We are hosting a free virtual co-working session, to help qualitative researchers get their work done in a supportive and motivating space.
We are hosting a free virtual co-working session, to help qualitative researchers get their work done in a supportive and motivating space.
Managing teams and projects in line with a private, public or voluntary organisation's operational or departmental strategy.
Learn how to be fully effective in your role without burning yourself out. Course overview Duration: 1 day (6.5 hours) There are only 24 hours in a day, and only so many of those that you want to spend in the office! While many people seem to see working long hours and being highly stressed as a badge of honour you can in fact be more productive and fully effective in your role without burning yourself out. Quite simply in this whirlwind world we need to be great at managing the time and that’s what this interactive one day workshop will teach you. Objectives By the end of the course you will be able to: Use a selection of tools to set goals, plan and prioritise your time Stop self-sabotaging and create more productive time every day Take control of your day, the time you have available and other people who try to steal your time Hold more effective meetings Manage stress so that you can be at your peak more often Content Getting Started Understanding the need to manage your time effectively Identifying your time stealers Setting goals Getting clarity about what needs to be done Understanding what is urgent and what is important in order to prioritise your tasks Planning your time Using to do lists and other time management tools Stop Self Sabotaging Understanding your time personality and the impact it can have on how you use your time and how others perceive your time management Recognising procrastination and taking action The myth of multitasking Creating focus and clarity in your day Using the time you have to be most productive Taking Control How to assert yourself with others who might be impacting your time management Managing interruptions Saying no and feeling OK about it Negotiating workloads Delegating How to hold productive meetings Managing your meeting attendance effectively Avoiding Burnout Exploring stress and how we respond to it Shifting mindsets Thinking differently Managing overwhelm and panic Tools to manage stress at work
We use it everyday but there are so many additional tools to save you time and make your work in Outlook more efficient and less stressful. Course overview Duration: 4 hours People tend to think they know how to use Outlook however there are so many lesser known features that can make working in Outlook so much more efficient. Simply understanding the layouts, how to turn things on and off and customising the environment to your preferences can save time and frustration. You then have search features, things such as conversation clean up and quick steps that can help to tidy up and organise what you do. Objectives By the end of the course you will be able to: Customise Outlook to your preferences Manage email conversations Setup and use Quick Steps Create folders and organise information Setup rules Search for information Work effectively with calendars Content Customising the user interface Using the Navigation Pane and “To-do Bar” Setting folder pane options Adding favourites Peak preview Customising the quick access bar Setting reading pane and message preview Customizing email mail views Using the field chooser Email options Email conversations Conversation clean up Using Quick Steps Creating folders and organising information Setting email options Setting up rules Searching for information Using the Search bar Setting what to search for Setting where to search Searching for categories Adding more search options Working with calendars Setting what to view Using Schedule View Setting calendar options Weather bar Adding different time zones Adding meetings and appointments Setting up and using categories Opening other people’s calendars Setting calendar permissions Calendar groups Working with Tasks Lists Setting task options Adding and amending tasks Setting dates, deadlines and reminders Adding attachments to tasks Assigning tasks to others Flagging tasks Using and setting Quick Click Recurring tasks Flagging emails to appear on your task list Converting emails to tasks Converting tasks to calendar appointments
Duration 1 Days 6 CPD hours This course is intended for This course is intended for IT Asset Managers and other professionals involved in Asset Management, strategic planning, security programs and those affected or influenced by ITAM and security initiatives. The mission of IAITAM?s CAMSE course is to maximize the contribution of IT Asset Management professionals to the information security and physical security of the organization by bridging the gap between ITAM and IT security processes while incorporating security strategies throughout the ITAM policies, processes and procedures so that ITAM enhances the security program and improves the applicable governance. This course includes the comprehensive online examination necessary for achieving CAMSE Certification. Course Outline Scope of IT Security & ITAM Threat Prevention vs. Threat Protection Decentralized vs. Centralized Security The IT Security Plan ITAM?s Role in Risk Management The 12 KPAs & Security Program Management & Security Communication & Education Management & Security Policy Management & Security Acquisition Management & Security Asset Identification Management & Security Disposal Management & Security Project Management & Security Documentation Management & Security Financial Management & Security Legislation Management & Security Compliance Management & Security Vendor Management & Security Assessing Asset Risk Level Program Issues by Asset Type ITAM Program Assessment for Security
Duration 2 Days 12 CPD hours This course is intended for AdministratorDatabase Administrators Overview Describe the components of ASMExplain and apply Automatic Storage Management (ASM) initialization parametersManage ASM instances and associated processesMonitor ASM using the V$ASM dynamic performance viewsUnderstand Flex ASM architecture and componentsUnderstand ASM Deployment AlternativesInstall and configure Flex ASMManage Flex ASMEmploy ASM space management techniquesCreate and delete Automatic Storage Management (ASM) disk groupsSet the attributes of an existing ASM disk groupPerform ongoing maintenance tasks on ASM disk groupsExplain key performance and scalability considerations for ASM disk groupsDescribe the Automatic Storage Management (ASM) architectureUse different client tools to access ASM filesDescribe the format of a fully qualified ASM file name This Oracle Database 12c: ASM Administration training teaches you about Oracle ASM architecture. Expert Oracle University instructors will help you develop a deeper understanding of both standard ASM and Flex ASM applications. This Oracle Database 12c: ASM Administration training teaches you about Oracle ASM architecture. Expert Oracle University instructors will help you develop a deeper understanding of both standard ASM and Flex ASM applications.
Duration 3 Days 18 CPD hours This course is intended for Information System Owners Analysts Ethical Hackers ISSOs Cyber Security Managers IT Engineers Overview Upon completion, the Certified Vulnerability Assessor candidate will be able to competently take the exam. This course provides a solid understanding of the tools an IT engineer needs to review an Information System. In this course, you will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins. Lessons include understanding malware and viruses and how they can infiltrate an organization?s network. After you take this course, you will be able to assess a company?s security posture and perform a basic vulnerability test.ÿPlus, you will be able to generate reports to guide new security implementation. Course Outline Why Vulnerability Assessment Vulnerability Types Assessing the Network Assessing Web Servers and Applications Assessing Remote and VPN Services Vulnerability Assessments & Tools of the Trade Output Analysis
Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodology Assess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deployment Apply advanced authentication and load balancing principles In this expert level 5-day training course you will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, you will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare you for the Citrix Certified Expert in Networking (CCE-N) exam. Module 1: Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirementrs User Segmentation Application Assessment Capabilities Assessment Module 2: Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Module 3: Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Module 4: Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Module 5: Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Module 6: Advanced Load Distribution and Link Load balancing Advanced Load Balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Module 7: Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new)
Designed for professional B2B salespeople to develop a modern approach to winning business