Are challenging people getting in the way of your happiness, well-being and success? You may find them at work, in social situations, you may live them or they may be members of your family? Even worse when you see them getting away with things; getting their way even though there is no sense to it; getting advantages over everyone else; and in many cases being rewarded for their abusive behaviour with promotion and other advantages! You probably would never want to behave the way they do. You don’t have it in you or you just couldn’t live with yourself if you behaved like that. Maybe your attempts to confront them have failed and you’ve ended up with egg on your face, with them having more opportunity to have a “dig” at you. As a result, you may have come to the conclusion that it’s the nasty people that get ahead, and someone like you just has to put up with this behaviour from others.
The ability to influence others is a life skill but also one that has never been so critically useful at work. This one day workshop will set you on the road to discover what you need to be able to think and do that will help you take people with you. This involves learning some new tools and strategies that fit the situation you are in and making sure you use the right skills and behaviours to influence well, whether it is a single person or a room full of cynical expectant people! This workshop will enable you to: Learn about and understand influencing styles and strategies available and formulate plans and ideas on how to use them in influencing situations Understand which skills and behaviours to use to be the most effective influencer Have greater confidence in situations where they need to influence someone Use thinking, speaking and behavioural techniques that enable influencing to be effective and positive Review and evaluate learning and have an action plan to take back and implement in the workplace 1 Welcome, introductions & getting to know you and why you are here Course objectives 2 Personal objectives Introducing a learning diary 3 Gallery exercise - using images of exemplars brought by participants Plenary discussion The skills and behaviours of an exemplar influencer 4 Group task - what does your self-evaluation say? Discussion and conclusions 5 Influencing - what is it? - why do we need it? The current organisational landscape including values and behaviours the influencer operates in 6 Pit Stop - 'pull / push', 'the lost horse' and 'talking at' 7 Direct / support / delegate / coach: the different choices and approaches to choose from 8 Updating the learning diary 9 Power and types of power - its impact on influencing ability and approach and what is within your control Group task and discussion 10 The 5 influencing styles tool Series of tasks and exercises Drilling down to a personal action plan for maximising influence 11 'The person with the most flexibility has the most influence' Skills and behaviours for effective influencing Exercises and techniques that develop skills for influencing 12 Review and evaluation Action planning
This programme provides an intensive, one-day overview of the key concepts and techniques of project management. The project management methods presented can be applied to a wide range of projects and the course emphasises both the task and the team-related aspects of project management. The aims of the programme are to: Present the key concepts of project management Provide a structured approach for managing projects Demonstrate tools and techniques for planning and controlling project work Enable participants to apply the techniques to their own projects At the end of the programme, participants will: Recognise the benefits of a structured approach to project work Be able to apply a range of practical tools and techniques to improve their personal effectiveness in project work Have a means of determining the status of current projects and know what actions are needed to ensure success 1 Introduction Why this programme has been developed Review of participants' needs and objectives 2 Key concepts The characteristics of projects and project work The four key phases of a project Essential lessons from past projects Key success factors Achieving success through the 'Team-Action Model' Challenges of the multi-project situation 3 Setting project goals Understanding 'customer' requirements Managing project stakeholders and gaining commitment Using questioning skills to define goals and success criteria Defining and documenting the scope of the project 4 Project planning Defining what has to be done Creating a work breakdown Agreeing roles and responsibilities for the work Developing a programme using networks and bar charts Estimating timescales, costs and resource requirements Planning exercise: participants develop a project plan Identifying and managing project risks Using project planning software Managing and updating the plan 5 Project implementation and control Creating a pro-active monitoring and control process Techniques for monitoring progress Using latest estimates Managing project meetings Resolving problems effectively Managing multiple projects Personal time management 6 Course review and action planning Identify actions Sponsor-led review and discussion of proposals Conclusion
The learning objectives that we believe you require to be covered within the training include: A detailed understanding of the CDM 2015 Regulations and how they should work in practice An understanding of the key roles (Designer, Principal designer, contractor, principal contractor and client) under CDM 2015 What constitutes design and when you may be acting as a designer The requirements for notification Pre construction information, the construction phase plan and the H&S file An opportunity for delegates to ask questions and gain clarification on specific project requirements 1 Introduction Why manage health and safety? The costs of accidents Construction industry statistics Why CDM 2015? 2 Overview of health and safety law and liabilities Criminal and civil law Liability Enforcement and prosecution Compliance - how far do we go? Statutory duties 3 Health and safety law in construction - the current framework Framework of relevant legislationHealth and Safety at Work etc Act 1974Management of Health and Safety at Work Regulations 1999Construction (Design and Management) Regulations 2015Work at Height Regulations 2005 Who is responsible for the risks created by construction work? Shared workplaces/shared responsibilities Control of contractors - importance of contract law 4 CDM 2015 - the principles and current best practice Scope - what is construction? Application - when do the Regulations apply? The CDM management systemDutyholders (client, designer, principal designer, principal contractor, contractor)Documents (pre construction information, Notification, construction phase Plan, H&S File)Management process The 2015 HSE guidance / industry best practice Clarification of roles and responsibilities 5 Competence under CDM 2015 What is 'Competence'? The criteria to be used in construction Achieving continuous improvement 6 Part 4 Construction Health Safety and Welfare Overview of Part 4 Responsibilities Welfare arrangements 7 Risk assessment and the role of the designer Principles of risk assessment Loss prevention / hazard management What is a suitable risk assessment?Design v construction risk assessmentThe client is a designer?Whose risk is it? 8 Risk assessment exercise Understanding the principles of design risk assessment Identifying hazards under the control of clients and designers Quantifying the risk 9 Questions, discussion and review
"A Journey of Sound, Spirit, and Soul Renewal." The Sacred Soul Healing Odyssey one day retreat is a transformative journey of deep healing, feeling your true nature, and inner restoration and embodiment. Experience deep healing and rediscover your true essence. Immerse yourself in a powerful journey of inner restoration and embodiment. Don’t miss this opportunity to transform your self! Key Elements: Vibroacoustic Therapy: Participants will be enveloped in the soothing vibrations of low-frequency sound waves, allowing the body to enter a state of profound relaxation and stress reduction. Hands-On Healing: To enhance the body's natural healing processes and promote a sense of grounding, balance and integration. Trauma Release Exercises: Through various exercises and gentle shaking, participants will start to release stored emotional and physical tension in the hips and body, encouraging a deeper sense of liberation and self-awareness. Plant Medicine Ceremony: The integration of carefully selected plant medicines (Sacred Cacao paired with the high vibrational Sacred Awareness Flower Essence by Lotuswei) will provide an additional layer of holistic support, spiritual connections and breakthroughs. Meditation and Mindfulness: Participants will engage in a variety of meditations, including Yoga Nidra and visualisation, designed to foster inner calm, clarity, and a deeper connection to the present moment. Breathwork: Participants will be guided through the breath allowing more of life's energy to flow into the body, enabling deep healing and mental clarity. Who Should Attend: This retreat is designed for individuals seeking presence and insight into their spiritual self, clearing out stuck energy and feeling their true nature. About Eduardo Camargo - Eduardo embraces ancestral and alternative healing methods, including holotropic breathwork, sound healing, and Amazonian plant medicine. Spiritual well-being became his core focus, leading Eduardo to practice the Wim Hof method. Through breathwork, vibration, and nature’s medicines, Eduardo first healed himself and is now helping others on their journey. Eduardo integrates ancient wisdom with modern life, through spiritual healing and personal growth to provide a profound experience. About Steph Edwards - Steph is an Intuitive Bodyworker, blending CranioSacral Therapy, Reiki, Reflexology, and Energy Healing to craft personalised sessions. Her intuitive approach allows her to connect with your unique needs in the present moment, merging the art of bodywork with energetic healing. Through a profound spiritual practice with Sacred Cacao and plant medicines, Steph cultivates sacred spaces that can catalyse self-discovery and genuine connection back to your true nature. Sneak peek
The “ISO 14298:2021 Lead Implementer Course” is designed to provide participants with the knowledge and skills necessary to lead the implementation of a Security Printing Management System based on ISO 14298:2021. This comprehensive course covers the key principles, requirements, and best practices for establishing and maintaining an effective security printing management system. Participants will learn how to develop, implement, and manage processes that comply with the ISO 14298 standard.
When managers have too many decisions to make, it can have a serious impact on the speed and efficiency of the organisation. When those decisions are commercial ones, the results can wreak havoc with the bottom line. Often the problem arises when those below them or in operational areas of the organisation aren't equipped or allowed to make a decision for themselves. Issues get passed back up and that wastes time. This programme provides a solution, giving your entire team the skills to: And most importantly, they'll be able to do this in line with the broader aims and commercial objectives of the business. By the end of the programme participants will be able to: Fully appreciate the importance of effective decision-making in business Use the five-step 'Stop, Think, Act!' decision-making process Stop leaping to conclusions Really understand the situations and decisions they are dealing with Identify good options Evaluate those options Make decisions and then put them into action Apply these tools and techniques to all their decisions in future 1 Understanding the business we work in What are the critical factors in our business? What is the SWOT analysis for our business? 2 Understanding what decision-making is 3 Background Culture of 'having to be doing' To change things we have to think about it! We are paid to make decisions! 4 Recognise the opportunity to make a decision 5 The 'Stop, Think, Act!' technique 6 STOP! Recognise the opportunity to make a decision Don't leap to conclusions Get ready to think Initial questions:Is this my decision? (Do I have the authority?)Who is this going to affect? (Do they need to be included?)When do I need to make the decision? (What's the timeline?) 7 THINK! The 3 Cs - making sure we understand the decisions we have to make What is the context of this decision?What is the overall situation?Why is this decision important?What do we need to achieve?What will success look like? Do I have clarity about the decision I need to make?Can I write it down?Can I express it clearly in two sentences? What are the criteria?What are the critical commercial factors that we will use to select our options?What will we use to measure the business success? 8 ACT! Identifying options What data do I need to collect?Issues with today's overloadIdentifying what will help you Select optionsHow many options?Must match your criteriaMust achieve success'Decision compass' exercise Analyse optionsTabular methodRisk analysis (likelihood v effect)Head, heart and gut (is there any organisational history/bias that we are up against?) Making your decision Taking it to actionFirst actionsPlanning how to make it happen
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
Face to face One to one.
Face to face training customised and bespoke. Professional tutors. One to One Online or Face to Face