Understand the Mental Toughness model and look at how to improve your mental toughness with the 4c’s. Course overview Duration: 1 day (6.5 hours) Mental toughness is the ability to resist, manage and overcome doubts, worries, concerns and circumstances that prevent you from succeeding, or excelling at a task or towards an objective or a performance outcome that you set out to achieve. Our one day programme can help you to achieve this by using tools and techniques to help you perform under pressure and ensure your wellbeing. Objectives By the end of the course you will to: Identify the causes of stress and how to prevent them Assess your mental toughness using the MTQ48 measure Use tools and techniques to develop your mental toughness Content Understanding Stress, Pressure and Challenge The causes of stress How stress can manifest itself Threat response The Stress performance curve Stress, challenge and pressure Positive stress Mental Toughness, Stress Management and Resilience Defining stress management, resilience and mental toughness How they differ and how they affect each other Mental Toughness Understanding mental toughness The importance of mental toughness The benefits of developing your mental toughness The 4 Cs of Mental Toughness How we approach Challenge Control our emotions Develop Confidence Create Commitment MTQ48 Profile Understanding your MTQ48 profile Looking at your mental toughness Areas for development Developing Mental Toughness Managing physical energy to deal with stress Developing healthy habits for managing stress Multitasking and the ability to focus Identifying unhelpful thought patterns Positive and pragmatic thinking approaches Managing your approach to change and challenge Ways of developing mental toughness
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who desire to influence, develop, and/or implement a business ethics program in an organization. Overview Upon successful completion of this course, students will be able to foster a successful company culture and increase profitability by implementing a program of good business ethics. In this course, students will grow in their understanding of business ethics, their impact on all business levels and how all who interact with the company influence the development of a company business ethic. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives What is Ethics? What is Business Ethics 10 Benefits of Managing Ethics Case Study Implementing Ethics in the Workplace Benefits Guidelines for Managing Ethics in the Workplace Roles and Responsibilities Employer / Employee Rights Privacy Policies Harassment Issues Technology Business and Social Responsibilities Identifying Types of Responsibilities Case Study Handling Conflicting Social and Business Responsibilities Case Study Ethical Decisions The Basics Balancing Personal and Organizational Ethics Common Dilemmas Making Ethical Decisions Overcoming Obstacles Whistle Blowing Criteria and Risk The Process When You Should 'Blow the Whistle Managerial Ethics Ethical Management Identifying the Characteristics Ensuring Ethical Behavior Unethical Behavior Recognize and Identify Preventing Addressing Interventions Ethics in Business (I) Organization Basics Addressing the Needs Ethical Principles Ethics in Business (II) Ethical Safeguards Developing a Code of Ethics Performing an Internal Ethics Audit Upholding the Ethics Program Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations Additional course details: Nexus Humans Business Ethics training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Ethics course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix Gateway, with little or no previous Citrix Gateway experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix Gateway environments. Overview Configure Authentication and Authorization Define End User Access and Experience Integrate Citrix Gateway with Citrix Virtual Apps and Desktops and additional resources Employ recommended tools and techniques to troubleshoot common Citrix Gateway network and connectivity issues Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops. Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA Additional course details: Nexus Humans CNS-226: Implement Citrix ADC 13.x with Citrix Gateway training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-226: Implement Citrix ADC 13.x with Citrix Gateway course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Successful account management requires time and investment to achieve high levels of customer satisfaction and develop new business opportunities. Ensuring you are equipped with the right tools to approach every customer interaction in a structured way will help you have productive relationships with your clients. Whether you're new to account management or experienced in business development and looking to expand your skillset, understanding how you can maximise customer relationships will be key to your success. We have developed this programme to be practical, fun and interactive. Participants will have the opportunity to learn and practice a number of key skills that will see successful results, and are encouraged to bring real life examples to the course so that learning can be translated to real world scenarios. This course will help participants: Learn how to plan growth and increase revenue from existing accounts Develop skills to build and develop essential relationships to increase value and visibility Learn how best to create loyalty and customer satisfaction Identify how to set account targets and development plan for building contacts and cross-selling Develop persuasion and influencing skills to better define needs and develop opportunities Learn how to add value at all stages; plus gaining competitive advantage Develop an up-selling, cross-selling strategy 1 Performance metrics for account management Introduction to the PROFIT account management model Using practical tools to measure account performance and success Planning your account strategy - red flags and green lights 2 Relationships for account management How to build and manage key relationships Producing a 'relationship matrix' Developing a coach or advocate 3 Setting objectives for your account Developing an upselling cross-selling strategy Setting jointly agreed goals, objectives and business plans Planning session 4 Feedback and Retention - building loyal and satisfied customers How to monitor and track your customer's satisfaction Building a personalised satisfaction matrix Customer service review meetings 5 Influence Getting your message and strategy across to C-level contacts Being able to better develop a business partnership within an accountes 6 Teamwork and time management Working with others to achieve your account goals Managing and working with a virtual team Managing your time and accounts effectively 7 Gaining commitment and closing the sale Knowing when to close for commitment How to ask for commitment professionally and effectively Key negotiation skills around the closing process - getting to 'yes' Checklist of closing and negotiation skills Practice session
Duration 3 Days 18 CPD hours There are good reasons Adobe Premiere Pro is such a popular post-production video editing software application. It excels for a wide variety of uses; tapeless and DSLR footage; cross-platforms, open workflows for easy collaboration, powerful metadata features for greater editing and production efficiency, plus real-time 3D editing and Virtual Reality. This four-day course is ideal for beginners, as well as Final Cut Pro and Avid editors - or for anyone who is involved in a content creation environment. Adobe Premiere Interface Performing Nonlinear Editing in Premiere Pro Looking at the Standard Digital Video Workflow Enhancing the Workflow with Premiere Pro Expanding the Workflow Incorporating other Components into the Editing Workflow Adobe Creative Cloud Video Workflow Touring the Premiere Pro Workspace Looking at the Workspace Layout Customizing the Workspace Introducing Preferences Keyboard Shortcuts Moving, Backing up, and Syncing User Settings Setting up a Project Setting up a Sequence Setting up the Timeline Importing Media Importing Assets Working with ingest Options and Proxy Media Working with the Media Browser Importing Images Using Adobe Stock Customizing the Media Cache Recording a Voice-over Organizing Media Project Panel Working with Bins Monitoring Footage Modifying Clips Mastering the Essentials of Video Editing Using the Source Monitor Navigating the Timeline Essential Editing Commands Working with Clips and Markers Using Program Monitor Controls Setting the Playback Resolution Playing back VR Video Using Markers Using Sync Lock and Track Lock Finding Gaps in the Timeline Selecting Clips Moving Clips Extracting and Deleting Segments Adding Transitions Understanding Transitions Edit points and Handles Adding Video Transitions Using A/B mode to Fine-tune a Transition Adding Audio Transitions Performing Advanced Editing Techniques Performing Three or Four-point Editing Changing Playback Speed Replacing Clips and Footage Nesting Sequences Performing Regular Trimming Performing Advanced Trimming Trimming in the Program Monitor Putting Clips in Motion Adjusting the Motion Effect Changing Clip Position, Size, and Rotation Working with Keyframe Interpolation Using other Motion-related Effects Multi-camera Editing Following the Multi-camera Process Creating a Multi-camera Sequence Switching Multiple Cameras Finalizing Multi-camera Editing Editing and Mixing Audio Setting up the Interface to Work with Audio Examining Audio Characteristics Creating a Voice-over Scratch Track Adjusting Audio Volume Normalizing Audio Creating a Split Edit Adjusting Audio Levels for a Clip Sweetening Sound Sweetening Sound with Audio Effects Adjusting EQ Cleaning up Noisy Audio Fading Audio with Essential Sounds Adding Video Effects Working with Effects Master Clip Effects Masking and Tracking Visual Effects Keyframing Effects Effect Presets Frequently Used Effects Improving Clips with Color Correction and Grading Following a Color-oriented Workflow An overview of Color-oriented Effects Fixing Exposure Problems Fixing Color Balance Using Special Color Effects Creating a Look Exploring Compositing Techniques Understanding an Alpha Channel Making Compositing Part of Your Projects Working with the Opacity Effect Working with Alpha-channel Transparencies Color Keying a Green Screen Shot Using Mattes Creating Titles An Overview of Shapes & Type Loading in Graphics Using the Essentials Graphic Panel Browsing Templates Saving Templates Mastering Video Typography Essentials Creating Titles Stylizing Text Making Text Roll and Crawl Introducing Captions Managing Your Projects Using the File menu Using the Project Manager Performing the Final Project Management Steps Importing Projects or Sequences Managing Collaboration Using the Libraries Panel Managing Your Hard Drives Exporting Frames, Clips, and Sequences Overview of Export Options Exporting Single Frames Exporting a Master Copy Working with Adobe Media Encoder Uploading to Social Media Exchanging with Other Editing Applications Additional course details: Nexus Humans Adobe Premiere Pro training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Adobe Premiere Pro course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Application Consultants, Business Analysts, and Process Owners Overview Learn to navigate the catalog, create and approve requisitions, and receive against POs. This course covers all of the functions of SAP Ariba Buying related to the creation of requisitions, the issuing of purchase orders, and receiving against purchase orders. Course Outline Introduction The Dashboard Catalogs Requisitions Accounting Approval Managing POs Receiving SAP Ariba Mobile Searching and Reporting Collaboration Demand Aggregation
Duration 2 Days 12 CPD hours This course is intended for This is an introductory-level course for Users new to Tableau who will be administering a Tableau Server installation, including managing content, users, and permissions. Overview This skills-focused course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert facilitator, students will learn how to: User interactions with Tableau Server Tableau Server components Single-server installation Content administration Authorization and permissions Users, groups, and sites Data sources and extracts Schedules, tasks, and subscriptions Monitoring server status Command-line utilities and REST API Upgrading a single-server installation to a new version Modifying the authentication method This fast paced hands-on course provides in-depth coverage of Tableau Server administration. The knowledge and skills acquired are best geared toward those who will be administering a Tableau Server installation, including managing content, users, and permissions. Tableau Server Overview Tableau Product Line End-User Abilities Tableau Server Architecture Component Functions Server Diagrams Single Server Installation Technical Specifications Tableau Server Installation Checklist Configuration Options Resolutions for Common Installation Issues Installing Tableau Server Software User Experience Content Navigation, Searching, and Filtering Exploring Server Content Types and Objects Updating Account Settings Setting the Start Page Viewing Version Information Renaming a Project Adding a Workbook Description Authorization and Permissions Administrator Settings Authorization Overview Functional Security Model Site Roles Content Ownership and Permissions Permission Rules and Capabilities Permissions and the Default Project Creating Projects, Local Groups, and a Local User Importing Users and Adding Users to Groups Granting Permissions to Projects Creating a Project Leader Publishing and Changing Ownership of a Workbook Moving a Workbook Site Administration Data Sources, Extracts, Schedules, and Subscriptions Creating, Publishing, and Connecting to a Data Source Data Engine and File Store Creating and Publishing Extracts Backgrounder Schedules Subscriptions Enabling Subscriptions and Alerts Automating Server Tasks Automating and Programming Server Tasks Tabadmin Tabcmd Using the REST API Monitoring Server Viewing Server Status Admin Alerts Viewing Email Alerts and Admin Views Enabling Access to the Repository Custom Admin Views Licensing Information Performance Recording Upgrading Tableau Server Preparing to Upgrade Upgrading Software on the Same Machine Modifying the Authentication Method Importing AD Groups Log Files Administration Overview of Log Files Archiving Log Files Data Security Controlling What Users Can See User Filters
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Data Consultants/Managers, Developers, Program/Project Managers, and System Administrators. Overview This course is designed to give you the comprehensive skills needed to work with the Information Design Tool. The Information Design Tool enables designers to extract, define, and manipulate metadata from relational and OLAP sources to create and deploy SAP BusinessObjects universes.In this course you learn how to use data from different source systems (SAP and non-SAP) with the SAP BusinessObjects BI client tools. This five-day course is designed to give you the comprehensive skills and in-depth knowledge needed to create SAP BusinessObjects universes using the SAP BusinessObjects Information Design Tool. Basic SAP BusinessObjects Universe Design Describing Universes Defining the Components of a Universe Data Connections Defining connections Data Foundations Creating Data Foundations Using Joins Business Layers Accessing Data through the Business Layer Integrating the Business Layer Components Validating Objects Creating Measure Objects Creating Shortcut Joins Loops in a Data Foundation Resolving Loops with Joined Tables Resolving Loops Using Aliases Resolving Loops Using Contexts Detecting Contexts Editing Contexts Testing Contexts Resolving Recursive Loops Data Restrictions Defining Data Restrictions Applying Mandatory Data Restrictions Applying Optional Data Restrictions Lists of Values (LOV) Providing a List of Values Parameters Illustrating Runtime Parameters Object @functions Using Object @functions in Queries Applying the Aggregate Awareness Optimization Method Using Other @ Functions Navigation Paths Defining Drill Down Navigation Paths Derived Tables Creating Derived Tables Key Awareness Defining Numeric Keys Universe Management with Data Foundation and Business Layer Views Managing a Universe using the Data Foundation View Managing a Universe using the Business Layer View Universe Optimization Optimizing Universes Using Parameters Universe Deployment and Security Deploying a Universe Securing a Published Universe Creating Data Security Profiles Creating Business Security Profiles Assigning Security Profiles to Users Identifying the Priority of Security Settings Updating a Published Universe SQL Clause Processing Problems Determining How the Order of SQL Clauses Affects Data Returned Detecting Ambiguity Caused by SQL Requests Run Against Joined Tables Resolving Ambiguity Caused by SQL Requests Run Against Joined Tables Identifying Fan Traps Resolving Ambiguity Caused by SQL Requests Run Against Joined Tables Outer Join Problem Resolution Resolving an Ambiguous Outer Join Using @AggregateAware Universe Creation from Different Data Sources Identifying the Different Data Sources Creating an OLAP Universe Creating a Multi-source Universe Shared Projects Using Shared Projects Manipulating Other Designers' Resources Universe Conversion Converting Existing .unv Universes Translation Deploying Universes in Different Languages