Our telephone training takes place in your normal working situation, using the actual telephones and software, and the programming software clients that trainees will use when fully trained. Our trainers will travel anywhere in the world to train you face to face, or if you prefer, we can offer our whole training catalogue remotely using Teams or Zoom. On-site and live remote telecoms training sessions have a general reputation as most effective for trainees to continue to efficiently carry out their telecoms usage, programming and own in-house training of future new employees. On-site training involves employees training at their place of work while they are doing their actual job, or in pre-organised classroom training sessions, based around hands-on interaction, trainer Q&A and all carried out using your own site telephone system. Our telephone trainers also offer consultations on your new or current telephone systems: looking into how you currently use your system, making suggestions on how programming could be tweaked and changed to improve your current usage, how to improve on call handling methods, and informing you of additional products which may be available on your system that you may not be aware of. This could help improve the level of communication across your company and interactions with your customers. We believe telephone handset and voicemail training sessions are essential to the smooth and efficient running of your company, making sure your staff are aware of all the features and benefits that the telephone handsets can offer, and ensuring calls are dealt with quickly and effectively. System administration training is available to teach new administrators how to manage and control a variety of system features. This type of training is especially important when new administrators have little or no previous telecom knowledge or experience, but it is equally important at all levels to ensure the new system is utilised to its maximum capability. Administration days or Call Centre Software training days take one full day to complete. Full Day Example: 9:30 - 16:00 Day Structure 09:30 - 10:45 Handset & VM session for up to 8 people 10:45 - 12:00 Handset & VM session for up to 8 people 12:00 - 12:45 Lunch 12:45 - 14:00 Handset & VM session for up to 8 people 14:00 - 15:15 Handset & VM session for up to 8 people 15:15 - 16:30 Handset & VM session for up to 8 people Half Day Example: 9:30 - 13:00 Switchboard training takes half a day (3-4 hours for up to 3 people). If you want to train more than 3 people, you may need to extend the day to a full day, to ensure everyone gets to have hands-on training on the switchboard. Super Users and Train the Trainer Sessions Super User sessions can also be organised to show advanced system features in order to provide an ongoing training service to their colleagues, once the trainers have left the site.
Ensure you can fully utilize this powerful tool to create a range of flowcharts and diagrams. Course overview Duration: 1 day (6.5 hours) Microsoft Visio is a powerful tool designed to simplify complex information through the creation of simple, professional-looking diagrams. While Visio is capable of producing almost any type of drawing this training concentrates on flowcharts, swim lane process diagrams and organisation charts. You will also discover the real power of Visio by adding essential data to the content of your diagrams and producing reports in Excel using this data. This course is designed for either new users of Visio or those who have dabbled and can create basic diagrams. Our course will give you the skills and knowledge you need to navigate your way around this powerful program and produce different types of diagram. Objectives By the end of the course you will be able to: Create and amend flowcharts Create cross functional (Swim Lane) process flows Produce organisation charts by importing data Add essential data to shapes Export diagram data reports to Excel Present, publish and print Visio diagrams Content Visio essentials Finding your way around Visio Using the ribbon and Quick Access toolbar Keyboard shortcuts Shapes and stencils explained What Visio can do for you Creating basic flowcharts Working with shapes Adding and deleting shapes Joining, aligning and sizing shapes Using Auto-Connect Labelling shapes and connectors Editing and improvinC flowcharts Amending shape and connector labels Using colours to emphasise Changing line styles Moving and copying objects Grouping diagram elements Quick ways of working Cross functional flowcharts Creating Cross-Functional Flowcharts Manipulating functional bands Creating off-page references within diagrams and hyperlinks to other documentation Organising charts and shape data Using the wizard to create an organisation Chart Importing existing Data into to create an organisation chart Modifying an organisation chart Shape Data Adding shape data to a shape Creating shape data sets Diagram reports Exporting data to a report in Excel Exporting to HTML Creating and customizing reports Presenting, publishing and printing Using Page Setup Print previewing Embedding backgrounds Adding headers and footers Converting your final documentation to PDF Saving as HTML Visio with PowerPoint
Firefighting or solving the same problems week after week? Create a problem-solving culture in your business with this proven methodology.
Expand your VBA knowledge further and learn some of the more advanced coding features. Course overview Duration: 2 days (13 hours) This course is aimed at experienced VBA users or those who have attended our Part 1 course and have started to use the language. Part 2 expands on the huge array of commands and elements of the data model that can be used and looks at building more complex VBA models Objectives By the end of the course you will be able to: Use comparison operators and system functions Use Arrays Work with ranges Work with the worksheets and workbooks collections and objects Use application objects Use the FileSystemObject Create function procedures Import and save text files Connect to other applications Content Comparison operators Using Comparison operators and functions The LIKE function Wildcards Using SELECT Case System functions The VAL function Case functions Trim functions Text functions Date functions Excel worksheet functions Using Excel functions in VBA Arrays Creating arrays Using arrays Ubound and Lbound Single and multi dimensional arrays Static vs dynamic arrays Working with ranges Creating range objects Passing data between range objects and arrays Using Transpose The Excel object model The object browser Working with collections Collections Creating object variables Setting object variables The For Each . . . Next Loo Sheet collections The worksheets collection The worksheet object The sheets collection Using object Grouping worksheets Using Typename The Workbook collection The workbooks collection Setting workbook variables Application objects Excel default information Display/alerts Screen updating Status bar On Time Using Wait Systems dialog boxes Showing dialog boxes Using dialog boxes Working with files Searching for files and folders The DIR function The FileSystemObject Function procedures Creating functions Adding arguments Calling functions Working with text files Searching for files and folders The DIR function The FileSystemObject Using the FILE and FOLDER collections Sharing data with other applications Early vs Late Binding Setting references to other applications Creating application variables Setting application variables
Duration 5 Days 30 CPD hours This course is intended for IT professionals with five to eight years of experience in these roles: Data center engineers Network designers Network administrators Network engineers Systems engineers System administrator Consulting systems engineers Technical solutions architects Server administrators Network managers Cisco integrators or partners Overview After taking this course, you should be able to: Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core Describe the Cisco Overlay Transport Virtualization (OTV) technology that is used to interconnect data centers Describe Locator/ID separation protocol Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding Describe hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV) Describe security threats and solutions in the data center Describe advanced data center security technologies and best practices Describe device management and orchestration in the data center Describe the storage options for compute function and different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective Describe Fibre Channel concepts, topologies, architecture, and industry terms Describe Fibre Channel over Ethernet (FCoE) Describe security options in the storage network Describe management and automation options for storage networking infrastructure Describe Cisco UCS servers and use cases for various Cisco UCS platforms Explain the connectivity options for fabric interconnects for southbound and northbound connections Describe the hyperconverged solution and integrated systems Describe the systemwide parameters for setting up a Cisco UCS domain Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager Describe the different policies in the service profile Describe the Ethernet and Fibre Channel interface policies and additional network technologies Describe the advantages of templates and the difference between initial and updated templates Describe data center automation tools The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco© data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System? (Cisco UCS©) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric. You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This course helps you prepare to take the exam, Designing Cisco Data Center Infrastructure (300-610 DCID) Describing High Availability on Layer 2 Overview of Layer 2 High-Availability Mechanisms Virtual Port Channels Cisco Fabric Path Virtual Port Channel+ Designing Layer 3 Connectivity First Hop Redundancy Protocols Improve Routing Protocol Performance and Security Enhance Layer 3 Scalability and Robustness Designing Data Center Topologies Data Center Traffic Flows Cabling Challenges Access Layer Aggregation Layer Core Layer Spine-and-Leaf Topology Redundancy Options Designing Data Center Interconnects with Cisco OTV Cisco OTV Overview Cisco OTV Control and Data Planes Failure Isolation Cisco OTV Features Optimize Cisco OTV Evaluate Cisco OTV Describing Locator/ID Separation Protocol Locator/ID Separation Protocol Location Identifier Separation Protocol (LISP) Virtual Machine (VM) Mobility LISP Extended Subnet Mode (ESM) Multihop Mobility LISP VPN Virtualization Describing VXLAN Overlay Networks Describe VXLAN Benefits over VLAN Layer 2 and Layer 3 VXLAN Overlay Multiprotocol Border Gateway Protocol (MP-BGP) Ethernet VPN (EVPN) Control Plane Overview VXLAN Data Plane Describing Hardware and Device Virtualization Hardware-Based High Availability Device Virtualization Cisco UCS Hardware Virtualization Server Virtualization SAN Virtualization N-Port ID Virtualization Describing Cisco FEX Options Cisco Adapter FEX Access Layer with Cisco FEX Cisco FEX Topologies Virtualization-Aware Networking Single Root I/O Virtualization Cisco FEX Evaluation Describing Basic Data Center Security Threat Mitigation Attack and Countermeasure Examples Secure the Management Plane Protect the Control Plane RBAC and Authentication, Authorization, and Accounting (AAA) Describing Advanced Data Center Security Cisco TrustSec in Cisco Secure Enclaves Architecture Cisco TrustSec Operation Firewalling Positioning the Firewall Within Data Center Networks Cisco Firepower© Portfolio Firewall Virtualization Design for Threat Mitigation Describing Management and Orchestration Network and License Management Cisco UCS Manager Cisco UCS Director Cisco Intersight Cisco DCNM Overview Describing Storage and RAID Options Position DAS in Storage Technologies Network-Attached Storage Fibre Channel, FCoE, and Internet Small Computer System Interface (iSCSI) Evaluate Storage Technologies Describing Fibre Channel Concepts Fibre Channel Connections, Layers, and Addresses Fibre Channel Communication Virtualization in Fibre Channel SAN Describing Fibre Channel Topologies SAN Parameterization SAN Design Options Choosing a Fibre Channel Design Solution Describing FCoE FCoE Protocol Characteristics FCoE Communication Data Center Bridging FCoE Initialization Protocol FCoE Design Options Describing Storage Security Common SAN Security Features Zones SAN Security Enhancements Cryptography in SAN Describing SAN Management and Orchestration Cisco DCNM for SAN Cisco DCNM Analytics and Streaming Telemetry Cisco UCS Director in the SAN Cisco UCS Director Workflows Describing Cisco UCS Servers and Use Cases Cisco UCS C-Series Servers Fabric Interconnects and Blade Chassis Cisco UCS B-Series Server Adapter Cards Stateless Computing Cisco UCS Mini Describing Fabric Interconnect Connectivity Use of Fabric Interconnect Interfaces VLANs and VSANs in a Cisco UCS Domain Southbound Connections Northbound Connections Disjoint Layer 2 Networks Fabric Interconnect High Availability and Redundancy Describing Hyperconverged and Integrated Systems Hyperconverged and Integrated Systems Overview Cisco HyperFlex? Solution Cisco HyperFlex Scalability and Robustness Cisco HyperFlex Clusters Cluster Capacity and Multiple Clusters on One Cisco UCS Domain External Storage and Graphical Processing Units on Cisco HyperFlex Cisco HyperFlex Positioning Describing Cisco UCS Manager Systemwide Parameters Cisco UCS Setup and Management Cisco UCS Traffic Management Describing Cisco UCS RBAC Roles and Privileges Organizations in Cisco UCS Manager Locales and Effective Rights Authentication, Authorization, and Accounting Two-Factor Authentication Describing Pools for Service Profiles Global and Local Pools Universally Unique Identifier (UUID) Suffix and Media Access Control (MAC) Address Pools World Wide Name (WWN) Pools Server and iSCSI Initiator IP Pools Describing Policies for Service Profiles Global vs. Local Policies Storage and Basic Input/Output System (BIOS) Policies Boot and Scrub Policies Intelligent Platform Management Interface (IPMI) and Maintenance Policies Describing Network-Specific Adapters and Policies LAN Connectivity Controls SAN Connectivity Controls Virtual Access Layer Connectivity Enhancements Describing Templates in Cisco UCS Manager Cisco UCS Templates Service Profile Templates Network Templates Designing Data Center Automation Model-Driven Programmability Cisco NX-API Overview Programmability Using Python Cisco Ansible Module Use the Puppet Agent Additional course details: Nexus Humans Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
An introduction to Ultrasound scanning common lower limb pathologies Speaker: Mike Grice a renowned Clinical Musculoskeletal Specialist, Shockwave Expert, Sonographer and Clinical Anatomist with over two decades of expertise in the Health and Fitness sector. Are you interested in learning more about using diagnostic ultrasound for lower limb pathologies? This expert led webinar is the perfect introduction to this fascinating topic. Over 90 minutes you will learn more about: How ultrasound works How to optimise images depending on structure depth The importance of anatomy Scanning an Achilles Tendon, Patellar Tendon and Medial Knee More on the speaker: With a passion for education and therapy, Mike Grice founded Movement Therapy Education in 2003, a leading institution dedicated to health, fitness, and therapy training. His academic contributions are notable. Mike has been an esteemed lecturer for both the FdSc and BSc Sports Therapy programs at University College Birmingham. Moreover, he has shared his insights as a guest lecturer across prestigious institutions in the UK, USA, and Europe. Serving as a lead tutor and advisor, Mike's expertise extends to affiliations with renowned institutions such as Movement Therapy Education, Elite Therapy Education, RockTape, and NAQI. His extensive knowledge is sought after by Premier League and Championship football clubs where he conducts specialised training sessions particularly in the delivery of Shockwave and Sonography. In the corporate sector, Mike has provided valuable consultancy to industry leaders like Boots, Pera Products, Startrite, and MicroScooter via Brytespark. His innovative approach was instrumental in advancing patient education systems in collaboration with Convatec. A regular on the conference circuit, Mike has been a featured speaker at events like Therapy Expo, FitPro, International Fitness Showcase, and Good Health Show. His notable presentation at the 2014 IOC World Conference for Injury Prevention in Monaco underscores his global influence. A testament to his dedication to education, Mike authored "Anatomy for Shockwave Users", a specialised course for Kinas Medical. He also serves as a trusted sonography educator for the Shockwave Academy based in Atlanta, Georgia.
