• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

70 Courses

Cybersecurity Maturity Model Certification (CMMC): Certified Professional

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. MANAGING RISK WITHIN THE DEFENSE SUPPLY CHAIN * Topic A: Identify Threats to the Defense Supply Chain * Topic B: Identify Regulatory Responses Against Threats * ENSURING COMPLIANCE THROUGH CMMC * Topic A: Identify Limitations of Self-Certification * Topic B: Identify Benefits of CMMC * Topic C: Describe the CMMC Model Architecture * PERFORMING THE GENERAL RESPONSIBILITIES OF A CMMC CP * Topic A: Identify Responsibilities of the CMMC CP * Topic B: Demonstrate Appropriate Ethics and Behavior * IDENTIFYING AND SCOPING REGULATED INFORMATION * Topic A: Identify Regulated Information * Topic B: Establish the Certification and Assessment Scope Boundaries * INITIATING THE ASSESSMENT PROCESS * Topic A: Evaluate Readiness * Topic B: Determine Objective Evidence * ASSESSING OBJECTIVE EVIDENCE * Topic A: Assess the Practices Using the CMMC Assessment Guides * Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 * IMPLEMENTING AND EVALUATING CMMC LEVEL 1 * TTopic A: Maturity Level 1 Domains and Practices * Topic B: Determine Scope Boundaries at Maturity Level 1 * Topic C: Perform a Maturity Level 1 Gap Analysis * Topic D: Perform a Maturity Level 1 Evidence Validation * IMPLEMENTING AND EVALUATING CMMC LEVELS 2 AND 3 * Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 * Topic B: Maturity Level 2 Practices * Topic C: Maturity Level 3 Practices * IDENTIFYING CMMC LEVELS 4 AND 5 * Topic A: Maturity Level 4 Processes and Practices * Topic B: Maturity Level 5 Processes and Practices * WORKING THROUGH A CMMC ASSESSMENT * Topic A: Define the Assessment Logistics * Topic B: Resolve Assessment Related Issues * Appendix A: Additional Documentation the CP Should Study *

Cybersecurity Maturity Model Certification (CMMC): Certified Professional
Delivered on-request, onlineDelivered Online
Price on Enquiry

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) LESSON 1: ASSESSING CYBERSECURITY RISK * Topic A: Identify the Importance of Risk Management * Topic B: Assess Risk * Topic C: Mitigate Risk * Topic D: Integrate Documentation into Risk Management LESSON 2: ANALYZING THE THREAT LANDSCAPE * Topic A: Classify Threats * Topic B: Analyze Trends Affecting Security Posture LESSON 3: ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS * Topic A: Implement Threat Modeling * Topic B: Assess the Impact of Reconnaissance * Topic C: Assess the Impact of Social Engineering LESSON 4: ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS * Topic A: Assess the Impact of System Hacking Attacks * Topic B: Assess the Impact of Web-Based Attacks * Topic C: Assess the Impact of Malware * Topic D: Assess the Impact of Hijacking and Impersonation Attacks * Topic E: Assess the Impact of DoS Incidents * Topic F: Assess the Impact of Threats to Mobile Security * Topic G: Assess the Impact of Threats to Cloud Security LESSON 5: ANALYZING POST-ATTACK TECHNIQUES * Topic A: Assess Command and Control Techniques * Topic B: Assess Persistence Techniques * Topic C: Assess Lateral Movement and Pivoting Techniques * Topic D: Assess Data Exfiltration Techniques * Topic E: Assess Anti-Forensics Techniques LESSON 6: ASSESSING THE ORGANIZATION'S SECURITY POSTURE * Topic A: Implement Cybersecurity Auditing * Topic B: Implement a Vulnerability Management Plan * Topic C: Assess Vulnerabilities * Topic D: Conduct Penetration Testing LESSON 7: COLLECTING CYBERSECURITY INTELLIGENCE * Topic A: Deploy a Security Intelligence Collection and Analysis Platform * Topic B: Collect Data from Network-Based Intelligence Sources * Topic C: Collect Data from Host-Based Intelligence Sources LESSON 8: ANALYZING LOG DATA * Topic A: Use Common Tools to Analyze Logs * Topic B: Use SIEM Tools for Analysis LESSON 9: PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS * Topic A: Analyze Incidents with Windows-Based Tools * Topic B: Analyze Incidents with Linux-Based Tools * Topic C: Analyze Indicators of Compromise LESSON 10: RESPONDING TO CYBERSECURITY INCIDENTS * Topic A: Deploy an Incident Handling and Response Architecture * Topic B: Mitigate Incidents * Topic C: Hand Over Incident Information to a Forensic Investigation LESSON 11: INVESTIGATING CYBERSECURITY INCIDENTS * Topic A: Apply a Forensic Investigation Plan * Topic B: Securely Collect and Analyze Electronic Evidence * Topic C: Follow Up on the Results of an Investigation ADDITIONAL COURSE DETAILS: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered Online6 days, Aug 12th, 13:00 + 1 more
£3495

