• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9342 Courses delivered Online

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V21.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Deploy and configure the NSX Advanced Load Balancer infrastructure within private or public clouds using Write and No-Access Cloud Connectors Explain, deploy, and configure Service Engines Explain and configure local load balancing constructs such as virtual services, pools, health monitors, and related components Explain and configure advanced virtual services and related concepts such as Subject Name Indication, Enhanced Virtual Hosting, and authentication of virtual services Explain and modify application behavior through profiles, policies, and DataScripts Describe Central licensing management using VMware NSX Advanced Load Balancer Enterprise with Cloud services (formerly Avi Pulse) Explain how to configure Role-Based Access Control (RBAC) in NSX Advanced Load Balancer Configure advanced services such as global server load balancing Describe how to use NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of applications that use built-in NSX Advanced Load Balancer tooling Identify the key features of VMware NSX Network Detection and Response This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer (Avi Networks) solution. This course covers key NSX Advanced Load Balancer (Avi Networks) features and functionality offered in the NSX Advanced Load Balancer 21.x release. Features include the overall infrastructure, virtual services, application components, global server load balancing, various cloud connectors, application troubleshooting, and solution monitoring. Hands-on labs provide access to a software-defined data center environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain virtual service components Explain virtual service types Explain and configure basic virtual service components such as application profiles and network profiles Virtual Services Configuration Advanced Concepts Explain the virtual service advanced components such as Wildcard VIP, Server Name Identification (SNI), and Enhanced Virtual Hosting (EVH) Explain the concept of virtual service VIP Sharing Explain different authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Profiles and Policies Explain application profiles and types such as L4, DNS, Syslog, HTTP, and VMware Horizon VDI Explain and configure advanced application HTTP profile options Describe network profiles and types Explain and configure SSL profiles and certificates Explain and configure HTTP, network, and DNS policies Pools Configuration Concepts Explain pools configuration options Describe the available load balancing algorithms Explain multiple health monitor types Explain multiple Persistence profiles Explain and configure pool groups Modifying Application Behavior Design and apply application solutions by using application profiles Design and apply application solutions by using network, HTTP policies, and DataScripts Explain DataScript fundamentals Explain and use NSX Advanced Load Balancer analytics to understand application behavior Describe and configure client SSL certificate validation Describe and configure virtual service DDoS, Rate limiting, and Throttling capabilities Modify network profile properties such as TCP connection properties Design and apply application solutions by using Persistence profiles NSX Advanced Load Balancer Infrastructure Architecture Explain management, control, data, and consumption planes and functions Describe control plane clustering and high availability Describe controller sizing and process sharing Describe Service Engine CPU and NIC architecture Explain tenants Configure properties of Service Engine groups Explain Service Engine group high availability modes Describe and configure active-standby high availability mode Explain Service Engine placement in multiple availability zones for public clouds Describe and configure elastic HA high availability mode (Active-Active, N+M) Explain Service Engine failure detection and self-healing Describe Service Engine as a router Explain virtual service scale-out options such as Layer 2 (Native), Layer 3 (BGP), and DNS-based Describe how to upgrade NSX Advanced Load Balancer Introduction to Cloud Connector Explain cloud connectors Review cloud connector integration modes List cloud connector types Review the different Service Engine image types in different ecosystems Installing, Configuring, and Managing NSX Advanced Load Balancer in No-Orchestrator Cloud Explain No-Access cloud concepts Configure No-Access cloud integration on bare metal Explain and configure Linux Server Cloud Explain and configure VMware No Orchestrator Describe the advanced configuration options available in bare metal (Linux Server Cloud) Installing, Configuring, and Managing NSX Advanced Load Balancer in VMware Environment: Cloud Configuration Introduce VMware integration options Explain and configure VMware Write Access Cloud Connector Explain NSX Advanced Load Balancer integration options in a VMware NSX environment Explain and configure NSX Cloud Connector for Overlay and VLAN-backed segments AWS Cloud Configuration Describe NSX Advanced Load Balancer public cloud integrations Explain different AWS components Explain and demonstrate AWS public cloud integration Deploy VMware NSX Advanced Load Balancer Controller, SEs, and virtual services in AWS Cloud Review Multi-AZ Support for virtual services in AWS cloud GCP Cloud Configuration Explain different GCP components Explain and demonstrate GCP public cloud integration Deploy NSX Advanced Load Balancer Controller, SEs, and virtual services in GCP cloud Azure Cloud Configuration Describe NSX Advanced Load Balancer public cloud integrations Explain different Microsoft Azure components Explain and demonstrate Azure public cloud integration Deploy NSX Advanced Load Balancer Controller, SEs, and virtual services in Azure Cloud NSX Advanced Load Balancer Enterprise with Cloud Services (Avi Pulse) Describe NSX Advanced Load Balancer public cloud services Explain different features of NSX Advanced Load Balancer Cloud Services Register the controller with Cloud Services DNS Foundations Review, discuss, and explain DNS fundamentals Describe NSX Advanced Load Balancer DNS and IPAM providers Global Server Load Balancing (GSLB) Introduce Global Server load balancing concepts and benefits Explain and configure the NSX Advanced Load Balancer infrastructure Explain and configure the DNS Virtual Service components Explain and configure GSLB Service Engine Group Describe and configure GSLB sites Explain and configure basic GSLB services to include pools and health monitors Describe GSLB Server Load Balancing algorithms Explain and configure health monitors based on data plane and control plane Describe GSLB Health Monitor Proxy Explain GSLB Site-Cookie Persistence Explain the different GSLB replication methods Role-Based Access Control (RBAC) Introduce local authentication in NSX Advanced Load Balancer Introduce remote authentication in NSX Advanced Load Balancer Review the different types of remote authentication Explain granular RBAC using labels NSX Advanced Load Balancer: Troubleshooting Introduce infrastructure and application troubleshooting concepts Describe troubleshooting based on control plane and data plane Explain application analytics and logs Describe client logs analysis Explain headers troubleshooting and packet capture mechanism Describe how to use CLI for detailed data plane troubleshooting Explain Service Engine logs Explain health monitors troubleshooting Explain BGP session troubleshooting Describe control plane troubleshooting, clustering, and cloud connector issues Events and Alerts Describe NSX Advanced Load Balancer events Describe and configure NSX Advanced Load Balancer alerts Describe NSX Advanced Load Balancer monitoring capabilities with SNMP, Syslog, and Email Introduction to NSX Advanced Load Balancer Rest API Introduce the NSX Advanced Load Balancer REST API interface Describe REST API Object Schema Explain and interact with REST API interface with

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V21.x]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture, components, and main functions Explain the key features and benefits of NSX Advanced Load Balancer Explain and configure local load-balancing constructs such as virtual services, pools, health monitors, and related components Recognize web application breaches and threats Recognize multiple attack vectors such as web scraping, Layer 7 Denial of Service, brute force, and code injections Explain the components of NSX Advanced Load Balancer WAF that build a security pipeline to protect a web application from being attacked Describe how to configure the NSX Advanced Load Balancer WAF components Describe an NSX Advanced Load Balancer WAF operational task such as setting up an application with WAF, tuning the WAF Policy, and working with logs and analytics Explain the NSX Advanced Load Balancer WAF best practices for on-boarding a web application; configuring WAF settings for effective application security Explain how to size the NSX Advanced Load Balancer WAF data plane Explain the WAF Application learning feature, configuration of Application learning, Virtual Patching concepts, common caveats, and troubleshooting while deploying in any environment Recognize NSX Advanced Load Balancer Cloud Services that include threat Intelligence services Describe the Threat Intelligence service provided by NSX Advanced Load Balancer WAF and how the NSX Advanced Load Balancer WAF Threat Intelligence service receives live security threat feed for multiple attack vectors from Cloud Services (formerly Avi Pulse) Describe the NSX Advanced Load Balancer DataScript capabilities for detecting and defending against advance and zero-day attacks. Discuss the relevant NSX Advanced Load Balancer WAF logs and perform basic troubleshooting of applications that are protected by NSX Advanced Load Balancer WAF Explain the NSX Advanced Load Balancer WAF capability to protect Personally Identifiable Information (PII) This three-day course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer Web Application Firewall (WAF) solution. This course covers key NSX Advanced Load Balancer WAF features and functionality offered in the NSX Advanced Load Balancer 22.1.3 release for web security and application attack protection. Features include security pipeline, application learning, policy tuning, false positive mitigation, virtual patching, threat intelligence, troubleshooting, logs, analytics, and solution monitoring. Hands-on labs provide access to an NSX Advanced Load Balancer environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Illustrate NSX Advanced Load Balancer Explain NSX Advanced Load Balancer architecture and components Describe control plane clustering and high availability Describe data plane high availability mode Understand the common terminologies used with NSX Advanced Load Balancer Explain the NSX Advanced Load Balancer service elements Explain virtual service components and how to configure a virtual service Explain application profiles and network profiles Explain the pool configuration options and how to configure a pool Explain the available load-balancing algorithms Explain and configure SSL profiles and certificates Explain cloud connectors and cloud connector integration modes Explain multiple health monitor types Understand client logs Introduction to Application Security Understand web application security breaches and the implication of breaches Explain common terminologies related to Web Application Security Understand the different teams involved to secure applications Attacking Web Applications Understand the various web application security testing methodologies Understand the OWASP Top 10 vulnerabilities Understand the tools to generate a web application attack Describe a few types of web application attacks Types of Transport Understand different web traffic transport modes Describe web traffic and API traffic NSX Advanced Load Balancer WAF Components Understand the core design principles of NSX Advanced Load Balancer WAF Describe the NSX Advanced Load Balancer WAF components that build the WAF security pipeline Understand the NSX Advanced Load Balancer WAF configuration objects NSX Advanced Load Balancer WAF Operations Examine how to set up an application with WAF Describe considerations for the WAF policy Work with WAF logs and analytics Describe WAF policy tuning Describe the options available to remediate false positive mitigation NSX Advanced Load Balancer WAF Best Practices Describe technical and application considerations for onboarding an application front ended by WAF Describe best practices to remediate false positive mitigation. Describe how to manage a response from a back-end application server and client upload to the application server Describe the consideration for setting the rigidity of a WAF signature rule set Describe the options available to identify client traffic NSX Advanced Load Balancer WAF Sizing Understand how to do WAF data plane sizing in Greenfield and Brownfield deployments NSX Advanced Load Balancer WAF Custom Rules Understand WAF custom rules Describe the need and recommendation for custom rules Describe ModSecurity rules Understand the ModSecurity rule structure and explain how to construct the rule Analyze a sample custom rule for the use-case scenario for in-depth understanding of a custom rule NSX Advanced Load Balancer WAF Application Learning Understand the significance of Application Learning Explain the Positive Security Model architecture Describe the WAF multifaceted Application Learning technique to build an application model for creating positive security rules Describe how to view the data that is learned by the Application learning module Describe the WAF Virtual Patching technique to construct a WAF policy from Dynamic Application Security Testing (DAST) scanner results Understand the conditions for sharing WAF Learning Data and PSM Group in WAF Policy. Malware Protection Through ICAP in NSX Advanced Load Balancer Understand Malicious File Upload Protection and ICAP workflow Describe ICAP configuration and log analytics NSX Advanced Load Balancer IP Reputation Understand IP Reputation concepts and their integration with NSX Advanced Load Balancer Describe IP Reputation configuration, log analytics, and troubleshooting DataScript for Application Security Describe DataScript events and reference Describe application security using DataScript Explain how to troubleshoot DataScript issues Rate Limiting and DOS Describe and configure the NSX Advanced Load Balancer rate limiter technique Describe protection from denial of service (DoS) attacks and distributed DoS (DDoS) attacks in NSX Advanced Load Balancer Explain the Service Engine general advice and guidance for DDOS Bot Management Understand Bots Describe the Bot Management mechanism in NSX Advanced Load Balancer Describe how to configure NSX Advanced Load Balancer Bot Management Managing Personally Identifiable Information in NSX Advanced Load Balancer Understand Personally Identifiable Information (PII) Understand the scope of managing PII in NSX Advanced Load Balancer Describe how to configure the hidden PII in NSX Advanced Load Balancer logs using profiles and WAF rules. Threat Intelligence Introduce the Threat Intelligence service Describe the Threat Intelligence live security threat feed for multiple attack vectors Describe how to configure Threat Intelligence in NSX Advanced Load Balancer Application Programming Interface Security Define Application Programming Interface (API) Security Understand API authentication and authorization using virtual service authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Understand API Rate Limiting in NSX Advanced Load Balancer Understand the NSX Advanced Load Balancer WAF Protection for API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Mental health in the workplace (In-House)