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture, components, and main functions Explain the key features and benefits of NSX Advanced Load Balancer Explain and configure local load-balancing constructs such as virtual services, pools, health monitors, and related components Recognize web application breaches and threats Recognize multiple attack vectors such as web scraping, Layer 7 Denial of Service, brute force, and code injections Explain the components of NSX Advanced Load Balancer WAF that build a security pipeline to protect a web application from being attacked Describe how to configure the NSX Advanced Load Balancer WAF components Describe an NSX Advanced Load Balancer WAF operational task such as setting up an application with WAF, tuning the WAF Policy, and working with logs and analytics Explain the NSX Advanced Load Balancer WAF best practices for on-boarding a web application; configuring WAF settings for effective application security Explain how to size the NSX Advanced Load Balancer WAF data plane Explain the WAF Application learning feature, configuration of Application learning, Virtual Patching concepts, common caveats, and troubleshooting while deploying in any environment Recognize NSX Advanced Load Balancer Cloud Services that include threat Intelligence services Describe the Threat Intelligence service provided by NSX Advanced Load Balancer WAF and how the NSX Advanced Load Balancer WAF Threat Intelligence service receives live security threat feed for multiple attack vectors from Cloud Services (formerly Avi Pulse) Describe the NSX Advanced Load Balancer DataScript capabilities for detecting and defending against advance and zero-day attacks. Discuss the relevant NSX Advanced Load Balancer WAF logs and perform basic troubleshooting of applications that are protected by NSX Advanced Load Balancer WAF Explain the NSX Advanced Load Balancer WAF capability to protect Personally Identifiable Information (PII) This three-day course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer Web Application Firewall (WAF) solution. This course covers key NSX Advanced Load Balancer WAF features and functionality offered in the NSX Advanced Load Balancer 22.1.3 release for web security and application attack protection. Features include security pipeline, application learning, policy tuning, false positive mitigation, virtual patching, threat intelligence, troubleshooting, logs, analytics, and solution monitoring. Hands-on labs provide access to an NSX Advanced Load Balancer environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Illustrate NSX Advanced Load Balancer Explain NSX Advanced Load Balancer architecture and components Describe control plane clustering and high availability Describe data plane high availability mode Understand the common terminologies used with NSX Advanced Load Balancer Explain the NSX Advanced Load Balancer service elements Explain virtual service components and how to configure a virtual service Explain application profiles and network profiles Explain the pool configuration options and how to configure a pool Explain the available load-balancing algorithms Explain and configure SSL profiles and certificates Explain cloud connectors and cloud connector integration modes Explain multiple health monitor types Understand client logs Introduction to Application Security Understand web application security breaches and the implication of breaches Explain common terminologies related to Web Application Security Understand the different teams involved to secure applications Attacking Web Applications Understand the various web application security testing methodologies Understand the OWASP Top 10 vulnerabilities Understand the tools to generate a web application attack Describe a few types of web application attacks Types of Transport Understand different web traffic transport modes Describe web traffic and API traffic NSX Advanced Load Balancer WAF Components Understand the core design principles of NSX Advanced Load Balancer WAF Describe the NSX Advanced Load Balancer WAF components that build the WAF security pipeline Understand the NSX Advanced Load Balancer WAF configuration objects NSX Advanced Load Balancer WAF Operations Examine how to set up an application with WAF Describe considerations for the WAF policy Work with WAF logs and analytics Describe WAF policy tuning Describe the options available to remediate false positive mitigation NSX Advanced Load Balancer WAF Best Practices Describe technical and application considerations for onboarding an application front ended by WAF Describe best practices to remediate false positive mitigation. Describe how to manage a response from a back-end application server and client upload to the application server Describe the consideration for setting the rigidity of a WAF signature rule set Describe the options available to identify client traffic NSX Advanced Load Balancer WAF Sizing Understand how to do WAF data plane sizing in Greenfield and Brownfield deployments NSX Advanced Load Balancer WAF Custom Rules Understand WAF custom rules Describe the need and recommendation for custom rules Describe ModSecurity rules Understand the ModSecurity rule structure and explain how to construct the rule Analyze a sample custom rule for the use-case scenario for in-depth understanding of a custom rule NSX Advanced Load Balancer WAF Application Learning Understand the significance of Application Learning Explain the Positive Security Model architecture Describe the WAF multifaceted Application Learning technique to build an application model for creating positive security rules Describe how to view the data that is learned by the Application learning module Describe the WAF Virtual Patching technique to construct a WAF policy from Dynamic Application Security Testing (DAST) scanner results Understand the conditions for sharing WAF Learning Data and PSM Group in WAF Policy. Malware Protection Through ICAP in NSX Advanced Load Balancer Understand Malicious File Upload Protection and ICAP workflow Describe ICAP configuration and log analytics NSX Advanced Load Balancer IP Reputation Understand IP Reputation concepts and their integration with NSX Advanced Load Balancer Describe IP Reputation configuration, log analytics, and troubleshooting DataScript for Application Security Describe DataScript events and reference Describe application security using DataScript Explain how to troubleshoot DataScript issues Rate Limiting and DOS Describe and configure the NSX Advanced Load Balancer rate limiter technique Describe protection from denial of service (DoS) attacks and distributed DoS (DDoS) attacks in NSX Advanced Load Balancer Explain the Service Engine general advice and guidance for DDOS Bot Management Understand Bots Describe the Bot Management mechanism in NSX Advanced Load Balancer Describe how to configure NSX Advanced Load Balancer Bot Management Managing Personally Identifiable Information in NSX Advanced Load Balancer Understand Personally Identifiable Information (PII) Understand the scope of managing PII in NSX Advanced Load Balancer Describe how to configure the hidden PII in NSX Advanced Load Balancer logs using profiles and WAF rules. Threat Intelligence Introduce the Threat Intelligence service Describe the Threat Intelligence live security threat feed for multiple attack vectors Describe how to configure Threat Intelligence in NSX Advanced Load Balancer Application Programming Interface Security Define Application Programming Interface (API) Security Understand API authentication and authorization using virtual service authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Understand API Rate Limiting in NSX Advanced Load Balancer Understand the NSX Advanced Load Balancer WAF Protection for API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Understand what Emotional Intelligence is and how it impacts you and others around you. Course overview Duration: 1 day (6.5 hours) Emotional intelligence (EI) is increasingly being regarded as a major key to personal success. IQ measures our ability to problem solve and is pretty difficult if not impossible to change. Our emotional intelligence is our ability to problem solve about emotions and like any other skill can be developed and honed. Some of the most successful people in life today are those who are regarded as having a high level of emotional intelligence whatever their level of IQ. Being able to manage themselves and others successfully is often a crucial factor in their success. With a growing emphasis on ‘soft skills’, leaders and managers need to be able to sensitively handle other people, both within and outside the organisation. Emotions are important in work life. They drive motivation and commitment; they are an inherent part of what we do whatever our job role. Effective individuals are proficient at recognising, using, understanding, and managing emotions in themselves and others. This one day course will help participants improve their understanding and skill in these areas. Objectives By the end of the course you will be able to: Identify the aspects of your role where emotions are important Recognise the four key elements of Emotional Intelligence Use a range of skills to build and maintain key relationships Develop an emotionally intelligent ‘culture’ in your part of the organisation Create a personal action plan to continue to enhance and monitor your Emotional Intelligence Content Emotional Intelligence (EI) What is Emotional Intelligence? Where does it sit in the “whole person model” IQ, Personality Traits, Skills and Knowledge and EI Dispelling the myths and legends about EI The RUUM Model of EI Recognising emotions in self and others Using emotions Understanding emotions Managing emotions Developing Skills in each of the 4 areas of EI Short and long-term strategies to develop EI Developing compensating strategies where needed Practical application of EI Leveraging EI strengths Practice using RUUM Model Case studies and scenarios Video analysis Examples in the public eye we can all relate to Incorporating EI into your day to day role Practical steps Peer coaching Action planning Optional Follow-up After completing this course, you have an opportunity to complete a psychometric to understand more about emotional motional drivers and derailers. If you would like to do this, you will be invited to complete a psychometric questionnaire called Lumina Emotion.It can be done online and takes between 30-60 minutes. The results are compiled into a report which one of our trained and accredited coaches will go through with the participant individually to work up an action plan to leverage their EI strengths and develop strength where needed.This can be very powerful in building EI into your people and your organisation.
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze Workspace ONE UEM deployments Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce Summarize basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway⢠platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist⢠In this extended five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge necessary to implement Workspace ONE UEM effectively.In addition, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to distribute business-critical applications securely from any device and configure access management controls. You will learn how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on, and you will leave with an understanding of the fundamental principles of identity and access management.Finally, you learn to investigate, analyze, and determine issues that might occur with the different components of Workspace ONE UEM. Troubleshooting is the backbone of service maintenance and management. By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management. Course Introduction Introductions and course logistics Course objectives Online resources and references Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for Workspace ONE Solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process and needs to integrate with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager? and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use cases for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway and the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List View and the Device Details View pages Analyze endpoint deployment and compliance data from the Monitor Overview page Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions that Workspace ONE Access enables Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Explain the integrations workflow Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by Unified Access Gateway Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of VMware Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common issues related to group management and assignment Outline common issues related to Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain Workspace ONE Access integration and Workspace ONE Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Understand how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Application Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway And Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify
Our self-leadership and executive development programme can be fully ITA SDS funded supporting leaders and business owners and creating a growth plan. SDS INDIVIDUAL TRAINING ACCOUNTS (ITA) Rely On Our Team for Your Executive Development The Power Within Training offers unrivalled executive development training for go-getters and self-starters throughout England and Scotland. Did you know that approximately 55% of people making their living in sales don’t have the right skills to be successful? Good sales skills are some of the rarest and most sought-after skills in the workforce. Whether you’re running a business, looking to progress further in your career or want to sharpen your skills before returning to work, our self-leadership training will help you develop the skills you need to succeed. After completing our executive development training, you’ll have a sales mindset and the skills to secure your ideal role, perform better, and utilise high-payoff action-planning techniques. Don’t hesitate to contact us to learn more information. OUR TRAINING SOLUTIONS What is Self-Leadership Executive Training? Self-Leadership Development Our self-leadership development course was designed to give you total control of your career, business, and professional life. Most professionals will spend more than 80% of their time at work or in business. We’ve structured our executive training to help those looking to enhance their career prospects or business success by taking advantage of our unique Motivational Intelligence seven steps to success framework. The seven-step success system will take you through a journey of self-discovery, self-awareness, and self-development, which enables you to understand the barriers and self-limiting obstacles that have been holding you back. The Power Within’s self-leadership training will guide you through overcoming these barriers and eliminating them from your life. If you are looking to stand out from the crowd and build a career or business you can be proud of, then this live classroom-based programme is definitely for you. Benefits of Self-Leadership Development The self-leadership training has been designed from the ground up to inspire, guide, and develop you into not only achieving your goals but being able to measure success in your career, help you find your dream job, and help make an immediate impact in everything you do. Completing our executive leadership development course will allow you to utilise emotional intelligence to get the best of your team while focusing on clear values and principles that increase your overall success and profitability. Working on your self-leadership skills will grant you greater insight into the factors hindering or impacting your success while giving you the tools to make decisions and get into action. Here are some additional benefits of our self-leadership training: Build Awareness – When you’re a leader, you must inspire and motivate people to achieve and go after the bigger picture for your organisation. You’ll need an effective and flexible leadership style to ensure your team succeeds. We’ll help you discover your leadership style and how you can use it effectively to the advantage of your business. Increase Team Engagement, Motivation, and Accountability – How can you expect your team to behave if you’re no longer motivated to succeed? The