COBIT 2019 Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The COBIT 2019 Foundation course would suit candidates working in the following IT professions or areas: IT Auditors IT Managers IT Quality professionals IT Leadership IT Developers Process practitioners Managers in IT service providing firms The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This COBIT 2019 Foundation course is designed as an introduction to COBIT 2019 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are: New framework introduction Key concepts and terminology Governance and Framework Principles Governance system and components Governance and management objectives Performance management Designing a tailored governance system COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained?the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance. 1 - COBIT 5 OVERVIEW AND INTRODUCTION * Course Administration * Course Objectives * Exam Overview * Certification Scheme * History of COBIT * COBIT 2019 Improvements * Major differences with 2019 * Misconceptions about COBIT * COBIT and Other Standards 2 - KEY CONCEPTS AND TERMINOLOGY * Introduction to Enterprise Governance of Information and Technology * Benefits of Information and Technology Governance * COBIT Information and Technology Governance Framework * Distinction of Governance and Management * Three Principles of a Governance Framework * Six Principles for a Governance System 3 - GOVERNANCE SYSTEMS AND COMPONENTS * Introduction to the Components of a Governance System * Processes and Capability Levels * Organizational Structures and Defined Roles * Information Flows and Items * People, Skills and Competencies * Principles, Policies and Frameworks * Culture, Ethics and Behavior * Services, Infrastructure and Applications 4 - GOVERNANCE MANAGEMENT OBJECTIVES * Governance and Management Objectives Publication * Governance and Management Objectives * Governance and Management Objectives Core Model * Evaluate, Direct and Monitor * Align, Plan and Organize * Build, Acquire and Implement * Deliver, Service and Support * Monitor, Evaluate and Assess 5 - GOALS CASCADE * Governance and Management Objective Relationships * Governance and Management Objective Descriptions * High-Level Information Example * Introduction to the Goals Cascade * Enterprise Goals * Alignment Goals * Mapping Tables ? Appendix A 6 - PERFORMANCE MANAGEMENT * Introduction to Performance Management * COBIT Performance Management Principles * COBIT Performance Management (CPM) Overview * Process Capability Levels * Rating Process Activities * Focus Area Maturity Levels * Performance Management of Organizational Structures * Performance Management of Information Items * Performance Management of Culture and Behavior 7 - DESIGNING A TAILORED GOVERNANCE SYSTEM * The Need for Tailoring * Design Factors * Enterprise Strategy * Enterprise Goals * Risk Profile * I&T Related Issues * Threat Landscape * Compliance Requirements * Role of IT * Sourcing Model for IT * IT Implementation Methods * Technology Adoption Strategy * Enterprise Size * Focus Areas * Designing a Tailored Governance System * Management Objective Priority and Target Capability Levels * Component Variations * Specific Focus Areas * Stages and Steps in the Design Process 8 - IMPLEMENTING ENTERPRISE GOVERNANCE OF IT * The Business Case * The COBIT Implementation Guide Purpose * COBIT Implementation Approach * Phase 1 ? What are the Drivers * Phase 2 ? Where are we Now * Phase 3 ? Where do we Want to be * Phase 4 ? What Needs to be Done * Phase 5 ? How do we get There * Phase 6 ? Did we get There * Phase 7 How do we Weep the Momentum Going? * EGIT Implementation Program Challenges

