Bluetooth training course description Bluetooth is used by many kids these days but is probably under-utilised in business environments. This hands on training course provides an overview of what Bluetooth is, how it works, what it can be used for and how to configure it on different devices. What will you learn Explain what Bluetooth is. Describe the Bluetooth protocol stack. Recognise the applications of Bluetooth. Configure Bluetooth. Bluetooth training course details Who will benefit: Anyone who needs to know more about Bluetooth. Prerequisites: None. Duration 2 days Bluetooth training course contents Classic Bluetooth Bluetooth overview Basics, standards, competing technologies. Bluetooth radio RF bands, power losses, frequency hopping. Bluetooth modulation PSK, DPSK, DPQSK. Bluetooth data transfer FH, TDD, FDMA, ACL, SCO, Bluetooth packets. Making connections Piconets, Scatternets, Pairing The protocol stack Baseband, Link Manager, L2CAP, SDP, GAP, RFCOMM. Profiles FTP, DUN, LAN, Synch, HDP, GOEP/OBEX etc. Security Authentication, authorisation, encryption, risks. Bluetooth Low Energy Introduction Bluetooth Smart and Bluetooth Smart Ready. BLE device types Design goals, terminology and core concepts. BLE usage models Presence detection, data broadcasting connectionless models, gateways. BLE architecture Controller, host, applications and stack splits. BLE protocol stack Link layer, HCI, L2CAP. BLE profiles GAP roles, models, procedures, security modes, data advertising. BLE security Pairing, bonding, data signing BLE applications Devices, services, profiles, peripherals
The TCM Group's National Certificate in Workplace Mediation course offers an in-depth analysis of mediation, with particular reference to resolving business complaints, disputes and conflict. The course uses a variety of learning and teaching methods. During the course, participants are encouraged to develop their learning through group discussions, role-plays, case study discussions as well as independent learning and reflection. Peer-based evaluation and learning feature heavily throughout the programme. This is supported by regular assessment of activities and learners’ progress by course facilitators. Delegates who successfully complete this course refer to themselves as TCM Accredited Mediators – thereby demonstrating the highest standards of mediation practice in the UK.
An intensive one-year programme that develops the writer’s original voice, embeds professional practice and enhances employability. At LFS you will gain expertise and experience that form the foundations of your professional screenwriting practice. You will forge relationships and develop networks that propel you into the film and television industries. MA Screenwriting focuses on the development of the individual screenwriter’s voice. You will be supported and challenged throughout your one year MA as you explore that voice through your screenwriting. You will work collaboratively within a diverse, international cohort and within the conservatoire atmosphere of LFS. The development of your feature screenplay, at the heart of your MA, is undertaken in small Feature Development Groups of 3 or 4 students, chaired by a tutor. Regular Group meetings are structured around the giving and receiving of feedback and the deep exploration of your feature project from initial idea through several draft screenplays. The ambition and variety of students’ screenplays reflect both the depth of their creativity and the breadth and diversity of their backgrounds and interests. In addition to your feature screenplay you will have opportunities to write short screenplays and to develop a television series idea.
Facilitating Effective Meetings: In-House Training Billions of dollars and exorbitant amounts of time are wasted annually across the globe because of organizations' meeting practices. This contributes to serious performance problems for both organizations and employees, and it has a serious impact on culture and morale. But despite the costs and consequences, every-day people in any role have the ability to change that. They can reduce cost, improve productivity, and enhance their workplace cultures by improving their meeting facilitation skills. And that is because facilitation skills start in the planning stage, not in the live meeting stage. In this course, participants will learn that their responsibility as a facilitator is to be a steward of time, money, relationships, and performance. To do that, they will learn to estimate costs of meetings and practice a variety of strategic thinking and analysis tasks to effectively plan results-aligned meetings. They will also apply several techniques and strategies to proactively prevent and deal with conflict in meetings, as well as give objective, constructive feedback to others in order to create behavior change during meetings. Participants must bring laptops with them and have internet access during the course (both virtual classroom and traditional classroom). The laptops are needed for specific activities. Also note that this course pairs well with IIL's Conflict Resolution Skills and Decision Making and Problem Solving courses, which go much deeper into related skills and tools that support effective meeting facilitation. What you will Learn At the end of this program, you will be able to: Estimate the financial and time costs of attendance for real-world meetings Use a performance formula to define the purpose of meetings Describe the responsibilities and qualities of an effective facilitator Analyze situations to determine when a meeting is necessary Articulate performance-driven meeting goals and results Align meeting goals and results Strategize to invite, involve, and exclude appropriate attendees Explain research-based best practices for meeting decisions and agenda development Create an effective agenda for a results-driven meeting Apply proactive tools and strategies for relationship-building dealing with meeting conflict Give constructive behavioral feedback using the Situation-Behavior-Impact® technique The Business Case for Effective Facilitation Embracing the research on meetings Estimating the real costs of meetings Determining a meeting's performance value Clarifying the meeting facilitator's role Facilitating the Meeting Plan Determining if a meeting is necessary Aligning meeting goals with meeting types Identifying the right attendees Creating a strategically effective agenda Facilitating the Live Meeting Building relationships from the start Dealing with conflict proactively Giving feedback on unproductive behavior
On successful completion of the ID Liner Gloss & Go™ Lip Blush training course, students will not only be given the skills and tools to offer this incredibly popular treatment to their clients but will also be permitted to advertise the trademark, giving them an edge in a competitive market.
Facilitating Effective Meetings (In-Person) Billions of dollars and exorbitant amounts of time are wasted annually across the globe because of organizations' meeting practices. This contributes to serious performance problems for both organizations and employees, and it has a serious impact on culture and morale. But despite the costs and consequences, every-day people in any role have the ability to change that. They can reduce cost, improve productivity, and enhance their workplace cultures by improving their meeting facilitation skills. And that is because facilitation skills start in the planning stage, not in the live meeting stage. In this course, participants will learn that their responsibility as a facilitator is to be a steward of time, money, relationships, and performance. To do that, they will learn to estimate costs of meetings and practice a variety of strategic thinking and analysis tasks to effectively plan results-aligned meetings. They will also apply several techniques and strategies to proactively prevent and deal with conflict in meetings, as well as give objective, constructive feedback to others in order to create behavior change during meetings. Participants must bring laptops with them and have internet access during the course (both virtual classroom and traditional classroom). The laptops are needed for specific activities. Also note that this course pairs well with IIL's Conflict Resolution Skills and Decision Making and Problem Solving courses, which go much deeper into related skills and tools that support effective meeting facilitation. What you will Learn At the end of this program, you will be able to: Estimate the financial and time costs of attendance for real-world meetings Use a performance formula to define the purpose of meetings Describe the responsibilities and qualities of an effective facilitator Analyze situations to determine when a meeting is necessary Articulate performance-driven meeting goals and results Align meeting goals and results Strategize to invite, involve, and exclude appropriate attendees Explain research-based best practices for meeting decisions and agenda development Create an effective agenda for a results-driven meeting Apply proactive tools and strategies for relationship-building dealing with meeting conflict Give constructive behavioral feedback using the Situation-Behavior-Impact® technique Getting Started The Business Case for Effective Facilitation Embracing the research on meetings Estimating the real costs of meetings Determining a meeting's performance value Clarifying the meeting facilitator's role Facilitating the Meeting Plan Determining if a meeting is necessary Aligning meeting goals with meeting types Identifying the right attendees Creating a strategically effective agenda Facilitating the Live Meeting Building relationships from the start Dealing with conflict proactively Giving feedback on unproductive behavior Summary and Next Steps
Intercultural Competence: In-House Training In a world that conducts business across continents and geographical borders, more than ever it is essential for team and organizational leaders to not only understand but also embrace the diversity of cultures; this is intercultural competence. Intercultural competence gives one the ability to effectively and appropriately communicate with people from other cultures in a competitively complex world. The participant in this program will gain cultural insights needed to build intercultural teams and navigate cultural diversities, without knowingly violating what are deemed to be acceptable or unacceptable cultural norms. What you will Learn At the end of this program, you will be able to: Articulate on the meaning of culture and intercultural competence Express the importance of body language and appropriately demonstrate its emblems Describe three cultural models and consider their application in assimilating cultural behaviors Define emotional intelligence and explain how it is linked to cultural intelligence Examine the four cultural intelligence capabilities and give examples of how each is developed Develop a personal cultural profile and compare its dimensions to gain an appreciation for intercultural competence Foundation Concepts Fundamentals of culture Culture and body language Culture and proxemics Cultural Models Iceberg culture model The onion model of culture Hofstede's model of national cultures High-context and low-context cultures Cultural Intelligence Emotional intelligence overview Cultural intelligence overview Cultural Profile Cultural profile dimensions Understanding your cultural profile
Employee Assistance Programme Training
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.