Duration 4.5 Days 27 CPD hours This course is intended for This course is intended for individuals who want to gain basic knowledge of business skills. Overview Upon successful completion of this course, students will be able to communicate and work effectively in a business environment. In this course, students will learn about all different aspects of business skills needed be effective in an office environment. Accessing PDF Documents Open a PDF Document Browse a PDF Document Creating & Saving PDF Documents Create and Save a PDF Document from an Existing Document Create a PDF Document from a Web Page Combine Multiple PDF Documents Navigating Content in a PDF Document Perform a Search in a PDF Document Search Multiple PDF Documents Work with Bookmarks Create Links and Buttons Modifying PDF Documents Manipulate PDF Document Pages Edit Content in a PDF Document Add Page Elements Reviewing PDF Documents Add Comments and Markup Compare PDF Documents Initiate and Manage a Review Converting PDF Files Reduce the File Size of a PDF Document Optimize PDF Files Convert and Reuse PDF Document Content Customizing the Acrobat XI Pro Workspace Customize the Toolbars Customize the Tool Sets Creating PDFs from Technical Documents Create PDF Documents Using Autodesk AutoCAD Measure Technical Drawings Enhancing PDF Documents Embed Multimedia Enhance PDF Document Accessibility Securing PDF Documents Manage the Security of PDF Documents Validate PDF Documents Creating Interactive PDF Forms Create a PDF Form Compile and Manage PDF Form Data Finalizing PDF Files for Commercial Printing Apply Color Management Settings Preview Printed Effects Perform Preflight on a PDF Document Create PDF/X, PDF/A, and PDF/E Compliant Files Create a Composite and Color Separations Accessing & Navigating SharePoint Team Sites Access SharePoint Sites Navigate SharePoint Sites Working with Documents, Content, & Libraries Upload Documents Search for Documents and Files Working with Lists Add List Items Modify List Items Configure List Views Filtering and Grouping with List Views Configuring Your SharePoint Profile Update and Share Your Profile Information Share and Follow SharePoint Content Creating a Blog Integrating with Microsoft Office Access and Save SharePoint Documents with Microsoft Office Manage Document Versions through Office 2013 Accessing SharePoint Data from Outlook 2013 Working Offline & Remotely with SharePoint Synchronize Libraries, Sites, and MySite and Working Offline Working from a Mobile Device Creating a New Site Create a Site Change the Look and Feel of Your SharePoint Site Adding & Configuring Libraries Configure Document Library for Your SharePoint Team Site Configure the Site Assets Library for Your SharePoint Site Add and Configure a Wiki for Your SharePoint Site Adding & Configuring Lists Add an Announcement List Add and Configure a Task List Add and Configure Contact and Calendar Lists Add and Configure a Blog Subsite Add and Configure a Custom List to your SharePoint Site Customize List Forms Configuring Site Settings, Navigation, & Search Configure Site Search Options Configure Site Administration Settings Configure Site Organization and Navigation Assigning Permissions & Access Rights Sharing Sites and Setting Site Permissions Secure Lists, Libraries, and Documents Configure Content Roll-Up, Summary Links, & Site Map Add and Configure the Content Search Web Part Add and Configure the Relevant Documents Web Part Identifying Nouns, Pronouns, & Verbs Identify Nouns Identify Pronouns Identify Verbs Identifying Adjectives & Adverbs Use Adjectives Use Adverbs Indentifying Prepositions, Conjunctions, and Interjections Use Prepositions Use Conjunctions Use Interjections Identifying Rules Monitor Sentences Monitor Modifiers Avoid Common Errors Identifying Correct Punctuation Use Parentheses Correctly Use Commas, Semicolons, and Quotation Marks Use Numbers, Symbols, and Capitalization Correctly Identifying Sentence Fragments, Run-Ons, and Comma Splices Identify Sentence Fragments Identify Run-ons, Comma Splices, and Solutions Improving Word Choices Identify Commonly Misused Words Identify Synonyms, Antonyms, and Homonyms Building Effective Sentences Identify the Goal Consider the Audience Consider the Context Editing Effectively Use Correct Spelling Achieve Clarity Avoiding Hypercorrections Avoid Hypercorrections Achieve Simplicity Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives Working with Words Spelling Grammar Creating a Cheat Sheet Constructing Sentences Parts of a Sentence Punctuation Types of Sentences Creating Paragraphs The Basic Parts Organization Methods Writing Meeting Agendas The Basic Structure Choosing a Format Writing the Agenda Writing E-Mails Addressing Your Message Grammar and Acronyms Writing Business Letters The Basic Structure Choosing a Format Writing the Letter Writing Proposals The Basic Structure Choosing a Format Writing