• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3197 Courses delivered Online

Contract and commercial management for practitioners (In-House)

By The In House Training Company

This five-day programme empowers participants with the skills and knowledge to understand and effectively apply best practice commercial and contracting principles and techniques, ensuring better contractor performance and greater value add. This is an assessed programme, leading to the International Association for Contracts & Commercial Management (IACCM)'s coveted Contract and Commercial Management Practitioner (CCMP) qualification. By the end of this comprehensive programme the participants will be able to: Develop robust contracting plans, including scopes of work and award strategies Undertake early market engagements to maximise competition Conduct effective contracting and commercial management activities, including ITT, RFP, negotiated outcomes Understand the legalities of contract and commercial management Negotiate effectively with key stakeholders and clients, making use of the key skills of persuading and influencing to optimise outcomes Undertake effective Supplier Relationship Management Appreciate the implications of national and organisational culture on contracting and commercial activities Appreciate professional contract management standards Set up and maintain contract and commercial management governance systems Take a proactive, collaborative, and agile approach to managing commercial contracts Develop and monitor appropriate and robust KPIs and SLAs to manage the contractor and facilitate improved contractor performance Appreciate the cross-functional nature of contract management Collaborate with clients to deliver sustainable performance and to manage and exceed client expectations Understand the roles and responsibilities of contract and commercial managers Use effective contractor selection and award methods and models (including the 10Cs model) and use these models to prepare robust propositions to clients Make effective use of lessons learned to promote improvements from less than optimal outcomes, using appropriate templates Effectively manage the process of change, claims, variations, and dispute resolution Develop and present robust propositions Make appropriate use of best practice contract and commercial management tools, techniques, and templates DAY ONE 1 Introduction Aims Objectives KPIs Learning strategies Plan for the programme 2 The contracting context Key objectives of contract management Importance and impact on the business 3 Critical success factors Essential features of professional commercial and contract management and administration The 6-step model 4 Putting the 'management' into commercial and contract management Traditional v 'new age' models The need for a commercial approach The added value generated 5 Definitions 'Commercial management' 'Contract management' 'Contracting' ... and why have formal contracts? 6 Stakeholders Stakeholder mapping and analysis The 'shared vision' concept Engaging with key functions, eg, HSE, finance, operations 7 Roles and responsibilities Contract administrators Stakeholders 8 Strategy and planning Developing effective contracting plans and strategies DAY TWO 1 Contract control Tools and techniques, including CPA and Gantt charts A project management approach Developing effective contract programmes 2 The contracting context Key objectives of contract management Importance and impact on the business 3 Tendering Overview of the contracting cycle Requirement to tender Methods Rationale Exceptions Steps Gateways Controls One and two package bids 4 Tender assessment and contract award I - framework Tender board procedures Role of the tender board (including minor and major tender boards) Membership Administration Developing robust contract award strategies and presentations DAY THREE 1 Tender assessment and contract award II - processes Pre-qualification processes CRS Vendor registration rules and processes Creating bidder lists Disqualification criteria Short-listing Using the 10Cs model Contract award and contract execution processes 2 Minor works orders Process Need for competition Role and purpose Controls Risks 3 Contract strategy Types of contract Call-offs Framework agreements Price agreements Supply agreements 4 Contract terms I: Pricing structures Lump sum Unit price Cost plus Time and materials Alternative methods Target cost Gain share contracts Advance payments Price escalation clauses 5 Contract terms II: Other financial clauses Insurance Currencies Parent body guarantees Tender bonds Performance bonds Retentions Sub-contracting Termination Invoicing 6 Contract terms III: Risk and reward Incentive contracts Management and mitigation of contractual risk DAY FOUR 1 Contract terms IV: Jurisdiction and related matters Applicable laws and regulations Registration Commercial registry Commercial agencies 2 Managing the client-contractor relationship Types of relationship Driving forces Link between type of contract and style of relationships Motivation - use of incentives and remedies 3 Disputes Types of dispute Conflict resolution strategies Negotiation Mediation Arbitration DAY FIVE 1 Performance measurement KPIs Benchmarking Cost controls Validity of savings Balanced scorecards Using the KPI template 2 Personal qualities of the contract manager Negotiation Communication Persuasion and influencing Working in a matrix environment 3 Contract terms V: Drafting skills Drafting special terms 4 Variations Contract and works variation orders Causes of variations Risk management Controls Prevention Negotiation with contractors 5 Claims Claims management processes Controls Risk mitigation Schedules of rates 6 Close-out Contract close-out and acceptance / completion HSE Final payments Performance evaluation Capturing the learning 7 Close Review Final assessment Next steps

Contract and commercial management for practitioners (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Translation: Freelance Translator

By Imperial Academy

Level 5 QLS Course | 150 CPD Points | Advanced Learning Materials | Lifetime Access | Tutor Support

