• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1246 Courses delivered Live Online

Getting Started in Data Governance (U.S. Version)

5.0(3)

By The Data Governance Coach

Exciting news! My popular 'Getting Started in Data Governance' course is making it's way across the pond! Due to numerous requests, I'm thrilled to announce that I will be hosting a U.S. edition of the course.

Getting Started in Data Governance (U.S. Version)
Delivered OnlineFlexible Dates
£900

F5 Networks Configuring BIG-IP Advanced WAF - Web Application Firewall (formerly ASM)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the F5 Advanced Web Application Firewall. In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Traffic Processing with BIG-IP Identifying BIG-IP Traffic Processing Objects Overview of Network Packet Flow Understanding Profiles Overview of Local Traffic Policies Visualizing the HTTP Request Flow Module 3: Web Application Concepts Overview of Web Application Request Processing Web Application Firewall: Layer 7 Protection F5 Advanced WAF Layer 7 Security Checks Overview of Web Communication Elements Overview of the HTTP Request Structure Examining HTTP Responses How F5 Advanced WAF Parses File Types, URLs, and Parameters Using the Fiddler HTTP Proxy Module 4: Common Web Application Vulnerabilities A Taxonomy of Attacks: The Threat Landscape What Elements of Application Delivery are Targeted? Common Exploits Against Web Applications Module 5: Security Policy Deployment Defining Learning Comparing Positive and Negative Security Models The Deployment Workflow Policy Type: How Will the Policy Be Applied Policy Template: Determines the Level of Protection Policy Templates: Automatic or Manual Policy Building Assigning Policy to Virtual Server Deployment Workflow: Using Advanced Settings Selecting the Enforcement Mode The Importance of Application Language Configure Server Technologies Verify Attack Signature Staging Viewing Requests Security Checks Offered by Rapid Deployment Defining Attack Signatures Using Data Guard to Check Responses Module 6: Policy Tuning and Violations Post-Deployment Traffic Processing Defining Violations Defining False Positives How Violations are Categorized Violation Rating: A Threat Scale Defining Staging and Enforcement Defining Enforcement Mode Defining the Enforcement Readiness Period Reviewing the Definition of Learning Defining Learning Suggestions Choosing Automatic or Manual Learning Defining the Learn, Alarm and Block Settings Interpreting the Enforcement Readiness Summary Configuring the Blocking Response Page Module 7: Attack Signatures & Threat Campaigns Defining Attack Signatures Attack Signature Basics Creating User-Defined Attack Signatures Defining Simple and Advanced Edit Modes Defining Attack Signature Sets Defining Attack Signature Pools Understanding Attack Signatures and Staging Updating Attack Signatures Defining Threat Campaigns Deploying Threat Campaigns Module 8: Positive Security Policy Building Defining and Learning Security Policy Components Defining the Wildcard Defining the Entity Lifecycle Choosing the Learning Scheme How to Learn: Never (Wildcard Only) How to Learn: Always How to Learn: Selective Reviewing the Enforcement Readiness Period: Entities Viewing Learning Suggestions and Staging Status Violations Without Learning Suggestions Defining the Learning Score Defining Trusted and Untrusted IP Addresses How to Learn: Compact Module 9: Cookies and Other Headers F5 Advanced WAF Cookies: What to Enforce Defining Allowed and Enforced Cookies Configuring Security Processing on HTTP headers Module 10: Reporting and Logging Overview: Big Picture Data Reporting: Build Your Own View Reporting: Chart based on filters Brute Force and Web Scraping Statistics Viewing F5 Advanced WAF Resource Reports PCI Compliance: PCI-DSS 3.0 The Attack Expert System Viewing Traffic Learning Graphs Local Logging Facilities and Destinations How to Enable Local Logging of Security Events Viewing Logs in the Configuration Utility Exporting Requests Logging Profiles: Build What You Need Configuring Response Logging Module 11: Lab Project 1 Lab Project 1 Module 12: Advanced Parameter Handling Defining Parameter Types Defining Static Parameters Defining Dynamic Parameters Defining Dynamic Parameter Extraction Properties Defining Parameter Levels Other Parameter Considerations Module 13: Automatic Policy Building Overview of Automatic Policy Building Defining Templates Which Automate Learning Defining Policy Loosening Defining Policy Tightening Defining Learning Speed: Traffic Sampling Defining Track Site Changes Lesson 14: Web Application Vulnerability Scanner Integration Integrating Scanner Output Importing Vulnerabilities Resolving Vulnerabilities Using the Generic XML Scanner XSD file Lesson 15: Deploying Layered Policies Defining a Parent Policy Defining Inheritance Parent Policy Deployment Use Cases Lesson 16: Login Enforcement and Brute Force Mitigation Defining Login Pages for Flow Control Configuring Automatic Detection of Login Pages Defining Session Tracking Brute Force Protection Configuration Source-Based Brute Force Mitigations Defining Credentials Stuffing Mitigating Credentials Stuffing Lesson 17: Reconnaissance with Session Tracking Defining Session Tracking Configuring Actions Upon Violation Detection Lesson 18: Layer 7 DoS Mitigation Defining Denial of Service Attacks Defining the DoS Protection Profile Overview of TPS-based DoS Protection Creating a DoS Logging Profile Applying TPS Mitigations Defining Behavioral and Stress-Based Detection Lesson 19: Advanced Bot Protection Classifying Clients with the Bot Defense Profile Defining Bot Signatures Defining Proactive Bot Defense Defining Behavioral and Stress-Based Detection Defining Behavioral DoS Mitigation Lesson 20: Form Encryption using DataSafe Targeting Elements of Application Delivery Exploiting the Document Object Model Protecting Applications Using DataSafe The Order of Operations for URL Classification Lesson 21: Review and Final Labs Review and Final Labs

F5 Networks Configuring BIG-IP Advanced WAF - Web Application Firewall (formerly ASM)
Delivered OnlineFlexible Dates
Price on Enquiry

Mercer: Wills & Estate Planning Webinar

By Biogen Booking System

Mercer’s Financial Education Clinic – Helping You Plan for the Future We are excited to invite you to Mercer’s Financial Education Clinic, a group session designed to help you take control of your financial future. This session will provide expert guidance on key financial topics, equipping you with the knowledge to make informed decisions about your finances. What Will Be Covered? During this session, we will explore: The importance of making a will and the potential risks of not having one The role and significance of Power of Attorney documents An overview of inheritance tax Possible planning strategies and solutions to manage estate matters effectively This interactive session will give you the opportunity to gain practical insights and ask questions to help you better understand how to plan and protect your financial legacy. Whether you're thinking about the future for yourself or your loved ones, this session will provide valuable guidance to support your estate planning journey. We encourage all employees to attend and take advantage of this valuable financial education opportunity. Session Details: Date: 12th November 2025 Time: 9:30 a.m. – 10:30 a.m. Location: Virtual

Mercer: Wills & Estate Planning Webinar
Delivered Online
FREE

Mercer: Young Professionals Webinar

By Biogen Booking System

Mercer’s Financial Education Clinic – Helping You Plan for the Future We are excited to invite you to Mercer’s Financial Education Clinic, a group session designed to help you take control of your financial future. This session will provide expert guidance on key financial topics, equipping you with the knowledge to make informed decisions about your finances. What Will Be Covered? During this session, we will explore: Key steps to build a strong financial foundation early in your career Strategies for saving effectively and getting onto the property ladder The importance of starting a retirement plan early Building confidence around financial decision-making as a young professional This interactive session will give you the opportunity to gain practical insights and ask questions to help you take control of your financial future from the very beginning of your career. Whether you're just starting out or looking to strengthen your financial understanding, this session will offer valuable tips and tools to support your goals. We encourage all employees to attend and take advantage of this valuable financial education opportunity. Session Details: Date: 12th November 2025 Time: 11:00 a.m. – 12:00 p.m. Location: Virtual

Mercer: Young Professionals Webinar
Delivered Online
FREE

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry

E-Commerce: Complete Guide to Income Mastery

By NextGen Learning

E-Commerce: Complete Guide to Income Mastery Course Overview This comprehensive course offers a detailed guide to mastering income generation through e-commerce. It covers all essential aspects, from setting up an online store to implementing effective marketing strategies that increase sales and customer engagement. Learners will gain insight into choosing profitable niches, optimising product listings, and driving targeted traffic. The course also addresses advanced topics such as email marketing, social media advertising, and loyalty programmes to boost revenue streams. By the end of this course, participants will have a solid understanding of how to create, manage, and grow a successful e-commerce business, equipping them with the knowledge to generate sustainable online income. Course Description "E-Commerce: Complete Guide to Income Mastery" delves into the key components required to succeed in the competitive world of online retail. The curriculum explores foundational topics such as selecting the right niche and business model, alongside marketing tactics including social media campaigns and Facebook ad funnels. Learners will explore product video creation best practices and discover how to build customer loyalty through targeted programmes. The course also examines common pitfalls to avoid and introduces virtual assistant opportunities within the e-commerce sector. Designed for all levels, it provides a clear pathway to develop strategic skills for launching and scaling an online store, ensuring learners are prepared to maximise income potential in the evolving digital marketplace. E-Commerce: Complete Guide to Income Mastery Curriculum Module 01: Ecommerce Income Mastery – Overview Module 02: How to sell online step by step Module 03: Best Ecommerce Marketing Strategies Module 04: Hot Selling Ecommerce Business Ideas Module 05: Best Ecommerce Tips For Success Module 06: Best Dropshipping Product Categories to Sell Module 07: How to find the right eCommerce niche and start selling Module 08: How to drive traffic to your online store Module 09: Best Practices for highly effective eCommerce Product Videos Module 10: How to be a Virtual Assistant and start making income Module 11: Best eCommerce email marketing campaigns for higher engagement Module 12: Setting up an eCommerce loyalty program for more revenue Module 13: How to set up a Facebook ad funnel for e-commerce products Module 14: How to boost e-commerce sales using Instagram Module 15: Critical mistakes eCommerce store owners should avoid (See full curriculum) Who is this course for? Individuals seeking to build a sustainable income through e-commerce. Professionals aiming to enhance their digital marketing and sales skills. Beginners with an interest in starting an online retail business. Entrepreneurs looking to explore dropshipping and niche markets. Career Path E-commerce Store Owner Digital Marketing Specialist Social Media Manager Virtual Assistant in E-commerce Online Sales Consultant Dropshipping Business Manager

E-Commerce: Complete Guide to Income Mastery
Delivered OnlineFlexible Dates
£7.99

Data Trust Scales with Samuel Clarkbourne - Virtual Masterclass

5.0(3)

By The Data Governance Coach

Come along to this free virtual masterclass to learn about Data Trust Scales and how they can be used to get stakeholders to care about the quality of their data.

Data Trust Scales with Samuel Clarkbourne - Virtual Masterclass
Delivered OnlineJoin Waitlist
FREE

Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for programmatic developers looking to write programmatic customizations to both business logic and UI layers using Apex and Visualforce. You should have a good understanding of core object-oriented programming concepts and experience building declarative solutions on the Salesforce Platform. This course is also a great foundation builder if you're looking to earn your Salesforce Platform Developer I credential. IMPORTANT: Students are expected to follow the steps detailed in the Computer Set-up Guide for this class if you'll be using your own computer when attending a virtual or in-person class. Overview Learn modern tools for developing on the Salesforce Platform using Visual Studio Code, the Salesforce Extension Pack, and the Salesforce CLI. Write business logic customizations using Apex triggers and classes; those customizations will use SOQL and DML. Design programmatic solutions that take advantage of declarative customizations. Describe how your trigger code works within the basics of the Save Order of Execution. Describe some of the fundamental aspects of designing programs on a multi-tenant platform. Write Visualforce markup and code to customize the user interface. Use the built-in testing framework to test Apex and Visualforce. Learn how to customize and design applications programmatically on the Salesforce Platform. In this 5-day class, our platform experts will introduce you to Apex (Salesforce?s programming language) and Visualforce markup, so you can customize your Salesforce applications using code and explore how Apex interacts with declarative customizations on the platform. Learn how to retrieve, manipulate, and store data programmatically in data objects (sObjects), write and test custom logic, write Visualforce pages to customize your user interface, and deploy your solutions to another environment. Get an overview of the declarative automation tools available on the platform and a brief introduction to the Lightning Component framework. Plus, explore the nuances of working on a multi-tenant platform so you can extend the platform to meet business demands. Declarative Automation Create Formula Fields Create Roll-Up Summary Fields Understand Record Types Review Other Automation Tools Build a Data Model on the Salesforce Platform Programming with Apex Describe Key Aspects of Apex That Differentiate It from Other Languages, Such as Java and C# Describe Why Apex Transactions and Governor Limits Must Be Considered When Writing Apex Execute Simple Apex Use the sObject Data Type, the Primitive Data Types, and Basic Control Statements in Apex Using SOQL and SOSL to Retrieve Your Org?s Data Write a Basic Query Using Salesforce?s Query Language, SOQL Process the Result of a Query in Apex Create a Query Dynamically at Run-Time Use SOQL to Query Parent-Child Relationships Describe a Relationship Query Write a Query That Traverses a Child-to-Parent Relationship Write a Query That Traverses a Parent-to-Child Relationship Use SOSL to Search Data Using DML to Manipulate Your Org?s Data List the Differences Between the Ways You Can Invoke DML Operations Write Apex to Invoke DML Operations and Handle DML Errors Deployment What Is Deployment? Deploy Code Using Change Sets Use the Ant Migration Tool Review Managed and Unmanaged Packages Explore Salesforce DX Trigger Essentials Describe What a Trigger Is Used For Describe the Syntax of a Trigger Definition Use Trigger Context Variables Apex Class Essentials Describe How Apex Classes Are Used Define an Apex Class Determine What Data an Apex Class Can Access The Save Order of Execution, Apex Transactions, and Platform Events Describe Key Points in the Order of Execution Describe How Triggers Fit Into and Can Be Impacted by the Order of Execution Describe the Lifecycle of an Apex Transaction Describe the Memory Lifecycle for Static Attributes Use Platform Events for Immediate Error Logging Apex Testing Describe the Apex Testing Framework Create Test Data Write and Run an Apex Test Test Best Practices Strategies for Designing Efficient Apex Solutions Describe Best Practices for Writing Code That Is Easy to Maintain and Extend Write Triggers and Classes That Assume Batches of Data as Input Write Code That Works Efficiently with the Database, Both in Querying and Using DML Trigger Design Strategies List Declarative Mechanisms You Can Use to Implement Complex Business Logic, What Types of Problems They?re Best Used for, and Their Limitations Describe Ways in Which You Can Use Declarative Functionality to Improve Your Programmatic Solutions Working with Visualforce Create a Visualforce Page Reference a Standard Controller Launch a Visualforce Page Using a Custom Button Display Data from a Record in a Visualforce Page Reference Custom Controllers and Controller Extensions Work with List Controllers Visualforce Development Considerations and Testing Describe Common Limit Issues and Security Concerns Describe Strategies for Testing Visualforce Controllers Write Tests for Controller Constructors Write Tests for Action Methods, Getters, Setters, and Properties Lightning Components Create and Surface an Aura Component Create and Surface a Lightning Web Component Additional course details: Nexus Humans Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450)
Delivered OnlineFlexible Dates
Price on Enquiry

Recruiting Talent and Termination Procedure

By NextGen Learning

Recruiting Talent and Termination Procedure Course Overview: This comprehensive course on "Recruiting Talent and Termination Procedure" provides an in-depth understanding of the recruitment process, effective interviewing methods, and employee termination procedures. Learners will explore a wide range of topics, from creating effective recruitment strategies to managing employee terminations in a legal and ethical manner. The course offers practical value by equipping learners with the necessary knowledge and skills to excel in HR roles and manage critical HR processes. On completion, learners will be prepared to contribute effectively to recruitment and employee management within an organisation. Course Description: This course covers the entire recruitment lifecycle, including the development of recruitment models, selection methods, and the nuances of human resource management. Key topics include virtual interviewing techniques, employee on-boarding strategies, and the legal and procedural aspects of employee termination. Through a structured learning experience, learners will develop skills in recruitment planning, interview preparation, and managing the complexities of terminating employment. With a focus on the latest HR practices, the course ensures learners are prepared to handle recruitment and termination tasks with professionalism and confidence. Recruiting Talent and Termination Procedure Curriculum: Module 01: Introduction to Recruitment Process Model Module 02: Recruitment Methods Module 03: Human Resource Management Module 04: Key Skills and Issues in Recruitment Function Module 05: Virtual Interviewing Module 06: Employee On-Boarding Module 07: Introduction to The Employee Termination Module 08: The Employee Termination Procedure Module 09: Employee Termination Letter and Guide (See full curriculum) Who is this course for? Individuals seeking to enhance their understanding of recruitment and employee management. Professionals aiming to advance their career in HR or recruitment. Beginners with an interest in human resource management. HR practitioners seeking to update their skills in recruitment and termination processes. Career Path: HR Manager Recruitment Consultant Talent Acquisition Specialist Employee Relations Officer HR Coordinator HR Director

Recruiting Talent and Termination Procedure
Delivered OnlineFlexible Dates
£7.99

Team Building Masterclass

By NextGen Learning

Team Building Masterclass Course Overview This Team Building Masterclass provides learners with the knowledge and skills necessary to create high-performing teams in various professional environments. Covering core topics such as communication, team dynamics, and leadership strategies, this course offers valuable insights into the qualities that contribute to a successful team. Learners will gain practical tools for managing both in-person and remote teams, along with strategies for overcoming common challenges. By the end of the course, learners will have a clear understanding of how to build cohesive, motivated, and effective teams, enhancing their leadership potential and organisational impact. Course Description The Team Building Masterclass delves into the critical aspects of team success, starting with the key qualities that define high-performing teams. Participants will explore various communication techniques, effective team-building models, and the stages of the team-building process. Special focus is placed on the challenges faced when managing virtual teams, as well as interactive exercises designed to strengthen team bonds. Throughout the course, learners will develop a comprehensive understanding of the essential elements of team collaboration and gain strategies for navigating obstacles. This course is ideal for those seeking to improve team cohesion and productivity in their professional roles. Team Building Masterclass Curriculum Module 01: Qualities of a Successful Team Module 02: Communicating Effectively as a Team Module 03: Team Building Models Module 04: Team Building Process Module 05: Challenges of Managing a Virtual Team Module 06: Team Building Exercises (See full curriculum) Who is this course for? Individuals seeking to enhance their leadership skills Professionals aiming to improve team performance Beginners with an interest in team management Managers looking to develop team-building strategies HR professionals and organisational developers Career Path Team Manager Project Manager HR Specialist Organisational Development Consultant Leadership Coach Remote Team Manager

Team Building Masterclass
Delivered OnlineFlexible Dates
£7.99