the Proposal Writing Reports The Basic Structure Choosing a Format Be guided by the: The purpose of the report The seniority of your readers Writing the Report Other Types of Documents Requests for Proposals Projections Executive Summaries Business Cases Proofreading & Finishing A Proofreading Primer How Peer Review Can Help Printing and Publishing Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations E-Mail Basics E-mail characteristics Writing online versus on paper Understanding the advantages and disadvantages of e-mail Understanding the cultural significance of e-mail E-mail programs Using an e-mail program to send e-mail When to use e-mail Communicating by e-mail Understanding when to avoid using e-mail Writing an e-mail message Using the MAIL acronym E-Mail Policies Company policies Avoiding improper e-mail messages Ensuring employee compliance to e-mail policies Copyright laws, viruses, and liability Avoiding copyright infringement Avoiding viruses Identifying e-mail liability E-Mail Features & Security Features of an e-mail program Using attachments Using priority labels and signature files Features of an e-mail program Using attachments Using priority labels and signature files Discussing e-mail program options Securing e-mail Usi Additional course details: Nexus Humans Business Applications training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Applications course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system integrators, and consultants responsible for implementing and managing VMware Cloud Foundation Overview By the end of the course, you should be able to meet the following objectives: Describe design implications of VMware Cloud Foundation standard or consolidated architecture List requirements for VMware Cloud Foundation deployment Describe the VMware Cloud Foundation bring-up process and the VMware Cloud Foundation architecture Perform VMware Cloud Foundation bring-up Describe physical and virtual networking considerations Outline VMware Cloud Foundation storage options Use the VMware Imaging Appliance to image ESXi hosts Describe VMware Cloud Foundation multi-instance federation Use VMware Cloud Foundation⢠SDDC Manager⢠to perform operational tasks Describe user roles in VMware Cloud Foundation and VMware vSphere Manage users and passwords using VMware Cloud Foundation Manage certificate rotation for VMware Cloud Foundation components Use Active Directory integration to automate certificate generation and rotation Describe workload domains Manage workload domains in VMware Cloud Foundation Manage VMware NSX-T⢠for VMware Cloud Foundation Describe use cases for Application Virtual Networks (AVNs) Meet vSphere with VMware Tanzu⢠requirements Deploy a vSphere with Tanzu enabled workload domain Manage VMware vSAN⢠storage in a workload domain Create vSAN storage policies Describe Cloud Native storage Describe the importance of business continuity measures in VMware Cloud Foundation Plan appropriate backup and restore workflows for VMware Cloud Foundation components Implement stretched clusters in VMware Cloud Foundation workload domains This five-day course includes instruction on the capabilities of VMware Cloud Foundation? and how to successfully plan, deploy, manage, and operate hybrid and cloud infrastructures, including customization. The course explains the architecture of VMware Cloud Foundation and explains licensing, certificates, and storage and network management. The course also covers workload domains, availability, life cycle management, and troubleshooting. Course Introduction Introductions and course logistics Course objectives VMware Cloud Foundation Overview Describe the VMware Cloud Foundation solution Describe VMware Cloud Foundation architecture Identify VMware Cloud Foundation components Describe VMware Cloud Foundation topology Define VMware Cloud Foundation terminology Day Zero Tasks Identify the requirements for deploying VMware Cloud Foundation Identify management domain sizing considerations Identify workload domain sizing considerations Detail design considerations for ESXi in management and VI workload domains Detail design considerations for vCenter in management and VI workload domains Detail the VMware Cloud Foundation bring-up process Identify information required for the Planning and Preparation Workbook Identify information required for the Deployment Parameter Workbook Describe how VMware Cloud Builder automates the deployment process Explain how the Deployment Parameter Workbook is imported into VMware Cloud Builder Recognize the configuration validation process performed by VMware Cloud Builder Detail the deployment of the management domain Recognize the options to image a host Identify the key capabilities of VIA Recognize how to use VIA for imaging the ESXi Nodes Post Deployment Operations Understand VMware Cloud Foundation integration with VMware Single Sign-On