By The In House Training Company

This is a one-day training event to help you: Develop your awareness of mental health issues in the workplace Enable you to act in a timely and constructive way to manage mental health issues that arise in the workplace Enable you to promote and maintain good mental health in your working environment It covers: Mental health statistical overview; most prevalent mental health problems, contributing factors, effects on productivity and the costs of mental ill-health Signs and symptoms of prevalent mental health conditions; 3 key indicators for all mental health problems Stigma; what it is and how it affects people Mental health legal and statistical overview: facts & figures, most prevalent mental health problems, aspects of the law, policy and procedural issues and guidelines for best practice Pro-active and constructive principles and strategies to manage mental health issues, to support colleagues who may be vulnerable to mental ill-health, and promote mental wellbeing This workshop will give you: Awareness of the key indications of mental ill-health Recognition of the prevalence and effects of stigma Knowledge of the wider picture; legal context Greater understanding and confidence to act constructively to support individuals who are vulnerable to mental ill-health The ability to take steps to actively promote mental-well-being in the workplace

Mental health in the workplace (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Introduction to procurement (In-House)

By The In House Training Company

This very practical one-day programme provides participants with the skills and knowledge required to be an effective member of the procurement team and to enable them to procure a wide range of resources for the organisation, in a compliant and cost-effective manner. It also empowers them to be able to collaborate with all key stakeholders. By the end of the programme participants will be able to: Understand the basic concepts of good procurement practice Apply a range of tools and techniques for developing scopes of work and specifications Apply various methods to select and evaluate suppliers Develop robust contract award strategies Appreciate the commercial importance of effective procurement and opportunities to reduce cost and add value Develop appropriate procurement strategies depending on risk and value Appreciate the legal aspects of procurement 1 Welcome Introductions Aims and objectives Plan for the day 2 The basics of procurement The concept of total cost of ownership v price The procurement cycle The roles of the customer and the contractor Impact upon profit 3 Specification process Importance of effective specifications Specification development process Types of specification Team approach Use of performance specifications Early supplier involvement (ESI) / early contractor involvement (ECI) 4 Quality Concepts and practices Defining 'fit for purpose' Conformance to requirements Compliance to standards Role of the supplier Quality assurance tools and techniques 5 Procurement methods RFP RFQ ITT Negotiated procurement Strategic partnerships Outsourcing 6 Tendering How to undertake a formal tendering process Business case to award Critical stages in the process Risks and benefits 7 Tender evaluation How to undertake a quotation analysis Tools of analysis Use of VFM models Role of the customer Comparisons around cost, quality, and delivery 8 Supplier selection and evaluation Developing critical selection criteria Using the 10Cs model Importance of effective selection process Weighting systems Importance of validity and evidence 9 Capital equipment procurement Life cycle cost issues Payback calculations Compatibility issues Maintenance and training issues After-sales support 10 Supplier relationships Corporate social responsibility issues Communication 360 feed-back Open and ethical Initial understanding Clear and fair terms and conditions 11 Close Review of key learning points Personal action planning

Introduction to procurement (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Control of contractors (In-House)

By The In House Training Company

If your organisation manages contractors then your staff need to understand the health and safety issues. This course is the answer. The expert trainer will set out clearly the legal responsibilities of all relevant parties and explore the practical application of these responsibilities with the course participants. The course will then examine the issues associated with the planning of work to be contracted out and the evaluation, selection, control and monitoring of contractors engaged to undertake the work. Although the main focus is on health and safety, the course will also explain how health and safety issues need to be integrated into your organisation's functional management processes to ensure effective control of contractors. The course will consider all types of contracted activities, including construction and maintenance, cleaning, security, plant installation, etc. This programme will give participants: A clear understanding of the organisation's legal responsibilities for managing contractors The information they need to assess the competence of contractors A practical understanding of risk assessment principles and the transfer of risk to contractors A step-by-step guide to the key aspects of managing contractors in practice, covering:Planning of the workSelecting contractorsHandover prior to work commencementDuring the workReviewing the work on completion Practical guidance on the integration of health and safety controls into organisational procedures for contractor management 1 Introduction Who are contractors? Why manage contractors? Different types of contractors Costs of poor contractor performance 2 Overview of health and safety law and liability Health and safety law and statutory duties Relevance of civil and criminal law Enforcement and prosecution 3 Relevant legislation for controlling contractors Health and Safety at Work Act 1974 Management of Health and Safety at Work Regulations 1999 Construction (Design and Management) Regulations 1994 (as amended, 2007) Other relevant legislation Contract law 4 Managing contractors in practice Exercise - how well is it happening? The objectives Five step approachPlanning of the workSelecting contractorsHandover prior to work commencementDuring the workReviewing the work on completion 5 Planning the work Scope and extent Risk assessment Interface and other activities Who controls what? Contract arrangements 6 Selecting the right contractor(s) Locating contractor organisations Selection the right contractors Assessing contractor competence Approved lists/frameworks Tender process 7 Pre-work commencement Co-ordination and co-operation Exchange of information Contractor risk assessments and method statements Permits to work Case study exercise 8 During contract work Communication and liaison Supervision and inspection of the work Inspection and reporting procedures Security issues Facilities and access 9 Reviewing work on completion Why, what and how? Achieving continuous improvement in contractor performance 10 Questions, discussion and review

Control of contractors (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Commercial awareness for project staff and engineers (In-House)

By The In House Training Company

Nowadays not only do we rely on our commercial and sales staff to hit that bottom line but we expect our engineers and project teams to play their part too - not only through their engineering and management skills but by behaving in a commercially minded way in their dealings with their counterparts in customer or supplier organisations. This means understanding, amongst other things, the issues surrounding the commencement of work ahead of contract, having a clear contract baseline, recognising the broader implications of contract change, the need for timeliness and the consequences of failing to meet the contracted timetable. This practical one-day programme has been designed specifically to give engineers, project staff and others just that understanding. The course is designed principally to provide engineers and project staff with an appreciation of contractual obligations, liabilities, rights and remedies so that they understand the implications of their actions. It is also suitable for business development staff who are negotiating contracts on behalf of the business. The main focus of the day is on creating an awareness of when a situation may have commercial implications that would harm an organisation's business interests if not recognised and handled appropriately and how taking a positive but more commercial approach to those situations can lead to a more positive outcome for the business. As well as providing an understanding of the commercial imperatives the day also focuses on specific areas affecting engineers and project staff, such as the recognition and management of change, the risks when working outside the contract and managing delays in contracts. The course identifies the different remedies that may apply according to the reasons for the delay and provides some thoughts on pushing back should such situations arise. On completion of this programme the participants will: appreciate the need for contractual controls and will have a better understanding of their relevance and how they can be applied, particularly the issues of starting work ahead of contract, implementing changes and inadvertently creating a binding contract by their behaviour; have gained an understanding of the terminology and procedural issues pertaining to contracting within a programme; and be more commercially aware and better equipped for their roles. 1 Basic contract law - bidding and contract formation Purpose of a contract Contract formation - the key elements required to create a legally binding agreement Completeness and enforceability Express and implied terms Conditions v warranties The use of, and issues arising from, standard forms of sale and purchase Use of 'subject to contract' Letters of intent Authority to commit 2 Change management Recognising changes to a contracted requirement Pricing change Implementation and management of change 3 Key contracting terms and conditions By the end of this module participants will be able to identify the key principles associated with: Pricing Getting paid and retaining payment Cashflow Delivery and acceptance Programme delaysExamining some reasons for non-performance...Customer failureContractor's failureNo fault delays ... and the consequences of non-performance: Damages claimsLiquidated damagesForce majeureContinued performance Waiver clauses and recent case law Use of best/reasonable endeavours Contract termination 4 Warranties, indemnities and liability Express and implied warranties Limiting liability 5 Protection of information Forms of intellectual property Background/foreground intellectual property Marking intellectual property Intellectual property rights Copyright Software Confidentiality agreements Internet

Commercial awareness for project staff and engineers (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Finance for project managers and engineers (In-House)

By The In House Training Company

What do engineers and project managers need to know of finance? 'Nothing - leave it to the accountants!' No, no, no! Engineers must be conversant with the terminology and statements that accountants use. Technical expertise in projects, service delivery, production or other areas can only really be harnessed if the managers understand the accounting and reporting that drives businesses. This course gives the necessary understanding to project, production and technical managers. It develops their skills in understanding financial and management accounting. Accountants may not always like it but a major part of their work is to be the 'servants of business' and to gather, compile and present your figures. So you must understand the figures - they belong to you, your processes or projects. There are many reasons for maintaining accurate accounts. This course focuses on the strategic issues (those over-used words) - what figures reveal about the drivers of business and what they reveal about the day-to-day issues that accountants bother you with. The course will enhance your understanding of finance and of the accounting issues which affect your projects, production and technical areas of business. This course will help you: Understand the business world in figures - make sense of what the accountants are telling you Appreciate what drives business - and how this affects your role in your part of the business Relate your activities to the success of the business - through figures Gain the skills to advance in management - financial awareness is a 'must have' if you are to progress in your career 1 What do accountants do? The finance function, types of accountant, financial v management accounting and the treasury function Understanding the role of the finance function and how the information you provide may be used 2 The basic financial statements Balance sheets and income statements (P&L accounts) What they are, what they contain and above all what they can reveal - how to read them The accounting process - from transactions to financial statements What underpins the statements - accounting systems and internal controls 3 Why be in business - from a financial perspective The driving forces behind financial information Performance measures - profitability, asset utilisation, sales and throughput, managing capital expenditure 4 Accounting rules - accounting standards Accounting concepts and the accounting rules: accruals, 'going concern' - substance over form and other 'desirable qualities' Accruals - why the timing of a transaction is so important to the finance function Depreciation and amortisation - the concepts and practice Accounting standards - the role of International Financial Reporting Standards 5 Cash The importance of cash flow - working capital management Cash flow statements - monitoring overall cash flows Raising cash - levels of borrowing, gearing Spending cash - an outline of capital expenditure appraisal 6 Budgeting Why budget? - good and bad practice Determining why budgets play a key role and should not be simply an annual ritual Justifying your budgets - the link between the strategic plan and day-to-day budgeting - alignment of company culture Budgets as motivators - the importance of the right culture Techniques to improve budgeting - whether day-to-day or capital budgeting 7 Costing The type and detail of costing very much depends on your business - eg, manufacturing piston rings is quite different from the construction of a power plant Issues with overhead allocation Accounting for R&D 8 Reading financial statements Annual financial statements - why they are produced, what's in them and what you should look for Learning what a set of accounts reveals about a company's current situation, profitability and future prospects 9 Performance measurement - analytical reviews and ratio analysis ROI/ROCE Profitability, margins and cost control Sales - asset turnover Efficiency (asset / stock turnover, debtor / creditor days) 'City' measures Investment (interest / dividend cover, earnings per share, dividend yield)

Finance for project managers and engineers (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Free online MS Awareness training

4.5(58)

By MS-UK

Free online MS Awareness training session for professionals

Free online MS Awareness training
Delivered OnlineFlexible Dates
FREE

Software management - the business perspective (In-House)

By The In House Training Company

Software comes in a variety of guises - application software, firmware, middleware, system software. Increasingly, however, it doesn't necessarily present that way, especially as the boundaries between software, data and source code are becoming more and more blurred. And as software becomes more complex and more difficult to disentangle, so it becomes harder to manage and to value. But as it becomes more integral to every aspect of a business, so it is ever more important to keep on top of the technical, legal and commercial issues that arise, issues such as: To address these issues, organisations need a process for evaluating their current situation from all perspectives and for identifying the key actions they need to take to ensure holistic management of their software. This very practical programme will help set your organisation on the right path. Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. This programme is designed to give you a deeper understanding of: The technical, legal and commercial risks associated with software development, procurement, use and commercial exploitation The most appropriate processes and responsibilities for managing those risks Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. 1 Software business model What is the software business model? What options exist? Has the software business model been thoroughly reviewed to ensure its viability? This means fully understanding the market opportunity, the business environment and customer and end-user expectations. 2 Technology What are the technologies? How has the technology selection been validated considering the competitiveness, structure, and potential for future innovation? 3 UI and UX What is the UI and UX? How to best articulate this? Has the user interface and user experience been studied from both a subjective and objective view to give insight into customer behaviour? 4 Legal framework / commercial aspects Has the necessary legal framework or commercial aspects that may impact upon use or operation of the software been understood and risks identified and mitigated? 5 Software development What is the software development process? Are both the business management and development team's processes resilient in order to improve the company's capability and the maturity of the software? 6 Software quality What is quality? What are the metrics around software quality? What is the maturity level, based around a qualitative and quantitative assessment? 7 Intellectual property associated What IP should be considered when it comes to software? Does the company understand both the intellectual property risks and potential opportunities associated with this software? 8 Security What does software security mean in this context? How is it being addressed? 9 An holistic approach Review of roles and responsibilities to ensure appropriate management and protection

Software management - the business perspective (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Credit control training 'menu' (In-House)

By The In House Training Company

This is not a single course but a set of menu options from which you can 'pick and mix' to create a draft programme yourself, as a discussion document which we can then fine-tune with you. For a day's training course, simply consider your objectives, select six hours' worth of modules and let us do the fine-tuning so that you get the best possible training result. Consider your objectives carefully for maximum benefit from the course. Is the training for new or experienced credit control staff? Are there specific issues to be addressed within your particular sector (eg, housing, education, utilities, etc)? Do your staff need to know more about the legal issues? Or would a practical demonstration of effective telephone tactics be more useful to them? Menu Rather than a generic course outline, the expert trainer has prepared a training 'menu' from which you can select those topics of most relevance to your organisation. We can then work with you to tailor a programme that will meet your specific objectives. Advanced credit control skills for supervisors - 1⁄2 day Basic legal overview: do's and don'ts of debt recovery - 2 hours Body language in the credit and debt sphere - 1⁄2 day County Court suing and enforcement - 1⁄2 day Credit checking and assessment - 1 hour Customer visits and 'face to face' debt recovery skills - 1⁄2 day Data Protection Act explained - 1⁄2 day Dealing with 'Caring Agencies' and third parties - 1 hour Debt counselling skills - 2 hours Elementary credit control skills for new staff - 1⁄2 day Granting credit and collecting debt in Europe - 1⁄2 day Identifying debtors by 'type' to handle them accurately - 1 hour Insolvency: Understanding bankruptcy / receivership / administration / winding-up / liquidation / CVAs and IVAs - 2 hours Late Payment of Commercial Debts Interest Act explained - 2 hours Liaison with sales and other departments for maximum credit effectiveness - 1 hour Suing in Scottish Courts (Small Claims and Summary Cause) - 1⁄2 day Telephone techniques for successful debt collection - 11⁄2 hours Terms and conditions of business with regard to credit and debt - 2 hours Tracing 'gone away' debtors (both corporate and individual) - 11⁄2 hours What to do if you/your organisation are sued - 1⁄2 day Other topics you might wish to consider could include: Assessment of new customers as debtor risks Attachment of Earnings Orders Bailiffs and how to make them work for you Benefit overpayments and how to recover them Cash flow problems (business) Charging Orders over property/assets Credit policy: how to write one Council and Local Authority debt recovery Consumer Credit Act debt issues Using debt collection agencies Director's or personal guarantees Domestic debt collection by telephone Exports (world-wide) and payment for Emergency debt recovery measures Education Sector debt recovery Forms used in credit control Factoring of sales invoices Finance Sector debt recovery needs Third Party Debt Orders (Enforcement) Government departments (collection from) Harassment (what it is - and what it is not) Health sector debt recovery skills Hardship (members of the public) Insolvency and the Insolvency Act In-house collection agency (how to set up) Instalments: getting offers which are kept Judgment (explanation of types) Keeping customers while collecting the debt Late payment penalties and sanctions Letter writing for debt recovery Major companies as debtors Members of the public as debtors Monitoring of major debtors and risks Negotiation skills for debt recovery Old debts and how to collect them Out of hours telephone calls and visits Office of Fair Trading and collections Oral Examination (Enforcement) Pro-active telephone collection Parents of young debtors Partnerships as debtors Positive language in debt recovery Pre-litigation checking skills Power listening skills Questions to solicit information Retention of title and 'Romalpa' clauses Sale of Goods Act explained Salesmen and debt recovery Sheriffs to enforce your judgment Students as debtors Statutory demands for payment Small companies (collection from) Sundry debts (collection of) Terms and Conditions of Contract Tracing 'gone away' debtors The telephone bureau and credit control Taking away reasons not to pay Train the trainer skills Utility collection needs Visits for collection and recovery Warrant of execution (enforcement)

Credit control training 'menu' (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry