Conflict Resolution Skills (Virtual) Many organizations have assumed that workplace conflict is always destructive. So, they have often believed that conflict is best dealt with by managers or even via policies and procedures. After all, conflict creates workplace stress and leads to many performance problems, generating very real organizational costs! However, savvy organizations have embraced the fact that when conflict is understood and harnessed, it can be leveraged to add value to teams and even enhance performance. With the right knowledge, skills, training, and practice, conflict can be productive and make organizations better! In this highly interactive course, learners will discover the connection between individual conflict response and team-empowering conflict resolution skills. Participants will explore conflict's visceral dynamics and the nuanced behaviors we individually engage in to communicate and respond to conflict. Learners will apply techniques for transforming unproductive conflict responses into productive ones. Additionally, learners will use a systematic method that prepares them to objectively dissect real-world conflict, while practicing many strategies for resolving it. They will also develop proactive conflict approach plans, which they can transfer back to their own workplaces. What you will Learn At the end of this program, you will be able to: Recognize the organizational costs of conflict Explain our physical and mental responses to conflict Communicate proactively and effectively with different types of people during conflict Replace unproductive conflict responses with productive ones Use the Conflict Resolution Diagram (CRD) process and conflict resolution approaches Relate team stages of development to shifts in conflict Develop a proactive conflict approach for your organization Create a conflict resolution plan for a real-world scenario Getting Started Introductions and social agreements Course goal and objectives Opening activities Conflict Facilitation Readiness Conflict responses and perceptions Conflict basics Conflict and organizations Dynamics of conflict Conflict Styles and Communication A look at the color energies model Conflict through the color energies and DiSC® lens Communication with opposite color energies Individual Response to Conflict The anatomy of conflict Recognizing unproductive conflict responses 4 steps to productive conflict Choosing productive conflict responses Team Performance and Conflict High-performing team relationships Conflict and project team performance Conflict Resolution Diagram (CRD) and process Conflict Facilitation - Preparation Recognizing context and stakeholder needs Using team conflict resolution approaches Preparing for Crucial Conversations® Conflict Facilitation - Clarity Exposing assumptions and biases Defining the conflict and using the CRD Conflict Facilitation - Action Proactive conflict management Conflict facilitation practice Summary and Next Steps Review Personal action plans
Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. Exploring Cisco Tetration Data Center Challenges Define and Position Cisco Tetration Cisco Tetration Features Cisco Tetration Architecture Cisco Tetration Deployment Models Cisco Tetration GUI Overview Implementing and Operating Cisco Tetration Explore Data Collection Install the Software Agent Install the Hardware Agent Import Context Data Describe Cisco Tetration Operational Concepts Examining Cisco Tetration ADM and Application Insight Describe Cisco Tetration Application Insight Perform ADM Interpret ADM Results Application Visibility Examining Cisco Tetration Intent-Based Networking Describe Intent-Based Policy Examine Policy Features Implement Policies Enforcing Tetration Policy Pipeline and Compliance Examine Policy Enforcement Implement Application Policy Examine Policy Compliance Verification and Simulation Examining Tetration Security Use Cases Examine Workload Security Attack Prevention Attack Detection Attack Remediation Examining IT Operations Use Cases Key Features and IT Operations Use Cases Performing Operations in Neighborhood App-based Use Cases Examining Platform Enhancement Use Cases Integrations and Advanced Features Third-party Integration Examples Explore Data Platform Capabilities Exploring Cisco Tetration Analytics Administration Examine User Authentication and Authorization Examine Cluster Management Configure Alerts and Syslog Additional course details: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use VMware vSphere Client⢠to manage certificates Use Identity Federation to configure VMware vCenter Server to use external identity sources Use VMware vSphere Trust Authority⢠to secure the infrastructure for encrypted VMs Use host profiles to manage VMware ESXi⢠host compliance Create and manage a content library for deploying virtual machines Manage VM resource usage with resource pools Monitor and analyze key performance indicators for compute, storage, and networking resources for ESXi hosts Optimize the performance in the vSphere environment, including vCenter Server This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere© 7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. As an exclusive benefit, those who participate in this course will receive additional premium recorded lecture material on vSphere security. Course Introduction Introductions and course logistics Course objectives Network Scalability Configure and manage vSphere distributed switches Describe how VMware vSphere© Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Storage Scalability Explain why VMware vSphere© VMFS is a high-performance, scalable file system Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O filtering Configure and assign virtual machine storage policies Create VMware vSAN? storage policies Recognize components of the VMware vSphere© Virtual Volumes? architecture Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Host and Management Scalability Use the vSphere Client to manage vSphere certificates Describe identity federation and recognize its use cases Configure identity federation to allow vCenter Server to use external identity provider Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority Use host profiles to manage ESXi configuration compliance Create a local content library and subscribe to a published content library Deploy VMs from a content library Create and manage resource pools in a cluster Describe how scalable shares work CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, transparent page sharing, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Discuss vSphere support for NVMe and iSER technologies Use esxtop to monitor key storage performance metrics Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Supplemental Content Appendix A: vSphere Auto Deploy Explain the purpose of VMware vSphere© ESXi ? Image Builder CLI Explain the purpose of VMware vSphere© Auto Deploy? Describe how an autodeployed ESXi host boots Configure a vSphere Auto Deploy environment Appendix B: vSphere Security Configure ESXi Host Access and Authentication Recognize strategies for securing vSphere components, such as vCenter Server, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs Encrypt core dumps List VM encryption events and alarms
