Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who require the skills to administer IBM MQ. Overview After completing this course, you should be able to: Describe the IBM MQ deployment options Create and manage queue managers, queues, and channels Use the IBM MQ sample programs and utilities to test the IBM MQ network Configure distributed queuing Configure MQ client connections to a queue manager Define and administer a queue manager cluster Administer Java Message Service (JMS) in MQ Implement basic queue manager restart and recovery procedures Use IBM MQ troubleshooting tools to identify the cause of a problem in the IBM MQ network Manage IBM MQ security Monitor the activities and performance of an IBM MQ system This course is also available as self-paced virtual (e-learning) course IBM MQ V9.1 System Administration (ZM156G). This option does not require any travel.This course teaches you how to customize, operate, administer, and monitor IBM MQ on-premises on distributed operating systems. The course covers configuration, day-to-day administration, problem recovery, security management, and performance monitoring. In addition to the instructor-led lectures, the hands-on exercises provide practical experience with distributed queuing, working with MQ clients, and implementing clusters, publish/subscribe messaging. You also learn how to implement authorization, authentication, and encryption, and you learn how to monitor performance. Introducing IBM MQ Exercise Getting started with IBM MQ Working with IBM MQ administration tools Exercise Working with IBM MQ administration tools Configuring distributed queuing Exercise Implementing distributed queuing Managing clients and client connections Exercise Connecting an IBM MQ client Advanced IBM MQ client features Working with queue manager clusters Exercise Implementing a basic cluster Publish/subscribe messaging Exercise Configuring publish/subscribe message queuing Implementing basic security in IBM MQ Exercise Controlling access to IBM MQ Securing IBM MQ channels with TLS Exercise Securing channels with TLS Authenticating channels and connections Exercise Implementing connection authentication Supporting JMS with IBM MQ Diagnosing problems Running an IBM MQ trace Backing up and restoring IBM MQ messages and object definitions Using a media image to restore a queue Backing up and restoring IBM MQ object definitions High availability Monitoring and configuring IBM MQ for performance Monitoring IBM MQ for performance Monitoring resources with the IBM MQ Console Additional course details: Nexus Humans WM156G IBM MQ V9.1 System Administration (using Windows for labs) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM156G IBM MQ V9.1 System Administration (using Windows for labs) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Experienced system operators, administrators, and integrators responsible for managing and maintaining VMware Horizon solutions Overview By the end of the course, you should be able to meet the following objectives: Implement a structured approach to troubleshooting Resolve common issues that occur in a VMware Horizon environment Troubleshoot issues with linked and instant clones Configure the Windows client Identify the correct log level for gathering logs Optimize protocols for best end-user experience This two-day course builds your skills in resolving common issues that occur in a VMware Horizon© environment. You engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators. Course Introduction Introductions and course logistics Course objectives Overview of Virtual Desktop Troubleshooting Structured approach to troubleshooting configuration and operational problems Applying troubleshooting methods Documenting the steps to resolving the problem Command-Line Tools and Backup Options Using command-line tools Backing-up and restoring VMware Horizon databases Troubleshooting Horizon Linked Clone Desktops Describe the components that make up a VMware Horizon desktop Explain how the View Agent Direct-Connection plug-In is useful for diagnosing problems Highlight the best practice for optimizing a VMware Horizon desktop Troubleshoot common problems with VMware Horizon desktops Troubleshooting Instant Clone Discuss how instant clones are created Discuss what gets logged when an instant clone is created Discuss the keywords to look for in the logs when troubleshooting instant clones Discuss how to troubleshoot problems with instant clones Windows Client Correctly configure the Windows Client Identify the correct log level for gathering logs Enable the required SSL configuration level for the environment Ports and Protocols Discuss the key ports on a Horizon Environment Discuss protocols used in the Horizon Environment Understand the benefit of optimizing Blast Become familiar with the optimization features for Blast Implement GPO changes for Blast Become familiar with the causes for Black Screens Discuss how to troubleshoot Black Screen problems Identify problems encountered when applying GPOs Discuss how to troubleshoot GPO-related problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Virtual Desktop Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Virtual Desktop Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Systems Administrators and Engineers Technical Solutions Architects Systems Integrators Channel Partners Value-Added Resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand the B-Series and C-Series product line similarities