A sales manager's role has more to do with the ability to lead, mentor, and motivate a sales team to achieve or exceed an organisation's sales goals. This programme concentrates on these skills and behaviours enhancing their existing skills to new levels through the sales management process.
Mediation for Managers Training
Overview This one day course will provide guidance on how to become more assertive and build self-confidence, which in-turn will help your attendees to achieve greater work effectiveness and productivity, whilst putting them in control of their daily activities and making them more able to overcome stressful work and life situations. Description Being assertive is being able to express yourself with confidence without having to resort to passive, aggressive or manipulative behaviour. By developing assertiveness and becoming aware of our own strengths and weaknesses, we can modify our behaviour for greater effectiveness in social and business interactions. Topics covered: What is Assertiveness? – A series of activities relating to what assertiveness means and, perhaps more importantly, what it means to the participants. My Assertiveness Goals – A chance for the participants to review what they want to get out of the session and where they would like to end up with regard to their approach to assertiveness. How Assertiveness Works – A look at human reactions and the reasoning behind them culminating in an activity that looks at the participants own observations in relation to assertive behaviour. My Assertive Rights – A review of the rights we have as individuals followed by a commitment to the rights by the participants. Taking a Positive Approach – Looking at key methodology, including: – Giving and Receiving Compliments A review of typical responses to compliments and their negative consequences, followed by an opportunity to develop new, positive responses. – Improving Self-Esteem An in-depth review of each individual’s positive aspects. – New Challenges A set of challenges to take participants out of their comfort-zone and into the realm of possibilities. – Effective Communication A look at what makes effective communication, with some modelling of behaviours. Approaching Assertiveness – A look at the four cornerstones of being assertive with an opportunity to practice these behaviours. The Words You Use – Understanding the key areas of effective communication. Covering the areas of; Disclosing Your Feelings, Being Clear, Being Persistent, Empathising and Working Towards a Wise Outcome. Preparing to Be Assertive – A chance to understand and practice a set process of ‘scripting’ in order to develop an effective and natural approach to assertive interactions. Assertive Review – An activity that solidifies the reasoning behind wanting to become assertive, whilst demonstrating that it is not an unachievable outcome. Who should attend Anyone that needs to develop their assertiveness skills and improve communication with others Requirements for Attendees None.
Choose what you want to learn in this fast-track hairdressing course. Aimed at those who’ve left college with a hairdressing qualification but don’t feel confident enough on the salon floor or those needing to brush up on a specific skill. Our training concentrates on cutting, colouring, styling and barbering.
This course will provide an opportunity to begin to understand what commercial and financial awareness means and the importance of everyone in thinking commercially.
Gain comprehensive knowledge and practical skills for safe and effective oxygen therapy with our "An Understanding of Oxygen Administration" course. Equip yourself with evidence-based best practices to assess, administer, and monitor oxygen therapy appropriately. Ideal for healthcare professionals.
Gain comprehensive knowledge on epilepsy management and simulated administration of buccal midazolam with our course. Respond effectively to seizure emergencies.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
Cloud deployment training course description This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. What will you learn Cloud services, models, and characteristics. Virtualization components, installation, and configuration. Infrastructure configurations and optimization. Resource management and specific allocations. IT security concepts, tools, and best practices. Recovery, availability and continuity in the cloud. Cloud deployment training course details Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. Prerequisites: Introduction to virtualization. Duration 5 days Cloud deployment training course contents Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues