The CIEH Foundation Certificate in Occupational Health and Safety supports businesses in their legal obligations to ensure employees are protected from harm. This course is ideal for those who want to develop their knowledge of health and safety issues in the workplace and of the regulations for maintaining a healthy and safe working environment. This course will focus on common hazards and how to control them. It will help you work more safely and be more aware of how your own actions can affect the health and safety of others.
EQ is a pattern of how people's biases in their thinking leads them to think one choice or thing is better than another, as well as their clarity in differentiating within those biases to exercise clear and sound judgement. Where your thinking and responses lie within your biases spectrum, and your ability in adjusting to the situation you find yourself in, will determine responses equating to poor or strong Emotional Intelligence (EI). This course will enhance and promote the skill set necessary for any working leader or manager, allowing our in-depth emotional intelligence knowledge to be applied into your working environment. From an employer's perspective, this award can be a significant long-term return on investment by further developing your leaders and managers. What Does This Course Offer? Our program offers an EQ-SWOT™ assessment and EI Model in detail, and through activity and discussion we explore how applying and possibly adjusting, you may offer an improved Emotional Intelligence. Our learning experiences are successful because the outcomes are quickly embedded and demonstrate an immediate visible impact on the day-to-day working environment. Our engaging learning inspires employees to want to personally add value to the companies they work for. We also offer our Paradigm EQ-SWOT™ online assessment and report as a frame of reference within the program. This assessment should be completed before attending the program, and will be expanded upon during the program delivery. Course Content The Emotional Intelligence for Today’s Leadership and Management course covers the following topics: What makes EI so important within the workplace Self-Awareness and your EQ Profile The EQ unpacked Unconscious Bias & EI How to develop your EI quotient Accreditation Activity Our accredited tutors deliver training that encourages delegates to confidently and practically apply all they have learnt as soon as they get back into the business. To achieve this award, delegates need to prepare and deliver a 3 minute presentation* on the highlights of their learning and immediate application avenues when back in their working environment. *Participants will be given 30 minutes during the program to prepare for their 3 min presentation at the end of the program. Scheduled Course Dates Unfortunately this course is not currently scheduled as an open course as it is primarily run as an in-house programme. For more information, please contact us. In-House Courses This is our own management training course which has been developed and refined over the many years we have been providing it to delegates from organisations in virtually every industry. This means that the course syllabus is extremely flexible and can be tailored to your specific requirements. If you would like to discuss how we can tailor this management training course for you and/or run it at your premises, please contact us.
Coming soon! The Certificate in Orthodontic Nursing is a qualification suitable for dental nurses who assist in orthodontic procedures. The course details areas of knowledge and understanding which a dental nurse assisting in orthodontic procedures needs to develop in order to practise competently. It requires students to maintain a work-based record of competence, integral to their learning journey, as well as complete an exam at the end of the 6 month course.
Duration 1 Days 6 CPD hours This course is intended for Employees not working in a centralized office. Overview The Telework and Telecommuting workshop will cover strategies to help participants learn skills required for working outside the office that include proper self-management, manage time efficiently, know different methods of organization and planning, identify various forms of communication and address and resolve challenges that teleworkers can face. The Telework and Telecommuting workshop will cover strategies to help participants learn skills required for working outside the office that include proper self-management, manage time efficiently, know different methods of organization and planning, identify various forms of communication and address and resolve challenges that teleworkers can face. Getting Started Workshop Objectives Pre-Assignment Core Skills Required Self-Management Time Management Organizing and Planning Communication Self-Management (I) Solving Problems on Your Own Being and Staying Motivated You Have More Freedom ? Don?t Abuse It You and Only You are Accountable Self-Management (II) Recognize and Remove Bad Habits Reflect on Mistakes and Learn from Them Establish Good Habits Be Assertive with Yourself Time Management (I) Build a Little Flexibility into Your Schedule Identify and Remove Time Wasters Working with Time Zones Using Free Time Wisely Time Management (II) The Urgent/Important Matrix Setting and Sticking to Deadlines The Glass Jar: Rocks, Pebbles, Sand and Water Recognize When You Are Procrastinating Organizing and Planning (I) Plan for Additional Stress When to Seek Help Being Proactive ? Not Reactive Establish Priorities and Attainable Goals Organizing and Planning (II) Setting Up Your Home Office Remove Unneeded or Distracting Items When Technology Fails Develop a Normal Working Day Communication (I) Stay in the Loop Use the Correct Medium Be Clear and to the Point Virtual Communication Can Be Impersonal Communication (II) Open and Frequent Communication Share Your Information Have a Collaborative Attitude Setting Expectations with Family and Friends Additional Challenges Building Trust and Rapport Feeling Isolated Always in the Office Lack of or Less Feedback Wrapping Up Words from the Wise
Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Support Engineer Technical Administrator Technical Consultant Overview Use Oracle Flashback Technologies to recover from human error Use Recovery Manager (RMAN) to create backups and perform recovery operations Use the Data Recovery Advisor to diagnose and repair failures Plan effective backup and recovery procedures Describe the Oracle Database architecture components related to backup and recovery operations Perform an encrypted database backup and restore Perform tablespace point-in-time recovery Configure the database for recoverability Describe Cloud Tooling for Backup and Recovery Describe Oracle Database backup methods and recovery operations that can be used to resolve database failure In this Oracle Database 12c R2: Backup and Recovery Workshop, students learn how to perform backup and recovery based on the related Oracle Database architecture components. Various backup, failure, restore, and recovery scenarios are provided so that students learn to evaluate their own recovery requirements and develop an appropriate strategy for backup and recovery procedures. This course includes an interactive workshop, with scenarios that provide participants with opportunities to diagnose and recover from several failure situations. Introduction Curriculum Context Assess your recovery requirements Categories of failures Oracle backup and recovery solutions Oracle Maximum Availability Architecture Oracle Secure Backup Benefits of using Oracle Data Guard Basic Workshop Architecture Getting Started Core Concepts of the Oracle Database, critical for Backup and Recovery Oracle DBA Tools for Backup and Recovery Connecting to Oracle Recovery Manager (RMAN) Configuring for Recoverablility RMAN commands Configuring and managing persistent settings Using the Fast Recovery Area (FRA) Control File Redo Log File Archiving Logs Using the RMAN Recovery Catalog Creating and Configuring the Recovery Catalog Managing Target Database Records in the Recovery Catalog Using RMAN Stored Scripts Maintaining and Protecting the Recovery Catalog Virtual Private Catalogs Backup Strategies and Terminology Backup Solutions Overview and Terminology Balancing Backup and Restore Requirements Backing Up Read-Only Tablespaces Data Warehouse Backup and Recovery: Best Practices Additional Backup Terminology Performing Backups RMAN Backup Types Incrementally Updated Backups Fast Incremental Backup Block Change Tracking Oracle-Suggested Backup Reporting on Backups Managing Backups Improving Your Backups Compressing Backups Using a Media Manager Backup and Restore for Very Large Files Creating RMAN Multi-section Backups, Proxy Copies, Duplexed Backup Sets and Backups of Backup Sets Creating and Managing Archival Backups Backing Up Recovery Files Backing Up the Control File to a Trace File Cataloging Additional Backup Files Using RMAN-Encrypted Backups Creating RMAN-Encrypted Backups Using Transparent-Mode Encryption Using Password-Mode Encryption Using Dual-Mode Encryption Diagnosing Failures Reducing Problem Diagnosis Time Automatic Diagnostic Repository Data Recovery Advisor Handling Block Corruption Restore and Recovery Concepts Restoring and Recovering Instance Failure and Instance/Crash Recovery Media Failure Complete Recovery (Overview) Point-in-Time Recovery (Overview) Recovery with the RESETLOGS Option Performing Recovery, Part I RMAN Recovery in NOARCHIVELOG Mode Performing Complete Recovery (of critical and noncritical data files) Restoring ASM Disk Groups Recovery with Image Files Performing Point-in-Time (PITR) or Incomplete Recovery Performing Recovery, Part II Recovery of Server Parameter File, Control File (One and All) Redo Log File Loss and Recovery Password Authentication File Re-creation Index, Read-Only Tablespace, and Temp file Recovery Restoring the Database to a New Host Disaster Recovery Restoring RMAN Encrypted Backups RMAN and Oracle Secure Backup Oracle Secure Backup Overview and Interface Options RMAN and OSB: Overview and Basic Process Flow Starting with Oracle Secure Backup Configuring Oracle Secure Backup for RMAN RMAN Backup and Restore Operations Oracle Secure Backup Jobs Displaying OSB log files and transcripts for RMAN activities Using Flashback Technologies Flashback Technology: Overview and Setup Using Flashback Technology to Query Data Flashback Table Flashback Transaction (Query and Back out) Flashback Drop and the Recycle Bin Flashback Data Archive Using Flashback Database Flashback Database Architecture Configuring Flashback Database Performing Flashback Database Best Practices for Flashback Database Transporting Data Transporting Data Across Platforms Transporting Data with Backup Sets Database Transport: Using Data Files Performing Point-in-Time Recovery When to use TSPITR TSPITR Architecture Performing RMAN TS Point-in-time Recovery Recovering Tables from Backups Duplicating a Database Using a Duplicate Database Duplicating Database with 'push' and 'pull' techniques Choosing Database Duplication Techniques Creating a Backup-up Based Duplicate Database Understanding the RMAN Duplication Operation RMAN Troubleshooting and Tuning Interpreting RMAN Message Output Tuning Principles Diagnosing Performance Bottlenecks RMAN Multiplexing Restore and Recovery Performance Best Practices Cloud Tooling for Backup and Recovery Backup Destinations Customize Backup Configuration On-Demand Backup and Recovery Oracle Backup Cloud Service Installing the Backup Module Backup and Recovery Workshop Workshop Structure and Approach Business Requirements for Database Availability and Procedures Diagnosing the Failures
Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders engaged in improving the delivery of products and services that meet user needs through the use of Microsoft SharePoint; Anyone who wants to improve their Business Analysis skills; Project stakeholders concerned with SharePoint requirements. Overview Plan, manage and close requirements for a project in reduced time using good business analysis practices Minimize project uncertainty and risk by applying good techniques Ensure your project delivers required functionality and adds value to the business Create an environment of self-management for your team that will be able to continuously align the delivered product or services with desired business needs, easily adapting to changing requirements throughout the process. Requirements can change frequently during a SharePoint project, and therefore projects need a streamlined, flexible approach to requirements change management. SharePoint professionals want to develop systems and services which are both high-quality and high-value, and the easiest way to achieve this is to implement the highest priority requirements first. This enables the projects to maximize value for their stakeholders. Introduction ? Roles involved in a SharePoint project The opportunities and challenges of a SharePoint project The business analysis process BA role vs. project manager role BA / PM competencies Case Study Exercise Understanding SharePoint Requirements Business, User, Functional, Quality-of-service and implementation requirements Requirements vs. specifications Requirements vs. business rules Risk management and risk response strategies Analyzing requirements Characteristics of effective requirements Case Study Exercise SharePoint Requirements Modeling Identify high level scope Identify initial requirements stack Identify an architectural vision Plan your iteration Iteration modeling Model storming Test driven development Case Study Exercise The Change Management Process Managing the Solution Scope and Requirements Capturing the Requirements Traceability Maintaining the Requirements for re-use Managing Requirements Conflicts Preparing the Requirements Package Building the Requirements communications plan Case Study Exercise Assessing & Validating Requirements Validating and verifying SharePoint Requirements Creating a master test plan Create test scenarios and test cases Case Study Exercise Additional Information Useful books and links on managing requirements and projects for SharePoint initiatives
Duration 2 Days 12 CPD hours This course is intended for The audience for B2B Commerce Developer is any individual who will participate in a new implementation who needs working knowledge and experience with B2B Commerce technical components. Attendees should have intermediate skills in: Object Oriented Programming (Apex or Java) Full-Stack Development (VisualForce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships)This class is designed for individuals responsible for implementing the technical components of a new B2B Commerce Cloud storefront. You should have some experience with the following: Object-oriented programming (Apex or Java) Full-stack development (Visualforce, JavaScript, CSS and REST APIs, JSON, Handlebars, and jQuery) Salesforce Administration (Sharing Rules, Process Builder, and Object Relationships) Overview Identify where and what events require code extension. Effectively navigate and configure in B2B Commerce on Classic Admin. Implement UI, Logic Class, and Service Class Overrides along with Subscriber Code Integration. Create your own B2B Commerce on Classic solution and troubleshoot problem areas during the development cycle. Take the next step toward a B2B Commerce Developer Accreditation. Explore the Salesforce B2B Commerce platform on Classic and discover how and when to extend your events with code. In this 2-day class, our B2B Commerce Cloud experts will walk you through how to use code to customize the UI and extend functionality in your B2B Commerce Cloud on Classic storefront so you can deliver a buyer experience that satisfies your organization?s unique requirements. Technical Overview Review Key Terms Understand B2B Commerce on Classic Architecture and Technology Stack Take a Tour of the UI Understand B2C Commerce Cloud on Classic Admin Configuration vs. Code Extension Storefront Overview Implement B2B Commerce on Classic Create a Storefront Load Data Enable Buyers User Interface Review UI Best Practices Familiarize Yourself with Key Terms Explore UI Themes Customize UI Layouts Use Subscriber Templates Use Page Includes Manage Subscriber Pages Extensions Override Handlebars Extend My Account Extend B2B Commerce Checkout Flow Explore Global JavaScript Functions Understand B2B Commerce Event Handling Explore Handlebars Functions Explore Localization Functions Extend Utility Functions and Objects Extend Global Extension Points Core Capabilities Handle Cases Using Process Builder Configure Payment Types
Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation
We often find ourselves working in fast-paced matrix environments, working in/with virtual teams or simply trying to get something done by someone in another part of the business. This common aspect of our working lives has a common challenge: how to influence other people to help us or do something for us, when they don't report to us. Pulling rank or strong nudging might work once, but we need to build a supportive and collaborative relationship over the long term. What Does This Course Offer? Fortunately, there are really effective tips for influencing, and our program offers an influencing model in detail. Through activity and discussion we explore how you can apply these principles and use it when you need help from other people. Even when we are not in a leadership position it can sometimes be extremely difficult to get people's help, especially when we have no authority over them. This is where an approach and an influencing model can help us identify what we and other people value in a given influencing situation. We can then explore that information so that everyone can view and pursue a common purpose. This course will enhance and promote the skill set necessary for any leader or manager, allowing our in-depth influencing knowledge to be applied into your working environment. From an employer's perspective this award can be a significant long-term return on investment by developing your leaders and managers. Our learning experiences are successful because the outcomes are quickly embedded and demonstrate an immediate visible impact on the day-to-day working environment. Our engaging learning inspires employees to want to personally add value to the companies they work for. We also offer our Paradigm Trait-Map™ online assessment and report as a frame of reference for your own influencing styles and that of others. This assessment should be completed before attending the program, and will be expanded upon during the program delivery. Course Content The Influencing for Leadership and Management course covers the following topics: Two key influencing models that you can apply back in your daily work Different types of influencing How to create the right environment for influencing Barriers you may face and how to overcome these barriers Accreditation Activity Our accredited tutors deliver training that encourages delegates to confidently and practically apply all they have learnt as soon as they get back into the business. To achieve this award, delegates need to prepare and deliver a 3 minute presentation* on the highlights of their learning and immediate application avenues when back in their working environment. *Participants will be given 30 minutes during the program to prepare for their 3 min presentation at the end of the program. Scheduled Course Dates Unfortunately this course is not currently scheduled as an open course as it is primarily run as an in-house programme. For more information, please contact us. In-House Courses This is our own management training course which has been developed and refined over the many years we have been providing it to delegates from organisations in virtually every industry. This means that the course syllabus is extremely flexible and can be tailored to your specific requirements. If you would like to discuss how we can tailor this management training course for you and/or run it at your premises, please contact us.
Duration 2 Days 12 CPD hours This course is intended for Todas aquellas personas que tengan relaci¢n con proyectos que requieran de una gesti¢n gil: Clientes, Promotores, Project Managers, Proveedores o Subcontratas, Equipo del Proyecto: Perfiles Tâcnicos, Perfiles de apoyo o Staff. En definitiva a cualquier persona que tenga relaci¢n con un proyecto gil. Overview Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?mâtodo??Desde finales del siglo pasado, se viene analizando la gesti¢n de proyectos cl sica conocida como Gesti¢n de Proyectos Predictiva, comprobando que no puede/debe ser aplicada a todo tipo de proyecto. Existen multitud de proyectos donde el nivel de detalle de las caracter¡sticas de los entregables est asociado al concepto IKIWISI (I?ll Know It When I See It -> Lo sabrâ cuando lo vea), otros proyectos que tienen muy bien definido el objetivo, pero dadas unas necesidades cambiantes, la manera de abordarlo puede ser bien diferente, otros proyectos que? En definitiva se ha puesto de manifiesto que la gesti¢n de proyectos predictiva, no es del todo til para estos tipos de proyecto. Durante este curso, analizaremos otra forma de hacer las cosas. Veremos c¢mo abordar estos otros tipos de proyectos que requieren de una gesti¢n diferente: una Gesti¢n µgil. Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?mâtodo?? Introducci¢n a Agile y Scrum Primeros conceptos Metodolog¡as µgiles Agile Manifesto y Principios µgiles ¨Quâ hay bajo el paraguas de Agile? Las 3 grandes aproximaciones a Agile: LEAN, XP y Scrum El entorno de trabajo µgil Roles µgiles Trabajando de forma gil Definir la Visi¢n del Producto Planificar la Release y los Sprints El trabajo del d¡a a d¡a La revisi¢n del producto Preparando la entrega Gestionando de forma gil Gesti¢n del Alcance y los Proveedores Gesti¢n de Tiempos y Costes Gesti¢n del Equipo y las Comunicaciones Gesti¢n de Riesgos y la Calidad Garantizando el âxito Construir una base s¢lida Impulsar el cambio