Child Psychology with Child Counselling Unlock the secrets of young minds with our Child Psychology with Child Counselling course. Develop proficiency in Child Psychology theories and practice. Propel your career as an expert in Child Psychology and counselling. Learning Outcomes: Grasp foundational concepts in Child Psychology. Chart key milestones in Child Development. Analyse factors affecting Child Psychology. Diagnose common childhood problems through Child Psychology. Administer effective Children Counselling based on Child Psychology principles. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Key Modules from Child Psychology with Child Counselling: Introduction to Child Psychology: Ingest fundamental theories and frameworks in Child Psychology for a strong foundational understanding. Child Development: Trace the stages and nuances of Child Development through the lens of Child Psychology. Child Psychology Factors: Assess and identify the critical factors that influence Child Psychology. Childhood Problem: Examine and address typical childhood problems with a Child Psychology approach. Children Counselling: Implement counselling strategies effectively, supported by Child Psychology theories. Child Counsellor: Equip yourself with the tools and skills required to succeed as a Child Counsellor specialised in Child Psychology.
Duration 2 Days 12 CPD hours This course is intended for The primary audiences for the course are as follows: Cisco technical customers (IT, telephony members, etc.) Cisco technology partners Cisco employees Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the CUIC High-Level Architecture and Deployment considerations Understanding Cisco Unified Intelligence Center Security, License Types and User Security Describe the installation and function of both the Controller Node Member Nodes. CUIC Configurations as well as how to upgrade the product is discussed. Managing Cisco Unified Intelligence Center Components Understanding Cisco Unified Intelligence Center Administration Describe what a Value List is and its function in CUIC Describe how Value Lists are created Describe what a Collection is and when you would use it when running reports Describe what are Report Definitions Describe the creation of Report Definitions and how to build a new Report using the new Report Definition The Cisco Unified Intelligence Center 11.6 for Advanced Users v1.1 (CUIC11.6AU v1.1) course is a 2-day instructor-led training (ILT) course. Cisco Unified Intelligence Center is a comprehensive, end-to-end reporting solution, designed to simplify the task of creating and modifying reports. It also can manage disparate data sources and, at the same time, to present a consistent user interface and a common tool to access varied data across multiple Cisco product families. Cisco Unified Intelligence Center Overview for the Advanced User Understanding Cisco Unified Intelligence Center Deployment Considerations Understanding Cisco Unified Intelligence Center Security, License Types and User Security Installing Cisco Unified Intelligence Managing Cisco Unified Intelligence Center Components Understanding Cisco Unified Intelligence Center Administration Using CUIC Value Lists and Collections as well as Report Definitions Using Value Lists and Collections Using Report Definitions
Duration 3 Days 18 CPD hours This course is intended for Data center architects Cloud infrastructure architects Network engineers System administrators Storage administrators System engineers who work in data center solutions and manage data center management policies Cisco integrators and partners Overview After taking this course, you should be able to: Understand Cisco UCS Director architecture Understand deployment models of Cisco UCS Director Configure virtual data centers, policies, and catalogs Understand the unified infrastructure management capabilities of Cisco UCS Director Understand orchestration and build advanced workflows Understand application containers The Cisco UCS Director Foundation (UCSDF) v6.6 course helps you understand concepts, architecture, and deployment use cases for Cisco UCS© Director. You will gain hands-on experience in deploying basic Cisco UCS Director solutions. You will also practice using core features that most implementations require, such as services design, using the self-service portal for provisioning services, creating workflows that enable cloud automation and standardize IT services, and more. Introducing Cisco UCS Director Understanding Data Center Challenges Understanding the Benefits of Cisco UCS Director Understanding Cisco UCS Director Components Explaining Cisco UCS Director Architecture Explaining Bare-Metal Agent Understanding Cisco UCS Director Deployment Explaining Cisco UCS Director Deployment Explaining Global System Settings Understanding Site and Pod Management Understanding Cisco UCS Director Infrastructure Management Understanding Cisco UCS Director Deployment Understanding the Design Phase Understanding Policies Understanding vDC and Groups Use Case Understanding Deployment Through the Self-Service Portal Understanding the Self-Service Provisioning Portal Understanding Service Request Introducing Orchestration Understanding Orchestration Reporting and Monitoring in Cisco UCS Director Understanding Chargeback in Cisco UCS Director Understanding Reports in Cisco UCS Director Introducing Application Containers Understanding Application Containers
Duration 4 Days 24 CPD hours This course is intended for Data center architects Cloud infrastructure architects Network engineers System administrators Storage administrators Engineers requiring advanced configuration skills Cisco integrators and partners Overview After taking this course, you should understand: Data center challenges and cloud solutions Cisco UCS Director architecture Cisco UCS Director setup and configuration Cisco ACI Multitenancy in FlexPod Cisco ACI infrastructure Resource groups and service offerings Tenant onboarding Self-service provisioning Application containers The Designing and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 course shows you how to use Cisco UCS© Director software to manage physical and virtual infrastructure elements, including Cisco Application Centric Infrastructure (Cisco ACI?). You will learn to use orchestration and automation functions of Cisco UCS Director to effectively manage infrastructure and automate IT processes. The course offers hands-on experience installing and configuring Cisco UCS Director software. You will also learn about features such as bare-metal provisioning; compute, network, and storage management; orchestration, including Application Policy Infrastructure Controller (APIC); Cisco UCS Director custom tasks, and more. Introducing Cisco UCS Director Understanding Data Center Challenges Understanding the Benefits of Cisco UCS Director Understanding Cisco UCS Director Components Explaining Cisco UCS Director Architecture Explaining Bare-Metal Agent Introducing Cisco Application Centric Infrastructure Understanding Cisco ACI Overview Understanding Cisco ACI Terms and Constructs Understanding Cisco UCS Director Infrastructure Management Understanding Cisco UCS Director Deployment Introducing Role-Based Access Control Explaining User Groups/Roles/Users Introducing Orchestration Understanding Orchestration Introducing Cisco UCS Director ACI Explaining Cisco UCS Director with ACI So Understanding Multitenancy with Cisco UCS Director ACI Explaining Multitenancy with Cisco UCS Director ACI Understanding Resource Groups and Service Offerings Introducing Advanced Tenant Onboarding Onboarding a Tenant Tagging Resources Introducing Application Containers Understanding Application Profiles Understanding Service Container Catalog Understanding Deployment Through Self-Service Portal Understanding Self-Service Provisioning Portal Understanding Service Request Understanding Virtual Data Center Understanding Policies Understanding vDC and Groups Use Case Additional course details: Nexus Humans CiscoDesigning and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CiscoDesigning and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration
Duration 3 Days 18 CPD hours This course is intended for This course is targeted for Juniper Networks system engineers, partner sales engineers (including Champions), and services partners who are interested in learning network design introductory concepts. However, the course is also applicable to a general audience of Juniper customers with a desire to learn more about network design. Overview Provide an overview of network design needs and common business requirements.Describe key product groups related to campus, WAN, data center, and security architectures.Analyze and interpret common RFP requirements.Scope a network design by gathering data and working with key stakeholders.Describe ways of processing customer data and design requests.Identify boundaries and scope for the design proposal.List some considerations when creating a design proposal.Provide an overview of network security design principles and common vulnerabilities.List high-level design considerations and best practices for securing the network.List the components of the campus network design.Describe best practices and design considerations for the campus.Describe architectural design options for the campus.List the components of the WAN.Describe best practices and design considerations for the WAN.Describe design options for the WAN.List the components of the data center design.Describe best practices and design considerations for the data center.Describe architectural design options for the data center.Define business continuity and its importance in a network design.Describe high availability design considerations and best practices.Provide an overview of high availability offerings and solutions.Describe Class of Service design considerations.Provide an overview of environmental considerations in network design.List design considerations and best practices for managing the network.Provide an overview of Juniper Networks and third party options for network management.List design considerations and best practices for network automation.Provide an overview of automation tools.Explain the foundational topics that have been taught throughout the course.Create a network design proposal that satisfies customer requirements and business needs.Provide an overview of the steps involved in migrating a network.Describe best practices used in network migration.List the various campus network topographies.Describe sample design options for the campus. This three-day course is designed to cover best practices, theory, and design principles for overall network design and will serve as the prerequisite course for other design subject areas Æ?? data center, security, and WAN. Course IntroductionNetwork Design Fundamentals A Need for Design Knowledge is King A Proposed Design Methodology A Reference Network Understanding Customer Requirements RFP Requirements Scoping the Design Project Analyzing the Data Lab: Understanding Customer Requirements Organizing the Data Processing the Data and Requests Understanding Boundaries and Scope Design Proposal Considerations Securing the Network Why Secure the Network? Security Design Considerations Creating the Design Campus The Campus Network: An Overview Best Practices and Considerations Architectural Design Options Lab: Creating the Design Campus Creating the Design Wide Area Network The WAN: An Overview Best Practices and Considerations WAN Design Examples Lab: Creating the Design WAN Creating the Design Data Center The Data Center: An Overview Best Practices and Considerations Data Center Design Examples Lab: Creating the Design Data Center Business Continuity & Network Enhancements Business Continuity Planning High Availability Design Considerations and Best Practices Offerings and Solutions CoS and Traffic Engineering Considerations Environmental Design Network Management Designing for Network Management Automation Designing for Network Automation Lab: Enhancing the Design Putting Network Design Into Practice Network Design Recap Responding to the RFP Final Lab Introduction Lab: Putting Network Design into Practice
Duration 5 Days 30 CPD hours This course is intended for Sr. Systems Administrator Cloud Engineer Systems Engineer Sr. Network Administrator Sr. Network Engineer Cloud Specialist Cloud Project Manager Overview After completion of this course you will be able to describe: Cloud architecture and design Security within the cloud Automation and virtualization Troubleshooting and Disaster recovery High availability This course covers in depth the skills and abilities needed to operate in the cloud, validating that candidates have the technical experience needed to deploy, secure, and automate environments regardless of the vendor solution. Understanding Cloud Concepts Topic 1A: Recognize Cloud Concepts Topic 1B: Recognize Cloud Terms Topic 1C: Understand the Troubleshooting Methodology Planning and Designing a Cloud Environment Topic 2A: Meet Cloud Business Requirements Topic 2B: Design Capacity Planning and Requirements Administering Cloud Resources Topic 3A: Manage Cloud Administration Topic 3B: Manage Compute Resources in the Cloud Topic 3C: Manage Memory Resources Managing Cloud Storage Topic 4A: Understand Cloud Storage Types Topic 4B: Configure Cloud Storage Solutions Topic 4C: Configure Cloud Storage Protocols and RAID Managing Networks in the Cloud Topic 5A: Deploying Cloud Network Services Topic 5B: Identify Cloud Network Infrastructure Components Securing and Troubleshooting Networks in the Cloud Topic 6A: Secure a Network in a Cloud Environment Topic 6B: Troubleshooting Cloud Connectivity Managing Cloud Migrations and Troubleshooting Cloud Deployments Topic 7A: Manage Cloud Migrations Topic 7B: Troubleshoot Cloud Deployment and Migration Issues Managing Cloud Automation and Orchestration Topic 8A: Understand Cloud Automation and Orchestration Techniques Topic 8B: Troubleshoot Automation and Orchestration in the Cloud Understanding Cloud Security Concepts Topic 9A: Administer Identity and Access Management in the Cloud Topic 9B: Manage Cloud Operating System and Application Security Topic 9C: Manage Data Security and Compliance in the Cloud Managing Cloud Security Topic 10A: Implement Security Measures in the Cloud Domain Topic 10B: Troubleshoot Cloud Security Managing Cloud Performance Topic 11A: Operate Efficiently in the Cloud Topic 11B: Accomplish Cloud Operations Tasks Topic 11C: Optimize Cloud Resources Topic 11D: Troubleshoot Common Cloud Performance Problems Managing Maintenance in the Cloud Topic 12A: Configure Logs, Monitoring, and Alerting for Cloud Services Topic 12B: Manage Backup and Restore in the Cloud Implementing High Availability and Disaster Recovery in the Cloud Topic 13A: Understand High Availability and Scaling in the Cloud Topic 13B: Manage Disaster Recovery in the Cloud Topic 13C: Incident Response Additional course details: Nexus Humans Cloud Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions Architects who are new to designing and building cloud architectures Data Center Architects who are migrating from on-premises environment to cloud architectures Other IT/cloud roles who want to understand how to design and build cloud architectures Overview In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Use AWS services to make your infrastructure scalable, reliable, and highly available Use AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well Architected Framework to improve architectures with AWS solutions This course covers all aspects of how to architect for the cloud over four-and-a-half-days. It covers topics from Architecting on AWS and Advanced Architecting on AWS to offer an immersive course in cloud architecture. You will learn how to design cloud architectures, starting small and working to large-scale enterprise level designs-and everything in between. Starting with the Well-Architected Framework, you will learn important architecting information for AWS services including: compute, storage, database, networking, security, monitoring, automation, optimization, benefits of de-coupling applications and serverless, building for resilience, and understanding costs Module 1: Introduction The real story of AWS Well-Architected Framework Six advantages of the cloud Global infrastructure Module 2: The Simplest Architectures S3 Glacier Choosing your regions Hands-on lab: Static Website Module 3: Adding a Compute Layer EC2 Storage solutions for instances Purchasing options such as dedicated host vs instances Module 4: Adding a Database Layer Relational vs non-relational Managed databases RDS Dynamo DB Neptune Hands-on lab: Deploying a web application on AWS Module 5: Networking in AWS Part 1 VPC CIDR and subnets Public vs private subnets NAT and internet gateway Security groups Module 6: Networking in AWS Part 2 Virtual Private Gateway VPN Direct Connect VPC peering Transit Gateway VPC Endpoints Elastic Load Balancer Route 53 Hands-on lab: Creating a VPC Module 7: AWS Identity and Access Management (IAM) IAM Identity federation Cognito Module 8: Organizations Organizations Multiple account management Tagging strategies Module 9: Elasticity, High Availability, and Monitoring Elasticity vs inelasticity Monitoring with CloudWatch, CloudTrail, and VPC Flow Logs Auto scaling Scaling databases Hands-on lab: Creating a highly available environment Module 10: Automation Why automate? CloudFormation AWS Quick Starts AWS Systems Manager AWS OpsWorks AWS Elastic Beanstalk Module 11: Deployment Methods Why use a deployment method? Blue green and canary deployment Tools to implement your deployment methods CI/CD Hands-on lab: Automating infrastructure deployment Module 12: Caching When and why you should cache your data Cloudfront Elasticache (Redis/Memcached) DynamoDB Accelerator Module 13: Security of Your Data Shared responsibility model Data classification Encryption Automatic data security Module 14: Building Decoupled Architecture Tight coupling vs loose coupling SQS SNS Module 15: Optimizations and Review Review questions Best practices Activity: Design and architecture - two trues and one lie Module 16: Microservices What is a microservice? Containers ECS Fargate EKS Module 17: Serverless Why use serverless? Lambda API Gateway AWS Step Functions Hands-on lab: Implementing a serverless architecture with AWS Managed Services Module 18: Building for Resilience Using managed services greatly increases resiliency Serverless for resiliency Issues with microservices to be aware of DDoS Hands-on lab: Amazon CloudFront content delivery and automating WAF rules Module 19: Networking in AWS Part 3 Elastic Network Adapter Maximum transmission units Global Accelerator Site to site VPN Transit Gateway Module 20: Understanding Costs Simple monthly calculator Right sizing your instances Price sensitive architecture examples Module 21: Migration Strategies Cloud migration strategies Planning Migrating Optimizing Hands-on lab: Application deployment using AWS Fargate Module 22: RTO/RPO and Backup Recovery Setup Disaster planning Recovery options Module 23: Final Review Architecting advice Service use case questions Example test questions Additional course details: Nexus Humans Architecting on AWS - Accelerator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS - Accelerator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for a non-technical audience and doesn't require any prior coding or technical experience. The handson exercises will be done using pre-built OpenAI tools and interfaces that are user-friendly and easy to use. Overview Working in an interactive learning environment, led by our engaging expert, you will: Get comfortable with the basics of prompt engineering and discover how it can make a difference in various business tasks, such as enhancing customer support, creating content, and fine-tuning sales pitches. Develop the knack for crafting, refining, and perfecting prompts suited to specific business situations by understanding context, user intent, and what makes a prompt great. Learn how to smoothly incorporate prompt engineering solutions into your existing business workflows, including pinpointing the right processes, integrating with your current software, and keeping data privacy and security in check. Become proficient in advanced techniques and best practices in prompt engineering, like making use of APIs, customizing language models, and collaborating with your teammates across different departments. Keep up with the latest developments in prompt engineering and be ready to adapt to changing business needs and trends, ensuring that you stay relevant and continue to grow in the dynamic business world. Prompt engineering is the process of designing and refining input prompts to get desired output from advanced language models, such as OpenAI Codex or GPT-4. It involves creating effective questions or statements that guide the AI model to generate useful responses for a specific task or purpose, like enhancing customer support, generating content, and fine-tuning sales pitches, making it an essential skill set for a wide range of business applications. Quick Start to Prompt Engineering for Everyday Business Users is a one-day, workshop style hands-on course that where you'll learn how to create effective prompts, integrate prompt engineering solutions into existing workflows, and uncover advanced techniques and best practices. Guided by our engaging, expert instructor, you?ll experiment with innovative tools and develop practical skills that can be immediately applied to a variety of projects. Whether you're aiming to enhance customer interactions, simplify content creation, or refine internal communication, this immersive learning experience will equip you with the knowledge to make a meaningful impact on your organization. Introduction to Prompt Engineering Understand the fundamentals of prompt engineering and its applications in the business world. What is prompt engineering? Importance of prompt engineering in business Key concepts and terminology Examples of prompt engineering in business scenarios Overview of popular prompt engineering tools (e.g., OpenAI Codex, GPT-4) Activity: Hands-on exploration of prompt engineering tools: Participants will engage in a fun scavenger hunt activity, where they will experiment with different prompt engineering tools to answer a set of questions. Developing Effective Prompts Learn how to create and refine prompts for a variety of business applications. Anatomy of a good prompt Understanding context and user intent Techniques for prompt iteration and optimization Generating specific and creative responses Handling sensitive information and biases Activity: Prompt development workshop: Participants will practice developing and refining prompts in a collaborative, game-like environment, where they will compete to create the most effective prompts for given business scenarios. Integrating Prompt Engineering into Business Processes Discover how to incorporate prompt engineering solutions into existing workflows. Identifying business processes that can benefit from prompt engineering Integrating prompt engineering with existing software and tools Evaluating the success and impact of prompt engineering solutions Ensuring data privacy and security Scaling prompt engineering solutions across an organization Activity: Business process integration simulation: Participants will work in teams to create a plan for integrating a prompt engineering solution into a simulated business process, with a focus on creativity and practicality. Advanced Techniques and Best Practices Gain insights into advanced techniques and best practices for prompt engineering in a business context. Leveraging APIs for prompt engineering Customizing and fine-tuning language models Adapting to changing business requirements and trends Collaborating with cross-functional teams Staying up-to-date with prompt engineering advancements Activity: Advanced prompt engineering challenge: Participants will take part in a friendly competition, using advanced techniques to solve complex business-related prompt engineering challenges. Additional course details: Nexus Humans QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Leaders, Managers, Individuals who lead meetings This course is designed to help leaders run effective virtual meetings as well as managing their team virtually. We will explore communication styles and understanding their team as well as productivity. This course involves a lot of open discussion as well as teaching leaders how to manage the virtual workplace and run productive meetings. Defining the Virtual Workplace What does it look like? Tools available Communication strategies Understanding communication styles Leading different communication styles Building a Virtual Workplace Strategy Goals & agenda Check-ins Communication strategies Virtual Leadership Strategies Making connections & check ins Managing virtual meetings with team members Defining availability & creating schedules Open Discussion & Action Plan