COBIT 2019 Foundation
Delivered Online3 days, Sept 9th, 13:00
£1330

Intermediate UX Design Bootcamp

5.0(5)

By UX Academy

We are excited to introduce to you our 5 Day In-Person Training for Intermediate & Advanced Level. The goal of the training is deep learning about Design Thinking, UX Maturity, and enhancing your UX knowledge. The five-days training offers a path to learn more about UX teamwork, collaboration, and communication. The maximum size of the class is 6 people to ensure interaction between the students and the teacher.

Intermediate UX Design Bootcamp
Delivered in-person, on-requestDelivered In-Person in London
£2500

Essentials in UX and HCD Management (CPUX-M)

By Bunnyfoot

This one-day course introduces the field of user experience and provides an excellent entry point to our other specialised training courses. UX processes and practices have become a central component of product design, service design and web design.

Essentials in UX and HCD Management (CPUX-M)
Delivered OnlineFull day, Aug 20th, 08:30
£895

Petroleum Geochemistry in Petroleum Exploration

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge in petroleum geochemistry with EnergyEdge's course on petroleum exploration. Enroll now!

Petroleum Geochemistry in Petroleum Exploration
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2399 to £2599

DevOps Foundation©

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Foundation course includes Management, Operations, Developers, QA and Testing professionals such as: Individuals involved in IT development IT operations or IT service management. Individuals who require an understanding of DevOps principles. IT professionals working within, or about to enter, an Agile Service Design Environment The following IT roles: Automation Architects, Application Developers, Business Analysts, Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Consultants, DevOps Engineers, Infrastructure Architect, Integration Specialists, IT Directors, IT Managers, IT Operations, IT Team Leaders, Lean Coaches, Network Administrators, Operations Managers, Project Managers, Release Engineers, Software Developers, Software Tester/QA, System Administrators, Systems Engineers, System Integrators, Tool Providers. Overview The learning objectives for DevOps Foundation include an understanding of: DevOps objectives and vocabulary Benefits to the business and IT Principles and practices including Continuous Integration, Continuous Delivery, testing, security and the Three Ways DevOps relationship to Agile, Lean and ITSM Improved workflows, communication and feedback loops Automation practices including deployment pipelines and DevOps toolchains Scaling DevOps for the enterprise Critical success factors and key performance indicators Real-life examples and results The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organizational success. Learners will gain an understanding of DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation to improve the flow of work between software developers and IT operations professionals. This course prepares you for the DevOps Foundation (DOFD) certification. EXPLORING DEVOPS * Defining DevOps * Why Does DevOps Matter? * CORE DEVOPS PRINCIPLES * The Three Ways * The First Way * The Theory of Constraints * The Second Way * The Third Way * Chaos Engineering * Learning Organizations KEY DEVOPS PRACTICES * Continuous Testing, Integration, Delivery, Deployment * Site Reliability & Resilience Engineering * DevSecOps * ChatOps * Kanban BUSINESS AND TECHNOLOGY FRAMEWORKS * Agile * ITSM * Lean * Safety Culture * Learning Organizations * Continuous Funding CULTURE, BEHAVIORS & OPERATING MODELS * Defining Culture * Cultural Debt * Behavioral Models * Organizational maturity models AUTOMATION & ARCHITECTING DEVOPS TOOLCHAINS * CI/CD * Cloud, Containers, and Microservices * AI and Machine Learning * Automation * DevOps Toolchains MEASUREMENT, METRICS, AND REPORTING * The Importance of Measurement * DevOps Metrics - Speed, Quality, Stability, Culture * Change lead/cycle time * Value Driven Metrics SHARING, SHADOWING AND EVOLVING * DevOps in the Enterprise * Roles * DevOps Leadership * Organizational Considerations * Getting Started * Challenges, Risks, and Critical Success Factors ADDITIONAL COURSE DETAILS: Nexus Humans DevOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevOps Foundation©
Delivered Online3 days, Sept 3rd, 13:00 + 1 more
£1495

ITIL 4 Managing Professional - Drive Stakeholder Value (DSV) with Exam

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The target audience include, but is not limited to:   Relationship managers Customer experience (CX) managers Account managers Service delivery managers Service desk managers Service Level Managers Enterprise Architects Service and Solution Architects Business Analysts Product Owners Marketing Managers Project Managers Portfolio Managers Supplier relationship Managers Vendor Managers Contract Managers Customer experience/User experience Designers Consultants Overview The purpose of this course is to give the delegate the understanding to optimize the value of the journey for all stakeholders, for example, to convert opportunity and demand into value and to drive stakeholder value. Engagement is important in the optimization of service value because, as ITIL Foundation explained, service value is co-created through the involvement of users, customers, sponsors, service providers, or any other stakeholder. This course introduces ways and methods to drive stakeholder value and encourage stakeholders contribute to the creation of service value by exploring the following:   Value propositions Fostering relationships Keeping engagement channels open Shaping demand Designing service offerings Aligning and agreeing expectations Co-creating service experiences Realizing value This course covers key topics such as SLA design, multi-supplier management, communication, relationship management, CX and UX design, customer journey mapping, and more. It will provide candidates with the tools to increase stakeholder satisfaction which is integral to business success in the current competitive landscape. The associated certification exam voucher is included with this course. As an ITIL© Accredited Training Organization of PeopleCert, all students attending this training will be provided with the exam voucher as a part of delivery. HOW CUSTOMER JOURNEYS ARE DESIGNED * Understand the concept of the customer journey * Understand the ways of designing and improving customer journeys * HOW TO TARGET MARKETS AND STAKEHOLDERS * Understand the characteristics of markets * Understand marketing activities and techniques * Know how to describe customer needs and internal and external factors that affect these * Know how to identify service providers and explain their value propositions * HOW TO FOSTER STAKEHOLDER RELATIONSHIPS * Understand the concepts mutual readiness and maturity * Understand the different supplier and partner relationship types, and how these are managed * Know how to develop customer relationships * Know how to analyze customer needs * Know how to use communication and collaboration activities and techniques * Know how the ?Relationship management? practice can be applied to enable and contribute to fostering relationships * Know how the ?Supplier management? practice can be applied to enable and contribute to supplier and partner relationships management * HOW TO SHAPE DEMAND AND DEFINE SERVICE OFFERINGS * Understand methods for designing digital service experiences based on value driven, data driven and user centered service design * Understand approaches for selling and obtaining service offerings * Know how to capture, influence and manage demand and opportunities * Know how to collect, specify and prioritize requirements from a diverse range of stakeholders * Know how the ?Business analysis? practice can be applied to enable and contribute to requirement management and service design * HOW TO ALIGN EXPECTATIONS AND AGREE DETAILS OF SERVICES * Know how to plan for value co-creation * Know how to negotiate and agree service utility, warranty and experience * Know how the ?Service level management? practice can be applied to enable and contribute to service expectation management HOW TO ONBOARD AND OFFBOARD CUSTOMERS AND USERS * Understand key transition, onboarding and offboarding activities * Understand the ways of relating with users and fostering user relationships * Understand how users are authorized and entitled to services * Understand different approaches to mutual elevation of customer, user and service provider capabilities * Know how to prepare onboarding and offboarding plans * Know how to develop user engagement and delivery channels * Know how the ?Service Catalogue management? practice can be applied to enable and contribute to offering user services * Know how the ?Service Desk? practice can be applied to enable and contribute to user engagement HOW TO ACT TOGETHER TO ENSURE CONTINUAL VALUE CO-CREATION * Understand how users can request services * Understand methods for triaging of user requests * Understand the concept of user communities * Understand methods for encouraging and managing customer and user feedback * Know how to foster a service mindset (attitude, behavior and culture) * Know how to use different approaches to provision of user services * Know how to seize and deal with customer and user ?moments of truth? * Know how the ?Service request management? practice can be applied to enable and contribute to service usage HOW TO REALIZE AND VALIDATE SERVICE VALUE * Understand methods for measuring service usage and customer and user experience and satisfaction * Understand charging mechanisms * Know how to assess service value realization * Know how to prepare to evaluate and improve the customer journey * Know how the ?Portfolio management? practice can be applied to enable and contribute to service value realization * ITIL© is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. The Swirl logo? is a trade mark AXELOS Limited used, under permission of AXELOS Limited. All rights reserved. IT Infrastructure Library© is a registered trade mark of the AXELOS Limited used, under permission of AXELOS Limited. All rights reserved. ADDITIONAL COURSE DETAILS: Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 Nexus Humans ITIL 4 Specialist Drive Stakeholder Value (DSV) with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ITIL 4 Specialist Drive Stakeholder Value (DSV) with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ITIL 4 Managing Professional - Drive Stakeholder Value (DSV) with Exam
Delivered Online4 days, Sept 16th, 13:00 + 1 more
£2385

Assessing and Managing Cyber Security Risks for Essential Services Operators

By EnergyEdge - Training for a Sustainable Energy Future

ABOUT THIS VIRTUAL INSTRUCTOR LED TRAINING (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: 1. Introduction to Risk Assessments (RA) 2. Threat Actors and Their Motivations 3. Threat and Risk Assessment 4. Critical Controls Identification 5. Maturity Assessment 6. Treated Cyber Risk Profile 7. Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level * Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Assessing and Managing Cyber Security Risks for Essential Services Operators
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1324 to £2499

Assessing the Water-Steam Chemistry Cycle in Thermal Power Plants

By EnergyEdge - Training for a Sustainable Energy Future

ABOUT THIS VIRTUAL INSTRUCTOR LED TRAINING (VILT)  This 2-half-day Virtual Instructor Led Training (VILT) course will discuss the chemical aspects of the water-steam cycle in a power plant. The VILT course will examine the different types of chemicals used in boilers, potential issues in a water-steam cycle as well as aspects of monitoring and specifications regarding target values and alarm levels. Participants will also be equipped on what to do or key action steps to take in the event of chemistry-related incidents. This course is delivered in partnership with ENGIE Laborelec. Training Objectives The VILT course will cover the following: * Detailed aspects of chemistry in a water steam cycle, including types of chemicals used in boilers depending on the treatment and type of boiler * Potential issues in a water-steam cycle such as corrosion and deposition * Monitoring & analytical programmes and knowledge of specifications for the water steam cycle (normal values targets - alarm levels) * Chemistry aspects during transition periods: start-up, shutdown and preservation * Actions to be taken in the event of an alarm * Examples of incidents or deviations compared to normal chemistry Target Audience The VILT course is intended for: * Power plant chemists * Plant operation or maintenance engineers * Consultants and technical project managers * Boiler engineers Course Level * Basic or Foundation Training Methods The VILT course will be delivered online in 2 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 2 half-day sessions, 4 hours per session (8 hours in total). Trainer Your expert course leader is a chemistry consultant in the energy sector. He works with operators of power plants and industrial facilities. He is active in water-steam cycle chemistry, where he provides support to increase chemistry maturity through audits, trainings or development of key performance indicators. His role also includes operational assistance in the field of chemical cleaning and troubleshooting. More recently, he expanded his field of competence towards electrical storage. In this regard, he specializes in electrochemistry and is in charge of different tests on batteries and their components within the ENGIE Batteries Lab. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Assessing the Water-Steam Chemistry Cycle in Thermal Power Plants
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1203 to £1399
123...7

Educators matching "maturity"

Show all 26