• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1317 FEEL courses in Nottingham delivered Live Online

MB-910T00 Microsoft Certified: Dynamics 365 Fundamentals (CRM)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for People in different roles and at various stages in their careers can benefit from this fundamentals course. This includes IT professionals, business stakeholders and others who want to be exposed to the customer engagement capabilities of Dynamics 365, students, recent graduates, and people changing careers who want to leverage Dynamics 365 to move to the next level. Overview Describe the customer engagement apps and what they have in common Describe the standard marketing processes and how Dynamics 365 Marketing addresses them Describe Dynamics 365 Marketing features and capabilities Describe additional marketing apps Describe the standard sales processes and how Dynamics 365 Sales addresses them Describe Dynamics 365 Sales capabilities Describe additional sales apps such as Sales Insights and Sales Navigator Describe the standard customer service processes and how Dynamics 365 Customer Serviceaddresses them Describe Dynamics Customer Service capabilities Describe additional sales apps such as Sales Insights and Sales Navigator Describe the standard field service business processes and how Dynamics 365 Field Service addresses Describe how to generate Work Orders Describe the scheduling capabilities of Dynamics 365 Field Service Describe the inventory management capabilities of Dynamics 365 Field Service Describe the asset management capabilities of Dynamics 365 Field Service Describe project-based customer engagement processes addressed by Dynamics 365 Project Operations Describe the sales capabilities of Dynamics 365 Project Operations Describe the project management capabilities of Dynamics 365 Project Operations Describe the resource utilization capabilities of Dynamics 365 Project Operations This course will provide you with a broad introduction to the customer engagement capabilities of Dynamics 365. You will become familiar with the concept of customer engagement, as well as each of the customer engagement apps, including Dynamics 365 Marketing, Dynamics 365 Sales, Dynamics 365 Customer Service, Dynamics 365 Field Service, and the customer relationship management (CRM) capabilities of Dynamics 365 Project Operations. This course will include lecture as well as hands-on labs. Learn the Fundamentals of Dynamics 365 Marketing Get introduced to the Dynamics 365 customer engagement apps Examine Dynamics 365 Marketing Describe Dynamics 365 Marketing capabilities Review Additional Marketing Apps Learn the Fundamentals of Dynamics 365 Sales Explore Dynamics 365 Sales Manage the sales lifecycle with Dynamics 365 Sales Review additional sales apps Learn the Fundamentals of Dynamics 365 Customer Service Examine Dynamics 365 Customer Service Describe Dynamics Customer Service capabilities Review additional customer service apps Learn the Fundamentals of Dynamics 365 Field Service Examine Dynamics Field Service Generate Work Orders in Dynamics 365 Field Service Describe the scheduling capabilities of Dynamics 365 Field Service Examine the inventory management capabilities of Dynamics 365 Field Service Review the asset management capabilities of Dynamics 365 Field Service Learn the Fundamentals of Dynamics 365 Project Operations (CRM) Examine Dynamics 365 Project Operations Describe the sales capabilities of Dynamics 365 Project Operations Plan projects with Dynamics 365 Project Operations Review the resource utilization capabilities of Dynamics 365 Project Operations Additional course details: Nexus Humans MB-910T00 Microsoft Dynamics 365 Fundamentals (CRM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-910T00 Microsoft Dynamics 365 Fundamentals (CRM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-910T00 Microsoft Certified: Dynamics 365 Fundamentals (CRM)
Delivered OnlineFlexible Dates
£1,190

This one-day or Two Session workshop will focus on a key but often ignored communication skill: Focused Listening.

Effective Listening
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£534

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

24-hour Postural Care: Hands on training for the postural care workforce

5.0(1)

By Born at the Right Time

24-hour postural care CPD training ,focussing on supported lying for hands-on workforce.

24-hour Postural Care: Hands on training for the postural care workforce
Delivered OnlineFlexible Dates
£80

VMware Horizon: Deploy and Manage [V8.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Tier 1 Operators, administrators, and architects for VMware Horizon Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of VMware Horizon Define a use case for your virtual desktop and application infrastructure Use vSphere to create VMs to be used as desktops for VMware Horizon Create and optimize Windows VMs to create VMware Horizon desktops Install and Configure Horizon Agent on a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure and manage the VMware Horizon Client systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the VMware Horizon environment using the VMware Horizon Console Dashboard and Horizon Help Desk Tool Identify VMware Horizon Connection Server installation, architecture, and requirements Describe the authentication and certificate options for the VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access™ and Horizon 8 Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in Horizon 8 Discuss scalability options available in Horizon 8 Describe different security options for the Horizon environment This five-day course gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon Introduction to Use Case Convert customer requirements to use-case attributes Define a use case for your virtual desktop and application infrastructure vSphere for VMware Horizon Explain basic virtualization concepts Use VMware vSphere© Client? to access your VMware vCenter System and VMware ESXi? hosts Create a Windows virtual machine using vSphere Create Windows Desktops Outline the steps to install Horizon Agent on Windows virtual machines Install Horizon Agent on a Windows virtual Machine Optimize and prepare Windows virtual machines to set up Horizon desktop VMs Create Linux Desktops Create a Linux VM for Horizon Install Horizon Agent on a Linux virtual machine Optimize and prepare Linux virtual machines to set up Horizon desktop VMs Creating and Managing Desktop Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access the Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of Remote Desktop Session Host farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Monitor the performance of the remote desktop using the Horizon Performance Tracker Horizon Connection Server Recognize the VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD LDS database as a critical {an important component?} component of the Horizon Connection Server installation Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe the BLAST Display Protocol Codecs Summarize the BLAST Codec options List the ideal applications for each BLAST codec Describe the BLAST and PCoIP ADMX GPO common configurations Graphics in Horizon Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a Horizon environment Securing Connections: Network Compare tunnels and direct connections for client access to desktops Discuss the benefits of using Unified Access Gateway List the Unified Access Gateway firewall rules Configure TLS certificates in Horizon Securing Connections: Authentication Compare the authentication options that Horizon Connection Server supports Restrict access to the Horizon remote desktops using restricted entitlements Describe the smart card authentication methods that Horizon Connection Server supports Explain the purpose of permissions, roles, and privileges in VMware Horizon Create custom roles Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a Horizon environment Configure a load balancer for use in a Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication. Explain Horizon Cloud Pod Architecture scalability options Horizon Cloud and Universal Broker Recognize the features and benefits of Horizon Cloud Service Use Universal broker to connect to a Horizon Cloud instance Configure and pair the Horizon Cloud Connector appliance with Horizon Connection Server Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the requirements to install and configure True SSO in a Horizon environment Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon: Deploy and Manage [V8.8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon: Deploy and Manage [V8.8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon: Deploy and Manage [V8.8]
Delivered OnlineFlexible Dates
£4,250

Effective Interpersonal Communication for Business Professionals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The typical students of this course will be business professionals who want to enhance their communication skills to interact more effectively with superiors, colleagues, team members, customers, and vendors, and ultimately improve their overall job performance. Overview Interact productively with others in the workplace on a day-to-day basis. Build positive relationships with diverse individuals. Consider organizational communication systems. Communicate with peers. Communicate with supervisors. Communicate with external people. Communicate during conflict and change. To be successful in the workplace, you must be able to effectively communicate and cooperate with coworkers and external people. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. Prerequisites To ensure your success in this course, you should have some level of work experience in any of a variety of organizational settings. 1. Interacting with Others Topic A- Understand the Communication Process Topic B- Apply Core Communication Skills Topic C- Observe Nonverbal Communication 2. Building Positive Relationships Topic A- Create Connection Topic B- Adapt Appropriately to Different Communication Styles Topic C- Accommodate Diversity 3. Considering Organizational Communication Systems Topic A- Analyze Organizational Culture Topic B- Ensure Communication Flows Effectively 4. Communicating with Peers Topic A- Interact Effectively with Peers Topic B- Work Productively in a Group Topic C- Engage in Productive Meetings Topic D- Lead a Team 5. Communicating with Supervisors Topic A- Communicate with Different Supervisor Styles Topic B- Discuss Important Topics with Your Supervisor 6. Communicating with External People Topic A- Interact Effectively with Customers Topic B- Work Productively with Vendors 7. Communicating During Conflict and Change Topic A- Communicate Through Conflict Topic B- Communicate Through Change Additional course details: Nexus Humans Effective Interpersonal Communication for Business Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Effective Interpersonal Communication for Business Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Effective Interpersonal Communication for Business Professionals
Delivered OnlineFlexible Dates
£435

AI-050T00 Develop Generative AI Solutions with Azure OpenAI Service

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course includes software developers and data scientists who need to use large language models for generative AI. Some programming experience is recommended, but the course will be valuable to anyone seeking to understand how the Azure OpenAI service can be used to implement generative AI solutions. Note Generative AI is a fast-evolving field of artificial intelligence, and the Azure OpenAI service is subject to frequent changes. The course materials are maintained to reflect the latest version of the service at the time of writing. Azure OpenAI Service provides access to OpenAI's powerful large language models such as GPT; the model behind the popular ChatGPT service. These models enable various natural language processing (NLP) solutions to understand, converse, and generate content. Users can access the service through REST APIs, SDKs, and Azure OpenAI Studio. In this course, you'll learn how to provision Azure OpenAI service, deploy models, and use them in generative AI applications. Prerequisites Familiarity with Azure and the Azure portal. Experience programming with C# or Python. 1 - Get started with Azure OpenAI Service Access Azure OpenAI Service Use Azure OpenAI Studio Explore types of generative AI models Deploy generative AI models Use prompts to get completions from models Test models in Azure OpenAI Studio's playgrounds 2 - Build natural language solutions with Azure OpenAI Service Integrate Azure OpenAI into your app Use Azure OpenAI REST API Use Azure OpenAI SDK 3 - Apply prompt engineering with Azure OpenAI Service Understand prompt engineering Write more effective prompts Provide context to improve accuracy 4 - Generate code with Azure OpenAI Service Construct code from natural language Complete code and assist the development process Fix bugs and improve your code 5 - Generate images with Azure OpenAI Service What is DALL-E? Explore DALL-E in Azure OpenAI Studio Use the Azure OpenAI REST API to consume DALL-E models 6 - Use your own data with Azure OpenAI Service Understand how to use your own data Add your own data source Chat with your model using your own data Additional course details: Nexus Humans AI-050T00: Develop Generative AI Solutions with Azure OpenAI Service training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI-050T00: Develop Generative AI Solutions with Azure OpenAI Service course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AI-050T00 Develop Generative AI Solutions with Azure OpenAI Service
Delivered OnlineFlexible Dates
£595

ITIL 4 Managing Professional - Drive Stakeholder Value (DSV) with Exam

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The target audience include, but is not limited to:   Relationship managers Customer experience (CX) managers Account managers Service delivery managers Service desk managers Service Level Managers Enterprise Architects Service and Solution Architects Business Analysts Product Owners Marketing Managers Project Managers Portfolio Managers Supplier relationship Managers Vendor Managers Contract Managers Customer experience/User experience Designers Consultants Overview The purpose of this course is to give the delegate the understanding to optimize the value of the journey for all stakeholders, for example, to convert opportunity and demand into value and to drive stakeholder value. Engagement is important in the optimization of service value because, as ITIL Foundation explained, service value is co-created through the involvement of users, customers, sponsors, service providers, or any other stakeholder. This course introduces ways and methods to drive stakeholder value and encourage stakeholders contribute to the creation of service value by exploring the following:   Value propositions Fostering relationships Keeping engagement channels open Shaping demand Designing service offerings Aligning and agreeing expectations Co-creating service experiences Realizing value This course covers key topics such as SLA design, multi-supplier management, communication, relationship management, CX and UX design, customer journey mapping, and more. It will provide candidates with the tools to increase stakeholder satisfaction which is integral to business success in the current competitive landscape. The associated certification exam voucher is included with this course. As an ITIL© Accredited Training Organization of PeopleCert, all students attending this training will be provided with the exam voucher as a part of delivery. How customer journeys are designed Understand the concept of the customer journey Understand the ways of designing and improving customer journeys How to target markets and stakeholders Understand the characteristics of markets Understand marketing activities and techniques Know how to describe customer needs and internal and external factors that affect these Know how to identify service providers and explain their value propositions How to foster stakeholder relationships Understand the concepts mutual readiness and maturity Understand the different supplier and partner relationship types, and how these are managed Know how to develop customer relationships Know how to analyze customer needs Know how to use communication and collaboration activities and techniques Know how the ?Relationship management? practice can be applied to enable and contribute to fostering relationships Know how the ?Supplier management? practice can be applied to enable and contribute to supplier and partner relationships management How to shape demand and define service offerings Understand methods for designing digital service experiences based on value driven, data driven and user centered service design Understand approaches for selling and obtaining service offerings Know how to capture, influence and manage demand and opportunities Know how to collect, specify and prioritize requirements from a diverse range of stakeholders Know how the ?Business analysis? practice can be applied to enable and contribute to requirement management and service design How to align expectations and agree details of services Know how to plan for value co-creation Know how to negotiate and agree service utility, warranty and experience Know how the ?Service level management? practice can be applied to enable and contribute to service expectation management How to onboard and offboard customers and users Understand key transition, onboarding and offboarding activities Understand the ways of relating with users and fostering user relationships Understand how users are authorized and entitled to services Understand different approaches to mutual elevation of customer, user and service provider capabilities Know how to prepare onboarding and offboarding plans Know how to develop user engagement and delivery channels Know how the ?Service Catalogue management? practice can be applied to enable and contribute to offering user services Know how the ?Service Desk? practice can be applied to enable and contribute to user engagement How to act together to ensure continual value co-creation Understand how users can request services Understand methods for triaging of user requests Understand the concept of user communities Understand methods for encouraging and managing customer and user feedback Know how to foster a service mindset (attitude, behavior and culture) Know how to use different approaches to provision of user services Know how to seize and deal with customer and user ?moments of truth? Know how the ?Service request management? practice can be applied to enable and contribute to service usage How to realize and validate service value Understand methods for measuring service usage and customer and user experience and satisfaction Understand charging mechanisms Know how to assess service value realization Know how to prepare to evaluate and improve the customer journey Know how the ?Portfolio management? practice can be applied to enable and contribute to service value realization ITIL© is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. The Swirl logo? is a trade mark AXELOS Limited used, under permission of AXELOS Limited. All rights reserved. IT Infrastructure Library© is a registered trade mark of the AXELOS Limited used, under permission of AXELOS Limited. All rights reserved. Additional course details:Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 Nexus Humans ITIL 4 Specialist Drive Stakeholder Value (DSV) with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ITIL 4 Specialist Drive Stakeholder Value (DSV) with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ITIL 4 Managing Professional - Drive Stakeholder Value (DSV) with Exam
Delivered OnlineFlexible Dates
£2,385

PERSON CENTRED PLANNING TRAINING

By Inclusive Solutions

Person Centred Planning (PCP) is a powerful tool for visioning, future planning and team building. It gets everyone on the same page and creates a progressive, constructive atmosphere so it is especially useful for people who are feeling ‘stuck’ or in a really desperate situation. The PCP processes we teach are called “PATH” and “MAPs”, and are both used for different situations. “To facilitate a group, family, team or organisation in thinking together around a given challenge or issue. Here is an opportunity to experience for real the person centred, futures planning tool – MAP/PATH” (Pearpoint, Forest, O’Brien. 1989). PCP can focus on an individual, with family and friends in the room supporting them, or focus on a group who want to set goals, and realise their potential as a team. PCP focuses on hopes and dreams, so is a very positive approach to planning, and utilises graphic facilitation, making it a very friendly way of working that is accessible to everyone.  This unique, hands on PCP training course explores the difference between ‘person-centred thinking’ and ‘service-centred thinking’. Traditionally, we have not always listened deeply enough to the needs of those we are planning for. Often ‘medical model’ thinking dominates our planning for those with the most complex needs. Typically we plan ‘about’ rather than ‘with’ children and adults.  We examine this ‘service centred’ approach that most professionals are used to, and question its limitations. This values based approach to inclusion will give participants the ‘theory’ behind why thinking and working in a person centred way is so important, and challenges people to strive for more for the people we are planning around. In addition to the knowledge and theory, this course empowers participants to facilitate their own Person Centred Plans using the PATH or MAPs process and provides the skills to do this effectively. Learning objectives  Strengthen understanding of how to think in a person centred way Knowledge of the steps of PATH / MAPs process Ability to facilitate PATH/MAPs process Ability to graphically facilitate a PCP meeting Develop problem solving and planning skills Inclusive Solutions offer: We could provide training for a team of staff, or we could facilitate a PATH or MAP around a disabled person. We can also offer bespoke training packages, please enquire for more details.  1 day “Introduction to PCP” with up to 100 attendees focusing on ‘Person Centred Thinking’ – includes live demonstration of PATH or MAPs Process (for a member of the group / with a student and their family/friends). 2 day “PCP Skills training” – More skills focused, lots of practice. Includes Graphics academy, Process academy and Coaching (Best with under 30 attendees). 2 day “Introduction to PCP with Skills training” – includes live demonstration of PATH or MAPs process, Graphics academy, Process academy and Coaching (Best with under 30 attendees). Half day PATH or MAP for a disabled person, led by two experienced Inclusive Solutions facilitators. Full day PATH or MAP for a team, organisation or group such as a full school staff led by two experienced Inclusive Solutions facilitators. Typical Structure of 2-Day “Introduction to PCP with Skills” Training This course is most useful when delivered over 2 days so we have time to cover the ‘skills’ behind facilitating a PATH or a MAP. Here is an example of what usually happens. If you need us to, we can tailor any of our courses to suit your specific needs.  Day 1 AM What makes a good welcome?Service centred thinking and working – what does it involve, how does it make people feel?Reflections on current practices – what is useful and what is harmful?Introduction to underpinning values of person centred thinking and working In depth exploration of the fundamentals of inclusion – encouraging identity, focusing on gifts and capacities Sharing success stories, and personal insight from experienced psychologistsShowcasing a number of practical PCP process in actionIntroduction to the “5 service accomplishments”, or “5 ordinary needs” PM  Full PATH process demonstration, led by 2 experienced facilitators – one process facilitator and one graphic facilitatorVolunteers will make notes on what they see the facilitators doing and feedback at the end of the dayFeedback, Q&A Day 2 AM Graphics Academy – we will ease you into the world of graphic facilitation and show you how simple it really is – includes live coaching and graphics tutorial, then participants will practice on each other by facilitating the first 1 or 2 sections of the PATH Process Academy – we will give you some pointers about holding the group, and facilitating in an inclusive way, this is another chance to practice your new graphics skills PM The group is divided up, and volunteers are selected to facilitate PATH meetings The group then run the PATH’s simultaneously with an experienced coaches in the room to guide and to be available for questionsWe reconvene to feedback about the process and digest all we have learntBrief Q&A session and then final reflections

PERSON CENTRED PLANNING TRAINING
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£2,500 to £6,900

Circle of Friends

By Inclusive Solutions

Circle of Friends is an approach to enhancing the inclusion, in a mainstream setting, of any child or young person who is experiencing difficulties in school because of disability, personal crisis or because of their challenging behaviour towards others. The ‘circle of friends’ approach works by mobilising the young person’s peers to provide support and engage in problem solving with the person in difficulty. Online Course now available via Teachable Platform – Creating Circles ofFriends Learn at your own pace… lots of text and video support Course Category Inclusion Peer Support Behaviour and Relationships Autism and Communication Description Circle of Friends is an approach to enhancing the inclusion, in a mainstream setting, of any child or young person who is experiencing difficulties in school because of disability, personal crisis or because of their challenging behaviour towards others. The ‘circle of friends’ approach works by mobilising the young person’s peers to provide support and engage in problem solving with the person in difficulty. ‘Circle of friends’ is not the same as ‘circle time’ but many of the skills and techniques used by teachers in ‘circle time’ can be used to support the ‘circle of friends’ process. Over the past 12 years Colin Newton and Derek Wilson have been encouraging the use of ‘circle of friends’ in a wide variety of primary and secondary schools, often with very successful outcomes. Some of these are described in their books ‘Circles of Friends’, (Folens, 1999) and ‘Creating Circles of Friends’ (Inclusive Solutions, 2005). This is an excellent opportunity to learn from Colin Newton and Derek Wilson the educational psychologists who brought this Department of Education endorsed approach to the UK. Learn how to build teams around challenging pupils by drawing on a resource which is always there…. other children. Enjoy participating in a multi media workshop that will challenge, entertain and reach for your emotions. Circles of support are for us all, for life…. and they work! Testimonials ‘Absolutely fantastic session – so thought provoking and positive.’ ‘Well presented excellent course’ ‘Wonderful, mind blowing day. Lots of children and young people there we need to really see – not treat’ ‘Excellent presentation, lively, modern, current – definitely got the attention. Course gave great food for thought and I feel confident that this way of working will have a place in the future of our school. Learning Objectives To be able to understand the values and wider context of inclusion To be able to set up and run a ‘circle of friends’ to reduce likelihood of a pupil being excluded or segregated To understand and be able to maximise the power of the peer group in supporting relationships, achievement and behaviour Who Is It For ? Primary and secondary teachers Heads and Deputies SENCOs Learning Support and Guidance staff Advanced Skills Teachers Parents Local Authority Support Services Community Development workers Early Years and School based Practitioners Course Content The course answers the questions: What do you do with the child who is isolated by their aggression and anger, through being different, disabled or new to the school or community? Practically how do we go about including high profile children or young people? How can we help some children be friends? We will cover: The importance of Welcome Inclusion values underpinning this work The Intentional Building of Relationships – ‘Circle of Friends’ work as an example Not doing it alone – The Importance of Teams in developing inclusive practice Practical setting up of circles of friends Lessons learned Stories of circles in primary and secondary mainstream schools ^ Circles of Friends Training in Kiev, Ukraine

Circle of Friends
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500