Overview Appreciative Inquiry is a form of action research that collects people’s stories of best practices. We can use these best practices as a way to initiate organisational change. This course will guide attendees through the process of Appreciative Inquiry (AI) and give them the techniques to succeed in using the AI system. This course will benefit anyone that leads change and wants to create positive dialogue that leads to improvements within their organisation. Description David Cooperrider, Suresh Srivastva, and their colleagues at Case Western Reserve University developed AI in the 1980s. According to them, the aim of Appreciative Inquiry is to help the organisation in: Envisioning a collectively desired future Realising that vision in ways that successfully translate intention into reality and beliefs into practices The AI approach can be applied in almost all groups of people and once the process starts, the change is put in motion. The appreciative approach works in individual conversations among colleagues, managers and employees. AI consultants around the world are increasingly using an appreciative approach to bring about collaborative and strengths-based change. This course will provide attendees with the means to effectively develop the skills of managers for the benefit of their organisation. They will be taken through the full process of appreciative inquiry; developing a wide understanding of the tools and techniques required to effectively improve communication and affect change. What can Appreciative Inquiry achieve? Well, just imagine you were better able to: Solve problems within an organisation in a positive and forward-thinking way. Be more curious and excited about the challenges faced within the business. Ask unconditional, positive questions to strengthen the organisations capacity to increase potential. Approach change in an affirmative mindset. Use questions to create movement and change within the company. Simply apply core communication skills, for overall organisational success Topics covered: What is Appreciative Inquiry? – A review of the subject with an activity that helps embed understanding and a case study that explains the process in action. Benefits of Appreciative Inquiry to the Organisation – Establishing how AI can aid and improve the way an organisation works and how people communicate within it. Exploring how specific organisational issues can be viewed positively. Appreciative Inquiry Questions – Understanding how questions can be used to identify positive organisational improvements and refocus our approach to business issues. Appreciative Inquiry Interviews – A set process for performing AI interviews and framing consultations to get the best out of those involved. A chance to practice the given approach and hone personal skills. The 4D Model – An overview of the AI 4D Model (Discovery, Dream, Design, Destiny) and how it is applied. The 4D Model: Topic – Demonstrating how selecting the topic is the beginning of the 4D model process. Choosing the participants own topic to work on throughout the training. The 4D Model: Discovery – Showing how positive discussions are kick-started at this stage and taking a chance to look at, ‘the best there is and what has been’. The 4D Model: Dream – ‘Thinking big and beyond what they have in the past’. Creating an amazing and positive vision for the future. The 4D Model: Design – Laying the foundation with a design of the vision, principles, and set of propositions that describe the ideal end state. Defining the desired state by creating a hierarchy and blueprint for success. The 4D Model: Destiny – Defining clear actions that will help the organisation and individuals achieve what they have set out to. The output is the self-reinforcing nature of using positive and affirmative inquiry to improve the business. The 4D Model: Summary Task – Review of learning and knowledge check. The Change Process – Exploring Dr. Kotter’s 8-step change process and how it can support the AI approach. Rooms of Change – Understanding feelings and attitudes to change, using this interesting and memorable model. Using an activity to help participants consider their own ‘change position’ and what this might mean for them. Strategies for Managing Change – A simple set of skills to help overcome the challenges faced by people trying to implement change. Applying these strategies to the 4D Model and Appreciative Inquiry. Recall Quiz – A chance to review learning in an engaging way. Summary – Developing actions and key points to take away. Who should attend Managers who want to learn about and practice the Appreciative Inquiry approach to drive positive changes. Requirements for Attendees None.
Overview OBJECTIVES Develop practical skills enabling effective communication at the time of an incident Familiarize students with both techniques & technologies involved in crisis communication Provide a health check for your personal & organizational readiness Provide the confidence to know that your response strategies are appropriate and effective Build relevant knowledge through exploring relevant case studies and practical exercises Develop flexible creative and well-motivated teams Upcoming Events Online (USD 1950) Online Streaming Live (Flexible Dates) At Venue (USD 4500) Dubai 20 Feb - 24 Feb Istanbul 27 Feb - 3 March London 20 March - 24 March For more dates and Venue, Please email sales@gbacorporate.co.uk
Understanding cultural differences in the global sales environment is critical to your salespeople’s success. Developing their intercultural communication skills and knowledge of the sales and negotiation techniques of different cultures and nationalities, will help them to ensure relationships are as effective and rewarding as possible. Bespoke courses include: The impact of language and cultural differences on the sales environment Communication techniques in international sales Effective sales questions A global mindset Culture and its impact on sales Delivering on different cultural expectations Perceptions of time across cultures and the impact on sales cycles and timelines
Microsoft Lync training course description This course teaches IT staff how to plan, design, deploy, configure, and administer a Microsoft Lync Server solution. The course emphasizes Lync Server Enterprise Unified Communications features focussing particularly on coexisting with and migrating from legacy communication services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat. This course helps prepare for Exam 70-336. What will you learn Describe the Lync Server architecture. Install and deploy Lync Server. Use Lync Server management interfaces. Deploy and manage clients. Manage and administer dial-in conferencing. Design audio and video for web conferencing. Plan for instant message and presence Federation. Deploy and configure persistent chat in Lync. Configure archiving and monitoring services. Troubleshoot Lync Server. Describe the required daily, weekly, and monthly maintenance tasks. Use SIP commands and analyze SIP logs. Configure high availability features in Lync. Design load balancing in Lync Server. Backup and restore Lync Server data. Microsoft Lync training course details Who will benefit: Technical staff working with Microsoft Lync. Prerequisites: Supporting Windows 2008 or 2012. Duration 5 days Microsoft Lync training course contents Microsoft Lync Server architecture Lync Server architecture, Lync core capabilities, Lync design process, assessing infrastructure requirements and updating the design, planning for all Microsoft solutions framework phases. Designing a Lync Server topology Infrastructure requirements for Lync Server, using the planning tool, using topology builder, server infrastructure, documentation. Hands on Environment preparation and Lync Server pools. Users and rights in Microsoft Lync Server Managing Lync Server, role based access control. Hands on Using the management shell, configuring role-based access control. Client/device deployment and management Deploy and manage clients, prepare for device deployment, IP phones. Hands on Clients. Conferencing in Lync Server Introduction to conferencing in Lync Server, designing for audio\video and web conferencing, dial-in conferencing in Lync Server, managing and administering conferencing. Hands on Conferencing in Microsoft Lync. Designing and deploying external access Conferencing and external capabilities of Lync Server, planning for IM and presence federation, designing edge services. Hands on Deploying Edge Server and Configuring Remote Access, Validating the Edge Server. Deploying Lync Server persistent chat Overview of persistent chat architecture in Lync Server, designing persistent chat, deploying and persistent chat. Hands on persistent chat server. Monitoring and archiving The archiving service, the monitoring service, configuring archiving and monitoring. Hands on Archiving and monitoring in Lync Server. Administration and maintenance of Lync Lync Server troubleshooting tools, Lync Server operational tasks, Lync Server troubleshooting techniques. Hands on Lync administration tools, centralized logging service, analysing Lync Server logs and traces. High Availability in Lync Server High availability in Lync Server, configuring high availability in Lync Server, planning for load balancing, designing load balancing. Hands on Configuring database mirroring, experiencing a scheduled SQL Server outage, experiencing an unscheduled SQL Server outage. Disaster recovery in Lync Server Disaster recovery in Lync Server, tools for backing up and restoring Lync Server, critical Lync Server data to back up and restore, critical data to export and import, designing branch site resiliency. Hands on Configure pool pairing, experiencing a pool failure or outage. Planning a migration to Lync Server Coexistence and migration, migration steps, planning for clients and devices. Designing a client migration and device migration strategy. Hands on Creating a migration plan, documenting the migration phases.
This course will help you to gain a better knowledge of the policy which underpins end of life care. It will help you to learn about the delivery of great end of life care and improve your communication skills to strengthen working relationships during this period. You will also feel you have a better understanding on how to support the friends and family of the person that you are caring for.
In the fast-changing world of business, and especially IT, everyone in the organisation should be involved in sales. One of the best ways is to give the customer an outstanding experience. The customer experience is the competitive battlefield of today. Sales may be won or lost here. You can either close a sale for a quick buck, or open a long-term relationship to create a high lifetime value customer. By developing excellent communication skills, rapport and, most of all, a desire to serve and listen to the needs of the customer to the best of their ability, both sales teams and other IT professionals will create trust, nurture relationships and develop awareness of other opportunities with the customer. By the end of this course, participants will be able to: Understand the power of a positive customer experience in developing sales opportunities Recognise and develop a sales opportunity when it arises Engage with customers and develop rapport and trust Use verbal and non-verbal communication skills and pick up on signals Ask powerful questions - and listen to the answers Create 'magic moments' for the customer Turn a complaint into an opportunity Know when to ask for referrals and testimonials Pass on leads to the relevant people 1 Introduction Aims and objectives Beliefs about sales 2 Building rapport First impressions Short cuts to rapport Finding common interests 3 Selling or serving? Managing emotions and behaviour - Transactional Analysis Moments of truth - creating 'magic moments' Speed sells - the follow-up 4 Meetings Planning a successful meeting Pre-meeting connection and assistance Sales meeting failure reasons Right v wrong mindset 5 Communication - verbal and non-verbal The 3 Vs - Visual, Verbal, Vocal Picking up on signals 7 power questions Questioning techniques LISTEN - 3 types of listening skills 6 Influencing 6 levels of influence Framing to change perspectives Turning complaints into opportunities 7 Referrals The power of referrals How and when to ask for a referral 5 steps from rapport to referral 8 Presentation and pitching (optional session) Basic presentation structure and delivery Creating powerful impressions Creating a 60-second pitch The elevator 10-second pitch - answering 'What do you do?' Sales presentations Emotion v Intellect - how to engage Using visuals
CWAP training course description This WiFi analysis course consists of hands-on learning using the latest enterprise wireless LAN analysis and troubleshooting tools. The course takes an in-depth look at the functionality of WLANs, intended operation of the 802.11 protocol and Wi-Fi Alliance specifications, WLAN frame formatting and structure, troubleshooting methodology, and protocol analysis. It also includes extensive training in modern spectrum analysis with a focus on advanced RF behaviour analysis, data collection methods, interpreting spectrum plots and charts, and understanding advanced features of WLAN spectrum analysers. What will you learn Analyse WiFi frames using Wireshark. Explain 802.11 protocol operation. Troubleshoot WiFi networks using Wireshark. Troubleshoot WiFi networks using spectrum analysers. CWAP training course details Who will benefit: Technical Network Staff Anyone looking to become a CWAP Prerequisites: Certified Wireless Network Administrator Duration 4 days CWAP training course contents Principles of WLAN Communication 802.11 Working Group, OSI reference model and the 802.11 PHY and MAC, Communication sublayers and data units, WLAN architecture components, Organization of station forwarding Addressing and internetworking operation, Modern WLAN product architectures. Physical (PHY) and MAC Layer Formats and Technologies Physical layer functions, Preamble function and format, Header purpose and structure, Analysis of PHY problems, Physical PPDU formats, 802.11b, 802.11a, 802.11g, 802.11n, MAC frame components, MAC encapsulation, Fields and subfields of the MAC header, Frame Control, Frame types and subtypes and their uses, Addressing, Frame body, Data frame format, Control frame format, Management frame format, Information elements and fields. Beaconing and synchronization Scanning, Client state machine, 802.11 contention, QoS, Admission control, Band steering and airtime fairness mechanisms Fragmentation, Acknowledgments and Block acknowledgments, Protection mechanisms and backward compatibility, Power management, Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC), Security components, methods, and exchanges, Roaming procedures exchanges, Future protocol enhancements. 802.11n Transmit beamforming, Spatial multiplexing, Maximal Ratio Combining (MRC), Space-Time Block Coding, 40 MHz channels, Frame aggregation, HT-OFDM format, Modulation and Coding Schemes (MCS), HT frame formatting and more. Protocol Analysis Tools and Methodology Troubleshooting methodology, Protocol analyser types, Analysis NIC/adapter selection and constraints, Interpreting results based on location, Analyzer settings and features, Filtering and channel scanning, Interpreting decodes, Using advanced analysis features, Assessing WLAN health and behaviour factors, Evaluating network statistics, Troubleshooting common problems, Wired analysis to support wireless network issues. Spectrum Analysis Tools and Methodology Radio frequency behaviour review, Visualizing RF domains using spectrum measurement tools, Spectrum analyser types and operation, Analyser specifications and characteristics, Understanding spectrum data presentation, Interpreting plots and charts, Common WLAN spectrum analyser features, Identifying transmit patterns, Device classification and network impact, Recognizing transmit signatures. Hands on lab exercises Wireshark Setup, Use, and In-Depth Analysis Wireshark is fundamental to troubleshooting. Labs include: - Capabilities, configuration, and data display - Opening, collecting, saving, and modifying capture files. - Filtering traffic, and using colouring rules as analysis aides. - Live captures based on a set of desired collection criteria. - Identify and isolate network problems. - Conversation analysis. - Remote packet capture with an AP. Understanding Frame Components Familiarity with the frame structure and contents is essential in real -world troubleshooting efforts. Labs include: - Understanding the MAC header - Comparing the three major frame types and their subtypes - Analysing frame formats of individual frame types - Analysing 802.11n frame components - Additional information is reported by protocol analysers - Information not visible in protocol analysers Frame Exchanges Understanding frame exchange rules and behaviors is critical to identifying expected and unexpected. It is also necessary to understand what is normal so that aberrations can be properly troubleshot. Labs include: - Connectivity exchanges and sequences - Legacy and modern security exchanges - ERP and HT protection mechanisms - Power save behaviour - Acknowledgments, block acknowledgments, and supporting action frames - Dynamic rate switching - Band steering Troubleshooting Common Problems This lab exposes students to hands-on troubleshooting skills by setting up common problems in WLANs and allowing students to attempt to solve them. - Trouleshooting connectivity exchanges - Troubleshooting 802.1X and EAP exchanges - Troubleshooting roaming Spectrum Analyzer Setup, Use, and In-Depth Analysis Specifically, it will explore the plots and charts used to display spectrum data and how to interpret this data to define a transmitter's impact on the network. The following are covered: - Installing the analyser and using display and navigation - The 'RF perspective' provided by each plot and chart - Using built-in features and automated device identification - Characterizing the behaviours of an interference source - Assessing the impact of an interference source - Determining the impact of transmitter proximity on interference. - Identifying signatures of common transmitters - Remote spectrum analysis with an AP
We communicate daily in many ways, including email, phone, text, Zoom, Teams, Google Meets, Slack, and even that old-fashioned thing, what was it now... oh yes, talking face-to-face. But, when we look at communication closely and really drill down into what we are doing in conjunction with how our brain works (neuroscience), how internal, organisational, and social politics control what we believe we can say, how hierarchical positioning impacts our honesty and how the lack of psychological safety means we say what we know others want to hear rather than what they need to hear…. It is oh so complicated! This workshop not only explores the concept of excellent communication, but we also want to hear what you believe it is too. We also delve into how organisational culture influences our perception of speaking up. Factors that hinder open and honest communication, and we work collaboratively towards removing these barriers to achieve a communication style that fosters trust and transparency, creating psychological safety. This workshop is particularly relevant to our Emotional Intelligence workshop (EI and Me). We firmly believe that developing emotional intelligence is the key to unlocking Clean Communication, a skill that is crucial for all of us, regardless of our roles and responsibilities, so that we thrive in our professional environment. If you want to see if we are correct, why not have us facilitate a workshop for you and see what you get by the end of it? LENGTH - Normally, one day. But please contact us to discuss your specific needs, or we can offer advice. NEXT WORKSHOP START - Please ask for more information as we deliver bespoke closed events for your people at your location or a mutually suitable location. WORKSHOP DELIVERY - The best environment for this workshop is face-to-face, but we can facilitate this workshop online. Suitability - Who should attend? Who Should Attend and Why? Who? - Perhaps think of this another way… who shouldn’t attend to ensure we can attain Clean Communication? There’s your answer. Why? - Every person needs to understand what we are saying above about how we get trapped in this organisational formatting which changes how we communicate and how it prevents us from communicating cleanly. EVERY organisation has this, despite what our values profess. And 'Values', that’s a whole other story. Workshop Content Using the 'Moccasin Approach'® to clean our personal and organisational communication LaPD’s Communication Cycle and what we must consider. (Can you work out what the ? represent above? Accountability and Responsibility raises its head in Communication. It has to. Bias, unconscious bias and its impacts on our communication. The conundrum of communicating with others and their styles (The TRAP). How would my perfect Manager/Leader communicate with me? Nonverbal communication (body language), rapport, Clean Communication. Negative communication can go viral (Self-Fulfilling Prophecy). Reflections, findings and goals (individual and team). Meeting our workshop objectives by listing five areas for development. Workshop delivery and venue This workshop is usually one day in duration, and it focuses solely on how we communicate with each other. It can also be a two-day event incorporating aspects of Emotional Intelligence (EI) with group, and individual activities to allow discussions about the various communication we need in your organisation. When you consider the content we deliver, we are sure you will understand why we always prefer to deliver our workshops, courses and programmes face-to-face. Face-to-face workshops and courses can be held at a location of your choice or, if you wish, a central UK location, such as the Macdonald Burlington Hotel in Birmingham, located directly across from the Birmingham New Street train station. We can deliver our workshops, courses and programmes online, although this will mean splitting elements into manageable learning events to suit the online environment.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.