We need to talk openly about how we are performing and we sometimes need to have an 'honest' conversation with our manager. We all know this, but it can be difficult. This short, focused workshop will give you the confidence and skills to have a conversation with your manager (or anyone else for that matter) about your performance and how you can add value. It will focus on how to get yourself heard and build better working relationships with those key to your success. The programme will help you: Overcome the barriers to effective performance conversations Receive feedback without taking it personally Improve working relationships with your manager Agree realistic expectations and targets (and get 'buy-in' for them) Improve your communication style Plan and prepare for honest conversations in the workplace 1 What is an honest conversation? Why don't we have them more often? What stops us? The cost of not having them 2 Asking for feedback 3 Preparing for challenge 4 The expectations conversation 5 Your communication styles 6 Planning and preparing for an honest conversation
This course focuses on empowering managers to foster a culture of ownership, leverage effective delegation practices, and enhance productivity within their teams. Participants will explore strategies and techniques to delegate effectively, promote accountability, and optimise team performance. This course is available to book for delivery in-house for your organisation and people exclusively, for either a half or full days training workshop. Prices are dependent on size of group ranging from a minimum of 4 to a maximum of 12 delegates. If you have a smaller number of delegates the Puritas 1:1 Leadership Coaching Programme is recommended.
Budgeting is more than mere vague oversight. Budgeting should deliver the corporate strategy, add shareholder value and lead to a well-run business - for the benefit of all involved in it. Effective budgeting leads to real control - effective day-to-day operational control and more. This course demonstrates what proper budgeting and operational control can do. This course will help ensure that participants: Appreciate the importance of the budgeting process Take ownership of it Use it as a daily working tool - not an annual exercise - to help run their part of the operation Improve their reporting against budget Ensure their delivery against budget 1 Objectives of budgets The budget process Stages - what is the prime aim of a budget? What is forecasting? ObjectivesPlanningImplementation 2 Budget and cost control focus Choosing objectives Links with corporate strategy Links with resource management Can the accounting systems cope? 3 Traditional budgeting and control Benefits and drawbacks The process Control and feedback Reporting - what can be expected? 4 Advanced budgeting and control Understanding the business process Taking out costs Cost awareness ZBB - as valid as ever 5 Reports Reports for action The purpose of a report Content - deliverables and feedback Culture is so important
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
Microsoft Lync training course description This course teaches IT staff how to plan, design, deploy, configure, and administer a Microsoft Lync Server solution. The course emphasizes Lync Server Enterprise Unified Communications features focussing particularly on coexisting with and migrating from legacy communication services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat. This course helps prepare for Exam 70-336. What will you learn Describe the Lync Server architecture. Install and deploy Lync Server. Use Lync Server management interfaces. Deploy and manage clients. Manage and administer dial-in conferencing. Design audio and video for web conferencing. Plan for instant message and presence Federation. Deploy and configure persistent chat in Lync. Configure archiving and monitoring services. Troubleshoot Lync Server. Describe the required daily, weekly, and monthly maintenance tasks. Use SIP commands and analyze SIP logs. Configure high availability features in Lync. Design load balancing in Lync Server. Backup and restore Lync Server data. Microsoft Lync training course details Who will benefit: Technical staff working with Microsoft Lync. Prerequisites: Supporting Windows 2008 or 2012. Duration 5 days Microsoft Lync training course contents Microsoft Lync Server architecture Lync Server architecture, Lync core capabilities, Lync design process, assessing infrastructure requirements and updating the design, planning for all Microsoft solutions framework phases. Designing a Lync Server topology Infrastructure requirements for Lync Server, using the planning tool, using topology builder, server infrastructure, documentation. Hands on Environment preparation and Lync Server pools. Users and rights in Microsoft Lync Server Managing Lync Server, role based access control. Hands on Using the management shell, configuring role-based access control. Client/device deployment and management Deploy and manage clients, prepare for device deployment, IP phones. Hands on Clients. Conferencing in Lync Server Introduction to conferencing in Lync Server, designing for audio\video and web conferencing, dial-in conferencing in Lync Server, managing and administering conferencing. Hands on Conferencing in Microsoft Lync. Designing and deploying external access Conferencing and external capabilities of Lync Server, planning for IM and presence federation, designing edge services. Hands on Deploying Edge Server and Configuring Remote Access, Validating the Edge Server. Deploying Lync Server persistent chat Overview of persistent chat architecture in Lync Server, designing persistent chat, deploying and persistent chat. Hands on persistent chat server. Monitoring and archiving The archiving service, the monitoring service, configuring archiving and monitoring. Hands on Archiving and monitoring in Lync Server. Administration and maintenance of Lync Lync Server troubleshooting tools, Lync Server operational tasks, Lync Server troubleshooting techniques. Hands on Lync administration tools, centralized logging service, analysing Lync Server logs and traces. High Availability in Lync Server High availability in Lync Server, configuring high availability in Lync Server, planning for load balancing, designing load balancing. Hands on Configuring database mirroring, experiencing a scheduled SQL Server outage, experiencing an unscheduled SQL Server outage. Disaster recovery in Lync Server Disaster recovery in Lync Server, tools for backing up and restoring Lync Server, critical Lync Server data to back up and restore, critical data to export and import, designing branch site resiliency. Hands on Configure pool pairing, experiencing a pool failure or outage. Planning a migration to Lync Server Coexistence and migration, migration steps, planning for clients and devices. Designing a client migration and device migration strategy. Hands on Creating a migration plan, documenting the migration phases.
Reclaiming Regulation is a series of individual, in-= person workshops for women who are seeking to explore nervous system regulation, somatic awareness, and embodied wellbeing. These 90 minute workshops offer accessible, practical tools to support emotional balance, reduce overwhelm, manage nervous system regulation and develop a deeper connection with the body. Each session is a stand alone experience that blends nervous system theory with somatic practices, breathwork, and grounding practices. The workshops are inclusive, trauma informed, and accessible to all levels, including complete beginners. Who These Workshops Are For WOMEN ONLY These sessions are ideal for women: seeking body based tools for managing stress and supporting calm feeling disconnected, tense, or emotionally fatigued curious about nervous system regulation and somatic practices wanting to reconnect with the body in a safe, supportive space No previous experience is required Somatics & Nervous System Regulation: Benefits for Stress, Trauma, and Emotional Regulation: Reduces chronic stress → Helps shift the body from fight-or-flight into rest-and-digest (parasympathetic state) Supports trauma recovery → Allows stored tension, stress and trauma symptoms to be released safely through the body Improves emotional regulation → Builds capacity to experience emotions without overwhelm or emotional shutdown Enhances self-awareness → Encourages a deeper connection to bodily sensations and internal states Increases resilience → Strengthens the nervous system's ability to recover from stress more quickly Promotes grounding and presence → Helps you feel more centred, calm, and connected to the present moment Reduces anxiety symptoms → Calms overactive stress responses through breath, movement, and awareness Improves sleep and rest quality → Calming the nervous system supports better rest and recovery Empowers self-regulation skills → Teaches tools to manage emotional ups and downs independently Strengthens mind-body connection → Enhances the ability to listen to and trust bodily signals Workshop Format Schedule: One in person workshop each month (October–July) Duration: 90 minutes per workshop Structure: Each workshop is a stand alone experience, attend one or as many as you choose Location: Art & Spirituality Facilitator: Led by a trauma informed integrative somatic therapist Provided: Comfort props, optional reflection prompts, and follow-up resources Each session includes: Accessible nervous system education Guided breathwork and somatic practices Restorative and grounding practices Optional moments for reflection or group connection Take home practices for integration Monthly Workshop Themes December: Breath as Medicine Discover the link between breath, energy, and emotional states Learn techniques to calm or energise the nervous system Explore breath and movement together to support coherence and focus Workshop Outcomes By attending one or more of these workshops, participants will: Understand key nervous system principles that support emotional balance Build body awareness and confidence in reading internal cues and sensations Gain practical breath and movement tools for everyday regulation Reconnect with the body as a resource for rest, presence, and wellbeing Cultivate more compassion and awareness of widening their your window of tolerance Why This Work Matters In a fast paced and often dysregulated world, many women are seeking grounded, body based tools to support their wellbeing. These workshops offer a gentle, empowering, and science informed space to reconnect with the body’s organic intelligence. Through movement, breath, and embodied awareness, participants can cultivate more resilience, rest, and a renewed sense of aliveness, one moment, one step at a time. This FREE workshop is for Adults women only and is sponsored by CORRA and HENRY DUNCAN GRANTS By attending this class you release Cori from Koa, Giada Gaslini and Art and Spirituality Cic, from any liability arising out of any personal injuries, emotional or physical release, death, physical reaction, expectations of results, theft in the venue or damages that may happen to people and objects while attending. Pictures will be taken during the workshop, if you prefer not to be in them, please inform the teacher.
Overview The credit Risk Assessment course gives participants a comprehensive overview of the key concepts and methodologies in understanding the drivers of credit risk, modelling tools used for the measurement of credit risk, and current best practices in credit risk management techniques. The course focuses on the actual practice of credit risk assessment within financial institutions as well as on the quantitative and methodological tools and procedures that are at the cutting edge of measuring, mitigating and managing credit risk.