Developing the high performing team takes time and effort. But above all, it requires an understanding of the dynamics of high performing teams. This programme helps managers and leaders understand what high performing teams do and how they do it. It focuses on enabling managers to see their teams from different perspectives, allowing them to adapt their styles to maximise team outputs. A core theme is the need for managers of teams to 'hold up the mirror' to themselves and to see themselves as a leader of people, to reflect on how others see them and to modify their style accordingly. This programme will help managers / team leaders: Analyse the constituents of a 'high performing' team Apply essential influencing techniques Use a range of communication techniques to support effective teamwork Create and articulate team vision Generate common values Assess team effectiveness and take/recommend the appropriate actions Make more efficient use of team time Understand and agree on techniques to manage conflict Define and implement team meeting protocols that will facilitate team effectiveness Use the Prime Focus model to create the environment and framework for a high performing team Draft your team strategy to take them to the next level Day 1 1 Welcome and introduction Participants are welcomed to the programme and invited to share their personal objectives and people challenges Participants are given an action plan template to complete throughout the workshop 2 Your team The concept of 'positive intention' The difference between a team and a high performing team Assess your team effectiveness What is your 'interference'? 3 The team environment Setting the scene Building rapport Active listening Team goals and role profiling 4 Your style Tuckman model of team stages - how do you manage each stage? Team standards and goals Your team vision 5 Effective team meetings Influencing in team meetings How to make them interesting and relevant The pure role of the chair Day 2 1 Effective communication techniques Giving and receiving feedback Your communication style How to adapt, pace and lead to build rapport The Mehrabian theory of communication 2 How to manage conflict What is conflict? What is your default conflict approach? Tools and tips for managing conflict Practice sessions 3 Team skills Undertake a team skills analysis Types of team member Motivating team members Reframing situations 4 Setting your strategy Seeing the bigger picture The Prime Focus Model Your strategy for success Articulating your strategy Action plans revisited
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
Complete Visual BASIC training course description A hands-on introduction to programming in Visual BASIC V6. What will you learn Build Visual BASIC applications. Build simple components. Debug Visual BASIC programs. Examine existing code and determine its function. Complete Visual BASIC training course details Who will benefit: Anyone wishing to program in Visual BASIC. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Complete Visual BASIC training course contents Application development using VB VB features. VB editions, VB terminology. Working in the Development Environment. Event-Driven Programming. Creating a program in VB. Project and executable files. VB reference materials. Visual Basic fundamentals Objects. Controlling objects. Introduction to forms. Introduction to controls. Basic controls. Working with code and forms Modules. Working with code. Interacting with the user. Working with code statements. Managing forms. Variables and procedures Introduction to variables and constants. Working with Procedures and Functions. Controlling program execution Common VB functions. Comparison and relational operators. Conditional structures. Looping structures. Debugging Error types. Debugging logic errors in VB. Working with controls Control types. Standard controls. Advanced standard controls. ActiveX controls. Insertable controls. Data access using the ADO data control Overview of ActiveX Data Objects. VB data access features. Relational database concepts. Using the ADO data Control to access data. SQL. Manipulating data. Using the data form wizard. Input validation Field-Level validation. The masked edit control. Form-Level validation. Form events used when validating data. Error trapping Trapping run time errors. Error handling overview. Enabling an error trap. Errors and the calling chain. In line error handling. Enhancing the User Interface Menus. Status bars. Toolbars. Drag and Drop Overview of Drag and Drop. Mouse events Drag and Drop basics. More about controls Using control arrays. Using the controls collection. Working with object variables. Collections. Finishing touches User Interface design principles. Distributing an application. Creating a default project.
Lean Six Sigma Black Belt Certification Program: In-House Training This course is specifically for people wanting to become Lean Six Sigma Black Belts, who are already Lean Six Sigma practitioners. If advanced statistical analysis is needed to identify root causes and optimal process improvements, (Lean) Six Sigma Green Belts typically ask Black Belts or Master Black Belts to conduct these analyses. This course will change that. Green Belts wanting to advance their statistical abilities will have a considerable amount of hands-on practice in techniques such as Statistical Process Control, MSA, Hypothesis Testing, Correlation and Regression, Design of Experiments, and many others. Participants will also work throughout the course on a real-world improvement project from their own business environment. This provides participants with hands-on learning and provides the organization with an immediate ROI once the project is completed. IIL instructors will provide free project coaching throughout the course. What you Will Learn At the end of this program, you will be able to: Use Minitab for advanced data analysis Develop appropriate sampling strategies Analyze differences between samples using Hypothesis Tests Apply Statistical Process Control to differentiate common cause and special cause variation Explain and apply various process capability metrics Conduct Measurement System Analysis and Gage R&R studies for both discrete and continuous data Conduct and analyze simple and multiple regression analysis Plan, execute, and analyze designed experiments Drive sustainable change efforts through leadership, change management, and stakeholder management Successfully incorporate advanced analysis techniques while moving projects through the DMAIC steps Explain the main concepts of Design for Six Sigma including QFD Introduction: DMAIC Review IIL Black Belt Certification Requirements Review Project Selection Review Define Review Measure Review Analyze Review Improve Review Control Introduction: Minitab Tool Introduction to Minitab Minitab basic statistics and graphs Special features Overview of Minitab menus Introduction: Sampling The Central Limit Theorem Confidence Interval of the mean Sample size for continuous data (mean) Confidence Interval for proportions Sample size for discrete data (proportions) Sampling strategies (review) Appendix: CI and sample size for confidence levels other than 95% Hypothesis Testing: Introduction Why use advanced stat tools? What are hypothesis tests? The seven steps of hypothesis tests P value errors and hypothesis tests Hypothesis Testing: Tests for Averages 1 factor ANOVA and ANOM Main Effect Plots, Interaction Plots, and Multi-Vari Charts 2 factor ANOVA and ANOM Hypothesis Testing: Tests for Standard Deviations Testing for equal variance Testing for normality Choosing the right hypothesis test Hypothesis Testing: Chi Square and Other Hypothesis Test Chi-square test for 1 factor ANOM test for 1 factor Chi-square test for 2 factors Exercise hypothesis tests - shipping Non-parametric tests Analysis: Advanced Control Charts Review of Common Cause and Special Cause Variation Review of the Individuals Control Charts How to calculate Control Limits Four additional tests for Special Causes Control Limits after Process Change Discrete Data Control Charts Control Charts for Discrete Proportion Data Control Charts for Discrete Count Data Control Charts for High Volume Processes with Continuous Data Analysis: Non-Normal Data Test for normal distribution Box-Cox Transformation Box-Cox Transformation for Individuals Control Charts Analysis: Time Series Analysis Introduction to Time Series Analysis Decomposition Smoothing: Moving Average Smoothing: EWMA Analysis: Process Capability Process capability Discrete Data: Defect metrics Discrete Data: Yield metrics Process Capability for Continuous Data: Sigma Value Short- and long-term capabilities Cp, Cpk, Pp, Ppk capability indices Analysis: Measurement System Analysis What is Measurement System Analysis? What defines a good measurement system? Gage R&R Studies Attribute / Discrete Gage R&R Continuous Gage R&R Regression Analysis: Simple Correlation Correlation Coefficient Simple linear regression Checking the fit of the Regression Model Leverage and influence analysis Correlation and regression pitfalls Regression Analysis: Multiple Regression Analysis Introduction to Multiple Regression Multicollinearity Multiple Regression vs. Simple Linear Regression Regression Analysis: Multiple Regression Analysis with Discrete Xs Introduction Creating indicator variables Method 1: Going straight to the intercepts Method 2: Testing for differences in intercepts Logistic Regression: Logistic Regression Introduction to Logistic Regression Logistic Regression - Adding a Discrete X Design of Experiments: Introduction Design of Experiment OFAT experimentation Full factorial design Fractional factorial design DOE road map, hints, and suggestions Design of Experiments: Full Factorial Designs Creating 2k Full Factorial designs in Minitab Randomization Replicates and repetitions Analysis of results: Factorial plots Analysis of results: Factorial design Analysis of results: Fits and Residuals Analysis of results: Response Optimizer Analysis of results: Review Design of Experiments: Pragmatic Approaches Designs with no replication Fractional factorial designs Screening Design of Experiment Case Study Repair Time Blocking Closing: Organizational Change Management Organizational change management Assuring project sponsorship Emphasizing shared need for change Mobilizing stakeholder commitment Closing: Project Management for Lean Six Sigma Introduction to project management Project management for Lean Six Sigma The project baseline plan Work Breakdown Structure (WBS) Resource planning Project budget Project risk Project schedule Project executing Project monitoring and controlling and Closing Closing: Design for Lean Six Sigma Introduction to Design for Lean Six Sigma (DMADV) Introduction to Quality Function Deployment (QFD) Summary and Next Steps IIL's Lean Six Sigma Black Belt Certification Program also prepares you to pass the IASSC Certified Black Belt Exam (optional)
This programme has a simple objective: to help a sales team create and implementa comprehensive account development plan. If you want to earn strategic partner or preferred supplier status with your clients and customers then you need to add value to their business, consistently, and you can only do this if you have a plan - a key account management plan. This programme will help participants: Discover opportunities - through a deeper understanding of the customer's business Develop partnership - through a better 'value proposition' for the customer Increase repeat business - based on higher customer satisfaction Improve synergy - by getting everyone to 'sing from the same hymn sheet' Develop a collaborative account plan - validated by the customer and their own management Secure resources - management will align resources to execute soundly based account plans Win an increased share of 'customer wallet' - through systematic account development 1 The six principles of strategic account development Introduction to the PROFIT account development model:- Performance- Relationships- Objectives and goals- Feedback- Integration- Teamwork Practical account development strategies: overview and case studies 2 Performance Use practical tools to help you manage and measure account performance and success Design and build a monthly account dashboard for all sizes of account Prioritise and manage accounts and customers pro-actively and successfully, using proven planning tools Develop a cross-selling strategy to integrate products or solutions into the customer's business as closely as possible 3 Relationships How to build and manage key relationships within an account Qualifying and managing key influencers accurately Producing a 'relationship matrix' for each account quickly and easily Approaching and developing new contacts strategically Tools and techniques for successful tracking of contacts and call-backs Developing a coach or advocate in every customer organisation pro-actively 4 Objectives and goals Where are you now? - how to establish your competitive position within an account Know how to set, monitor and track key objectives for accounts over the short, medium and long term Selling against the competition - developing both long- and short-term sales strategies 5 Feedback - building loyal and satisfied customers The correct way to manage customer expectations and create listening loops within an account How to monitor and track your customer's perception and satisfaction with your organisation Building a personalised satisfaction matrix for each account Customer review meetings - best practice in building loyalty by regular joint planning events Understanding the concept of long-term customer value and the importance of adapting a customer-focused attitude 6 Integration How to integrate your products or solutions with the customer's business needs and processes Spot and react to early warning signals that may cause an account's loyalty to fade, reduce revenue or switch to a competitor Developing a loyalty strategy for key accounts or groups of smaller accounts Getting your message and strategy across to C-level contacts 7 Teamwork Working with others to achieve your account goals Gaining internal commitment from your organisation Managing and working with a virtual team Creating cross-departmental communication loops 8 Putting it all together Personal account reviews Personal learning summary and action plans
Overview The course begins by introducing credit risk, its components and its drivers. The course then dives into business risk assessment and group structure risks. After examining financial statements, including accounting concepts and principles, the course concludes with a review of financial analysis and its four main risk areas.
Overview Objectives Understand the fundamental concepts of credit risk Evaluate and understand internal and external credit ratings Understand value at risk (VaR) and its use in measuring credit risk Explain the counterparty risk for derivatives, particularly over-the-counter derivatives Describe different credit risk models according to the recommendations of the Basel Committee
Overview This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course
Overview The credit Risk Assessment course gives participants a comprehensive overview of the key concepts and methodologies in understanding the drivers of credit risk, modelling tools used for the measurement of credit risk, and current best practices in credit risk management techniques. The course focuses on the actual practice of credit risk assessment within financial institutions as well as on the quantitative and methodological tools and procedures that are at the cutting edge of measuring, mitigating and managing credit risk.
Overview For internal employees who want to understand and expand their roles related to financial reporting, as well as those who simply need a refresher on financial accounting, this course is the ideal way to get up to speed. By exploring concepts that go beyond basic accounting, this course will enable participants to approach financial auditing with renewed confidence. The programme will walk participants through an analysis of an organization's financial statements using case study exercises, where participants will calculate key ratios and analyze trends over time. Engaging in discussions on both historic and current fraud cases, participants will learn how to recognize âred flagsâ in financial statement reporting.