Duration 1 Days 6 CPD hours This course is intended for This course is intended for those who want to understand and use soft skills to communicate, problem solve, and resolve conflict. Overview Upon successful completion of this course, participants will use soft skills to more effectively interact with people and improve communication skills. In this course, participants will develop a core set of ten soft skills. Getting Started Workshop Objectives Action Plan What are Soft Skills? Definition of Soft Skills Empathy and the Emotional Intelligence Quotient Professionalism Learned vs. Inborn Traits Practical Illustration Communication Ways We Communicate Improving Nonverbal Communication Listening Openness and Honesty Practical Illustration Team Work Identifying Capabilities Get Into Your Role Learn the Whole Process The Power of Flow Practical Illustration Problem Solving Define the Problem Generate Alternative Solutions Evaluate the Plans Implementation and Re-Evaluation Practical Illustration Time Management The Art of Scheduling Prioritizing Managing Distractions The Multitasking Myth Practical Illustration Attitude and Work Ethic What Are You Working For? Caring for Others vs Caring for Self Building Trust Work Is Its Own Reward Practical Illustration Adaptibility/Flexibility Getting Over the Good Old Days Syndrome Changing to Manage Process Changing to Manage People Showing You?re Worth Your Weight in Adaptability Practical Illustration Self Confidence (Owning It) Confident Traits Self-Questionnaire Sure-fire Self-Confidence Building Tactics Build Up Others Practical Illustration Ability to Learn Wow, You Mean I?m Not Perfect? Listen with an Open Mind Analyze and Learn Clear the Air and Don?t Hold Any Grudges Practical Illustration Networking Redefine Need Identifying Others? Interests Reach Out When to Back Off Practical Illustration Wrapping Up Words From the Wise
We Deliver Neonatal, Paediatric & Adult Intensive Care Nurse Training Programmes Face to face clinical skills training is supported by our platform which provides relatable and impactful content that helps nurses develop their leadership skills, embed their learning and earn certified CPD. See course content. Available World-Wide Delivered by prominent nurse educators and senior current ICU doctors with global experience in public and private healthcare We take pride in uplifting capabilities, inspiring the nursing workforce and improving patient care Overview Theoretical knowledge, clinical skills & competencies NICU Intensive Care Nurse Training This course will provide: Development of foundation to deeper theoretical knowledge and skills within various topics in critical care Demonstration of application of knowledge and understanding in practice Problem solving through critical analysis and evaluation of complex situations Maintaining quality care and positive patient experience Proactively manage problems, issues and challenges as they present Workforce management Risk management skills Decision making skills Course Structure: On the first day the participants will be allocated to groups in order to facilitate the practical skills teaching. The participants are encouraged to utilise this group for study purposes throughout this course. Each group will be allocated a senior nurse coach who will be their point of contact for queries and provide support throughout the course and for a period after the course has finished, until the participants have achieved their competencies in their respective place of work. Each participant will be given a workbook populated with competencies for each of the 7 topics within NICU. This workbook will provide guidance and it is intended for the participants to use it in their clinical practice. The participants will require a senior nurse allocated to them locally in their respective hospital who can oversee the application of the gained knowledge in practice. The participants will be assessed throughout the course via: Active participation Simulation in applying knowledge during workshops and practical sessions Completion of workbook and record achievements Reflective practice Contact us for a full training schedule 2. PICU Intensive Care Nurse Training This course will provide: Development of foundation to deeper theoretical knowledge and skills within various topics in critical care Demonstration of application of knowledge and understanding in practice Problem solving through critical analysis and evaluation of complex situations Maintaining quality care and positive patient experience Proactively manage problems, issues and challenges as they present Workforce management Risk management skills Decision making skills Course Structure: On the first day the participants will be allocated to groups in order to facilitate the practical skills teaching. The participants are encouraged to utilise this group for study purposes throughout this course. Each group will be allocated a senior nurse coach who will be their point of contact for queries and provide support throughout the course and for a period after the course has finished, until the participants have achieved their competencies in their respective place of work. Each participant will be given a workbook populated with competencies for each of the 12 topics within PICU. This workbook will provide guidance and it is intended for the participants to use it in their clinical practice. The participants will require a senior nurse allocated to them locally in their respective hospital who can oversee the application of the gained knowledge in practice The participants will be assessed throughout the course via: Active participation Simulation in applying knowledge during workshops and practical sessions Completion of workbook and record achievements Reflective practice Contact us for a full training schedule 3. AICU Intensive Care Nurse Training This course will provide: Development of foundation to deeper theoretical knowledge and skills within various topics in critical care Demonstration of application of knowledge and understanding in practice Problem solving through critical analysis and evaluation of complex situations Maintaining quality care and positive patient experience Proactively manage problems, issues and challenges as they present Workforce management: safe staffing levels, utilising skill mix, safe and effective patient care Ability to assess the complex patient in the ICU Rehabilitation and recovery planning for ICU patients Risk management skills Decision making skills Course Structure: On the first day the participants will be allocated to groups in order to facilitate the practical skills teaching. The participants are encouraged to utilise this group for study purposes throughout this course. Each group will be allocated a senior nurse coach who will be their point of contact for queries and provide support throughout the course and for a period after the course has finished, until the participants have achieved their competencies in their respective place of work. Each participant will be given a workbook populated with competencies for each of the 13 topics within adult critical care. This workbook will provide guidance and it is intended for the participants to use it in their clinical practice. The participants will require a senior nurse allocated to them locally in their respective hospital who can oversee the application of the gained knowledge in practice. Course Content The content helps nurses succeed in gaining essential skills to excel in day-to-day work activities, such as; communicating with colleagues and patients, conducting difficult conversations, knowing how to lead and motivate teams and problem solving. The content is mapped to the leadership requirements as stated by the UK Royal Colleges, including the Royal College of Nursing What is the role of leader? Building and Leading Successful teams CPDwatch Building and Leading Successful teams Building and Leading Successful teams Leading with Values and Ethics CPDwatch Leading with Values and Ethics Leading with Values and Ethics watch Leadership Insights on Leading with Executive Presence Leadership Insights on Leading with Executive Presence watch Leadership Insights on Building & Leading Teams Leadership Insights on Building & Leading Teams watch Leadership Toolkit: Facilitating a Workshop Leadership Toolkit: Facilitating a Workshop watch Leadership Toolkit: Facilitating a Brainstorming Session Leadership Toolkit: Facilitating a Brainstorming Session watch Leadership Toolkit: Running a Team Debrief Leadership Toolkit: Running a Team Debrief watch The Characteristics of an Accountable Leader The Characteristics of an Accountable Leader Leading through Shared Vision CPDwatch Leading through Shared Vision Leading through Shared Vision watch Evaluating Your Management Style Evaluating Your Management Style watch The Adaptive Leader: Be an Iceberg The Adaptive Leader: Be an Iceberg The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader Leading through Problem Solving and Decision Making CPDwatch Leading through Problem Solving and Decision Making Leading through Problem Solving and Decision Making watch Leadership Insights on Leading Diversity Leadership Insights on Leading Diversity watch Leadership Insights on Judgment and Decisiveness Leadership Insights on Judgment and Decisiveness Leading with Judgment and Decisiveness CPDwatch Leading with Judgment and Decisiveness Leading with Judgment and Decisiveness Accountable Leadership CPDwatch Accountable Leadership Accountable Leadership watch Leadership Insights on Being Accountable Leadership Insights on Being Accountable watch Expert Insights on Networking & Building Relationships Expert Insights on Networking & Building Relationships watch Building Your Professional Network Building Your Professional Network watch Leadership Insights on Networking with your Peers Leadership Insights on Networking with your Peers watch Networking to Improve Leadership Effectiveness Networking to Improve Leadership Effectiveness watch Empowering Employees Empowering Employees read MIT Sloan Management Review on New Leader Transitions MIT Sloan Management Review on New Leader Transitions read All the Leader You Can Be: The Science of Achieving Extraordinary Executive Presence All the Leader You Can Be: The Science of Achieving Extraordinary Executive Presence read MIT Sloan Management Review on The Adaptive Leader MIT Sloan Management Review on The Adaptive Leader read MIT Sloan Management Review Article on Looking for Opportunity in the Midst of Crisis MIT Sloan Management Review Article on Looking for Opportunity in the Midst of Crisis read Executive Presence: The Art of Commanding Respect like a CEO, Second Edition Executive Presence: The Art of Commanding Respect like a CEO, Second Edition read MIT Sloan Management Review on Leader as Motivator MIT Sloan Management Review on Leader as Motivator listen The Accountable Leader: Developing Effective Leadership Through Managerial Accountability The Accountable Leader: Developing Effective Leadership Through Managerial Accountability listen From Bud to Boss: Secrets to a Successful Transition to Remarkable Leadership From Bud to Boss: Secrets to a Successful Transition to Remarkable Leadership listen Strategic Connections: The New Face of Networking in a Collaborative World Strategic Connections: The New Face of Networking in a Collaborative World listen The Courage Way: Leading and Living with Integrity The Courage Way: Leading and Living with Integrity listen Executive Presence: The Art of Commanding Respect Like a CEO Executive Presence: The Art of Commanding Respect Like a CEO The importance of skillful communication Leading across Cultures CPDwatch Leading across Cultures Leading across Cultures watch Leadership Insights on Setting and Managing Priorities Leadership Insights on Setting and Managing Priorities watch Expert Insights on Collaboration Expert Insights on Collaboration Becoming a Successful Collaborator CPDwatch Becoming a Successful Collaborator Becoming a Successful Collaborator Leading with Judgment and Decisiveness CPDwatch Leading with Judgment and Decisiveness Leading with Judgment and Decisiveness watch Managing Conflict across Cultures Managing Conflict across Cultures watch Managing Conflict in High Performance Teams Managing Conflict in High Performance Teams watch Leadership Insights on Conflict Management Leadership Insights on Conflict Management The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader watch Leadership Insights on Leading Across Cultures Leadership Insights on Leading Across Cultures Leading Diversity CPDwatch Leading Diversity Leading Diversity Encouraging Team Communication and Collaboration CPDwatch Encouraging Team Communication and Collaboration Encouraging Team Communication and Collaboration Navigating Challenging Situations with Diplomacy and Tact CPDwatch Navigating Challenging Situations with Diplomacy and Tact Navigating Challenging Situations with Diplomacy and Tact Facing Virtual Team Challenges CPDwatch Facing Virtual Team Challenges Facing Virtual Team Challenges watch Leadership Insights on Problem Solving & Decision Making Leadership Insights on Problem Solving & Decision Making watch Leadership Insights on Leading through Disruption Leadership Insights on Leading through Disruption watch Leadership Insights on Leading through Motivation Leadership Insights on Leading through Motivation Leading Others through Conflict CPDwatch Leading Others through Conflict Leading Others through Conflict Cultivating Cross-functional Team Collaboration CPDwatch Cultivating Cross-functional Team Collaboration Cultivating Cross-functional Team Collaboration watch Running a Team Debrief Running a Team Debrief watch Leaders Have to Be Human Leaders Have to Be Human watch Collaborating Beyond the Team Collaborating Beyond the Team watch How the Power of Listening Can Reveal Your Team's Motivating Tensions How the Power of Listening Can Reveal Your Team's Motivating Tensions read Successful Time Management: How to be Organized, Productive and Get Things Done Successful Time Management: How to be Organized, Productive and Get Things Done read Managing Conflict at Work: Understanding and Resolving Conflict for Productive Working Relationships Managing Conflict at Work: Understanding and Resolving Conflict for Productive Working Relationships read Conflict Management Conflict Management read Committed Teams: Three Steps to Inspiring Passion and Performance Committed Teams: Three Steps to Inspiring Passion and Performance read Building the Team Organisation: How to Open Minds, Resolve Conflict, and Ensure Cooperation Building the Team Organisation: How to Open Minds, Resolve Conflict, and Ensure Cooperation read MIT Sloan Management Review on Problem Solving and Decision Making MIT Sloan Management Review on Problem Solving and Decision Making read Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done read MIT Sloan Management Review on Negotiation MIT Sloan Management Review on Negotiation read 5 Critical Conversations to Talent Development: Tips, Tools & Intelligence for Developing Talent 5 Critical Conversations to Talent Development: Tips, Tools & Intelligence for Developing Talent read MIT Sloan Management Review on Developing People MIT Sloan Management Review on Developing People read MIT Sloan Management Review on Cross-Functional Collaboration MIT Sloan Management Review on Cross-Functional Collaboration listen Opening Doors to Teamwork and Collaboration: 4 Keys That Change Everything Opening Doors to Teamwork and Collaboration: 4 Keys That Change Everything How to create and lead change Contributing as a Virtual Team Member CPDwatch Contributing as a Virtual Team Member Contributing as a Virtual Team Member Leading Innovation CPDwatch Leading Innovation Leading Innovation Leading with Strategic Thinking CPDwatch Leading with Strategic Thinking Leading with Strategic Thinking watch Leadership Insights on Strategic Thinking Leadership Insights on Strategic Thinking Building and Leading Successful Teams CPDwatch Building and Leading Successful Teams Building and Leading Successful Teams watch Leadership Insights on Building & Leading Teams Leadership Insights on Building & Leading Teams Creating a Successful Business Execution Culture CPDwatch Creating a Successful Business Execution Culture Creating a Successful Business Execution Culture watch How to Build Trust in a Team How to Build Trust in a Team watch Leadership Insights on Leading Innovation Leadership Insights on Leading Innovation watch Leadership Insights on Leading a Culture of Execution Leadership Insights on Leading a Culture of Execution watch Leadership Insights on Leading through Change Leadership Insights on Leading through Change Leading through the Challenge of Change CPDwatch Leading through the Challenge of Change Leading through the Challenge of Change watch Leadership Insights on Leading Collaboratively Leadership Insights on Leading Collaboratively Facilitating Sustainable Change CPDwatch Facilitating Sustainable Change Facilitating Sustainable Change watch Disruptive Leadership Disruptive Leadership read Learning to Think Strategically Learning to Think Strategically read Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results read Demystifying Strategic Thinking: Lessons from Leading CEOs Demystifying Strategic Thinking: Lessons from Leading CEOs read MIT Sloan Management Review on Building and Leading Teams MIT Sloan Management Review on Building and Leading Teams read Virtual Leadership: Practical Strategies for Getting the Best Out of Virtual Work and Virtual Teams Virtual Leadership: Practical Strategies for Getting the Best Out of Virtual Work and Virtual Teams read Managing and Leading People through Organizational Change: The Theory and Practice of Sustaining Change through People Managing and Leading People through Organizational Change: The Theory and Practice of Sustaining Change through People read The Effective Change Manager's Handbook: Essential Guidance to the Change Management Body of Knowledge The Effective Change Manager's Handbook: Essential Guidance to the Change Management Body of Knowledge read Choosing to Change: An Alternative Understanding of Change Management Choosing to Change: An Alternative Understanding of Change Management Why leaders should possess emotional intelligence Leading by Developing People CPDwatch Leading by Developing People Leading by Developing People watch Leadership Insights on Critical Thinking Leadership Insights on Critical Thinking watch Knowing When to Think Critically Knowing When to Think Critically Developing Your Critical Thinking and Cognitive Flexibility CPDwatch Developing Your Critical Thinking and Cognitive Flexibility Developing Your Critical Thinking and Cognitive Flexibility Leading through Setting and Managing Priorities CPDwatch Leading through Setting and Managing Priorities Leading through Setting and Managing Priorities watch Managing Priorities Managing Priorities watch Leadership Insights on Leading with Values & Ethics Leadership Insights on Leading with Values & Ethics The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader The Agile Leader CPDwatch The Agile Leader The Agile Leader watch Disruptive Leadership Disruptive Leadership Make The Time You Need: Get Organised CPDwatch Make The Time You Need: Get Organised Make The Time You Need: Get Organised watch Leadership Insights on Emotional Intelligence Leadership Insights on Emotional Intelligence Becoming an Emotionally Intelligent Leader CPDwatch Becoming an Emotionally Intelligent Leader Becoming an Emotionally Intelligent Leader Managing in a Crisis CPDwatch Managing in a Crisis Managing in a Crisis watch Planning Crisis Communications Planning Crisis Communications watch Crisis Management for Leaders Crisis Management for Leaders watch Take a Deep Breath and Manage Your Stress Take a Deep Breath and Manage Your Stress watch Being a Mindful Leader Being a Mindful Leader watch Overcome Emotional Feelings Overcome Emotional Feelings Managing Pressure and Stress to Optimise Your Performance CPDwatch Managing Pressure and Stress to Optimise Your Performance Managing Pressure and Stress to Optimise Your Performance watch Expert Insights on Managing Stress Expert Insights on Managing Stress watch Emotional Intelligence and Effective Leadership Emotional Intelligence and Effective Leadership watch Helping Your Team Work Helping Your Team Work watch Fair and Just Decision Making Fair and Just Decision Making read MIT Sloan Management Review on Setting and Managing Priorities MIT Sloan Management Review on Setting and Managing Priorities read Advances in Authentic and Ethical Leadership Advances in Authentic and Ethical Leadership read Resilient Organisations: How to Survive, Thrive and Create Opportunities Through Crisis and Change Resilient Organisations: How to Survive, Thrive and Create Opportunities Through Crisis and Change read 50 Activities For Managing Stress 50 Activities For Managing Stress read Emotional Intelligence Pocketbook: Little Exercises for an Intuitive Life Emotional Intelligence Pocketbook: Little Exercises for an Intuitive Life read Mindful Leadership: The 9 Ways to Self-Awareness, Transforming Yourself, and Inspiring Others Mindful Leadership: The 9 Ways to Self-Awareness, Transforming Yourself, and Inspiring Others The significance of coaching in your career Developing Successful Coaching Relationships CPDwatch Developing Successful Coaching Relationships Developing Successful Coaching Relationships watch Working on Shared Goals through Teaming Working on Shared Goals through Teaming watch Initiating a Coaching Relationship Initiating a Coaching Relationship watch Coaches Build Self-Confidence Coaches Build Self-Confidence watch Be a Better Coach Be a Better Coach watch Coaching Team Members Coaching Team Members Leading by Developing People CPDwatch Leading by Developing People Leading by Developing People watch Delivering Results While Developing People Delivering Results While Developing People watch How to Increase Engagement How to Increase Engagement watch Leadership Insights on Coaching Leadership Insights on Coaching watch Leadership Insights on Developing Women Leaders Leadership Insights on Developing Women Leaders watch Leadership Insights on Leading Collaboratively Leadership Insights on Leading Collaboratively watch Creating a Vision Creating a Vision watch Becoming A More Effective Delegator Becoming A More Effective Delegator read MIT Sloan Management Review on Leader as Coach Special Collection MIT Sloan Management Review on Leader as Coach Special Collection read Anytime Coaching: Unleashing Employee Performance, Second Edition Anytime Coaching: Unleashing Employee Performance, Second Edition read Coaching and Mentoring: Practical Techniques for Developing Learning and Performance, Third Edition Coaching and Mentoring: Practical Techniques for Developing Learning and Performance, Third Edition read The Extraordinary Coach: How the Best Leaders Help Others Grow The Extraordinary Coach: How the Best Leaders Help Others Grow read Leading the Unleadable: How to Manage Mavericks, Cynics, Divas, and Other Difficult People Leading the Unleadable: How to Manage Mavericks, Cynics, Divas, and Other Difficult People read 100 Ways to Motivate Others: How Great Leaders Can Produce Insane Results without Driving People Crazy, Third Edition 100 Ways to Motivate Others: How Great Leaders Can Produce Insane Results without Driving People Crazy, Third Edition read Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done listen 50 Top Tools for Coaching: A Complete Toolkit for Developing and Empowering People, Third Edition 50 Top Tools for Coaching: A Complete Toolkit for Developing and Empowering People, Third Edition
Duration 2 Days 12 CPD hours This course is intended for This course is designed primarily for customer engineers and systems engineers in the following job roles: Automation architect Automation engineer Consulting systems engineer DevOps engineer Network administrator Network architect Network consulting engineer Network design engineer Network engineer Network operator Network reliability engineer Sales engineer Site reliability engineer Systems engineer Technical solutions architect Overview After taking this course, you should be able to: Articulate the role network automation and programmability play in the context of end-to-end network management and operations Define and differentiate between waterfall and agile software development methodologies Interpret and troubleshoot Python scripts with fundamental programming constructs built for network automation use cases Describe how DevOps principles, tools, and pipelines can be applied to network operations Understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker Understand and construct HTTP-based API calls to network devices Articulate the differences among and common use cases for XML, JSON, YAML, and protobuf Construct and interpret Python scripts using the Python requests module to automate devices that have HTTP-based APIs Understand the role YANG plays in network automation Understand that a number of tools exist to simplify working with YANG models Describe the functionality of RESTCONF and NETCONF and the differences between them Construct Ansible playbooks to configure network devices and retrieve operational state data from them Build Jinja2 templates and YAML data structures to generate desired state configurations The Introducing Automation for Cisco Solutions (CSAU) v1.1 course gives you a broad overview of network automation skills. Through a combination of lecture and hands-on labs, you will learn the fundamentals of automation such as working on model-driven programmability solutions with Representational State Transfer Configuration Protocol (RESTCONF) and Network Configuration Protocol (NETCONF) protocols. The course also covers data formats and types, including Extensible Markup Language (XML), JavaScript Object Notation (JSON), Yaml Ain?t Markup Language (YAML), and Yet Another Next Generation (YANG), and their value in network automation, along with DevOps tools such as Ansible and Git. Course Outline Examining Network Management and Operations Exploring Software Development Methodologies Using Python for Network Automation Describing NetDevOps: DevOps for Networking Managing Automation Development Environments Introducing HTTP Network APIs Reviewing Data Formats and Data Encoding Using Python Requests to Automate HTTP-Based APIs Exploring YANG Using YANG Tools Automating Model-Driven APIs with Python Introducing Ansible for Network Automation Templating Configurations with Jinja2
