• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4807 Ada courses delivered Online

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of VMware Horizon Use VMware vSphere to create VMs to be used as desktops for VMware Horizon Create and optimize Windows VMs to create VMware Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon Client™ systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the VMware Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Identify Horizon Connection Server installation, architecture, and requirements. Describe the authentication and certification options for a VMware Horizon environment Recognize the integration process and benefits of VMware Workspace ONE Access™ and Horizon 8 Discuss performance and scalability options available in Horizon 8 Describe different security options for the Horizon environment Describe the features and functions of App Volumes and Dynamic Environment Manager Demonstrate the architectures of App Volumes and Dynamic Environment Manager Install and configure App Volumes Create and deploy Application Packages and writable volumes Install and configure Dynamic Environment Manager Manage application configurations, user environment settings, and personalization settings This five-day accelerated, hands-on training course is a blend of VMware Horizon© 8: Skills for Virtual Desktop Management, VMware Horizon 8: Infrastructure Administration, and VMware App Volumes?, and VMware Dynamic Environment Manager?. Eight days of content are taught in five-days of extending learning.This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users.You learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server? and VMware Unified Access Gateway?. You also learn how to configure a load balancer for use with Horizon and how to establish Cloud Pod Architecture.Additionally, you learn how to use App Volumes to deliver applications and data to desktops and users in seconds and at scale. You gain skills in managing application life cycles from installation to update and replacement. You also learn how to use Dynamic Environment Manager to provide personalization and dynamic policy configuration across virtual, physical, and cloud-based environments to simplify end-user profile management. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of VMware Horizon Introduction to Use Case Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes vSphere for Horizon 8 Explain basic virtualization concepts Use vSphere Client to access your vCenter Server system and VMware ESXi? hosts Create, provision, and remove a virtual machine VMware Horizon Desktops Create a Windows and a Linux virtual machine using vSphere Optimize and prepare Windows and Linux virtual machines to set up VMware Horizon desktop VMs VMware Horizon Agents Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines Create a gold master for Windows Horizon desktops VMware Horizon Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the Horizon Connection Server inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access the VMware Horizon desktop using various VMware Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant-clone desktop pools Set up an automated pool of instant clones Push updated images to instant-clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of RDSH farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the VMware Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Horizon Connection Server Recognize VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the ADAM database as a critical component of the Horizon Connection Server installation VMware Horizon Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the Smartcard authentication options that Horizon Connection Server supports Outline the steps to create a VMware Horizon administrator and custom roles Describe the roles available in a VMware Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a VMware Horizon environment Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Recognize the Workspace ONE Access console features Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services VMware Horizon Performance and Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization Describe the 3D rendering options available in VMware Horizon 8 List the steps to configure graphics cards for use in a VMware Horizon environment Configure a load balancer for use in a VMware Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options Managing VMware Horizon Security Explain concepts relevant to secure VMware Horizon connections Describe how to restrict VMware Horizon connections. Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List Unified Access Gateway firewall rules Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces Overview of Application and Profile Management Profile Management Application Management Overview of App Volumes App Volumes components App Volumes Installation Overview Requirements Installing and configuring App Volumes Manager Installing the App Volumes agent Working with Application Packages Packaging Applications Maintaining Applications Working with Writable Volumes Default writable volume templates Writable volume policies at creation Updating and rescanning writable volumes Working with AppStacks Enabling AppStacks Creating and provisioning AppStacks Assigning and updating AppStacks Overriding precedence in AppStacks Overview of Dynamic Environment Manager Features and benefits VMware Dynamic Environment Manager terminology User environment settings and scope User profile scenarios Install VMware Dynamic Environment Manager Infrastructure and system requirements VMware Dynamic Environment Manager Agent (FlexEngine) requirements Group Policy configuration Management Console configuration Management Console User Interface Personalize User Profile User environment configuration Application Configuration Management Predefined and user-customized application settings Using Application Profiler Using the Self-Support Tool Using the Helpdesk Support Tool VMware Horizon Smart Policies Scope of VMware Horizon Smart Policies Configure VMware Horizon Smart Policies settings Define Smart Policies conditions Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track
Delivered OnlineFlexible Dates
Price on Enquiry

Minuting virtual meetings (In-House)

By The In House Training Company

Taking minutes is a much under-rated skill. It can be challenging at the best of times. So how do you do it for virtual meetings? This trainer-led session will help. It's a very practical programme which explores the issues specific to minuting on-line meetings and gives solutions to some of the trickier problems. Full of useful tips, the session will enable participants to: Identify how to adapt their current minute-taking skills to on-line meetings Plan and prepare for a meeting Follow a line of discussion Work in partnership with a remote Chair Deal confidently with minute-taking challenges. 1 Welcome Programme objectives Personal introductions 2 Adapting minute-taking to virtual meetings How is it different? What changes in approach are needed? 3 Preparation Preparing for the meeting Technology and equipment Dress and personal presentation Liaising with the Chair Practical preparation tips 4 Minuting tips Managing the 'techie' elements, eg. poor sound/visual quality Knowing who is speaking Following a line of discussion What if I don't hear or understand? Tips for producing a set of minutes 5 Session review Summary, key learning points, feedback and close

Minuting virtual meetings (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Reliability centred maintenance (In-House)

By The In House Training Company

Reliability Centred Maintenance (RCM) is commonly used to help establish safe minimum levels of maintenance, determine changes to operating procedures and help establish maintenance regimes and plans. Successful implementation can result in cost savings, machine uptime and improved risk management. But the devil's in the detail - how can you achieve these benefits and successfully implement RCM in your organisation? This programme will help you do just that. Note: this is a purely indicative outline. The content, duration, objectives and material used can all be adapted to match your specific requirements. To provide a better understanding of RCM, particularly: What, why, how and who? Opportunities and benefits Risks Cost effectiveness Note: this is a purely indicative outline. The content, duration, objectives and material used can all be adapted to match your specific requirements. 1 What is maintenance? Why maintain? Traditional maintenance methods Common current practices and trends 2 What is Reliability Centred Maintenance? Its history Its development Current usage Where can it be cost-effective? 3 How does it work? Basic features Key criteria Maintenance options Key outcomes 4 Making the business case and preparing the strategy Identifying and quantifying current risks Identifying and quantifying current costs Motivating decision-makers Identifying and empowering those who have to deliver the results Educating / gaining buy-in from interested parties 5 Implementation Identify business functions Prioritise functions Verify correct usage Identify failure modes Identify the consequences of failure Understand the failure process Specify the appropriate maintenance action(s) 6 Ongoing requirements Monitoring Recording Analysis Continuous re-evaluation 7 Open discussion Sharing experience and addressing specific issues of interest to participants Course review Close

Reliability centred maintenance (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Price increases (In-House)

By The In House Training Company

It's a fact of life that costs generally increase and as a result prices must go up too. Implementing an increase without losing customers is challenging. Talking about a price increase with customers never makes for an easy conversation. Your customers will generally decide whether to accept the increase based upon value, as well as the hassle cost of switching and going elsewhere. Even the most experienced salesperson who has implemented price increases before will be fighting back the nerves when faced with the task of 'selling' the increase. In this flexible programme, we will support your internal preparations at whichever stage you and your colleagues are at. From making the decision to increase prices, right through to those on the frontline already dealing with any push-back. This programme will help participants: Understand the business case for increasing prices Take steps to research the market Consider their customers' motivations Use the six principles of influence Identify and adapt for different personality styles Assess their level of trust with customers Build rapport rapidly with their customers and prospects 1 Raising prices - keys to success Understanding the business case Researching the market Assessing the value of your offering 2 Understanding your customer base Assessing your key accounts What is your 'target' customer range? Creating consistency in pricing approach 3 Planning the increase Timing your implementation Communication strategy Elements of a good price increase letter 4 Developing influencing skills The Trust Equation The six principles of influence Discovering your customer's buying decisions 5 Emotional intelligence and price increases The part emotion plays Developing strategies for keeping calm Handling your customer's responses 6 Understanding different customer styles Discover your own style Recognising behaviour traits in others Adapting your approach to their style 7 Preparing for customer contact Preparing for specific customers Anticipating their response Dealing with challenging customers 8 Following through Maintaining a consistent approach Resisting requests for discounts Confirming the increase in writing

Price increases (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Maintenance and operation (M&O) of engineering plant and services (In-House)

By The In House Training Company

M&O of engineering plant and services is becoming more important to the success of the core business. To select the right M&O technique for specific plant and equipment it is necessary to know what options are available, what they deliver and how they should be implemented. This course will help you consider options and techniques that provide best value based on that thorough understanding of the business need. M&O will increasingly be required to demonstrate it is delivering the optimum of cost and value and the main purpose of the course is to show how this can be achieved. Note: this is a purely indicative list of topics that can be covered. The content, duration, objectives and material used would all be adapted to match your specific requirements. This course will help you: Determine what the business needs from the M&O service Determine the cost and value of the various M&O options Prepare and present the business case for the selected M&O strategy Introduce meaningful KPIs based on performance-based service by the M&O provider Undertake a review of current M&O and make recommendations for improvement Introduce energy and carbon management performance criteria in M&O Better deal with project risk and uncertainties Motivate others to deliver a reliable and cost effective M&O service Note: this is a purely indicative list of topics that can be covered. The content, duration, objectives and material used would all be adapted to match your specific requirements. 1 What is maintenance and what is operation? - their relative importance to the business 2 Comparison of the various maintenance options and techniques, including: Planned preventative Run to failure Condition monitoring Business focused Business critical Total productive Reliability centred maintenance 3 Forms of contracts and service, including: Comprehensive Input driven Output driven Limited replacement Performance based M&O 4 Selecting the right options and making the business case 5 Continuous commissioning as a tool for delivering best value 6 Case studies

Maintenance and operation (M&O) of engineering plant and services (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Developing the high performing team takes time and effort. But above all, it requires an understanding of the dynamics of high performing teams. This programme helps managers and leaders understand what high performing teams do and how they do it. It focuses on enabling managers to see their teams from different perspectives, allowing them to adapt their styles to maximise team outputs. A core theme is the need for managers of teams to 'hold up the mirror' to themselves and to see themselves as a leader of people, to reflect on how others see them and to modify their style accordingly. This programme will help managers / team leaders: Analyse the constituents of a 'high performing' team Apply essential influencing techniques Use a range of communication techniques to support effective teamwork Create and articulate team vision Generate common values Assess team effectiveness and take/recommend the appropriate actions Make more efficient use of team time Understand and agree on techniques to manage conflict Define and implement team meeting protocols that will facilitate team effectiveness Use the Prime Focus model to create the environment and framework for a high performing team Draft your team strategy to take them to the next level Day 1 1 Welcome and introduction Participants are welcomed to the programme and invited to share their personal objectives and people challenges Participants are given an action plan template to complete throughout the workshop 2 Your team The concept of 'positive intention' The difference between a team and a high performing team Assess your team effectiveness What is your 'interference'? 3 The team environment Setting the scene Building rapport Active listening Team goals and role profiling 4 Your style Tuckman model of team stages - how do you manage each stage? Team standards and goals Your team vision 5 Effective team meetings Influencing in team meetings How to make them interesting and relevant The pure role of the chair Day 2 1 Effective communication techniques Giving and receiving feedback Your communication style How to adapt, pace and lead to build rapport The Mehrabian theory of communication 2 How to manage conflict What is conflict? What is your default conflict approach? Tools and tips for managing conflict Practice sessions 3 Team skills Undertake a team skills analysis Types of team member Motivating team members Reframing situations 4 Setting your strategy Seeing the bigger picture The Prime Focus Model Your strategy for success Articulating your strategy Action plans revisited

Teams (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Agile project management (In-House)

By The In House Training Company

Agile project management, already widely used for software development, is increasingly recognised as having much more general application. Continuous improvement programmes, business change projects, new technology development, research and development and a variety of other scenarios characterised by rapid change and high uncertainty can all benefit from an Agile approach. This programme presents the concepts and methods of Agile project management, and shows how to apply them to a range of project and change management situations. Participants will learn: how Agile project management can help with project and change management the 4 values and 12 principles of the Agile 'manifesto' and the range of Agile methodologies how to apply Agile project management methods and techniques in a range of project scenarios alternative Agile project management methods and how they can be applied and adapted what makes Agile project teams succeed the key roles and responsibilities needed to enable Agile project teams to work effectively how to encourage an Agile mindset within their organisation and how to move toward an Agile approach to managing projects 1 Introduction to Agile project management Overview of 'classical' project management and methodologies The link between project success and management performance Limitations of classical approaches and the need for Agile methods The 4 values and 12 principles of the Agile manifesto explained Agile project management values:Individuals and interactions over processes and toolsWorking outputs over comprehensive documentationCustomer collaboration over contract negotiationResponding to change over following a plan The cultural challenges of using Agile project management Choosing when and how to adopt Agile project management 2 Initiating a project using Agile project management Some key Agile methodologies explained: SCRUM, XP, Crystal Identifying and engaging project stakeholders; defining roles and responsibilities Setting the project vision and goals; defining project scope The Agile approach to requirements capture and elicitation of needs Tools and techniques for capturing and characterising requirements The role of documentation, reporting and process management 3 The Agile approach to definition and planning Understanding Agile planning; the 'planning onion' concept Developing the culture needed for collaborative involvement and iterative planning Defining project deliverables; the 'product backlog' concept Tools and techniques for defining and prioritising requirements in Agile projects Understanding and applying Agile estimating techniques Dealing with uncertainty and managing risks 4 The Agile approach to execution and delivery The results orientated, fast adapting culture of Agile teams The monthly 'Sprint' process for project planning and review The disciplines needed for effective daily SCRUM meetings Reviewing progress, managing change and project reporting Testing, completing and handing over of work packages Managing the interface between the project team and the business 5 Leadership and teamwork in Agile project teams Why Agile teams are different: the importance of individuals and interactions The skills and attributes needed to lead an Agile project team The challenges faced and skills needed by Agile team members Recognising team development needs; adopting the right leadership style Making the transition from project manager to Agile coach Key coaching skills explored: mentoring, facilitating, managing conflict

Agile project management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Effective technical writing (In-House)

By The In House Training Company

The aim of this programme is to help attendees create better quality technical documents in an organised and efficient manner. It will give those new to the topic an appreciation of how to approach the task professionally whilst those with more experience will be able to refresh and refine their skills. The programme comprises three complementary one-day modules: The programme presents a structured methodology for creating technical documents and provides a range of practical techniques that help delegates put principles into practice. Although not essential, it is strongly advised that delegates for modules 2 and 3 have already attended module 1, or another equivalent course. Note: the content of each module as shown here is purely indicative and can be adapted to suit your particular requirements. This course will: Explain the qualities and benefits of well written technical documents Present a structured approach for producing technical documents Review the essential skills of effective technical writing Demonstrate practical methods to help create better documents Provide tools and techniques for specification and report writing Review how technical documents should be issued and controlled Note: the content of each module as shown here is purely indicative and can be adapted to suit your particular requirements. Module 1: Essential skills for technical writers 1 Introduction to the programme Aims and objectives of the module Introductions and interests of participants 2 Creating effective technical documents What is technical writing? how does it differ from other writing? Key qualities of an effective technical document Communication essentials and the challenges faced by technical writers The lessons of experience: how the best writers write The five key steps : prepare - organise - write - edit - release (POWER) 3 Preparing to write Defining the document aims and objectives; choosing the title Understanding technical readers and their needs Getting organised; planning and managing the process Integrating technical and commercial elements The role of intellectual property rights (IPR), eg, copyright 4 Organising the content The vital role of structure in technical documents Deciding what to include and how to organise the information Categorising information: introductory, key and supporting Tools and techniques for scoping and structuring the document Creating and using document templates - pro's and con's 5 Writing the document Avoiding 'blinding them with science': the qualities of clear writing Problem words and words that confuse; building and using a glossary Using sentence structure and punctuation to best effect Understanding the impact of style, format and appearance Avoiding common causes of ambiguity; being concise and ensuring clarity Using diagrams and other graphics; avoiding potential pitfalls 6 Editing and releasing the document Why editing is difficult; developing a personal editing strategy Some useful editing tools and techniques Key requirements for document issue and control Module 2: Creating better specifications 1 Introduction Aims and objectives of the day Introductions and interests of participants The 'POWER' writing process for specifications 2 Creating better specifications The role and characteristics of an effective specification Specifications and contracts; the legal role of specifications Deciding how to specify; understanding functional and design requirements Developing the specification design; applying the principles of BS 7373 Getting organised: the key stages in compiling an effective specification 3 Preparing to write a specification Defining the scope of the specification; deciding what to include and what not Scoping techniques: scope maps, check lists, structured brainstorming The why/what/how pyramid; establishing and understanding requirements Clarifying priorities; separating needs and desires: the MoSCoW method Useful quantitative techniques: cost benefit analysis, QFD, Pareto analysis Dealing with requirements that are difficult to quantify 4 Organising the content The role of structure in specifications Typical contents and layout for a specification What goes where: introductory, key and supporting sections Creating and using model forms: the sections and sub sections Detailed contents of each sub-section Exercise: applying the tools and techniques 5 Writing the specification Identifying and understanding the specification reader Key words: will, shall, must; building and using a glossary Writing performance targets that are clear and unambiguous Choosing and using graphics Exercise: writing a specification 6 Editing and releasing the document Key editing issues for specifications Issue and control of specifications Module 3: Writing better reports 1 Introduction Aims and objectives of the day Introductions and interests of participants The 'POWER' technical writing process for technical reports 2 Creating better reports What is a technical report? types and formats of report The role and characteristics of an effective technical report Understanding technical report readers and their needs The commercial role and impact of technical reports Getting organised: the key stages in compiling a technical report 3 Preparing to write reports Agreeing the terms of reference; defining aims and objectives Being clear about constraints; defining what is not to be included Legal aspects and intellectual property rights (IPR) for reports Preparing the ground; gathering information and reference documents Keeping track of information: note making, cataloguing and cross referencing Tools and techniques for developing a valid and convincing argument 4 Organising the content The role of structure reviewed; some typical report structures Who needs what: identifying the varied needs of the readership What goes where: introductory, key and supporting sections Creating and using model forms: the sections and sub sections Detailed contents of each sub-section Exercise: applying the tools and techniques 5 Writing the report Planning the storyline: the report as a journey in understanding Recognising assumptions about the reader; what they do and don't know Converting complex concepts into understandable statements Presenting technical data and its analysis; the role of graphics Presenting the case simply whilst maintaining technical integrity Exercise: writing a technical report 6 Editing and releasing the report Key editing issues for technical reports Issue and control of technical reports

Effective technical writing (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Abdominal and Cardiac Ultrasound Webinar Series

4.8(6)

By CelticSMR

Join this course for full access to our Small Animal Sonography Webinar archive.  Speaker: Mark Overend qualified from Glasgow University in 1990 and since then has held several positions and Directorships within practice and the veterinary industry. He was awarded the ESVPS GP Cert in cardiology in 2010, and a the PgC (Small Animal Cardiology Studies) (Distinction) from Harper Adams University in 2017. Mark has been running a cardiology and ultrasound referral service for the last 12 years (now a travelling service) but also lectures to and trains vets all over the UK in the fields of Ultrasound and Cardiology.

Abdominal and Cardiac Ultrasound Webinar Series
Delivered Online On Demand1 hour
FREE