Configure user access to VMware Cloud Foundation Describe the importance of user roles in vSphere Configure identity sources in vSphere to use with VMware Cloud Foundation Manage passwords in VMware Cloud Foundation Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components Detail the best practices for password management for VMware Cloud Foundation Retrieve and secure the password list Describe the process for rotating passwords not managed by VMware Cloud Foundation VMware Cloud Foundation License Management Describe how to add license keys to the VMware Cloud Foundation inventory Describe how to view license keys in SDDC Manager Describe how to assign license keys Describe how to remove license keys Describe how to replace expiring licenses VMware Cloud Foundation Networking with NSX-T Describe NSX Management plane and Control planes Detail design considerations for workload domains with shared NSX Manager instances Detail design considerations for workload domains with dedicated NSX Manager instances Describe the spine-and-leaf design Describe the addressing scheme for the underlay Recognize possible variations of the spine-and-leaf design Describe the multi-NIC design Describe NSX Edge node design and BGP peering with the physical network Describe cluster design and rack design Explain dynamic routing with BGP Explain virtual IP addressing Describe logical switching Detail NSX Edge functions Define application virtual networks Describe management domain rack options List NSX Edge cluster requirements for vSphere with Tanzu Discuss NSX Edge cluster placement considerations Describe NSX-T Data Center deployment in VMware Cloud Foundation Explain how logical routing works in NSX-T Data Center Identify NSX Edge functions Describe data plane preparation for NSX-T Data Center Edge nodes in a workload domain Recognize Tier-0 and Tier-1 gateway topologies Recognize features of NSX distributed firewalls Describe the benefits of NSX Federation in VMware Cloud Foundation Identify NSX Federation Use Cases Explain NSX Federation Components and Architecture Discuss NSX Federation configuration basics Managing Workload Domains Define workload domains Detail design considerations for vSphere networking in management and VI workload domains Detail design considerations for storage in management and VI workload domains Recognize design choices for a consolidated design or standard design List the types of workload domains State scale limits for workload domains Identify use cases for multiple clusters in a workload domain List workload domain prerequisites Explain how to create a workload domain Describe how to scale a workload domain Explain how to delete a workload domain Describe host decommissioning vSphere with Tanzu in VMware Could Foundation Discuss the vSphere with Tanzu solution Define the role of Spherelet Describe the supervisor cluster control plane Define vSphere with Tanzu namespaces Describe the role of NSX-T networking components Discuss vSphere with Tanzu networking topology Describe VMware Container Networking with Antrea Describe control plane VM management networking requirements Plan appropriate IP address CIDR ranges for pod, ingress, and egress networking Describe prerequisites for vSphere with Tanzu cluster compatibility Deploy vSphere with Kubernetes Create a vSphere namespace Configure limits and permissions for a vSphere namespace Enabling Harbor Image Registry VMware Cloud Foundation Storage Management Identify vSAN architecture and components Recognize storage options for VMware Cloud Foundation Recognize the connectivity options for supplemental storage Explain why vSAN is the best option for VMware Cloud Foundation storage Recognize vSAN design considerations Identify sizing and performance considerations that impact the storage design Describe vSAN requirements for the management and workload domains Define deduplication and compression Discuss how to scale vSAN clusters in VMware Cloud Foundation Explain how storage policies work with VMware Cloud Foundation vSAN clusters Explain storage policy failure tolerance rules Identify a VM storage policy compliance status Relate storage policies to Kubernetes storage classes Describe persistent volumes Monitor Cloud Native Storage in the vSphere Client Availability and Business Continuity Identify steps in the SDDC Manager backup and restore process Recognize the importance of external service availability Describe native vSphere availability options Identify steps in the NSX backup and restore process Identify stretched cluster use cases Identify stretched cluster components Recognize stretched cluster requirements in VMware Cloud Foundation Prepare and deploy a vSAN stretched cluster using APIs VMware Cloud Foundation Certificate Management Describe public key infrastructure (PKI) Explain the purpose of certificate signing requests (CSRs) List the available CA options in SDDC Manager Describe how to view certificates Explain how to generate a CSR Describe how to replace and install certificates for VMware Cloud Foundation components List the available CA options in SDDC Manager Explain how to configure the Microsoft CA server Describe how to install certificates issued by the Microsoft CA server Explain how to add OpenSSL CA in SDDC Manager Describe how to install certificates issued by OpenSSL CA Explain how to install certificates issued by third-party CAs
Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp
This five-day programme empowers participants with the skills and knowledge to understand and effectively apply best practice commercial and contracting principles and techniques, ensuring better contractor performance and greater value add. This is an assessed programme, leading to the International Association for Contracts & Commercial Management (IACCM)'s coveted Contract and Commercial Management Practitioner (CCMP) qualification. By the end of this comprehensive programme the participants will be able to: Develop robust contracting plans, including scopes of work and award strategies Undertake early market engagements to maximise competition Conduct effective contracting and commercial management activities, including ITT, RFP, negotiated outcomes Understand the legalities of contract and commercial management Negotiate effectively with key stakeholders and clients, making use of the key skills of persuading and influencing to optimise outcomes Undertake effective Supplier Relationship Management Appreciate the implications of national and organisational culture on contracting and commercial activities Appreciate professional contract management standards Set up and maintain contract and commercial management governance systems Take a proactive, collaborative, and agile approach to managing commercial contracts Develop and monitor appropriate and robust KPIs and SLAs to manage the contractor and facilitate improved contractor performance Appreciate the cross-functional nature of contract management Collaborate with clients to deliver sustainable performance and to manage and exceed client expectations Understand the roles and responsibilities of contract and commercial managers Use effective contractor selection and award methods and models (including the 10Cs model) and use these models to prepare robust propositions to clients Make effective use of lessons learned to promote improvements from less than optimal outcomes, using appropriate templates Effectively manage the process of change, claims, variations, and dispute resolution Develop and present robust propositions Make appropriate use of best practice contract and commercial management tools, techniques, and templates DAY ONE 1 Introduction Aims Objectives KPIs Learning strategies Plan for the programme 2 The contracting context Key objectives of contract management Importance and impact on the business 3 Critical success factors Essential features of professional commercial and contract management and administration The 6-step model 4 Putting the 'management' into commercial and contract management Traditional v 'new age' models The need for a commercial approach The added value generated 5 Definitions 'Commercial management' 'Contract management' 'Contracting' ... and why have formal contracts? 6 Stakeholders Stakeholder mapping and analysis The 'shared vision' concept Engaging with key functions, eg, HSE, finance, operations 7 Roles and responsibilities Contract administrators Stakeholders 8 Strategy and planning Developing effective contracting plans and strategies DAY TWO 1 Contract control Tools and techniques, including CPA and Gantt charts A project management approach Developing effective contract programmes 2 The contracting context Key objectives of contract management Importance and impact on the business 3 Tendering Overview of the contracting cycle Requirement to tender Methods Rationale Exceptions Steps Gateways Controls One and two package bids 4 Tender assessment and contract award I - framework Tender board procedures Role of the tender board (including minor and major tender boards) Membership Administration Developing robust contract award strategies and presentations DAY THREE 1 Tender assessment and contract award II - processes Pre-qualification processes CRS Vendor registration rules and processes Creating bidder lists Disqualification criteria Short-listing Using the 10Cs model Contract award and contract execution processes 2 Minor works orders Process Need for competition Role and purpose Controls Risks 3 Contract strategy Types of contract Call-offs Framework agreements Price agreements Supply agreements 4 Contract terms I: Pricing structures Lump sum Unit price Cost plus Time and materials Alternative methods Target cost Gain share contracts Advance payments Price escalation clauses 5 Contract terms II: Other financial clauses Insurance Currencies Parent body guarantees Tender bonds Performance bonds Retentions Sub-contracting Termination Invoicing 6 Contract terms III: Risk and reward Incentive contracts Management and mitigation of contractual risk DAY FOUR 1 Contract terms IV: Jurisdiction and related matters Applicable laws and regulations Registration Commercial registry Commercial agencies 2 Managing the client-contractor relationship Types of relationship Driving forces Link between type of contract and style of relationships Motivation - use of incentives and remedies 3 Disputes Types of dispute Conflict resolution strategies Negotiation Mediation Arbitration DAY FIVE 1 Performance measurement KPIs Benchmarking Cost controls Validity of savings Balanced scorecards Using the KPI template 2 Personal qualities of the contract manager Negotiation Communication Persuasion and influencing Working in a matrix environment 3 Contract terms V: Drafting skills Drafting special terms 4 Variations Contract and works variation orders Causes of variations Risk management Controls Prevention Negotiation with contractors 5 Claims Claims management processes Controls Risk mitigation Schedules of rates 6 Close-out Contract close-out and acceptance / completion HSE Final payments Performance evaluation Capturing the learning 7 Close Review Final assessment Next steps
Medication Awareness training is essential in the Health and Social Care Sector. This course aims to provide learners with the knowledge required to support the use of medication in Health and Social Care settings. It provides information on the different types, classifications and forms of medication, as well as providing guidance on safe storage and disposal.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for System and network engineers, technical architects and technical support personnel Overview Upon successful completion of this course, students will be able to install and operate a Cisco DNA Center (DNAC) This course will cover the basics of installing and operation of the Cisco DNA Center (DNAC). The Cisco DNAC is a stand-alone product that provides a single dashboard for every fundamental management task to simplify running an enterprise network. The DNAC is the management piece of the Software Defined Access (SDA) solution. Intent-based Networking overview DNA Center overview. DNA Center as a Platform. DNA Center Architecture & Design. DNA Center Installation DNA Center/Identity Services Engine (ISE) Integration ISE Integration configuration in DNA Center. DNA - Global - Add servers (e.g. ISE server(s)). DNA Center integration configuration in ISE. Approve pxGrid in ISE.Verify DNA/ISE integration DNA Center - Device Inventory Add networks devices to the DNA Center device inventory. Verify DNA Center Inventory configuration. DNA Center - Design - Network Hierarchy. Verify DNA Center - design configuration DNA Center - Design - Software Image Management (SWIM) Review SWIM image repository listing. Create golden software image & role. Verify golden software image creation DNA Center - Design ? Templates and Policies Templates ? Apache Velocity Engine. Command Runner. Policies: Group-Based, Application,Traffic Copy, IP-Based DNA Center - Provision Configuration Add devices to newly created sites/locations. Plug and Play (PnP). Verify DNA Center - provision configuration. DNA Center - Assurance Collection. DNA Center ? Administration
Power BI is a powerful data visualisation program that allows businesses to monitor data, analyse trends, and make decisions. This course is designed to provide a solid understanding of the reporting side of Power BI, the dashboards, where administrators, and end users can interact with dynamic visuals that communicates information. This course focuses entirely on the creation and design of visualisations in dashboards, including a range of chart types, engaging maps, and different types of tables. Designing dashboards with KPI's (key performance indicators), heatmaps, flowcharts, sparklines, and compare multiple variables with trendlines. This one-day programme focuses entirely on creating dashboards, by using the many visualisation tools available in Power BI. You will learn to build dynamic, user-friendly interfaces in both Power BI Desktop and Power BI Service. 1 Introduction Power BI ecosystem Things to keep in mind Selecting dashboard colours Importing visuals into Power BI Data sources for your analysis Joining tables in Power BI 2 Working with data Utilising a report theme Table visuals Matrix visuals Drilling into hierarchies Applying static filters Group numbers with lists Group numbers with bins 3 Creating visuals Heatmaps in Power BI Visualising time-intelligence trends Ranking categorical totals Comparing proportions View trends with sparklines 4 Comparing variables Insert key performance indicators (KPI) Visualising trendlines as KPI Forecasting with trendlines Visualising flows with Sankey diagrams Creating a scatter plot 5 Mapping options Map visuals Using a filled map Mapping with latitude and longitude Mapping with ArcGIS or ESRI 6 Creating dashboards High-level dashboard Migration analysis dashboard Adding slicers for filtering Promote interaction with nudge prompts Searching the dashboard with a slicer Creating dynamic labels Highlighting key points on the dashboard Customised visualisation tooltips Syncing slicers across pages 7 Sharing dashboards Setting up and formatting phone views Exporting data Creating PDF files Uploading to the cloud Share dashboards in SharePoint online
Getting Started The Master of Business Administration Top Up is a prestigious postgraduate qualification that leading employers highly value. The programme is designed to enhance business managers' strategic thinking and decision-making and develop their critical understanding of business management. The programme is designed for individuals who hold a Qualifi Level 7 Diploma in Strategic Management and Leadership. This programme covers the core business sectors: entrepreneurship, marketing, accounting, statistics, finance, business ethics, business law, managerial economics, business strategy and analysis, operations, administration and communication. This programme, qualified from UK business schools, is well acknowledged and globally respected as it dominates critical thinking and research. MBA can also help you specialise in a new industry you want to move to or in your current sector. This professional qualification improves the chances of progression in a career path. This qualification helps the learner to oversee, supervise and allocate the operations in a business firm. The programme aims to make the candidate capable of understanding the functional aspects of a company and acquiring the skills for communication and decision-making. The MBA Top-Up programme is awarded and delivered 100% online by Anglia Ruskin University. At Anglia Ruskin University, you will study through Canvas, a world-class online Learning Management System (LMS), accessed from your phone, pc or tablet at home or on the move. Canvas provides instant access to study materials, forums, and support from tutors and classmates, as well as enabling easy submission of your assignments. After successfully completing your studies, you'll be invited to attend a graduation ceremony on campus at Anglia Ruskin University. If attending the ceremony in person is not possible, we'll arrange to send your certificate to you. School of Business and Technology London partners with Chestnut Education Group to promote this programme. About Awarding Body Anglia Ruskin University began in 1858 as the Cambridge School of Art founded by William Beaumont. It was then merged with the Cambridge shire College of Arts and Technology and the Essex Institute of Higher Education and was renamed Anglia Polytechnic. It was then given university status in 1992 and renamed Anglia Ruskin University in 2005. The university has campuses in the UK (Cambridge, Chelmsford, London and Peterborough), as well as they are partnered with institutions around the world including Berlin, Budapest, Trinidad, Singapore and Kuala Lumpur. Assessment Major Project No examinations Entry Requirements Qualifi Level 7 Diploma in Strategic Management and Leadership or any equivalent diploma Further, candidates are also required to demonstrate their English language proficiency. Progression An MBA graduate can pursue a fruitful career in many industries. MBA can open career opportunities in various sectors such as banking and financial services, investment banking, management consulting, insurance, hospitality, media, information technology (IT) and marketing. MBA is often a pathway to promotion or a career change as you will gain a professional reputation and develop essential skills in the sector one chooses to pursue. Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. Structure MBA Top-Up Programme Structure Dissertation (Major Project) Delivery Methods The MBA Top-Up programme is awarded and delivered 100% online by Anglia Ruskin University. At Anglia Ruskin University, you will study through Canvas, a world-class online Learning Management System (LMS), accessed from your phone, pc or tablet at home or on the move. Canvas provides instant access to study materials, forums, and support from tutors and classmates, as well as enabling easy submission of your assignments. After successfully completing your studies, you'll be invited to attend a graduation ceremony on campus at Anglia Ruskin University. If attending the ceremony in person is not possible, we'll arrange to send your certificate to you. School of Business and Technology London partners with Chestnut Education Group to promote this programme. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.