Duration 5 Days 30 CPD hours This course is intended for Software Engineers and DevOps professionals working in an Enterprise developing mission critical line of business applications. Overview By the end of this course, students will be able to: Assess the advantages of a containerized software development & deployment Use Docker engine features necessary for running containerized applications Utilize Swarm and Kubernetes orchestrators to deploy, maintain, and scale a distributed application Describe the essential patterns used in a highly distributed EE application Understand how to configure EE applications for different environments without code changes Produce and containerize scalable, accessible, and fault-tolerant EE applications Apply different debugging and testing techniques to containerized EE applications The Docker Fundamentals + Enterprise Operations Bundle includes the full Docker for Enterprise Operations course as well as the prerequisite Docker Fundamentals course run back to back in a single intensive training experience. The Docker Fundamentals training course features the foundational concepts and practices of containerization on a single Docker node. The course offers learners the opportunity to assimilate basic container orchestration and how to scale Docker across multiple nodes in a simple swarm cluster. This course provides essential foundational knowledge for subsequent Docker courses. As the follow-on to the Docker Fundamentals course, Docker for Enterprise Operations is a role-based course is designed for Docker Operations teams to accelerate their Docker journey in the enterprise. The course covers in-depth core advanced features of Docker EE and best practices to apply these features at scale with enterprise workloads. Platform Availability: Linux, Windows (Fundamentals Only). Introducing Docker Containerization Fundamentals Creating Images Docker Volumes Docker Networking Basics Introduction to Docker Compose Introduction to Swarm Mode Introduction to Kubernetes Secrets Fundamentals Signature Assignment Distributed Application Architecture Sample Application Edit and Continue Debugging Docker Compose Testing Service Discovery Defensive Programming Logging and Error Handling Health Checks Secrets Configuration Management Development Pipeline Overview Universal Control Plane Docker Trusted Registry Repository Automation Build Server
Duration 1 Days 6 CPD hours Overview Please refer to Overview This course provides an overview of IoT and Blockchain, and how Blockchain holds the potential to securely unlock business and operational value of IoT to support common tasks, such as sensing, processing, storing information, and communicating. What is IoT? Internet of Things Overview IoT History How does IoT work? Components of an IoT device Current IoT Landscape Growth areas Privacy concerns IoT Design Standards Zigbee networking protocol Thread Group AllSeen Alliance/AllJoyn Open Interconnect Consortium/IoTivity Industrial Internet Consortium ITU-T SG20 IEEE P2413 Apple HomeKit IoT Design Questions Questions to help you design an IoT solution IoT Architecture Stage 1 - Data Generation (Sensors / Actuators) Stage 2 - Data Acquisition Systems Stage 3 - Edge Processing Stage 4 - Long-Term Data Storage / Blockchain What is Blockchain? History of Blockchain How does Blockchain work? Benefits of Blockchain Blockchain vs. conventional technology IoT / Blockchain Benefits of adding Blockchain to IoT Trust Building Cost Reduction Accelerate Data Exchanges Scaled Security for IoT Additional course details: Nexus Humans IoT and Blockchain Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the IoT and Blockchain Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours Overview Topics Include:Installation of a multi-node Kubernetes cluster using kubeadm, and how to grow a cluster.Choosing and implementing cluster networking.Various methods of application lifecycle management, including scaling, updates and roll-backs.Configuring security both for the cluster as well as containers.Managing storage available to containers.Learn monitoring, logging and troubleshooting of containers and the cluster.Configure scheduling and affinity of container deployments.Use Helm and Charts to automate application deployment.Understand Federation for fault-tolerance and higher availability. In this vendor agnostic course, you'll learn the installation, configuration and administration of a production-grade Kubernetes cluster. Introduction Linux Foundation Linux Foundation Training Linux Foundation Certifications Laboratory Exercises, Solutions and Resources Distribution Details Labs Basics of Kubernetes Define Kubernetes Cluster Structure Adoption Project Governance and CNCF Labs Installation and Configuration Getting Started With Kubernetes Minikube kubeadm More Installation Tools Labs Kubernetes Architecture Kubernetes Architecture Networking Other Cluster Systems Labs APIs and Access API Access Annotations Working with A Simple Pod kubectl and API Swagger and OpenAPI Labs API Objects API Objects The v1 Group API Resources RBAC APIs Labs Managing State With Deployments Deployment Overview Managing Deployment States Deployments and Replica Sets DaemonSets Labels Labs Services Overview Accessing Services DNS Labs Volumes and Data Volumes Overview Volumes Persistent Volumes Passing Data To Pods ConfigMaps Labs Ingress Overview Ingress Controller Ingress Rules Labs Scheduling Overview Scheduler Settings Policies Affinity Rules Taints and Tolerations Labs Logging and Troubleshooting Overview Troubleshooting Flow Basic Start Sequence Monitoring Logging Troubleshooting Resources Labs Custom Resource Definition Overview Custom Resource Definitions Aggregated APIs Labs Kubernetes Federation Overview Federated Resources Labs Helm Overview Helm Using Helm Labs Security Overview Accessing the API Authentication and Authorization Admission Controller Pod Policies Network Policies Labs