Duration 4 Days 24 CPD hours This course is intended for Risk professionals Business analysts Project managers Compliance professionals IT professionals Anyone whose work includes evaluating and mitigating risk Overview This boot camp prepares you to pass the ISACA CGEIT exam, which covers four domain areas designed to reflect the work performed by individuals who have a significant management, advisory or assurance role relating to the governance of IT. Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization This CGEIT Boot Camp is designed for experienced IT governance personnel and those who have responsibilities for the stewardship of IT resources. You will learn how to effectively implement and manage governance across all areas of technology ? as well as align that technology with strategic enterprise goals. This training also explains the CGEIT examination process and helpsprepare you for your CGEIT exam by providing guidance and testing your exam readiness through sample questions. You?ll leave fully prepared to earn your CGEIT certification. Course Outline Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization
ISO 37001 Foundation training enables you to learn the basic elements to implement and manage an Anti-bribery Management System (ABMS) as specified in ISO 37001. About This Course During this training course, you will be able to understand the different modules of an ABMS, including ABMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement. After completing this course, you can sit for the exam and gain "Certified ISO 37001 Foundation' credential. An IECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach. Learning objectives Understand the elements and operations of an Anti-bribery Management System and its principal processes Acknowledge the correlation between ISO 37001 and other standards and regulatory frameworks Understand the approaches, methods and techniques used for the implementation and management of an ABMS Educational approach Lecture sessions are illustrated with practical questions and examples Practical exercises include examples and discussions Practice tests are similar to the Certification Exam Prerequisites There are no prerequisites for this course. What's Included? Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides The Exam fees Who Should Attend? Individuals concerned about Anti-bribery Management Individuals seeking to gain knowledge about the main processes of Anti-bribery Management Systems (ABMS) Individuals interested to pursue a career in Anti-bribery Management Accreditation Assessment The examination consists of 40 multiple choice questions stemming from the course materials. The exam should be completed within 60 minutes, with a 70% pass mark. Exam results are provided within 24 hours. Provided by This course is accredited by NACS and Administered by the IECB
This module aims to develop knowledge and understanding of the importance of customs documentation in the world of international trade to ensure both parties clearly understand the documentation that will be required in the import or export of goods or services.
CPD Accredited, Interactive Short Course 2 hr session Make sure that everyone knows what to do in case a member of staff or the public gets an asthma attack Better still, learn how to prevent an asthma attack from occurring in the first place! Course Contents What is asthma How many people have asthma How it affects a person's lungs The severity of the condition Triggers for an asthma attack Signs & Symptoms of an asthma attack Medication First Aid for a person having an asthma attack What it is like to live with asthma Benefits of this Short Course: In the UK, 5.4 million people (12.35% of the population) have asthma, 200,000 severely. Every day, three of those people die from an asthma attack Every 20 minutes, someone is admitted to hospital due to their asthma, and every 8 minutes, that is a child Learning from home is a good way to keep one's skills and knowledge up to date With the knowledge you'll pick up from this course, you could potentially save someone's life!
Duration 1 Days 6 CPD hours This course is intended for This course is intended for IT Asset Managers and other professionals involved in Asset Management, strategic planning, security programs and those affected or influenced by ITAM and security initiatives. The mission of IAITAM?s CAMSE course is to maximize the contribution of IT Asset Management professionals to the information security and physical security of the organization by bridging the gap between ITAM and IT security processes while incorporating security strategies throughout the ITAM policies, processes and procedures so that ITAM enhances the security program and improves the applicable governance. This course includes the comprehensive online examination necessary for achieving CAMSE Certification. Course Outline Scope of IT Security & ITAM Threat Prevention vs. Threat Protection Decentralized vs. Centralized Security The IT Security Plan ITAM?s Role in Risk Management The 12 KPAs & Security Program Management & Security Communication & Education Management & Security Policy Management & Security Acquisition Management & Security Asset Identification Management & Security Disposal Management & Security Project Management & Security Documentation Management & Security Financial Management & Security Legislation Management & Security Compliance Management & Security Vendor Management & Security Assessing Asset Risk Level Program Issues by Asset Type ITAM Program Assessment for Security