certified IT Specialist (CITS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is most suited for IT professionals who have a need to understand the current requirements and core competences for managing IT in mission-critical environments. Overview After completion of the course the participant will be able to: 1. Provide guidance and implementation for IT strategy as set by senior IT and business management 2. Select and manage staff, implement training programs, career plan development and job rotation programs 3. Select, evaluate and negotiate vendors using RFI, RFP and selection criteria 4. Provide guidance for developing, testing and implementing business applications 5. Manage and/or assist in IT project management 6. Design and implement service management processes for incident, problem and change management 7. Understand the need for business continuity and design the business continuity plan 8. Review and implement information security practices and controls 9. Assist and initiate risk management practices 10. Understand and select new technologies such as cloud computing, big data, Internet of Things and social media to support business change demands 11. Select strategies for information management 12. Measure and improve quality of IT services CITS is designed to teach the skills, knowledge and competencies required of the modern IT specialist working at the senior professional, team-leader, supervisor or management level in IT management. IT STRATEGY * The need for Information Technology * Enterprise architecture * Service catalogue * Service level management * Sustainable development IT ORGANISATION * Personnel need * Roles and responsibilities * Sourcing * Selection process * Hiring staff * Managing staff * Career planning * Training / job rotation * Performance appraisal * Staff departures VENDOR SELECTION / MANAGEMENT * The importance of vendors * Vendor selection * Request For Information (RFI) * Request For Proposal (RFP) * Proposal evaluation * Vendor reference checks * Contract negotiation * Contract management * Vendor management * Re-compete vendors PROJECT MANAGEMENT * Methodologies * Project organisation * Starting up / initiating * Planning / initiation a project * Risk * Quality * Scope * Work / Product Breakdown Structure * PERT diagram / Gantt chart * Cost * Communication APPLICATION MANAGEMENT * Software Development Life Cycle (SDLC) * Software Quality Assurance (SQA) * Requirements * Development * Testing * Adoption (implementation) * Maintenance SERVICE MANAGEMENT * Incident management * Problem management * Change management BUSINESS CONTINUITY MANAGEMENT * Standards and guidelines * Objectives * Context * Interested parties * Scope * Roles and responsibilities * Resources and competences * Awareness and communication * Documentation * Business Impact Analysis RISK MANAGEMENT * Guidelines * Context establishment * Identification * Analysis * Evaluation * Treatment * Communication * Monitoring and control INFORMATION SECURITY MANAGEMENT * Standards * Confidentiality * Integrity * Availability * Controls types * Guideline for controls selection * Control categories * Information security awareness * Security incident response INFORMATION AND KNOWLEDGE MANAGEMENT * Information management * Data management * Information management - technologies * Business intelligence * Data management - technologies * Best practices in data governance * Pitfalls in data governance BUSINESS CHANGE MANAGEMENT * Business change * Frameworks, models and techniques * Needs identification * Cloud computing * Social media / digital marketing * Big data * Internet of Things (IoT) QUALITY MANAGEMENT * Standards, guidelines and frameworks * Objectives * Activities * Services review * Customer feedback * Customer survey * Key Performance Indicators (KPI) * Metrics * Scorecards and reports * Quality register EXAM * Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified IT Specialist (CITS)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Crazy about Arduino: Your End-to-End Workshop - Level 2

By Packt

Learn to build a complete Arduino project using a keypad, LCD, ultrasonic sensor, LDR sensor, and a buzzer

Crazy about Arduino: Your End-to-End Workshop - Level 2
Delivered Online On Demand
£101.99

Git and GitHub Complete Master Class: Beginner to Git Expert

By Packt

This course takes you through the full spectrum of basic to advanced topics, equipping you with the skills you need to get started with Git and GitHub. With the help of exercises and activities, you will be able to grasp all the concepts of Git and GitHub with ease.

Git and GitHub Complete Master Class: Beginner to Git Expert
Delivered Online On Demand
£93.99

CompTIA Security+ Certification SY0-601: The Total Course

By Packt

This video course is designed to prepare you to achieve the internationally recognized fundamental IT training certification, CompTIA Security+ Certification SY0-601 exam. The course covers all the major domains needed for the certification and will help you develop the basics of IT and computers with the help of examples and quizzes.

CompTIA Security+ Certification SY0-601: The Total Course
Delivered Online On Demand
£59.99

Ultimate Guide to Raspberry Pi - Tips, Tricks, and Hacks

By Packt

This course will provide the information you need to master the Raspberry Pi 3 and Raspberry Pi 4. It walks you through everything you need to know to use the platform to the fullest and assumes no prior programming or electronics knowledge. The course also covers details about Raspberry Pi OS and Raspberry Pi Imager.

Ultimate Guide to Raspberry Pi - Tips, Tricks, and Hacks
Delivered Online On Demand
£68.99

IoT and Blockchain Training

By Nexus Human

Duration 1 Days 6 CPD hours Overview Please refer to Overview This course provides an overview of IoT and Blockchain, and how Blockchain holds the potential to securely unlock business and operational value of IoT to support common tasks, such as sensing, processing, storing information, and communicating. WHAT IS IOT? * Internet of Things Overview * IoT History HOW DOES IOT WORK? * Components of an IoT device CURRENT IOT LANDSCAPE * Growth areas * Privacy concerns IOT DESIGN STANDARDS * Zigbee networking protocol * Thread Group * AllSeen Alliance/AllJoyn * Open Interconnect Consortium/IoTivity * Industrial Internet Consortium * ITU-T SG20 * IEEE P2413 * Apple HomeKit IOT DESIGN QUESTIONS * Questions to help you design an IoT solution IOT ARCHITECTURE * Stage 1 - Data Generation (Sensors / Actuators) * Stage 2 - Data Acquisition Systems * Stage 3 - Edge Processing * Stage 4 - Long-Term Data Storage / Blockchain WHAT IS BLOCKCHAIN? * History of Blockchain HOW DOES BLOCKCHAIN WORK? * Benefits of Blockchain * Blockchain vs. conventional technology IOT / BLOCKCHAIN * Benefits of adding Blockchain to IoT * Trust Building * Cost Reduction * Accelerate Data Exchanges * Scaled Security for IoT ADDITIONAL COURSE DETAILS: Nexus Humans IoT and Blockchain Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the IoT and Blockchain Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

IoT and Blockchain Training
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. FUNDAMENTALS OF INFORMATION PRIVACY * Reviewing the modern history of privacy * Foundational privacy concepts * Data protection roles and fair information practices * Exploring the impacts of privacy and data protection regulations on information management PRIVACY IN THE IT ENVIRONMENT * Compliance requirements * IT risks * Stakeholder privacy expectations * Differentiating between privacy and security CORE PRIVACY CONCEPTS * Foundational elements for embedding privacy in IT * Common privacy principles * Data protection by design and default PRIVACY CONSIDERATIONS IN THE INFORMATION LIFE CYCLE * Privacy considerations throughout the stages of the information life cycle PRIVACY IN SYSTEMS AND APPLICATIONS * Examining the risks inherent in the IT environment and options for addressing them * Identity and access management * Credit card information and processing * Remote access * BYOD and telecommuting * Data encryption * Additional privacy-enhancing technologies in the enterprise environment PRIVACY TECHNIQUES * Strengths and weaknesses of authentication techniques * Using identifiers * Privacy by design ONLINE PRIVACY ISSUES * Unique challenges that come from online privacy issues * Laws and regulations * Online threats * Social media * E-commerce * Tracking technologies * Web security protocols TECHNOLOGIES WITH PRIVACY CONSIDERATIONS * Privacy considerations associated with a variety of technologies * Cloud computing * Wireless IDs * Location-based services * ?Smart? technologies * Video/data/audio surveillance * Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Penetration Testing Professional (CPENT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. COURSE OUTLINE * Introduction to Penetration Testing * Penetration Testing Scoping and Engagement * Open Source Intelligence (OSINT) * Social Engineering Penetration Testing * Network Penetration Testing ? External * Network Penetration Testing ? Internal * Network Penetration Testing - Perimeter Devices * Web Application Penetration Testing * Wireless Penetration Testing * IoT Penetration Testing * OT/SCADA Penetration Testing * Cloud Penetration Testing * Binary Analysis and Exploitation * Report Writing and Post-Testing Actions ADDITIONAL COURSE DETAILS: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Penetration Testing Professional (CPENT)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Consulting systems engineer IoT Designer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Overview After taking this course, you should be able to: Explain the fundamentals of Cisco IoT and list common devices involved List the common protocols, standards, and data flows of IoT Explain the Cisco IoT, common needs, and the corresponding solutions Explain how programmability can be used to automate and make operations, deployment, and support of Cisco IoT more effective Describe common Cisco IoT applications and how they apply to Cisco IoT use cases Explain the functions and use cases for Cisco security applications and Cisco IoT This course prepares you to develop Internet of Things (IoT) applications for Cisco© IoT edge compute and network architecture. Through a combination of lessons and hands-on experience, you will learn to implement and deploy Cisco IOx applications using Cisco Field Network Director and Cisco Kinetic. This course covers designing, deploying, and troubleshooting edge applications, and understanding the use of management tools, so you can control your industrial network and connected devices at scale. This course will prepare you for the certification exam 300-915 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT), a concentration in the CCNP DevNet track. COURSE OUTLINES * DEFINING CISCO IOT * IOT NETWORKING AND OTHER DEVICES * EXAMINING IOT PROTOCOLS * EXAMINING IOT STANDARDS * RECOGNIZING CISCO IOT NEEDS AND SOLUTIONS * USING PROGRAMMABILITY WITH CISCO IOT * DESCRIBING CISCO IOT APPLICATIONS: CISCO IOX * DESCRIBING CISCO IOT APPLICATIONS: CISCO KINETIC AND CISCO FIELD NETWORK DIRECTOR * DEFINING CISCO SECURITY APPLICATIONS LAB OUTLINE * Use an MQTT Consumer to Subscribe to Sensor Data Use Cisco IOx Applications to Receive and Process Sensor Data Troubleshoot a Sensor Connection Use and Interpret Freeboard Data Use and Interpret Grafana Data Use and Interpret Kibana Data Cisco IOx Familiarity Lab Develop and Deploy a Cisco IOx Application Troubleshoot Cisco IOx Navigate Cisco Field Network Director Explore Cisco Field Network Director API ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT)
Delivered on-request, onlineDelivered Online
Price on Enquiry

AI for beginners

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course does not have any technical knowledge prerequisites for the learners, besides being proficient in using a computer and the Internet. IT and/or AI knowledge is a benefit but not a hard requirement. Given the rapid development of AI and the broad range of its applications in everyday life, it is crucial for anyone to attend this course to update their digital skills in an ever-changing world. It is expected that all learners have registered for a free account of OpenAI ChatGPT at https://chat.openai.com. Overview Discover how AI relates to other 4th industrial revolution technologies Learn about AI, ML, and associated cognitive services Overview of AI development frameworks, tools and services Evaluate the OpenAI ChatGPT4 / ChatGPT3.5 model features in more detail The core aim of this ?AI for beginners? course is to introduce its audience to Artificial Intelligence (AI) and Machine Learning (ML) technologies and allow them to understand the practical applications of AI in their everyday personal and professional life. Moreover, the course aims to provide a handful of demos and hands-on exercises to allow the learners to familiarize themselves with usage scenarios of OpenAI ChatGPT and other Generative AI (GenAI) models. The content of this course has been created primarily by using the OpenAI ChatGPT model. AI THEORETICAL CONCEPTS. * Introduction to AI, ML, and associated cognitive services (Computer vision, Natural language processing, Speech analysis, Decision making). * How AI relates to other 4th industrial revolution technologies (cloud computing, edge computing, internet of things, blockchain, metaverse, robotics, quantum computing). * AI model classification by utilizing mind maps and the distinctive role of Gen AI models. * Introduction to the OpenAI ChatGPT model and alternative generative AI models. Familiarization with the basics of the ChatGPT interface (https://chat.openai.com). * Talking about Responsible AI: Security, privacy, compliance, copyright, legal challenges, and ethical implications. AI PRACTICAL APPLICATIONS * Overview of AI development frameworks, tools and services. AI aggregators review. * Hand-picked AI tool demos: * a.Workplace productivity and the case of Microsoft 365 Copilot. * b.The content creation industry. Create text, code, images, audio and video with Gen AI. * c.Redefining the education sector with AI-powered learning. * Evaluate the OpenAI ChatGPT4 / ChatGPT3.5 model features in more detail: * a.Prompting and plugin demos. * b.Code interpreter demos. * Closing words. Discussion with an AI model on the future of AI. ADDITIONAL COURSE DETAILS: Nexus Humans AI for beginners training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI for beginners course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AI for beginners
Delivered on-request, onlineDelivered Online
Price on Enquiry