In a world focused on digital media, 24-hour news channels and social channels, it’s really important to communicate with your audience – there are lots of opportunities to do this if you are interviewed by journalists. There’s the chance to deliver expert comments or take part in in-depth features or give a quote about your business or organisation. The media wants to stay relevant and engaged with its audience and you can play a part in that and talk to your audience. In our Broadcast Media Training Courses, we will teach you the best ways to share your story, how to answer those difficult questions and present yourself with confidence and style. This means you will capitalise on every opportunity. Our broadcast media and media interview training courses include: Exploiting the opportunity The world of digital media means there are lots of opportunities to appear online, on radio or on TV, as an expert or commentator and gain invaluable exposure for your business and organisation. You may meet journalists at industry events or be contacted for a comment on an issue. You may also need media training because you have to protect your business’ reputation by reacting proactively if you become involved in a news story. Media training will help you handle interviews with journalists, content creators and other media professionals. You need to communicate positively and effectively and make sure your message reaches the audience. It means speaking consistently, and with style and confidence. You’ll also need to know how to handle challenging questions and make sure you positively manage your reputation. Contemporary Media Training Our media training is interactive, engaging and importantly, carried out by experienced journalist trainers. Our team has worked at the highest levels of journalism and broadcasting and will give you an invaluable insight into how to maximise the opportunity of a media appearance. We will take you through the background of what journalists want and need, and give you a clear understanding of how to prepare and deliver your messages and ideas. We will then carry out a number of media style interviews which our technical team will record and playback so you can see and hear yourself. We will then support you with practical, inclusive and useful feedback for you to put into practice for the next interview. We provide copies of all your recordings and useful notes after the training. Locations that suit you We deliver training at our facilities in Birmingham or London or at your location, bringing our technical equipment and cameras with us. You can have a half day training session for up to 4 people or a full day training for a larger group. We also deliver training online for small groups which can be useful when teams are spread around the country. Expert Journalist Trainers We pride ourselves on two things at Coherent Comms – delivering contemporary media training and our supportive inclusive feedback. We know there are lots of media training companies out there but our clients tell us they work with us because we listen. We don’t tell you what training you need or hark back to the old days. We take on board your communication needs and deliver bespoke training. Our associates are working in digital communications, carrying out interviews for news online sites and our contacts are producing digital content for a 21st century audience. We’ll talk to you about TV and radio but we understand the wider media landscape and how to navigate it. And we’re really proud of our feedback – we want to take you from good to great and believe confidence building with tips and ideas that will work for you is the best way to develop your skills. We will help you design the course you want All our media training is bespoke and designed to exactly suit your needs. We have lots of ideas of how it might work but we want to hear from you and what you want! So get in touch with our friendly team by phone on 0754 533 4269 or fill in our contact form and we will get back to you. We’d love to hear how you hope to improve your media and communication skills.
Gain practical skills in influencing and decision-making, perfect for anyone working in team-based or project-focused environments, with interactive, hands-on learning. Course overview Duration: 1 day (6.5 hours) This is a highly interactive and practical course which will help you to use influencing and decision making techniques. This workshop has been specifically designed to give you an opportunity to learn and test a range of influencing and decision making models and techniques. The course is aimed at anyone who interacts with others on a regular basis, especially those in project management disciplines, multi disciplinary, matrix type organisations where healthy debate and challenge are key to achieving optimum resolutions. Objectives By the end of the course you will be able to: Utilise a variety of new techniques to enhance your influencing skills Recognise the impact of non-verbal communication and use it to enhance influencing behaviours Use language skills necessary to get your message across in an influential way Apply different techniques for dealing with aggression Understand VUCA – Volatility, Uncertainty, Complexity & Ambiguous Use Perception, Bias, Decision Making and Judgement Understand personal preferences and approaches to Decision Making Speed read others approach to decision making Apply Mindsets, Skillsets and Toolsets for decision making Content What is influencing? Sources of power Influencing skills Choosing the right approach Developing Skills Communication skills – the language of influence Different influencing techniques and when to use them Having the confidence to challenge Dealing with confrontation and challenges in a confident manner The Decision Lifecycle – Personal Preferences Understand the human facts that influence decision making Understanding personal preferences and approaches to Decision Making Understand the impact of Perception, Bias and judgement in decision making Speed reading others approach to decision making Frameworks to provide context for decision making Understand the business factors that influence decision making - VUCA The Cynefin Framework – decision making in complex situations Understanding which business context, you operate in – simple, complicated, complex or chaotic Understanding how to decide in complexity Practical Practical exercises Case studies Personal action planning
This is for New leaders/Managers working within early years. This programme is consists of 6 topics which all include work based projects. 1. What does good leadership look like? 2 Enhance your communication skills .3. Promoting good teamwork. 4 Managing Difficult Conversations. 5. Getting to know sector relevant documents. 6. The importance of wellbeing for yourself and for your team. This programme of training ensures new leaders are professional, knowledgeable and confident in leading teams of people. The work based projects gives the opportunity to practise new skills and then reflect on that practise with the trainer. The programme is delivered individually for maximum impact either face to face or virtually depending on the location The trainer has 24 years experience of managing teams of people in the early years and can relate to the busy, challenging emotional environments that Early Years Leaders work in. Each session is 1.5hrs.
Half day course on data protection and direct marketing - GDPR & PECR
Duration 5 Days 30 CPD hours This course is intended for IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators and/or earn RHCSA certifications This course focuses on the key tasks needed to become a full time Linux administrator and goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. Schedule future Linux tasks Schedule tasks to automatically execute in the future. Manage priority of Linux processes Influence the relative priorities at which Linux processes run. Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. Connect to network-defined users and groups Configure systems to use central identity management services. Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. Manage logical volume management (LVM) storage Manage logical volumes from the command line. Access networked attached storage with network file system (NFS) Access (secure) NFS shares. Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall, Configure a basic firewall. Comprehensive review Practice and demonstrate knowledge and skills learned in this course.
Duration 2 Days 12 CPD hours This course is intended for Built for experienced IT Professionalsworking with Citrix Virtual Appsand Desktops who need to plan for,implement, or manage a ProvisioningServices environment. Potential studentsinclude administrators, engineers, andarchitects. Overview #NAME? In this course, students will learn to install and configure a highly available Citrix Provisioning farm according to leading practices. In this course, students will learn about the architecture, communication, and processes that make up Citrix Provisioning to be successful with deploying and managing a farm. Manage and integrate vDisks and target devices with Citrix Virtual Apps and Desktops for easy rollback, upgrades, and performance of Virtual Delivery Agent machines. At the end of this course students will be able to install, configure and manage the CitrixProvisioning 7 solution. Advanced Provisioning Learning Objectives Introduction to Citrix Provisioning (PVS) Getting Started with Citrix Provisioning Citrix Provisioning Architecture Citrix Provisioning Infrastructure Lab VM Power Management Learning Objectives The Citrix Provisioning Server The Farm Database The Store Streaming the vDisk Lab VM Power Management Learning Objectives vDisk Introduction Master Target Device Preparation Streaming Introduction Boot Methods Target Devices Lab VM Power Management Learning Objectives Target Devices Introduction Reads and Writes Machine and User Data Integrating Citrix Provisioning with Citrix Virtual Apps and Desktops Lab VM Power Management Learning Objectives The Complete Architecture Overview The Citrix Virtual Desktops Setup Wizard Manage the Target Devices through Creating Device Collections Using Provisioned Services with Citrix Virtual Apps and Desktops Managing Citrix Provisioning from Citrix Cloud Advanced Architecture Lab VM Power Management Learning Objectives Farm Component Scalability Store Redundancy Farm Database Redundancy Supporting Citrix Provisioning Lab VM Power Management Learning Objectives vDisk Updates Delegate Administration Audit and Support Alternative vDisk Update Methods
Gain essential healthcare skills with this CPD-accredited Care Certificate course. Master 15 key standards & boost your career in health & social care.
Boost your career in healthcare & social care with this CPD-accredited Level 3 course. Gain essential skills & flexible learning. Enroll today!
Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances