This session will combine knowledge as well as practical interactive scenarios to work through to assist delegates in evaluating themselves to identify areas they might need to improve on. The course will cover: The purpose of the role (reminder) How the role has evolved What lessons can be gained so far How do you create a culture of compliance What good systems, policies and procedures look like Easy tips on what, where and how you should be looking Target Audience This online course is suitable for those new to the COFA role, those supporting the COFA and for those that would like a refresher of the role and their responsibilities. Resources An information pack including the course slides, scenarios and suggested answers will be provided to all delegates, which may be useful for ongoing reference. Please note a recording of the course will not be made available. Speaker Sarah Charlton, Consultant, DG Legal Sarah has a BSc (Hons) in Applied Accounting and is a Fellow member of the Association of Chartered and Certified Accountants. Her career spans over 35 years working within the legal sector, fulfilling roles from COFA through to CEO. During her career she has worked with a number of legal regulators, professional bodies and government organisations. Sarah has been a member of the Institute of Legal Finance and Management throughout her career, qualifying as a Fellow member in 2005. Sarah also served as chairperson between 2010-2012 and continues to serve as an Executive Council Member.
The course will increase participants knowledge relating to how drugs work, potential risks and hazards associated with medicines, and provide an overview of the legal and professional aspects of medicines management.
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site 2 - Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot 3 - Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections 4 - Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations 5 - Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence 6 - Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points 7 - Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying and managing Windows apps 8 - Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates 9 - Implementing Defender Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies 10 - Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access 11 - Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service 12 - Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance and Management Insights Backing up and recovering a Configuration Manager site Updating the Configuration Manager infrastructure 13 - What?s new in Microsoft Endpoint Configuration Manager Whats new in Microsoft Endpoint Manager covering each semi annual release Additional course details: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Overview Objectives Define brands and understand the opportunities and challenges facing them in highly competitive business landscapes Plan and craft a powerful brand positioning statement that reflects the brand's promise and the expectations of their most valued customers Build a strategic brand and track its growth and sustainability using researched processes Explore the elements of brand equity and the constituents of brand identity to build consistent and sustainable brands Identify various brand strategies to come up with sound actions aligned with the status of existing and new markets and products Master the process for conducting a full brand audit to evaluate brand performance and take remedial actions
Overview This course is designed to gain advanced sales techniques through traditional and modern selling techniques. It will help train the participants for a wide range of sale environments in diverse sectors. With the increase in neck-to-neck competition sales have become a major factor and a lot of new philosophies and modern techniques including new sales methodology has been introduced in the sales industry. As a salesperson who is directly involved in sales or even managers who are into products and services, knowing how to sell is an incredibly useful skill. The course is designed with a lot of practical exercises, and modern techniques, taking from basic to advance level which will help the delegates to attain the skills they require and start implementing what they learned.
The course is relevant to anyone requiring an understanding of the use of Agile or looking to adopt it. This includes, but is not limited to, organisational leaders and managers, marketing executives and managers, and/or all professionals working in an Agile environment, including software sesters, developers, business analysts, UX designers, project management office (PMO), project support and project coordinators.
This workshop covers the five main types of payment for exports, from advance payment to open account. It includes the use of Bills of Exchange with and without documents
Project Leadership Skills: In-House Training To be effective within an organization, project managers need to have a wide variety of skills and abilities. Included among these are: creating and executing on a vision; motivating others; influencing without authority; networking; communicating up, down and laterally; negotiating; managing stakeholders; and managing conflict. This highly interactive workshop focuses on building the soft skills that are critical to leading a team and creating sustainable business change. Participants will gain insight into the social science as well as the brain science behind motivating and empowering others. They will learn and experiment with a variety of influencing strategies and tactics. Working in pairs as well as small groups, they will collaborate with others to brainstorm, share experiences, and apply concepts to everyday challenges. Participants will also discover their personal communication preferences, strengths, and blind spots and will gain insight into how best to communicate with others they find 'difficult.' They will gain insight into managing the people side of change, learning strategies for dealing with each step in the process. Hands-on negotiation and conflict management activities enhance the theoretical learning, grounding it in real life and making it actionable. Interweaving role play with experiential learning and group activities, this course will help participants refine a skill set that is invaluable to their organization, and one that transfers easily across their professional and personal lives. What You Will Learn At the end of this course, you will be able to: Explain the importance of vision in driving motivation and engagement Apply science-based research to better motivate those around you Strategically leverage both personal and positional power to achieve positive project results Determine influencing and networking strategies needed for personal growth Identify ways to problem solve communication challenges when others have different personality styles Connect stakeholder expectations to project success criteria Assess key stakeholders across various dimensions of complexity Apply the four rules of principled negotiation to a real-life conflict situation Recognize key aspects of a physiological response to conflict Utilize selected tools and techniques to 'defuse' an emotional situation Leverage various strategies and tactics to successfully deal with ambiguity at work Getting Started / Foundation Concepts Introductions Course structure, goals, and objectives Beginning a personal action plan Managing Vision and Purpose / Motivating Others Communicating and aligning around vision Tying the present to the future The importance of purpose The art and science of motivation Networking and Influencing Positive politics and project success Types of power within organizations Power and influence Networking best practices Communication The medium and the message Personality and communication styles Communication challenges Stakeholder Management and Negotiation Identifying stakeholders Analyzing stakeholders Negotiation basics Principled negotiation Conflict Management Dynamics of conflict The anatomy of conflict Conflict management approaches and tools Dealing with ambiguity Summary and Next Steps Key concepts review Creating your personal action plan
About this training course This highly interactive 5-day training is aimed at those who wish to take their E&P accounting skills to a more advanced level than our introductory course, E&P Accounting - Level 1, and our intermediate course, E&P Accounting - Level 2. It will help equip you for more demanding analytical roles within your organisation. Training Objectives After the completion of this training course, participants will be able to: Carry out and manage the day-to-day financial accounting activities associated with participation in E&P joint ventures Prepare, analyse and present information for effective financial reporting Understand the impact of a comprehensive range of activities on the financial statements of an upstream oil and gas company Practically apply IFRS in accounting for a wide range of typical oil and gas industry activities Target Audience This is an advanced level course designed for: those who have already attended E&P Accounting - Level 1 and E&P Accounting - Level 2, or those who can demonstrate, by a combination of relevant experience and previous study, sufficient prior knowledge to contribute and benefit from attending this workshop Course Level Advanced Training Methods Training Method - Scenario Based Learning Learning centers around highly realistic E&P company scenarios. A computer-based simulation is used to plan, record and report the progress of your company through several years of international E&P activities. Teams of 2 - 3 people participate in the financial management of these activities, including Operator and Non-operator accounting, recording of transactions, updating of financial statements and analysis of results. The highly interactive laptop-based scenario approach will enable you to follow the impact of each activity from initiation through to final results and analysis of company performance. You will need to bring with you to the course your own laptop PC with MS Excel⢠pre-installed. Prior knowledge of spreadsheet techniques is assumed. Trainer will provide various Excel files which participants may retain at the end of the course. Course Duration: 5 days in total (35 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. Trainer Your expert course leader has more than 30 years of experience in the international oil and gas industry, covering all areas of Finance and Audit, including involvement in Commercial roles. During her 19 years with ENI she worked in Italy, Netherlands, Egypt and UK and was CFO for 2 major ENI subsidiaries. She has delivered training courses in Accounting, Audit, Economics and Commercial topics in many Countries. She has a Degree in Economics & Accounting and is a Certified Chartered Accountant. She is also a Chartered Auditor and an International Petroleum Negotiator. Outside of work, she is inspired by the beauty of nature and art, helping disadvantaged people, sports (football, golf) and her cat. Courses Delivered Internationally: E&P Accounting, Auditing in the Oil & Gas Industry Cost Control & Budgeting Introduction to the Oil & Gas Industry Petroleum Project Economics Contracts Strategy International O&G Exploitation Contracts POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations