Stressed spelled backward is desserts, but it's no sweet treat in the real world! Ready to conquer stress and boost your well-being and productivity? Join our Managing Stress Masterclass, where you'll unlock the secrets to a calmer, more focused you! đ What's on the Menu? 1ď¸âŁ Cracking the Stress Code Define stress and its many flavours (distress & eustress) Peek inside your body's stress playbook Eye-opening facts about stress in the UK workplace Why managing stress is your ticket to a happier, more productive life! 2ď¸âŁ Spotting Stress from Miles Away Unmask the sneaky culprits of workplace stress How your personal life can stir up stress at work Red flags! Learn to spot stress symptoms 3ď¸âŁ Your Stress-Busting Toolbox Master the art of mindfulness and meditation Rule your schedule with time management hacks Embrace a healthier lifestyle to crush stress Lean on your squad for support Rewire your brain with cognitive restructuring đ What You'll Take Home: A deeper understanding of stress and its many disguises. A stress radar to spot trouble brewing. A treasure trove of proven stress-busting techniques. A handy takeaway PDF full of key insights and additional resources.
5 ways for SEN/EBSA parents to strengthen their coping skills and cope with the unique set of challenges they face.
Duration 3 Days 18 CPD hours This course is intended for This course is geared for attendees with solid Python skills who wish to learn and use basic machine learning algorithms and concepts Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Topics Covered: This is a high-level list of topics covered in this course. Please see the detailed Agenda below Getting Started & Optional Python Quick Refresher Statistics and Probability Refresher and Python Practice Probability Density Function; Probability Mass Function; Naive Bayes Predictive Models Machine Learning with Python Recommender Systems KNN and PCA Reinforcement Learning Dealing with Real-World Data Experimental Design / ML in the Real World Time Permitting: Deep Learning and Neural Networks Machine Learning Essentials with Python is a foundation-level, three-day hands-on course that teaches students core skills and concepts in modern machine learning practices. This course is geared for attendees experienced with Python, but new to machine learning, who need introductory level coverage of these topics, rather than a deep dive of the math and statistics behind Machine Learning. Students will learn basic algorithms from scratch. For each machine learning concept, students will first learn about and discuss the foundations, its applicability and limitations, and then explore the implementation and use, reviewing and working with specific use casesWorking in a hands-on learning environment, led by our Machine Learning expert instructor, students will learn about and explore:Popular machine learning algorithms, their applicability and limitationsPractical application of these methods in a machine learning environmentPractical use cases and limitations of algorithms Getting Started Installation: Getting Started and Overview LINUX jump start: Installing and Using Anaconda & Course Materials (or reference the default container) Python Refresher Introducing the Pandas, NumPy and Scikit-Learn Library Statistics and Probability Refresher and Python Practice Types of Data Mean, Median, Mode Using mean, median, and mode in Python Variation and Standard Deviation Probability Density Function; Probability Mass Function; Naive Bayes Common Data Distributions Percentiles and Moments A Crash Course in matplotlib Advanced Visualization with Seaborn Covariance and Correlation Conditional Probability Naive Bayes: Concepts Bayes? Theorem Naive Bayes Spam Classifier with Naive Bayes Predictive Models Linear Regression Polynomial Regression Multiple Regression, and Predicting Car Prices Logistic Regression Logistic Regression Machine Learning with Python Supervised vs. Unsupervised Learning, and Train/Test Using Train/Test to Prevent Overfitting Understanding a Confusion Matrix Measuring Classifiers (Precision, Recall, F1, AUC, ROC) K-Means Clustering K-Means: Clustering People Based on Age and Income Measuring Entropy LINUX: Installing GraphViz Decision Trees: Concepts Decision Trees: Predicting Hiring Decisions Ensemble Learning Support Vector Machines (SVM) Overview Using SVM to Cluster People using scikit-learn Recommender Systems User-Based Collaborative Filtering Item-Based Collaborative Filtering Finding Similar Movie Better Accuracy for Similar Movies Recommending movies to People Improving your recommendations KNN and PCA K-Nearest-Neighbors: Concepts Using KNN to Predict a Rating for a Movie Dimensionality Reduction; Principal Component Analysis (PCA) PCA with the Iris Data Set Reinforcement Learning Reinforcement Learning with Q-Learning and Gym Dealing with Real-World Data Bias / Variance Tradeoff K-Fold Cross-Validation Data Cleaning and Normalization Cleaning Web Log Data Normalizing Numerical Data Detecting Outliers Feature Engineering and the Curse of Dimensionality Imputation Techniques for Missing Data Handling Unbalanced Data: Oversampling, Undersampling, and SMOTE Binning, Transforming, Encoding, Scaling, and Shuffling Experimental Design / ML in the Real World Deploying Models to Real-Time Systems A/B Testing Concepts T-Tests and P-Values Hands-on With T-Tests Determining How Long to Run an Experiment A/B Test Gotchas Capstone Project Group Project & Presentation or Review Deep Learning and Neural Networks Deep Learning Prerequisites The History of Artificial Neural Networks Deep Learning in the TensorFlow Playground Deep Learning Details Introducing TensorFlow Using TensorFlow Introducing Keras Using Keras to Predict Political Affiliations Convolutional Neural Networks (CNN?s) Using CNN?s for Handwriting Recognition Recurrent Neural Networks (RNN?s) Using an RNN for Sentiment Analysis Transfer Learning Tuning Neural Networks: Learning Rate and Batch Size Hyperparameters Deep Learning Regularization with Dropout and Early Stopping The Ethics of Deep Learning Learning More about Deep Learning Additional course details: Nexus Humans Machine Learning Essentials with Python (TTML5506-P) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Machine Learning Essentials with Python (TTML5506-P) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The ideal audience for the RPA and UiPath Boot Camp is beginners in the field of RPA and individuals in roles such as developers, project managers, operation analysts, and tech enthusiasts looking to familiarize themselves with automation technologies. It's also perfectly suited for business professionals keen on understanding and implementing automated solutions within their organizations to optimize processes. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Working in a hands-on learning environment, led by our Automation Learning expert instructor, students will explore: Gain a thorough understanding of Robotic Process Automation (RPA) and its applications using UiPath, setting a solid foundation for future learning and application. Learn to record and play in UiPath Studio, a key skill that enables automating complex tasks in a user-friendly environment. Master the art of designing and controlling workflows using Sequencing, Flowcharting, and Control Flow, helping to streamline and manage automation processes effectively. Acquire practical skills in data manipulation, from variable management to CSV/Excel and data table conversions, empowering you to handle data-rich tasks with confidence. Develop competence in managing controls and exploring various plugins and extensions, providing a broader toolkit for handling diverse automation projects. Get hands-on experience with exception handling, debugging, logging, code management, and bot deployment, fundamental skills that ensure your automated processes are reliable and efficient. How to deploy and control Bots with UiPath Orchestrator The Hands-on Natural Language Processing (NLP) Boot Camp is an immersive, three-day course that serves as your guide to building machines that can read and interpret human language. NLP is a unique interdisciplinary field, blending computational linguistics with artificial intelligence to help machines understand, interpret, and generate human language. In an increasingly data-driven world, NLP skills provide a competitive edge, enabling the development of sophisticated projects such as voice assistants, text analyzers, chatbots, and so much more. Our comprehensive curriculum covers a broad spectrum of NLP topics. Beginning with an introduction to NLP and feature extraction, the course moves to the hands-on development of text classifiers, exploration of web scraping and APIs, before delving into topic modeling, vector representations, text manipulation, and sentiment analysis. Half of your time is dedicated to hands-on labs, where you'll experience the practical application of your knowledge, from creating pipelines and text classifiers to web scraping and analyzing sentiment. These labs serve as a microcosm of real-world scenarios, equipping you with the skills to efficiently process and analyze text data. Time permitting, you?ll also explore modern tools like Python libraries, the OpenAI GPT-3 API, and TensorFlow, using them in a series of engaging exercises. By the end of the course, you'll have a well-rounded understanding of NLP, and will leave equipped with the practical skills and insights that you can immediately put to use, helping your organization gain valuable insights from text data, streamline business processes, and improve user interactions with automated text-based systems. You?ll be able to process and analyze text data effectively, implement advanced text representations, apply machine learning algorithms for text data, and build simple chatbots. What is Robotic Process Automation? Scope and techniques of automation Robotic process automation About UiPath The future of automation Record and Play UiPath stack Downloading and installing UiPath Studio Learning UiPath Studio Task recorder Step-by-step examples using the recorder Sequence, Flowchart, and Control Flow Sequencing the workflow Activities Control flow, various types of loops, and decision making Step-by-step example using Sequence and Flowchart Step-by-step example using Sequence and Control flow Data Manipulation Variables and scope Collections Arguments ? Purpose and use Data table usage with examples Clipboard management File operation with step-by-step example CSV/Excel to data table and vice versa (with a step-by-step example) Taking Control of the Controls Finding and attaching windows Finding the control Techniques for waiting for a control Act on controls ? mouse and keyboard activities Working with UiExplorer Handling events Revisit recorder Screen Scraping When to use OCR Types of OCR available How to use OCR Avoiding typical failure points Tame that Application with Plugins and Extensions Terminal plugin SAP automation Java plugin Citrix automation Mail plugin PDF plugin Web integration Excel and Word plugins Credential management Extensions ? Java, Chrome, Firefox, and Silverlight Handling User Events and Assistant Bots What are assistant bots? Monitoring system event triggers Monitoring image and element triggers Launching an assistant bot on a keyboard event Exception Handling, Debugging, and Logging Exception handling Common exceptions and ways to handle them Logging and taking screenshots Debugging techniques Collecting crash dumps Error reporting Managing and Maintaining the Code Project organization Nesting workflows Reusability of workflows Commenting techniques State Machine When to use Flowcharts, State Machines, or Sequences Using config files and examples of a config file Integrating a TFS server Deploying and Maintaining the Bot Publishing using publish utility Overview of Orchestration Server Using Orchestration Server to control bots Using Orchestration Server to deploy bots License management Publishing and managing updates
Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations⢠for Logs and VMware Aria Operations⢠for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSXĂŠ for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSXĂŠ Intelligence?, and VMware NSXĂŠ NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. This includes Senior Engineers and Architects responsible for creating architectures for Veeam environments. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. Design and architect a Veeam solution in a real-world environment Describe best practices, review an existing infrastructure and assess business/project requirements Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing Provide implementation and testing guidelines in line with designs Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirements Veeam Certified Architect is the highest level of Veeam technical certifications. Engineers who complete both Veeam Availability Suite v11: Configuration and Management and Veeam Backup & Replication V11: Architecture and Design programs (courses + exams) will be granted with the 'Veeam Certified Architect' (VMCA) title by Veeam. Introduction Veeam Availability Suite v11: Configuration and Management Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Introduction Veeam Backup & Replication v11: Architecture and Design Review the architecture principles Explore what a successful architecture looks like Review Veeam?s architecture methodology Discovery Analyze the existing environment Uncover relevant infrastructure metrics Uncover assumptions and risks Identify complexity in the environment Conceptual design Review scenario and data from discovery phase Identify logical groups of objects that will share resources based on requirements Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks Review infrastructure data with each product component in mind Create high level design and data flow Logical design Match critical components and features of VBR with requirements Create logical groupings Determine location of components and relationship to logical grouping Aggregate totals of component resources needed per logical grouping Calculate component (storage, CPU, memory) quantity sizing Physical/tangible design Convert the logical design into a physical design Physical hardware sizing Create a list of physical Veeam backup components Implementation and Governance Review physical design and implantation plan Review Veeam deployment hardening Describe the architect?s obligations to the implementation team Provide guidance on implementation specifics that relate to the design Validation and Iteration Provide framework for how to test the design Further develop the design according to a modification scenario
Agile working is an approach that the NHS supports. It demands new ways of working and thinking. Agile means that work is now seen as an activity, not a place. People are the organisation. The way we communicate has to change. The way we manage has to change. This workshop will let you reflect on what works for you now and where you may need to adapt. You may need to trust and value your team more than ever, but when they aren't in front of you in the office, you will need to question your beliefs. The workshop will help you: Understand what Agile Working is all about Reflect on your management style Recognise the new ways of managing agile workers Choose the right communication methods Understand culture and mindset Identify different ways of measuring performance Focus on innovation and not bureaucracy Manage more effectively This workshop has been designed to support you in effectively managing an agile team. You will need to be open to questioning your existing techniques and be open and responsive to change. 1 What's it all about? What is Agile working? What are your personal management concerns? How to make it work Time / location / role / source 2 Your role as an Agile manager Your style Your team's individual preferences Learning to let go Your management style self assessment 3 The 3 areas of focus Trust Delegation Empowerment 4 Communicating effectively New ways of communicating Managing expectations What are you measuring? 5 Your personal action plan What are you going to do differently?
Course Overview: Data analysis is a hot skill in today's job market. According to a recent study by LinkedIn, demand for data analysts is growing 15 times faster than the average for all occupations. And the salaries are good too. The average salary for a data analyst in the UK is ÂŁ40,000. If you're looking to get ahead in your career or learn a new skill that's in high demand, then the Data Analysis in Excel Level 3 Course is for you. In this course, you'll learn how to use Excel to analyse data like a pro. You'll learn how to clean, format, and analyse data using various Excel tools and techniques. You'll also learn how to create charts and graphs to visualise your data. This course won't merely make you adept at Excel. It will mould you into a data wizard, wielding Excel as a potent tool to make data sing and secrets reveal themselves. Enrol Today and Start Learning! Key Features of the Course: Embark on your data analysis journey with us and discover these exciting features: A CPD Certificate to validate your newfound skills. 24/7 Learning Assistance for any hour inspiration strikes. Engaging learning materials to ensure an enriching learning experience. Who is This Course For? Our Data Analysis in Excel Level 3 Course caters to ambitious individuals with a basic understanding of Excel, eager to take their skills to new heights. This course welcomes everything from budding data enthusiasts to established business analysts seeking to fortify their analytical toolkits. What You Will Learn: Dive deep into the labyrinth of data as you master essential modules such as 'Search for and Replace Data,' 'Sort and Filter Data,' and 'Query Data with Database Functions.' Venture further into data exploration with our 'Outline and Subtotal Data' module, where you'll learn to summarise your data for a more organised view efficiently. The journey continues with modules like 'Create Charts' and 'Modify and Format Charts,' enabling you to translate complex data into easy-to-understand visuals. Furthermore, our dedicated modules on 'Creating a PivotTable' and 'Analysing PivotTable Data' promise a comprehensive understanding of one of Excel's most powerful tools. Why Enrol in This Course: Rated as a top-reviewed course and constantly updated to keep up with the latest trends, our Data Analysis in Excel Level 3 Course equips you with sought-after skills like data forecasting, creating sparklines, using advanced chart features, and more. Requirements: While no specific prerequisites are required, a basic understanding of Excel and an eagerness to explore the fascinating world of data analysis would be beneficial. Career Path: On completion of this Data Analysis in Excel Level 3 Course course, you'll be ready to step into diverse roles such as: Data Analyst (ÂŁ30,000-ÂŁ35,000) Business Intelligence Analyst (ÂŁ32,000-ÂŁ37,000) Market Research Analyst (ÂŁ28,000-ÂŁ33,000) Operations Analyst (ÂŁ31,000-ÂŁ36,000) Financial Analyst (ÂŁ35,000-ÂŁ40,000) Supply Chain Analyst (ÂŁ30,000-ÂŁ35,000) Sales Analyst (ÂŁ29,000-ÂŁ34,000) Certification: Upon successful completion of the course, you'll be awarded a prestigious CPD Certificate, demonstrating your expertise in data analysis using Excel. So, are you ready to discover the hidden stories in data and revolutionise decision-making? Enrol in our Data Analysis in Excel Level 3 Course and start your journey today! Course Curriculum 11 sections ⢠32 lectures ⢠04:43:00 total length â˘Insert, Delete, and Adjust Cells, Columns, and Rows: 00:10:00 â˘Search for and Replace Data: 00:09:00 â˘Use Proofing and Research Tools: 00:07:00 â˘Sort Data: 00:10:00 â˘Filter Data: 00:10:00 â˘Query Data with Database Functions: 00:09:00 â˘Outline and Subtotal Data: 00:09:00 â˘Apply Intermediate Conditional Formatting: 00:07:00 â˘Apply Advanced Conditional Formatting: 00:05:00 â˘Create Charts: 00:13:00 â˘Modify and Format Charts: 00:12:00 â˘Use Advanced Chart Features: 00:12:00 â˘Create a PivotTable: 00:13:00 â˘Analyze PivotTable Data: 00:12:00 â˘Present Data with PivotCharts: 00:07:00 â˘Filter Data by Using Timelines and Slicers: 00:11:00 â˘Use Links and External References: 00:12:00 â˘Use 3-D References: 00:06:00 â˘Consolidate Data: 00:05:00 â˘Use Lookup Functions: 00:12:00 â˘Trace Cells: 00:09:00 â˘Watch and Evaluate Formulas: 00:08:00 â˘Apply Data Validation: 00:13:00 â˘Search for Invalid Data and Formulas with Errors: 00:04:00 â˘Work with Macros: 00:18:00 â˘Create Sparklines: 00:07:00 â˘MapData: 00:07:00 â˘Determine Potential Outcomes Using Data Tables: 00:08:00 â˘Determine Potential Outcomes Using Scenarios: 00:09:00 â˘Use the Goal Seek Feature: 00:04:00 â˘Forecasting Data Trends: 00:05:00 â˘Assignment - Data Analysis in Excel Level 3 Course: 00:00:00
The Sales Accelerator programme is a fresh approach to improving business development productivity. It focuses on identifying and using a series of business productivity metrics in order to build a clear action plan for improving sales results - typically within 90 days. The metrics are grouped under three headings: The basic principle is that a small improvement in each area can lead to a significant increase in sales results and productivity. And the object of the programme is to show how best to achieve that. The programme therefore looks at each of these three areas in turn, spending a day on each. Suitable for any and all businesses and all levels of experience and expertise, this is a remarkably practical and hands-on programme. During the workshop, participants discuss, review and apply many proven sales and marketing techniques and personal selling ideas. The goal is to generate and commit to changes and actions that can lead to a 10-30% increase in the next three to six months. There's also a consultancy option, rather than the workshop-based programme. See below for details. Day one - Activity Key objective This first module introduces the Sales Accelerator model. The goal here is to show participants how to increase their pro-active activity levels by around 10%. It covers all aspects of creating new business opportunities, from existing customers and non-customers alike, and is linked to personal activity improvement goals. Main elements Improve the productivity, accuracy and effectiveness of your business approach by using new and unique models and techniques. Different methods of creating and generating new business opportunities in the short, medium and long term. This includes sourcing new business, up-selling, cross-selling, warm calling and gaining referrals. Using organised persistence to track and build new customer revenue. Managing your sales time effectively. Key learning points Sales productivity - understand the dynamics of increasing the combination of activity levels, deal value and conversion rate of proposals/quotations to orders and implement an improvement plan. Sales goal setting: setting business development objectives for quantity and quality - plus tips and tricks of top performers. Maintain a peak activity level, on a consistent basis using 'organised persistence' and structured business development tracking methodology. How to prioritise opportunities and manage your time when sourcing new business. Identify potential new customers - and particularly the decision-makers and influencers - with greater accuracy. Make outbound business or appointment calls with improved confidence, control and results. Day two - Value Key objective To be able to better anticipate, identify, create, and develop business opportunities using a customer / client-focused communication-based business model and consultative skills. Main elements How to develop sales more effectively from new and existing customers; and managing the first appointment with a new customer. Use structured and assertive drawing-out skills to identify, develop and formalise business opportunities and to gain commitment. How to better position your company and your products and services against your main competitors. Create and deliver persuasive business messages based on specific need areas, criteria and value. Key learning points Advanced consultative selling - use a variety of structured and advanced questioning techniques to confidently and efficiently uncover opportunities, need areas and business criteria - confidently and efficiently. Involve the customer/client at all times, and to a far greater degree, and keep better control of business development process. Value message - differentiate your solutions clearly and accurately with customer/client-matched value statements. Presenting the right USPs, features and benefits and making them relevant and real to the customer. Qualification and reading buying signals. Day three (held around four weeks after the first module) - Conversion Key objective This module looks at how to improve the final qualification, progression and conversion of opportunities in your sales pipeline. Also includes price negotiation, overcoming objections and obstacles to gaining agreement. The module begins with a learning review, sharing participants' experiences over the last four weeks in applying the new techniques and skills acquired during the first two modules. This is an opportunity to revisit particularly challenging areas as well as to share and celebrate successes. Main elements Structuring and preparing for negotiating a deal and knowing when and how to move into the 'end-game' mode. Anticipate and answer customer objections and questions more confidently. Build more credibility and proof into your business process to reduce 'buyer's remorse' and speed-up decision-making. Being more assertive and developing better instincts and strategic thinking in progressing quotations and proposals. Key learning points Smart ways to position price, emphasise value and be a strong player without being the cheapest. Becoming more assertive in closing deals, and the importance of organised follow-up on the telephone. Qualify pipeline opportunities with more accuracy, using a proven check-list. Use an 'option generator' to simplify complex proposals, increase business value and close business faster. Writing more effective sales proposal documents and quotations. How best to draw-out, understand, isolate and answer customer objections, negotiate points and concerns. Practical methods of asking for agreement and closing a sale
Course Overview: Are you ready to embark on a journey into SQL Programming? Unlock the power of data manipulation and database management with the SQL Programming Masterclass. This comprehensive course is meticulously designed throughout this masterclass to provide you with an in-depth understanding of SQL, starting from the basics and progressing to advanced topics. You will explore SQL data types, filtering and sorting data, working with functions, handle NULL values, and even diving into complex SQL concepts like joins, unions, etc. With a course duration of carefully crafted lessons, this Masterclass ensures you grasp SQL's nuances and develop the proficiency to apply these skills effectively.By the end of the SQL Programming Masterclass, you will be prepared to navigate the world of databases confidently. Enrol in this course today and start your journey! Key Features of the Course: CPD certificate upon completion 24/7 learning assistance and support Who is This Course For? This course is perfect for individuals seeking to enhance their data management and analysis skills. Whether you're a data analyst, database administrator, software developer, or professional looking to upskill, this course will empower you to harness the power of SQL programming. Prior programming experience is not mandatory, making it accessible to beginners and intermediate learners. What You Will Learn: Foundations of SQL programming: Learn the basics of SQL, database management systems, and the tools used in this course, such as PostgreSQL and SQLectron. Data manipulation: Master the art of extracting, filtering, and sorting data based on specific requirements using various SQL keywords and operators. Advanced querying techniques: Dive deeper into SQL programming by exploring functions, grouping and aggregating data, and using advanced query techniques. Data conversion and manipulation: Discover how to convert data types, concatenate strings, manipulate characters and numbers, and utilise case statements for more sophisticated queries. Joining tables: Understand the different types of joins and how to combine data from multiple tables using join operations effectively. Data modification: Learn how to insert, update, and delete records in a database, as well as manage table structures and constraints.Joining tables: Understand the different types of joins and how to combine data from multiple tables using join operations effectively. Views and schemas: Explore the concepts of views and schemas, and learn how to create and use them to organise and present data effectively. Why Enrol in This Course: Top-reviewed course: Join thousands of satisfied learners who have praised this course for its clear explanations, comprehensive content, and examples. Recently updated curriculum: Benefit from the most up-to-date information and industry best practices in SQL programming. In-demand skills: SQL programming is a highly sought-after skill in today's job market, opening up numerous career opportunities across industries. Requirements: No prior programming experience is required. All you need is a computer with an internet connection and a willingness to learn. Career Path: Upon completing the SQL Programming Masterclass, you'll have the knowledge and skills for various career paths, including: Data Analyst - Average UK salary: ÂŁ35,000 per year Database Administrator - Average UK salary: ÂŁ40,000 per year Business Intelligence Analyst - Average UK salary: ÂŁ45,000 per year SQL Developer - Average UK salary: ÂŁ40,000 per year Data Engineer - Average UK salary: ÂŁ55,000 per year Software Developer - Average UK salary: ÂŁ45,000 per year Data Scientist - Average UK salary: ÂŁ60,000 per year Certification: Upon completing the Hygiene and Infection Control CPD Level 4 course, you will receive a CPD certificate. It demonstrates your commitment to maintaining the highest standards of hygiene and infection control. Course Curriculum 17 sections ⢠117 lectures ⢠10:47:00 total length â˘Introduction: 00:01:00 â˘Tools Used in This Course: 00:01:00 â˘Download PostgreSQL: 00:02:00 â˘Install PostgreSQL: 00:03:00 â˘Download SQLectron: 00:02:00 â˘Install SQLectron: 00:01:00 â˘Connect to PostgreSQL - Credentials: 00:01:00 â˘Connect to PostgreSQL Using SQLectron: 00:02:00 â˘Import Course Data Using SQLectron: 00:02:00 â˘FOR WINDOWS 32-BIT USERS: Download, Install, Configure & Import Data: 00:08:00 â˘Check Imported Data: 00:06:00 â˘What is a Database?: 00:01:00 â˘SQL Data Types: 00:02:00 â˘Finally Some Fun! Extracting Data Based on Requirements: 00:01:00 â˘Filtering Data using WHERE Keyword: 00:08:00 â˘Filter Data by Range Using BETWEEN: 00:03:00 â˘Filter Data by Set of Values Using IN: 00:03:00 â˘Filter Data by Date: 00:05:00 â˘More Filtering by Date: 00:03:00 â˘Another Query Filtering by Date: 00:01:00 â˘Filter Data by Strings: 00:04:00 â˘More Filtering by Strings: 00:05:00 â˘More Filtering by Strings 2: 00:10:00 â˘More Filtering by Strings 3: 00:02:00 â˘How to Ignore Caps when Filtering by String: 00:04:00 â˘AND Operator: 00:10:00 â˘OR Operator: 00:12:00 â˘NOT Operator: 00:09:00 â˘AND, OR & NOT Operators: Which Has the Highest Priority?: 00:06:00 â˘Basic Math Operations: 00:06:00 â˘Modulo Operator: 00:04:00 â˘Calculate The Net Salary for Employees: 00:06:00 â˘Filter Data with Math Equations: 00:03:00 â˘Concatenate Strings with '||' Operator: 00:06:00 â˘Concatenate Strings with Numbers: 00:02:00 â˘Give Your Report Fields A Cool Name: 00:04:00 â˘A Report for Payroll: 00:07:00 â˘Order Records by Column: 00:06:00 â˘Order Records by Multiple Columns: 00:12:00 â˘How Alias Names Cannot Be Used with WHERE: 00:02:00 â˘LIMIT Record Count Fetched by Your Query: 00:08:00 â˘Fetch A Field's Unique Values Using DISTINCT: 00:03:00 â˘Using DISTINCT Keyword with Multiple Columns: 00:06:00 â˘What is a NULL Value Anyway?: 00:05:00 â˘Build More Sophisticated Queries with CASE Statements: 00:10:00 â˘Your Knowledge So Far Under A Great Test: 00:09:00 â˘Let Me Introduce You to Functions: 00:04:00 â˘SUM Function: 00:04:00 â˘AVG (Average) Function: 00:04:00 â˘COUNT Function: 00:07:00 â˘MIN & MAX Functions: 00:04:00 â˘How To Count Your Field's Unique Values: 00:04:00 â˘GROUP BY Clause: Use Functions with Dimensions: 00:06:00 â˘GROUP BY More Than One Dimension: 00:05:00 â˘Now For Some Tough Workout: 00:09:00 â˘Filter By Aggregate Functions with HAVING Clause: 00:08:00 â˘Character Functions - UPPER, LOWER & INITCAP: 00:08:00 â˘Character Functions - CONCAT & LENGTH: 00:10:00 â˘Character Functions - LPAD & RPAD: 00:13:00 â˘Character Functions - TRIM: 00:04:00 â˘Character Functions - REPLACE: 00:09:00 â˘Character Functions - SUBSTR: 00:10:00 â˘Number Functions - MOD & ROUND: 00:11:00 â˘Number Functions - TRUNC: 00:07:00 â˘Selectception: A Select Query inside another Select Query!: 00:06:00 â˘Auto Data Conversion in SQL: 00:11:00 â˘Cast Date to Character: 00:10:00 â˘Cast Number to Character: 00:09:00 â˘Cast Timestamp to Character: 00:07:00 â˘Cast Character to Number: 00:08:00 â˘Cast Character to Date & Timestamp: 00:09:00 â˘UNION: 00:03:00 â˘UNION ALL: 00:02:00 â˘Important Note about Combining Queries: 00:02:00 â˘INTERSECT: 00:01:00 â˘EXCEPT: 00:01:00 â˘Employees & Departments Tables Revised: 00:03:00 â˘Entity Relationship Diagram (ERD): 00:09:00 â˘Cartesian Join: 00:09:00 â˘Table Aliases with Joins: 00:07:00 â˘Why I Don't Recommend Cartesian Joins: 00:08:00 â˘Inner Join: 00:06:00 â˘In-Depth Look into Join Types in SQL: 00:03:00 â˘Outer Join - Right, Left & Full: 00:08:00 â˘INSERT a New Record to a Table: 00:09:00 â˘Insert Without Specifying Column Names: 00:09:00 â˘UPDATE a Record's Field Values: 00:07:00 â˘CAUTION! How an UPDATE Query Can Go Wrong: 00:04:00 â˘Update a Record Using Single-Row Functions: 00:04:00 â˘A Good Exercise: Extract Employee's Email Address: 00:02:00 â˘Solution: Extract Employee's Email Address: 00:13:00 â˘DELETE a Table's Record: 00:06:00 â˘Insert Records with Nested Select Queries: 00:06:00 â˘SQL Data Types Revised: 00:13:00 â˘Bookstore Data Set: Let's Move It to Database: 00:04:00 â˘Create Your First Table!: 00:08:00 â˘Insert Data to Your New Table: 00:08:00 â˘Change Column Data Type: 00:07:00 â˘Rename Column: 00:04:00 â˘Add a New Column to Table: 00:04:00 â˘Constraints in SQL: 00:01:00 â˘Primary Keys: 00:14:00 â˘NOT NULL Constraint: 00:05:00 â˘UNIQUE Constraint: 00:04:00 â˘DEFAULT Constraint: 00:04:00 â˘Foreign Keys: 00:08:00 â˘Use Foreign Keys with Joins - Books & Publishers: 00:06:00 â˘Foreign Keys - Properties: 00:06:00 â˘Drop Column: 00:01:00 â˘DROP Table: 00:01:00 â˘Create a New Table with Select Statement: 00:05:00 â˘A Trick to Create an Empty Table with Select Statement: 00:03:00 â˘Insert New Records Using Select Statement: 00:06:00 â˘Views: 00:03:00 â˘Schemas: 00:02:00 â˘Create & Use Schemas: 00:04:00 â˘Resources - SQL Programming Masterclass: 00:00:00