Trade barriers are going up across the globe. And cybercrime is on the increase. The link between the two? The value of trade secrets. As countries become increasingly protectionist as regards international trade, so their IP law has been changing, with the result that companies that previously would have sought protection through patents are opting to go down the trade secret route instead. But is this a high-risk strategy? Technology is changing and this is having an impact on forms of commercial co-operation. Collaborative or open forms of innovation by their very nature involve the sharing of intellectual property (IP), and in many instances this IP is in the form of valuable confidential business information (ie, trade secrets). Little surprise, then, that trade secrets disputes have increased accordingly. At the same time, the changes in technology make trade secrets more vulnerable to attack, misappropriation, theft. So just how effective are the legal protections for trade secrets? How can organisations safeguard the value in their IP (increasingly, the single biggest line in their balance sheets)? This programme is designed to help you address these issues. Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. This session is designed to give you a deeper understanding of: Emerging trends in trade secrets protection and exploitation The current situation in key jurisdictions Recent case law How leading companies are responding The importance of trade secret metadata Different external stakeholders and their interests Key steps for effective protection of trade secrets Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. 1 What are trade secrets? Definitions Examples Comparison with other forms of IP (patents, confidential information, know-how, copyright) 2 Current trends The various changes taking place affecting trade secrets - legal changes, trade wars, cybercrime, technology, commercial practice The current position in the UK, Europe, USA, China, Japan, Russia Corporate best practice 3 Trade secret disputes - how to avoid them Trade secret policies, processes and systems Administrative, legal and technical protection mechanisms The role of employees The sharing of trade secrets with others 4 Trade secret disputes - how to manage them Causes Anatomy of a trade secret court case 'Reasonable particularity' 5 Related issues Insurance Tax authorities and investigations Investor relations 6 Trade secret asset management roadmap Maturity ladder First steps Pilot projects
This two-day programme gives the key insights and understanding of contracting principles and the impact they have on business and operations. The course is designed for individuals involved in or supporting contracting who want to improve their commercial management skills; individuals in functions such as project management, business development, finance, operations who need practical training in commercial management; general audiences wanting to gain a basic understanding of commercial management. This is an assessed programme, leading to the International Association for Contracts & Commercial Management (IACCM)'s coveted Contract and Commercial Management Associate (CCMA) qualification. The programme addresses 31 different subject areas, across the five stages of the contracting process. By the end of the course the participants will be able, among other things, to: Develop robust contract plans, including scope of work and award strategies Conduct effective contracting activities, including ITT, RFP, negotiated outcomes Negotiate effectively with key stakeholders, making use of the key skills of persuading and influencing and to work with stakeholders to improve outcomes Set up and maintain contract management systems Take a proactive approach to managing contracts Make effective use of lessons learned to promote improvements from less than optimal outcomes, using appropriate templates Develop and monitor appropriate and robust Key Performance Indicators to manage the contractor and facilitate improved performance Understand the approvals process and how to develop and present robust propositions Make appropriate use of best practice contract management tools, techniques and templates DAY ONE 1 Introductions Aims Objectives Plan for the day 2 Commercial context Explaining the contracting context Define the key objective The importance of contact management Impact upon the business 3 Stakeholders How to undertake stakeholder mapping and analysis Shared vision concept, How to engage with HSE, Finance, Operations 4 Roles and responsibilities Exploring the key roles and responsibilities of contract administrators, HSE, Finance, Divisional managers, etc 5 Initiating the contract cycle Overview of the contracting cycle Requirement to tender Methods Rationale and exceptions 6 Specifications Developing robust scope of works Use of performance specifications Output based SOW 7 Strategy and award criteria Developing a robust contract strategy Award submissions/criteria 8 Managing the tender process Review the pre-qualification process Vendor registration rules and processes Creation of bidder lists Evaluation, short listing, and how to use of the 10Cs© model template and app 9 Types of contract Classify the different types of contracts Call-offs Framework agreement Price agreements Supply agreements 10 The contract I: price Understanding contract terms Methods of compensation Lump sum, unit price, cost plus, time and materials, alternative methods Cost plus a fee, target cost, gain share contracts Advanced payments Price escalation clauses DAY TWO 11 Risk How to manage risks Risk classification Mitigation of contractual risks 12 Contractor relationship management session Effectively managing relationships with contractors, Types of relationships Driving forces? Link between type of contract and style of relationship 13 Disputes Dealing with disputes Conflict resolution Negotiation Mediation Arbitration 14 Contract management Measuring and improving contract performance Using KPIs and SLAs Benchmarking Cost controls 15 The contract II: terms and conditions Contract terms and conditions Legal aspects Drafting special terms 16 Managing claims and variations How to manage contract and works variations orders Identifying the causes of variations Contractor claims process 17 Completion Contract close-out process Acceptance/completion Capture the learning/HSE Final payments, evaluation of performance 18 Close Review Final assessment