Power Within will give you the tools to keep striving toward success while ensuring your business is focused and motivated. Cultivating a High-Performance Culture – The right high-performance culture installs peak performance into every team member. Through our executive development, you’ll be able to help each reach their targets while they look for ways to improve constantly. Develop Strategic Skills – We’ll help you develop leadership skills and self-improvement goals, allowing you to introduce changes to your business based on your guiding visions while encouraging others to share the same vision. If you are looking to stand out from the crowd and build a career or business you can be proud of, then this live classroom-based programme is definitely for you. What Are the Key Skills Learned from Executive Development Training One of the first sets of vital skills for self-leadership you’ll learn is the ability to stop, step back, and reflect on the things that trigger us to react. When we react, we’re being controlled by the trigger. Another skill we’ll help instill is to consider intention. Intention is important to us, such as our values and what we’re trying to achieve. When you become intentional, you start to live a life of choice. Self-leadership and executive development are a journey. The more self-leadership we attain, the more successful we’ll become. The more successful we become, the more self-leadership we need. Here are some additional critical skills you’ll learn from our self-leadership training: Self-Awareness – It’s vital to hone your ability to see yourself as clearly as you are. This skill takes dedication, introspection, and mindfulness. Also, a dose of self-awareness helps with self-control, self-confidence, and feelings of validation. Overall, you should be open to critique and accountability. Goal Setting – A good self-leader must be proactive in not only identifying their goals but how to reach those goals in a manageable manner. Our executive development training will teach you how to break down a larger goal into more attainable steps to avoid burnout while helping you celebrate smaller milestones. Self-Motivation – A classic way to handle self-motivation is to divide long-term goals into smaller, more attainable ones. This optimization means recognising what about the goal that appeals to you, then forming a strategy that aligns with your strengths and values toward that goal. Constructive Thought Patterns – Through our leadership skills and self-improvement course, you’ll be able to review your performance and assess your intentions and effectiveness while providing an opportunity to ensure your strategies are geared towards success. This is done by focusing on improving strengths and the mental imagery of yourself that recognizes your capacity to grow, develop, and change. Self-leadership training teaches you to see yourself as having the ability to create, improvise, innovate, and adapt. OUR LIVE WORKSHOPS ARE BACK What’s Covered in Our Executive Development? Self-Leadership "It's a mindset thing" When you undergo our self-leadership training, you’ll experience several modules designed to allow your conscious and subconscious belief systems to work together for a predetermined goal or set of outcomes. Self-leadership is one skill that will significantly impact your career, team, and even your life’s happiness. Our executive leadership development course promotes bold and powerful decisions to get you back into the driver’s seat of your life and make the best of each day by setting goals, shifting your mindset, and finding your purpose. During each module, we’ll work with you and help you design and deliver your team leadership programmes catered to your team and your business dynamic. Our goal is to allow you to evolve into a bigger and better leader. Here are some of the modules in our self-leadership training: Unleash Your True Potential Create Your Personalised 7-Step Success Framework Peak Performance and Self-Mastery Growth Mindset and Mindset Performance The Power of Feedback Taking Back Control of Your Personal & Professional Journey Goal Setting & Defining If you are looking to stand out from the crowd and build a career or business you can be proud of, then this live classroom-based programme is definitely for you. Discover Who’s Leading Our Self-Leadership Training James Fleming, the co-creator of The Power Within, will lead your self-leadership training. James founded The Power Within with his wife, Enas Fleming. They wanted to inspire people around the world to think better, be better and achieve more. James believes that everyone can be whatever they set their minds to. Founding The Power Within allowed James to turn that deep knowledge into a business that helps others think bigger, better, and achieve more daily. He strives to give leaders the tools and knowledge to achieve their full potential while increasing their self-confidence and self-belief through Motivational Intelligence Revolution. James wants to support today’s businesses to become tomorrow’s leaders. Course Overview Our self-leadership development course is a quick-paced training that is between eight and twelve hours in length. After you attend the face-to-face workshops, you’ll be given access to our online self-leadership training portal. This allows you to continue your journey of self-development by ensuring you’ll always have a system and process to fall back on when you need it. One of the best parts of our executive development course is that you receive this information fully funded. Even if you aren’t eligible for funding, you can still invest in this course and begin a new chapter of professional development for yourself. Elevate yourself if any of our eligibility requirements apply and you early less than 22,000 a year.