Join us at our Sustainability Summit for SMEs to learn how to build thriving businesses and resilient supply chains in a fun and interactive Refund Policy Contact the organiser to request a refund.Eventbrite's fee is nonrefundable. About this event Event lasts 5 hours 30 minutes Sustainability Summit for SMEs: Thriving Businesses and Strong Supply Chains! Welcome to the Sustainability Summit 2024, a 1-day online event focused on sustainability for founders and senior decision makers in small and medium enterprises (SMEs), including those in the supply chains of larger organisations! In today’s dynamic business landscape, sustainability isn't just a buzzword; it's a necessity. Small and medium size enterprises must go beyond policy statements and adopt cohesive, actionable strategies to thrive. WHEN Date: Tuesday, 22 October 2024 Time: 10:00 AM – 3:15 PM (BST) Where: online (virtual event) This online Sustainability Summit will cover essential topics such as: Marketing, HR (skills and talent development), Low-carbon digital assets, Procurement, Finance and ESG. It will feature Guest Speakers, dynamic panel discussions and real-world case studies. Designed with small and medium enterprises at the centre, this learning event promises to be inspiring and thought provoking. Speakers will provide practical, actionable insights for immediate implementation as well as share effective ways to enable you to be more adaptable in the medium to long-term. Book now to participate from the comfort of your workplace [or your home office]. Our lineup of speakers include: Prof. Dave Spicer, Director of Business & Community Engagement, Univ. of Bradford Richard Clarke, Founder and Managing Director of Highland Carbon Tracy Cartwright, SHEQ Consultant and Director of Applaud Business Consultancy Antony Gutsa, Founder & CEO of Ecoswap and Banking Professional Giles Metcalfe, Ethical Marketer at Giles Metcalfe Digital Carolyn McGarry Williams, Co-Founder of 4 My Card and Director of Marketing Trevor Gibbs, Web Accessibility Specialist Amelia Banful, Head of Business Strategy, Enviro Electronics Dr Veronica Broomes, Founder of Sustainability Support Service & Sustainability Expert David Conner, Founder at 2030hub & Global Goals Week Organiser BENEFITS: reasons why you should attend Expert Insights: Hear from Guest Speakers and Panellists about the latest trends in sustainability and forthcoming changes in policies and legislation. Real-world case studies: Discover success stories from other SMEs that integrated multiple facets of sustainability for business benefits. Innovative Strategies: Learn actionable approaches to embed sustainability in your business and how to showcase this to win new business and talent for the future. Future-proof your business: Get inspired by new processes and up-skilling opportunities. Equip yourself with the knowledge to adapt and thrive. Networking: Connect with attendees during an interactive and fun 'lunchtime' session. PRICE: from £97.00 PLUS BONUSES: YOUR SWAG BAG GIFTS: *Personalised digital business card: discounted price for 1 year subscription for attendees. [Usual price: £65 or US$70] *Eco-friendly gift card: 10% OFF *Sustainability Calendar 2025: 40% OFF for attendees [You save £27 or US$29] DONATION TO CHARITY Our commitment to People, Planet and Communities (business, geographic, places) is ongoing. For this 2024 Sustainability Summit [online], we will donate 1% of ticket price (ex. VAT) to The Rotary Foundation, our global charity of choice. WHO SHOULD ATTEND This Sustainability Summit is ideal for: • Business Founders and Senior Leaders: Gain strategic insights and learn practical actions to embed sustainability in your organisation’s DNA. • SMEs in Supply Chains: Understand how to meet the sustainability expectations of larger organisations and enhance your competitiveness. • Procurement and HR Professionals: Update your knowledge and gain useful insights about varied road maps to evidence sustainability -multiple pillars: planet, people for high social impact, ESG. Don’t miss this chance to learn more about how your business can be at the forefront and boost competitiveness with embedding sustainability for environmental, social and economic benefits. BOOK YOUR PLACE NOW https://www.eventbrite.co.uk/e/sustainability-summit-for-smes-thriving-businesses-and-strong-supply-chains-tickets-993387768557 DON'T MISS OUT Don't miss this opportunity to learn in a dynamic virtual meeting, network with business leaders and founders in a professional environment and gain the knowledge you need to take your business to the next level with capable and resilient supply chains! #sustainabilitysummit, #onlinesustainabilityevent, #sustainabilitytraining, #CSR, #sustainabilityforSMEs, #businesssustainability #summit, #greenbusiness, #online, #supplychains, #planet #forpurpose #betterbusiness, #netzero, #conference