Translation: Freelance Translator
Delivered Online On Demand
£12

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

IT Support Technician

By NextGen Learning

In today's digital age, it is becoming increasingly important for individuals and businesses to have a strong understanding of information technology (IT). IT training can provide individuals with the skills and knowledge they need to succeed in a variety of industries and positions. From computer programming to networking and cybersecurity, IT Support training can open up a world of career opportunities and help businesses stay competitive in an increasingly digital marketplace. There are several reasons why IT Support training is important for individuals and businesses. First and foremost, a strong understanding of IT Support can help individuals and businesses stay up-to-date with the latest technology and trends. This can be especially important in fast-paced industries where technology is constantly evolving. In addition, IT Support training can help individuals and businesses improve efficiency and productivity by streamlining processes and automating tasks. The demand for IT Support Technician is on the rise as businesses and organisations continue to rely on technology to improve efficiency and stay competitive. This demand is reflected in the growing number of job openings in the field, as well as the increasing salaries being offered to IT professionals. Whether you are a business owner looking to improve your organisation's technological capabilities or an individual looking to enter the IT field, now is the time to start building your skills and knowledge through an IT Support training course. Regardless of your industry or profession, it is becoming increasingly important for everyone to have a basic understanding of IT. From computer basics to cybersecurity, IT Support training can help individuals and businesses protect themselves and their data from cyber threats. In addition, a basic understanding of IT Support can help individuals and businesses stay competitive in an increasingly digital job market. Whether you are a student, a business owner, or a professional looking to improve your skills, enrol in our IT Support Training course and keep yourself updated just as everyone is. Learning Outcome Upon completing this IT Support Training course, you should be able to: Understand the impact and importance of information technology in today's world Learn about different types of communication and networking technologies Explore the skills that will be required in the future in the field of information technology Know about the importance of technology as a foundation skill in various industries Develop proficiency in word processing, presentation, and spreadsheet software Find out how to create and edit databases for storing and organising information from this IT Support course. Understand the basics of project management in the field of information technology FREE Course: ***Information Management*** Module 01: Introduction Module 02: Information Management Strategy Module 03: Databases and Information Management Module 04: Management Information Systems (MIS) Module 05: Auditing Information Systems Module 06: Ethical and Social Issues and Data Protection What will make you stand out? Upon completion of this IT Support online course, you will gain: CPD QS Accredited Proficiency Lifetime access to the whole collection of learning materials. The online test with immediate results You can study and complete the course at your own pace. Study the IT Support course using any internet-connected device, such as a computer, tablet, or mobile device. The IT Support Technician course provides an immersive exploration into the dynamic realm of Information Technology. Tailored to reflect the evolving needs of the industry, this course spotlights the central role of IT Support in ensuring the seamless operation of contemporary, technology-driven enterprises. Delving into the intricacies of effective communication, robust network management, and adeptness in various software tools, participants are primed to become proficient IT Support technicians. As technology's footprint expands in every sector, the demand for skilled IT Support personnel rises. This course serves as a comprehensive guide, arming learners with the expertise needed to navigate and excel in this ever-changing domain. Elevate your skills, understanding, and career prospects by mastering the critical aspects of IT Support through our comprehensive course. Enrol today and begin your journey towards becoming an indispensable asset in the IT domain, ensuring smooth technological operations in contemporary digital landscapes. CPD 20 CPD hours / points Accredited by CPD Quality Standards Module 01: Introduction: A Transforming Technology 16:00 1: Introduction: A Transforming Technology 16:00 PDF Module 02: Importance of Information Technology 08:00 2: Importance of Information Technology 08:00 PDF Module 03: Communication and Network 17:00 3: Communication and Network 17:00 PDF Module 04: Future Skills Required in Information Technology 10:00 4: Future Skills Required in Information Technology 10:00 PDF Module 05: Technology as a Foundation Skill Area 07:00 5: Technology as a Foundation Skill Area 07:00 PDF Module 06: Word Processing Software 17:00 6: Word Processing Software 17:00 PDF Module 07: Presentation Software 18:00 7: Presentation Software 18:00 PDF Module 08: Creating and Editing Spreadsheet Part 1 11:00 8: Creating and Editing Spreadsheet (Part 1: The Basics of Spreadsheets) 11:00 PDF Module 09: Creating and Editing Spreadsheet Part 2 16:00 9: Creating and Editing Spreadsheet (Part 2: Navigation and Edit) 16:00 PDF Module 10: Storing Database 16:00 10: Storing Database 16:00 PDF Module 11: Information Technology Project Management 11:00 11: Information Technology Project Management 11:00 PDF ***FREE Course : Information Management 1:22:19 12: Introduction to Information Management 18:08 13: Information Management Strategy 10:28 14: Databases and Information Management 17:08 15: Management Information Systems (MIS) 09:17 16: Auditing Information Systems 09:18 17: Ethical and Social Issues and Data Protection 18:00 Assignment (Optional) - IT Support 04:00 18: Assignment On IT Course 04:00 PDF Order Your CPD Quality Standard Certificate (Optional) 01:00 19: Order Your CPD Quality Standard Certificate (Optional) 01:00 PDF Who is this course for? This IT Support course is suitable for anyone interested in learning about information technology and developing skills in this field, including: Students studying computer science, information technology, or a related field Professionals working in the IT field looking to update their knowledge and skills Business owners or entrepreneurs who want to improve their understanding of technology and how it can be used in their business Individuals interested in pursuing a career in the field of information technology Requirements Without any formal requirements, you can delightfully enrol in this IT Support course. Career path Upon completing this course, individuals may pursue a career in the following fields: IT Support Technician IT Support Manager IT Support Technician IT Administrator IT Support Analyst IT Teacher IT Support Engineer IT Support Helpdesk Analyst Certificates CPD Quality Standard Certificate Digital certificate - £4.99 Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hardcopy Transcript: £9.99

IT Support Technician
Delivered Online On Demand39 hours
£12

Being Assertive with Emotional Intelligence

By Ei4Change

This leadership course explores the application of emotional intelligence at work as a core underpinning skill of leadership. Your emotional intelligence helps you to manage your thinking along with your emotions to make authentic decisions and build quality relationships.

Being Assertive with Emotional Intelligence
Delivered Online On Demand
£78

AS28 IBM BRMS for IBM i

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for POWER i administrators, IBM Business Partners, and anyone else who would like practical knowledge of the features and functions supported by BRMS. Overview Describe the major features and functions of BRMS List the steps to install BRMS on a single system or in a BRMS Network environment Implement a previously defined backup and recovery strategy using BRMS Implement a previously defined archival and retrieval plan, including dynamic retrieval, using BRMS Explain how to utilize a tape drive, tape library system, virtual tape, and optical drive with BRMS Implement and use BRMS using the green screen, System i Navigator, and IBM Navigator for i This course covers the features & functions supported by Backup Recovery & Media Services (BRMS). Learn how to perform the supported functions when using a 5250 emulation session, when using System i Navigator, & when using IBM Navigator for i. Overview of BRMS . Installing BRMS . BRMS policies overview . Media devices and encryption using software and hardware . Overview and implementation of virtual tape, DVD, and optical device support . Creating a simple backup control group . BRMS log . Saving IFS data . Working with backup lists . Parallel save, user exits, and save-while-active . Performing a backup and full system backup . Other backup topics i . Storage locations . Containers . Move management . Media class . Media policies . Media topics . BRMS networking . Scheduling BRMS jobs . Daily maintenance . BRMS reports . Recovery . Tape duplication and label print . Functional usage . Archive . Retrievaltion . TSM Client and BRMS on IBM i . BRMS Enterprise . Summary .

AS28 IBM BRMS for IBM i
Delivered OnlineFlexible Dates
Price on Enquiry

Reliability centred maintenance (In-House)

By The In House Training Company

Reliability Centred Maintenance (RCM) is commonly used to help establish safe minimum levels of maintenance, determine changes to operating procedures and help establish maintenance regimes and plans. Successful implementation can result in cost savings, machine uptime and improved risk management. But the devil's in the detail - how can you achieve these benefits and successfully implement RCM in your organisation? This programme will help you do just that. Note: this is a purely indicative outline. The content, duration, objectives and material used can all be adapted to match your specific requirements. To provide a better understanding of RCM, particularly: What, why, how and who? Opportunities and benefits Risks Cost effectiveness Note: this is a purely indicative outline. The content, duration, objectives and material used can all be adapted to match your specific requirements. 1 What is maintenance? Why maintain? Traditional maintenance methods Common current practices and trends 2 What is Reliability Centred Maintenance? Its history Its development Current usage Where can it be cost-effective? 3 How does it work? Basic features Key criteria Maintenance options Key outcomes 4 Making the business case and preparing the strategy Identifying and quantifying current risks Identifying and quantifying current costs Motivating decision-makers Identifying and empowering those who have to deliver the results Educating / gaining buy-in from interested parties 5 Implementation Identify business functions Prioritise functions Verify correct usage Identify failure modes Identify the consequences of failure Understand the failure process Specify the appropriate maintenance action(s) 6 Ongoing requirements Monitoring Recording Analysis Continuous re-evaluation 7 Open discussion Sharing experience and addressing specific issues of interest to participants Course review Close

Reliability centred maintenance (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Talent Management Level 3

By The Teachers Training

Master the art of talent management with our Level 3 course. Learn advanced strategies for identifying, nurturing, and retaining top talent within organizations. Gain the skills to create effective talent development plans and drive organizational success. Elevate your career in human resources with expert-led training tailored to Level 3 proficiency.

Talent Management Level 3
Delivered Online On Demand2 hours
£15

Translation: Translator Training

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Translation: Translator Training
Delivered Online On Demand5 hours 42 minutes
£25

Freelance Masterclass - Become An Expert Copywriter

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Freelance Masterclass - Become An Expert Copywriter
Delivered Online On Demand2 hours 23 minutes
£25