Calling all aspiring filmmakers and film enthusiasts! Join us for an engaging taster session on filmmaking, specially designed for students like you. Led by BA Practical Course Leader Devon Dickson, this session aims to explore the art of creating films that go beyond traditional performances and instead capture evocative and unforgettable cinematic truth. Discover how visual narrative can unlock your unique voice as a filmmaker. Devon Dickson, an accomplished writer, producer, and director with over 25 years of experience, will share his valuable insights gained from working on feature films, television shows, and over 300 commercials across 30 countries. His work has reached billions of viewers worldwide, making him a remarkable mentor for budding filmmakers. During this taster session, you'll delve into the philosophy and principles that form the foundations of our teaching here at Central Film School. Through practical examples and captivating case studies, you'll witness how this innovative approach to filmmaking can elevate your creativity and storytelling skills. Whether you're a film student, a passionate movie lover, or simply curious about the art of cinema, this taster session promises to be an inspiring and educational experience. No prior experience in filmmaking is required, so all students are welcome to attend. Don't miss out on this unique opportunity to learn from one of the industry's most experienced professionals. Reserve your spot now and embark on a journey to unlock your unique voice in filmmaking!
An accredited qualification to prepare supervisors and team leaders for a future management role. This programme gives Team Leaders & Managers the skills, disciplines and confidence to manage their team effectively and add a great deal more value to the organisation - where they have to apply their learning in order to achieve the highly coveted ILM qualification. In order for a business to obtain maximum results, it is important that employees are motivated and supported in their job roles. It is the responsibility of the team leader or supervisor to lead their team effectively and present feedback to management. This 3-day programme will guarantee to boost your performance as a team leader and help you make the transition from working in a team to leading a team. We use a combination of theory and practical to help you develop yourself, and a toolkit of resources to use in the workplace. This is an internationally accredited course which not only carries kudos but it ensures you apply the learning back into the workplace for an immediate impact. All of our ILM Programmes are provided in partnership with BCF Group Limited, which is the ILM Approved Centre we deliver under. Course Syllabus The syllabus of the ILM Level 2 Award in Leadership and Team Skills course is split into three main modules, covering the following: Module One Developing Yourself as a Team Leader Learning the various roles, functions and responsibilities of a team leader - depending on workplace Recognising limits of authority and accountability, and how these are defined Developing personal skills and abilities for effective team leading Using reflective learning skills to improve performance Identifying areas of strength and possible improvement Finding ways of obtaining feedback from others Receiving and responding positively to feedback Module Two Workplace Communications Learning stages in the communication process Consideration of the recipient's needs Spotting barriers to communication and how to overcome them Establishing a range of direct communication methods relevant to the team Collating a range of direct communication methods relevant to people outside own area of responsibility. This includes written, telephone, e-mail and face-to-face Recognising the aspects of face-to-face communication, including appearance, impact, body language Realising the importance of succinct and accurate records of one-to-one oral communication Reasons for maintaining records of one-to-one communication (e.g. potential disciplinary or legal issues) Module Three Managing Yourself Setting SMART objectives and using them to prioritise own actions Learning simple time management techniques Developing an awareness of own skills and abilities Giving yourself personal objectives in relation to team objectives Developing flexibility and responding to daily changing circumstances Diagnosing the causes and impacts of stress at work Identifying symptoms of stress in yourself Knowing the implications of stress for workplace and non-work activities/relationships Developing simple stress management techniques Available sources of support Action planning and review techniques Accreditation As with all ILM accredited programmes, participants will need to complete the post-programme activity in order to achieve their full ILM Level 2 Award in Team Leading. This element is designed to show to ILM that you are able to apply what you have learned in the workplace. Who Is It For? This programme is ideal for practising or aspiring team leaders, in any industry sector, who is looking to gain a solid foundation or develop their existing skills as a team leader. This internationally recognised course will give you a solid understanding of what is needed to be a successful team leader, how to delegate, motivate and how to implement these skills in to your work place. What Will I Learn? At the end of the course, successful candidates will: Have a good understanding of the team leader role Apply a range of effective communication skills to overcome barriers Know how to motivate, build confidence and gain the best from their teams Identify, build and encourage effective team behaviours Apply practical skills and knowledge to be transferred to the workplace Gain an internationally recognised qualification What Is Required? There are no formal entry requirements, but participants will normally be either practising or aspiring team leaders, with the opportunity to meet the assessment demands and have a background that will enable them to benefit from the programme. Scheduled Courses Unfortunately this course is not one that is currently scheduled as an open course, and is only available on an in-house basis. For more information about running this course in-house at your premises, please contact us for more information.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for both organizations that would like to improve the corporate communications of their employees and individuals, who take the role of Project Managers, Business Analysts, Team Leaders, Scrum Masters, Product Owners, Managers, Employees, and anyone who would like to improve their communications skills both in the personal and professional aspects. Overview Upon successful completion of this course, students will learn: what effective communications are. why they are important. how by improving communications you will be able to improve the overall execution of projects and your results in general. the specifics of online remote teamwork communications. Your employees will be equipped with knowledge of different communication techniques and styles, which will save them time to adapt to the communication style of the interlocutor and allow them to have more effective conversations both with business partners and customers, and with colleagues at work. Also, they will master the art of active listening and thus win more customers and partners. This course can be adapted to the specific needs of your organization. This course represents highly effective training on developing communication skills and teaches students how to ask correct questions and get the most from one discussion. Also, students will learn how to resolve and/or avoid conflict situations. Course Outline What is the process of effective communications? How to ask good questions and reach clear agreements? Why is listening important and how to listen actively? How to give and receive feedback? How to prepare and conduct effective meetings? Each topic includes discussions and exercises.
Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to:Identify the different types of tools and techniques availableApply change management successfullyReview what to look for when applying business case thinking to Root Cause AnalysisDevelop a process to systematically approach problems Problem determination skills cannot be acquired by reading a book. They mostly come from experience. After this course, you will have a general understanding of a structured problem determination approach, which you can then apply in your daily work. RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? Exercise 1a: Why is RCA important What is Root Cause? RCA Benefits and Approaches Exercise 1b: Why are multiple approaches important? Event and Casual Analysis Exercise 1c: Apply Event and Causal Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Exercise 1D: Prepare for Case Study Section Summary and Conclusions Enhance Use of RCA Tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Exercise 2a: Apply Change Analysis Exercise 2b: Change Analysis Worksheet Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Exercise 2b: Apply 5 Why?s Sequence-of-Events Exercise 2b: Worksheet Tool: Cause and Effect Exercise 2c: Apply Cause and Effect Exercise 2c: Cause and Effect Worksheet Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Exercise 2D: Apply Fault Tree Analysis Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Exercise 2E: Apply FMEA Tool: Design / Application Review Exercise 2d: Apply Design/Application Review Section summary & conclusions Problem Resolution & Prevention Section Objectives The Secret of Solving Problems A Note about Statistical Control A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Exercise 3A: Problem as IGOE Exercise 3A: IGOE Template Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Exercise 3B: Apply Lean Six Sigma Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN) What is Business Process Modeling Notation (BPMN)? Benefits of BPMN Basic Components of BPMN Exercise 3C: Use BPMN to Document a Current State Technique: Business Process Maturity Model Five Levels of Maturity Exercise 3D: Appraise Business Process Maturity Level Section Summary and Conclusions Capability Improvement for RCA Section Learning Objectives Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Exercise 4A: Apply RCA to RCA Process Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey Exercise 4B: Apply Strengths, Weakness, Opportunities and Threats (SWOT) to RCA SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? Awareness of the need for change Desire to participate and support the change Knowledge on how to change Ability to implement required skills and behaviors Reinforcement to sustain the change Exercise 4C: Create an Ability Checklist The ADKAR Model: Reinforcement Exercise 4D: Find two examples of how ADKAR will be different Section Summary and Conclusions Course Summary & Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Exercise 5A: Creating Action Plans Resource Guide Questions Additional course details: Nexus Humans BA17 - Advanced Root Cause Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA17 - Advanced Root Cause Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for intermediate to advanced Business Analysts who are looking to improve their skills for eliciting, analyzing, documenting, validating, and communicating requirements. Overview Obtain a thorough understanding of the core responsibilities of the business analyst Understand the main professional associations and standards supporting business analysts in the industry Discuss and explore the components of each of the domains/knowledge areas that comprise the work of business analysis Recognize the importance of properly defining the business need prior to engaging in requirements activities Formulate a strong understanding of the concepts that comprise strategy analysis Obtain experience with identifying and analyzing stakeholders Decipher between project and product scope and successfully use models to communicate scope Thoroughly understand and identify the various requirements categories and be able to recognize requirements of various types Explore business rules analysis Understand the benefits of process modeling and the common modeling language of BPMN Discuss process models and how the techniques can capture details about the as-is/to-be environment Learn how to properly prepare and conduct interviews Explore the components of use cases Learn what it means to package requirements Obtain hands-on experience with a number of business analysis techniques and gain hands-on experience eliciting, defining, and writing requirements. This course provides students a clear understanding of all the facets of the business analysis role, including a thorough walkthrough of the various domain/knowledge areas that comprise the business analysis profession. Students are provided an opportunity to try their hand at several business analysis techniques to assist with improving their skills in stakeholder identification, scope definition, and analyzing, documenting, and modeling requirements. Introduction to Business Analysis What is business analysis Benefits and challenges of business analysis Project success factors A Closer Look at the Business Analyst Role Definition of a business analyst Responsibilities of a business analyst Importance of communication/collaboration BA role vs. PM role Project roles involved in requirements IIBA/PMI and the goals of a professional association Purpose for having a BA standard IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Business analysis beyond project work Business analysis core concepts Business analysis perspectives IIBA and PMI certifications for business analysts Workshop: Choose Your Project Supporting the Project Portfolio (Enterprise Analysis) Define Strategy Analysis When to perform Strategy Analysis Components of Strategy Analysis Defining the business need Envisioning the Product and Project Defining business requirements The importance of stakeholders Stakeholder identification Tips for analyzing stakeholders Techniques for managing stakeholder lists Discussion: Who is involved in strategy analysis? Workshops: Define the Business Need, Write Business Requirements, and Identify Stakeholders Understanding and Defining Solution Scope Defining solution scope Techniques for defining solution scope Applying the brainstorming technique Project scope vs. Product scope Finding solution boundaries The Context Diagram Actors and key information Workshop: Draw a Context Diagram Understanding Requirements What is a requirement? Requirement types Business, Stakeholder, Solution, and Transition requirements Assumptions and constraints Business rules Taxonomy of business rules Decision tables How to write simple calculations Requirements vs. business rules Document requirements Workshop ? Document Requirements Elicitation and Process Modeling Why do we model processes? What is Business Process Management? Using a modeling notation ?As Is? vs. ?To Be? modeling Why use BPMN? Basic BPM notation Business Process Modeling ? A case study Business Process Realignment ?As Is? vs. ?To Be? activity diagrams Workshop: Create a Business Process Model Planning & Eliciting Requirements Interviewing ? what and why? Preparing for an effective interview Types of questions to ask Sequencing questions Active listening techniques Planning for elicitation Conducting the interview Establishing rapport Active Listening Feedback techniques Types of elicitation techniques Workshops: Planning for Elicitation and Conducting an Elicitation Session Use Case & User Story Analysis What is an Actor? Types of Actors How to ?find? Use Cases? Diagramming Use Cases Tips on naming Use Cases Explaining scenarios The use case template Components of a use case Scenario examples Best practices for writing Use Cases Scenarios and flows Alternate and exception flows Exercises: Drawing a Use Case Diagram, Writing the Main Success Scenario, and Writing Alternate and Exception Scenarios Analyzing & Documenting Requirements Requirements and Use Cases Non-Functional requirements User Interface Requirements UI Data Table Reporting requirements Data requirements Data accessibility requirements Characteristics of good requirements The business requirements document (BRD) BRD vs. Functional Requirements Specification Preparing the requirements package Requirements traceability Workshops: Develop a User Interface, Analyzing Requirements, and Tracing requirements Additional Resources Useful books and links on writing effective requirements
Manage the day to day operations involved in supply chain.
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Art Therapy Course Overview This Art Therapy course offers a comprehensive exploration of the therapeutic power of art in promoting mental health and well-being. It provides an understanding of the psychological and neurological principles behind art therapy, equipping learners with the knowledge to use creative expression as a tool for healing and self-discovery. The course also delves into various art therapy techniques, their applications, and the role of mindfulness in enhancing creativity. Learners will gain valuable skills in facilitating art therapy sessions, working with different age groups, and addressing specific needs in both individual and group settings. Upon completion, learners will be equipped to apply art therapy principles in a range of professional environments, including healthcare, education, and counselling. Course Description This course covers the essential aspects of art therapy, beginning with an introduction to its core principles and the science behind its effectiveness. Learners will explore the psychology and neuroscience that underpin art therapy, gaining insight into how creative expression influences the brain. In later modules, the course covers practical applications of art therapy for various groups, including children, adults, and families. Emphasis is placed on mindfulness techniques, reflective writing, and using art as a means to cope with illness. Learners will explore a variety of therapeutic art forms, with a particular focus on how to integrate them into therapy sessions. Throughout the course, learners will develop a deep understanding of how art therapy fosters emotional well-being and resilience. By the end, learners will have acquired the skills necessary to incorporate art therapy into diverse settings, from clinical environments to community outreach. Art Therapy Curriculum Module 01: Introduction to Art Therapy Module 02: Art Therapy: Psychology and Neuroscience Module 03: Art Therapy in Practice Module 04: Creative Therapy Module 05: Mindful Creativity: Colour and Creation Module 06: Art Therapy Techniques and Applications Module 07: Using Mindfulness in Art Therapy Module 08: Drawings Module 09: Reflective Writing Module 10: Art Therapy for Children Module 11: Art Therapy for Adults Module 12: Art Therapy for Family Module 13: Illness and Art Module 14: The Art Therapist (See full curriculum) Who is this course for? Individuals seeking to explore art as a therapeutic tool. Professionals aiming to develop their skills in art therapy. Beginners with an interest in psychology and creative therapies. Therapists looking to integrate art into their existing practices. Educators or healthcare providers who wish to use creative methods in their work. Career Path Art Therapist Mental Health Counsellor Healthcare Professional in Therapy Settings Creative Arts Practitioner Occupational Therapist Teacher in Special Education Rehabilitation Specialist Social Worker
These events are designed to work on the ideas introduced in Level 1: Understanding & Dealing with Everyday Racism The Six Stages Framework
Social Media Strategy and Content workshop for professional hypnotherapists. Presented by Elle Cloke of We Do Social Media and The Social Media Gym.