Duration 2 Days 12 CPD hours This course is intended for Professionals desiring to improve working relationships and maximize cooperation and productivity will benefit from this course. Overview After completing this workshop, students will be able to: Describe the importance of effective work relationships Identify the interdependencies between you and your colleagues Communicate effectively to create rapport and connect with others Identify and maintain your network of professional relationships Develop collaborative, trust-based relationships that achieve meaningful results In the interdependent workplace, we rely on each other to get things done. A professional network isn?t something we can take for granted ? mapping work relationships can be a complex task and understanding different behavioral styles takes effort - but it pays off! Good working relationships means more than just reducing conflict and misunderstandings. It also means building trust, increasing influence, and benefitting from the knowledge and advice of co-workers and senior managers. This workshop will help you develop relationship building skills so you can communicate who you are, what you need, and why you need it in a way that builds trust, respect, and a professional reputation. The Importance of Work Relationships Expectations of Work Relationships The Value of Relationships Effects of Work Relationships Mapping Your Work Relationships A Network of Relationships Mapping Work Relationships Languages of Appreciation Identifying Interdependencies Clarifying Purpose Systems Thinking Analyzing Independencies Bridging Work Styles Understanding Behavioral Styles Strengths and Trouble Spots Bridging Different Styles Building Your Network Relationships, Communication, and Results Networking Principles Reputation Management Collaborating For Success Understanding Personalities Aspects of Trust Recognizing Blind Spots Additional course details: Nexus Humans Building Successful Work Relationships (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Successful Work Relationships (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
Duration 5 Days 30 CPD hours This course is intended for This course is designed for network and software engineers and hold job roles such as: Network administrator Network engineer Network manager System engineer Project manager Network designer Overview After taking this course, you should be able to: Describe network architectures, devices, and software used by service providers Describe the various Internet governance organizations, their roles, and tools available for governance information verification Configure Cisco Internetwork Operating System (Cisco IOS) and Cisco IOS XE routers Describe Cisco IOS XR software, perform initial configuration, and explain platform daily tasks Describe various access and core technologies used by service providers Describe various major switching technologies used by service providers Describe major overlay technologies and their usage, and configure Virtual Extensible LAN I (VxLAN) Describe various major routing protocols used by service providers Configure Layer 3 services used by service providers Describe Multiprotocol Label Switching (MPLS), components, protocols, and MPLS usage Describe usage of various services used and maintained by service providers Introduce Linux networking, Bourne Again Shell (BASH) scripting, and their usage within Cisco IOS XR software This course is designed to provide you with the foundational knowledge for the suite of Cisco© CCNP© Service Provider courses. The course expands what you learned from the Cisco CCNA© course with a focus on theoretical and practical knowledge needed for the Service Provider environment. Through a combination of lessons and hands-on practice, you will learn about architectures, protocols, software and hardware platforms, and solutions within the Service Provider realm. While this course does not lead directly to a certification exam, it does cover foundational knowledge critical to the success in the Service Provider Technology track. Course Outline Introducing Service Provider Architectures Describing Internet Governance Organizations Configuring the Cisco IOS and Cisco IOS XE Router Configuring Cisco IOS XR Router Introducing Access and Core Technologies in the Service Provider Environment Introducing Routing Technologies in the Service Provider Environment Describing MPLS Implementing Layer 3 Services Introducing Switching Technologies in the Service Provider Environment Introducing Overlay Technologies Implementing Service Provider Services Introducing Programmability on Cisco IOS XR Routers Lab outline Review Lab Environment Examine Governance Data Perform an Initial Cisco Internetworking Operating System (IOS XE) Configuration Configure Connectivity and Connectivity Verification on Cisco IOS XE Devices Perform Initial Cisco IOS XR Configuration Configure and Verify Connectivity on Cisco IOS XR Configure Intermediate System to Intermediate System (IS-IS) Configure Routing Information Protocol (RIPv2) and RIP extension (RIPng) Configure Basic Border Gateway Protocol (BGP) Configure MPLS Configure Internet Protocol Service Level Agreement (IP SLA) Configure Hot Standby Router Protocol (HSRP) with Object Tracking Configure Virtual Routing and Forwarding (VRFs) Configure Network Time Protocol (NTP) Use Linux Command Line Interface Configure IOS XR Using a Bash Script