and differences Describe the Intersight support for C-Series standalone and UCS managed architectures Describe Cisco Intersight and how it can be used to manage UCS and Hyperflex Understand the process for upgrading B-Series and C-Series Firmware with UCSM and Intersight Administering service profiles, pools, and policies with UCSM and Intersight Understanding RBAC with Active Directory integration Administering backup and restores in UCS Manager Learn and discuss the various management tools for Cisco UCS including Intersight Perform basic troubleshooting of B-Series and C-Series in normal operations with UCSM and Intersight Describe how to get started with Intersight programmability DCUCAI, Administering Cisco Data Center Unified Computing System with Intersight is a 3-day instructor-led course. In this Cisco UCS server training course, you will become experienced with the administration and troubleshooting of Cisco Unified Computing System (UCS) B-Series and C-Series servers including using Cisco Intersight for UCS management. This custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager or Intersight as the primary interface. Using real-world scenarios and examples, this Cisco training course will explore all the components of the UCS B-Series and C-Series solutions from a day-to-day administrative point of view. Learn C-Series standalone, C-Series under UCS Manager, B-Series administration, troubleshooting, and management tools used to support basic UCS and multi-cluster support with UCS Central, as well as using Cisco Intersight for UCS and Hyperflex operations and management. Module 1: UCS Infrastructure Components with Intersight Cisco UCS Product Line, Use Cases, and Components Introducing Cisco Intersight Describing Cisco UCS C-Series Servers Module 2: Administering Cisco UCS with Intersight Managing Virtual Resources Configuring Compute Node LAN Connectivity Configuring Compute Node SAN Connectivity Creating Identity and Resource Pools Creating Service Profiles Creating Service Profile Templates and Cloning Service Profiles Managing Service Profiles Troubleshooting Cisco UCS B-Series Configuration Troubleshooting Cisco UCS B-Series Operation Backing Up & Restoring the Cisco UCS Manager Database Managing and Upgrading Cisco UCS B-Series Firmware Module 3: Administering UCS Management Tools with Intersight Describing Cisco UCS User Interfaces Exploring Intersight User Interfaces Describing Cisco UCS Management Framework & Features Describing Cisco UCS Hyperflex Getting Started with Intersight Programmability Lab Outline: Labs are designed to assure learners a whole practical experience, through the following practical activities: Connecting to the Lab Environment Explore the Cisco UCS GUI and CLI Environment Explore the Cisco Intersight Dashboard and claim devices Create Users, Groups, Roles and Organizations in Intersight Provision Identity and Resource Pools in UCSM Provision Mobile Service Profiles from Updating Templates Backup and Restore Cisco UCS Manager Database Objects Configure Logging in Cisco Intersight Create LAN and SAN Network Policies in Intersight Build a Server Profile and deploy to a UCS blade from Intersight Using Intersight to upgrade Firmware Install an OS from Intersight Using Rest API to Query UCSM Objects in Intersight
This programme has a simple objective: to help a sales team create and implementa comprehensive account development plan. If you want to earn strategic partner or preferred supplier status with your clients and customers then you need to add value to their business, consistently, and you can only do this if you have a plan - a key account management plan. This programme will help participants: Discover opportunities - through a deeper understanding of the customer's business Develop partnership - through a better 'value proposition' for the customer Increase repeat business - based on higher customer satisfaction Improve synergy - by getting everyone to 'sing from the same hymn sheet' Develop a collaborative account plan - validated by the customer and their own management Secure resources - management will align resources to execute soundly based account plans Win an increased share of 'customer wallet' - through systematic account development 1 The six principles of strategic account development Introduction to the PROFIT account development model:- Performance- Relationships- Objectives and goals- Feedback- Integration- Teamwork Practical account development strategies: overview and case studies 2 Performance Use practical tools to help you manage and measure account performance and success Design and build a monthly account dashboard for all sizes of account Prioritise and manage accounts and customers pro-actively and successfully, using proven planning tools Develop a cross-selling strategy to integrate products or solutions into the customer's business as closely as possible 3 Relationships How to build and manage key relationships within an account Qualifying and managing key influencers accurately Producing a 'relationship matrix' for each account quickly and easily Approaching and developing new contacts strategically Tools and techniques for successful tracking of contacts and call-backs Developing a coach or advocate in every customer organisation pro-actively 4 Objectives and goals Where are you now? - how to establish your competitive position within an account Know how to set, monitor and track key objectives for accounts over the short, medium and long term Selling against the competition - developing both long- and short-term sales strategies 5 Feedback - building loyal and satisfied customers The correct way to manage customer expectations and create listening loops within an account How to monitor and track your customer's perception and satisfaction with your organisation Building a personalised satisfaction matrix for each account Customer review meetings - best practice in building loyalty by regular joint planning events Understanding the concept of long-term customer value and the importance of adapting a customer-focused attitude 6 Integration How to integrate your products or solutions with the customer's business needs and processes Spot and react to early warning signals that may cause an account's loyalty to fade, reduce revenue or switch to a competitor Developing a loyalty strategy for key accounts or groups of smaller accounts Getting your message and strategy across to C-level contacts 7 Teamwork Working with others to achieve your account goals Gaining internal commitment from your organisation Managing and working with a virtual team Creating cross-departmental communication loops 8 Putting it all together Personal account reviews Personal learning summary and action plans
Some 60% of injuries at work are caused by lifting heavy objects. This powerful, practical programme is designed to help stop any of your staff from becoming the next statistic. 1 Introduction and objectives 2 Overview of Health and Safety Legislation and HSE Injury Statistics Health and Safety at Work Act 1974 Management of Health and Safety at Work Regulations (MHSWR) 1992 MHSWR 1999 specific duties to risk assess Manual Handling Operations Regulations (MHOR) 1992 Breakdown of injury statistics and costs of poor manual handling 3 The musculoskeletal system explained Prevention and ill-health Ergonomics RSI The spine in detail 4 Risk assessment General principles The TILE method Employees' duties Workplace scenarios
Duration 3 Days 18 CPD hours This course is intended for This is an intermediate-level course for web developers with prior practical experience working with React. Overview Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn about and explore: React Native Essentials React Fundamentals: 7 steps of app development Building a React Native App / Case Study Core Components Core APIs Getting Started with React Native is a hands-on, intermediate level web development course geared for experienced web developers who need to build and design applications using React Native. Students will explore the core APIs and Components, applying these skills to the course case study project to create a React Native app in class. React Native: An Introduction What Is React Native, Exactly? What Does React Native Bring to the Table? Pros and Cons Introduction to React Native Prerequisites: How to Get React Native Baby Steps: A First App Getting Started with React Native Weather App Starting the project Expo Components Custom components React Fundamentals Breaking the app into components 7 step process Step 2: Build a static version of the app Step 3: Determine what should be stateful Step 4: Determine in which component each piece of state should live Step 5: Hardcode initial states Step 6: Add inverse data flow Updating timers Deleting timers Adding timing functionality Add start and stop functionality Methodology review Core Components, Part 1 What are components? Building an Instagram clone View StyleSheet Text TouchableOpacity Image ActivityIndicator FlatList Core Components, Part 2 TextInput ScrollView Modal Core APIs, Part 1 Building a messaging app Initializing the project The app Network connectivity indicator The message list Toolbar Geolocation Input Method Editor (IME) Core APIs, Part 2 The keyboard Day Four to Five or Time Permitting Navigation Navigation in React Native Contact List Starting the project Container and Presentational components Contacts Profile React Navigation Stack navigation Tab navigation Drawer navigation Sharing state between screens Deep Linking Testing Flow - Benefits of Using Flow Jest - Jest with React Native Snapshot Testing with Jest Building and publishing Building Building with Expo OS Android Handling Updates Additional course details: Nexus Humans Getting Started with React Native (TT4198) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Getting Started with React Native (TT4198) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This is an Introductory level course for experienced Linux system administrators, DevOps engineers, infrastructure automation engineers, and systems design engineers. Ideally students should have familiarity with basic Python scripting. Attendees without programming skills can follow along with the scripting portion of the labs. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert practitioner attendees will explore how to: Describe Ansible concepts and install Red Hat Ansible Engine (optional - we can pre-install is as well if desired, depending on the audience) Deploy Ansible and Configure Ansible to manage hosts and run ad hoc Ansible commands. Implement playbooks Write a simple Ansible playbook and run it to automate tasks on multiple managed hosts. Manage variables and facts Write playbooks that use variables to simplify management of the playbook and facts to reference information about managed hosts. Implement task control; Manage task control, handlers, and task errors in Ansible playbooks. Deploy files to managed hosts Deploy, manage, and adjust files on hosts managed by Ansible. Manage large projects Write playbooks that are optimized for larger, more complex projects. Simplify playbooks with roles Use Ansible roles to develop playbooks more quickly and to reuse Ansible code. Troubleshoot Ansible Troubleshoot playbooks and managed hosts. Automate Linux administration tasks Automate common Linux system administration tasks with Ansible This lab-intensive course is geared toward those responsible for automation of configuration management; consistent and repeatable application deployment; provisioning and deployment of development, testing, and production servers; and integration with DevOps CI/CD workflows. Throughout the course you will explore core Ansible features such as automatic provisioning, configuration management, service deployment and operational processes. Ansible Overview Overview of Architecture Overview of Deployments Inventory Deploying Ansible Installing Configuration Files Running Ad Hoc Commands Dynamic Inventory Playbooks Writing YAML Files Modules Variables and Inclusions Variables Facts Inclusions Task Control Constructing Flow Control Handlers Tags Handling Errors Jinja2 Templates Jinja2 Templates Jinja2 Templates Roles Role Structure Creating Roles Deploying Roles with Ansible Galaxy Optimizing Ansible Configuring Connection Types Configuring Delegation Configuring Parallelism Ansible Vault Configuring Ansible Vault Executing with Ansible Vault Troubleshooting Ansible Troubleshooting Playbooks Troubleshooting Managed Hosts Ansible Tower Ansible Tower overview Installing Account management Hosts Jobs Optional: Ansible in a DevOps Environment Provisioning Vagrant Machines Deploying Vagrant in a DevOps Environment Deploying Docker in a DevOps Environment Additional course details: Nexus Humans Introduction to Ansible: Automation with Ansible (TTDV7580) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Ansible: Automation with Ansible (TTDV7580) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. Introduction to privacy program management Privacy program management responsibilities Accountability in privacy program management Privacy governance Considerations for developing and implementing a privacy program Position of the privacy function within an organization Role of the DPO Program scope and charter Privacy strategy Support and ongoing involvement of key functions and privacy frameworks Applicable laws and regulations The regulatory environment Common elements across jurisdictions Strategies for aligning compliance with organizational strategy Data assessments Practical processes for creating and using data inventories/maps Generating and applying gap analyses Privacy assessments Privacy impact assessments/data protection impact assessments Vendor assessments Policies Common types of privacy-related policies Policy components Strategies for implementation Data subject rights Operational considerations for communicating and ensuring data subject rights Privacy notice Choice and consent Access and rectification Data portability Erasure Training and awareness Developing privacy training and awareness programs Implementing privacy training and awareness programs Protecting personal information Holistic approach to protecting personal information Privacy by design Data breach incident plans Planning for a data security incident or breach Responding to a data security incident or breach Monitoring and auditing program performance Common practices for monitoring privacy program performance Measuring, analyzing and auditing privacy programs Additional course details: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The 'golden rule' of negotiation is simple - don't! But life's rarely that simple and very often we do have to negotiate, particularly if we want to win the business and especially if we want to win it on our terms. Such negotiations are crucial. We need to prepare for them. We need a strategy, and the skills to execute it. Does your team have a structured approach? Is it flawlessly executed, every time? Or is there room for improvement? This programme will help them master the six fundamentals of closing better business: Manage all these elements well and you will win more business, more profitably. This course will help participants: Negotiate from a position of partnership, not competition Deal more effectively and profitably with price objections Identify and practise successful sales negotiating skills Identify strengths and weaknesses as a sales negotiator Understand different types of buyer behaviour Learn to recognise negotiating tactics and stances Apply a new and proven structure to their business negotiations Identify and adapt for different behavioural styles Be alert to unconscious (non-verbal) communication Prepare and present a proposal at a final business negotiation stage Project confidence and exercise assertiveness in all sales negotiations 1 Planning for successful business negotiations This session introduces the concept of business negotiation and looks at its importance in the context of the participants' roles and activities. It briefly examines why we negotiate and the dynamics involved. Session highlights: What kind of a negotiator are you? Negotiation skills self-assessment and best practice How to establish roles and responsibilities for both parties How to identify and set objectives for both buyer and seller How to research and establish the other person's position (business negotiation stance) 2 How to structure your negotiations This module presents an eight-step framework or structure for use in negotiations and considers how best to prepare and plan your negotiations within the context of a supplier/customer relationship or business cycle. It also includes a brief review of legal responsibilities and what constitutes a 'deal'. Session highlights: Learn and apply a formal structure to use when negotiating How to establish short- and longer-term objectives and opportunities How best to plan, prepare and co-ordinate a major business negotiation meeting, or on-going negotiations Understanding of basic legal and organisational requirements 3 Verbal negotiation skills This session examines the human and communication dynamics inherent in any negotiation situation. It emphasises the importance of professional skills in preparing for a negotiation by identifying needs, wants and requirements accurately and by qualifying the competitive and organisational influences present. Session highlights: How to fully 'qualify' the other party's needs, requirements and constraints during the negotiation process by using advanced questioning and listening skills How to pre-empt negotiation objections by promoting and gaining commitment to options, benefits, value and solutions How best to propose and suggest ideas, using drawing-out skills 4 Non-verbal negotiation skills This module highlights how different personal styles, corporate cultures and organisation positions can influence events, and demonstrates practical methods for dealing with and controlling these factors. It also examines key principles of body language and non-verbal communication in a practical way. Session highlights: Gaining rapport and influencing unconsciously Understanding the importance of non-verbal communication; reading other people's meaning and communicating effectively as a result Ensure that non-verbal behaviour is fully utilised and observed to create maximum impact and monitor progress (eg, buying signals) Recognising that business negotiations are precisely structured and agreements gained incrementally 5 Proposing and 'packaging' This session highlights how best to present and package your proposal. It looks at how to pre-empt the need for negotiating by creating minor-options and 'bargaining' points, as well as how to manage the expectations and perceptions of the customer or buyer. Session highlights: How to identify the key variables that can be negotiated The power and use of 'authority' within your negotiations How to structure and present your proposal, ideas or quotation to best effect The importance of when and how to identify and influence buyer's objections 6 Dealing with price This module highlights how to best present and package price within your proposal or negotiation. In most cases, price has more to do with psychology than affordability and preparation and careful handling are essential. Session highlights: The three reasons that people will pay your asking price How to set price in a competitive market The key differences between selling and negotiating Ten ways to present price more effectively and persuasively 7 Getting to 'Yes': tactics and strategies There are many different tactics and strategies common to successful negotiators. This session looks at those that are most appropriate to the participants' own personal styles and situations. The importance of 'follow-through' is also explained and how to deal with protracted or 'stale-mate' business negotiations. Session highlights: How to negotiate price and reduce discounting early in the process How to recognise negotiating tactics and strategies in your customer or supplier Key strategies, techniques and tactics to use in negotiation The importance of follow-through and watching the details How to deal with stalled business negotiations or competitor 'lock-out' 8 Case studies and review This session examines a number of different situations and participants discuss ways to approach each. This will allow learning to be consolidated and applied in a very practical way. There will also be a chance to have individual points raised in a question and answer session. Session highlights: Case studies Question and answer Planning worksheet Negotiation 'toolkit' and check-list 9 Personal action plans Session highlights: Identify the most important personal learning points from the programme Highlight specific actions and goals Flag topics for future personal development and improvement
Duration 4 Days 24 CPD hours This course is intended for This is an introductory-level C++ programming course designed for developers with experience programming in C or other languages. Practical hands-on prior programming experience and knowledge is required. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in basic coding with C++, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn: Writing procedural programs using C++ Using private, public and protected keywords to control access to class members Defining a class in C++ Writing constructors and destructors Writing classes with const and static class members Overloading operators Implementing polymorphic methods in programs Writing programs using file I/O and string streams Using manipulators and stream flags to format output Using the keyword template to write generic functions and classes Writing programs that use generic classes and functions Writing programs that use algorithms and containers of the Standard Library Apply object-oriented design techniques to real-world programming problems Using algorithms and containers of the Standard Library to manipulate string data Understand how C++ protects the programmer from implementation changes in other modules of an application Using try() blocks to trap exceptions Using catch() blocks to handle exceptions Defining exceptions and using throw to trigger them Introduction to C++ Programming / C++ Essentials is a skills-focused, hands-on C++ training course geared for experienced programmers who need to learn C++ coupled with sounds coding skills and best practices for OO development. Students will leave this course armed with the required skills to put foundation-level C++ programming skills right to work in a practical environment. The central concepts of C++ syntax and style are taught in the context of using object-oriented methods to achieve reusability, adaptability and reliability. Emphasis is placed on the features of C++ that support abstract data types, inheritance, and polymorphism. Students will learn to apply the process of data abstraction and class design. Practical aspects of C++ programming including efficiency, performance, testing, and reliability considerations are stressed throughout. Comprehensive hands on exercises are integrated throughout to reinforce learning and develop real competency Moving from C to C++ (Optional) New Compiler Directives Stream Console I/O Explicit Operators Standard Libraries Data Control Capabilities Handling Data New Declaration Features Initialization and Assignment Enumerated Types The bool Type Constant Storage Pointers to Constant Storage Constant Pointers References Constant Reference Arguments Volatile Data Global Data Functions Function Prototypes and Type Checking Default Function Data Types Function Overloading Problems with Function Overloading Name Resolution Promotions and Conversions Call by Value Reference Declarations Call-by-Reference and Reference Types References in Function Return Constant Argument Types Conversion of Parameters Using Default Initializers Providing Default Arguments Inline Functions Operator Overloading Advantages and Pitfalls of Overloading Member Operator Syntax and Examples Class Assignment Operators Class Equality Operators Non-Member Operator Overloading Member and Non-Member Operator Functions Operator Precedence This Pointer Overloading the Assignment Operator Overloading Caveats Creating and Using Objects Creating Automatic Objects Creating Dynamic Objects Calling Object Methods Constructors Initializing Member consts Initializer List Syntax Allocating Resources in Constructor Destructors Block and Function Scope File and Global Scope Class Scope Scope Resolution Operator :: Using Objects as Arguments Objects as Function Return Values Constant Methods Containment Relationships Dynamic Memory Management Advantages of Dynamic Memory Allocation Static, Automatic, and Heap Memory Free Store Allocation with new and delete Handling Memory Allocation Errors Controlling Object Creation Object Copying and Copy Constructor Automatic Copy Constructor Conversion Constructor Streaming I/O Streams and the iostream Library Built-in Stream Objects Stream Manipulators Stream Methods Input/Output Operators Character Input String Streams Formatted I/O File Stream I/O Overloading Stream Operators Persistent Objects Introduction to Object Concepts The Object Programming Paradigm Object-Orientated Programming Definitions Information Hiding and Encapsulation Separating Interface and Implementation Classes and Instances of Objects Overloaded Objects and Polymorphism Declaring and Defining Classes Components of a Class Class Structure Class Declaration Syntax Member Data Built-in Operations Constructors and Initialization Initialization vs. Assignment Class Type Members Member Functions and Member Accessibility Inline Member Functions Friend Functions Static Members Modifying Access with a Friend Class Templates Purpose of Template Classes Constants in Templates Templates and Inheritance Container Classes Use of Libraries Strings in C++ Character Strings The String Class Operators on Strings Member Functions of the String Class Inheritance Inheritance and Reuse Composition vs. Inheritance Inheritance: Centralized Code Inheritance: Maintenance and Revision Public, Private and Protected Members Redefining Behavior in Derived Classes Designing Extensible Software Systems Syntax for Public Inheritance Use of Common Pointers Constructors and Initialization Inherited Copy Constructors Destructors and Inheritance Public, Protected, Private Inheritance Exceptions Types of Exceptions Trapping and Handling Exceptions Triggering Exceptions Handling Memory Allocation Errors C++ Program Structure Organizing C++ Source Files Integrating C and C++ Projects Using C in C++ Reliability Considerations in C++ Projects Function Prototypes Strong Type Checking Constant Types C++ Access Control Techniques Polymorphism in C++ Definition of Polymorphism Calling Overridden Methods Upcasting Accessing Overridden Methods Virtual Methods and Dynamic Binding Virtual Destructors Abstract Base Classes and Pure Virtual Methods Multiple Inheritance Derivation from Multiple Base Classes Base Class Ambiguities Virtual Inheritance Virtual Base Classes Virtual Base Class Information The Standard Template Library STL Containers Parameters Used in Container Classes The Vector Class STL Algorithms Use of Libraries