Overview This course sets out to develop attendee’s skills in understanding their own body language as well as being able to read the body language of others. If we can learn to identify and appreciate non-verbal clues, we can begin to improve our communication as a whole. This use of body language skills could impact situations such as; sales visits, interviews, presentations and normal day-to-day interactions where body language plays a part. Description Effective communication skills are critical in the development of relationships between people and although verbal communication plays a large part in this, studies have shown that a proportionate amount of our message comes from not what we say, but very often the non-verbal communication behind the message. Therefore, it is clear that body language is an important, influential aspect of communication and understanding how it works is essential in the development of your personal communication skills. Topics covered: Core Principles and the Five C’s – Exploring the subconscious effects of body language and setting the scene by ensuring participants appreciate the rules to interpreting body language. Reading Body Language – Gestures – An activity that helps participants realise the power of body language and how important it is to communication. Arm Barriers – Understanding the different arm barrier gestures and crossed arm positions and what each means. Palm and Handshake Gestures – Discussing the different handshakes and palm actions, what they mean and how they are applied in real life. Includes activities that test the theory. Hand and Thumb Gestures – A review of these different gestures and what they mean. Hand to Face Gestures…or… How to Spot a Liar! – An exploration of different gestures that involve the hand moving to the face. Identifying how to spot body language that signifies lying and what to watch out for. Chin and Cheek Gestures – An activity that helps participants understand the different chin and cheek gestures and how to interpret this body language. Eye Signals – A review of pupil dilation, directed gazes and eye accessing cues in order to fully understand how eyes provide body language clues. Matching & Mirroring – Looking at the technique of building rapport and developing relationships through careful observation of body language. Bringing it all Together – An activity that allows participants to embed their learning and realise how much they now understand and appreciate body language and its effect on communication. Who should attend Anyone who wants to gain a better understanding of their own body language, and that of others. Requirements for Attendees None.
The main subject areas of the course are: the properties of asbestos and health effects of exposure to asbestos fibres an introduction to regulatory requirements types of asbestos and its uses in buildings types of asbestos surveys the asbestos register, risk assessment and management plan asbestos remediation
Business Relationship Management Fundamentals: In-House Training Business Relationship Management (BRM) Fundamentals introduces BRM as a capability, role, and discipline. What you will Learn Participants can expect an interactive and lively one-day session, with a high-level introduction to successfully navigate the complexity of BRM. Topics include: Defining BRM as a capability, role, and discipline Understanding what a BRM does and does not do Providing the language needed to change perceptions and perspectives Learn how the BRM discipline interacts with other disciplines (project management, architecture, Business Analysts, Business functions, strategy, etc.) inside an organization Basic introduction to the different frameworks, processes, and models to bring structure and guidance to BRM Introductions Why BRM? BRM defined BRM in action BRM value Reflection and next steps Resources
Essential EVPN training course description Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN) are emerging technologies providing Ethernet services over MPLS. This course studies the technologies in E-VPN/PBB-EVPN providing multi-homing, multi pathing, auto discovery, multicast, forwarding and fast convergence. What will you learn Differentiate between E-VPN and PBB-EVPN. Explain how E-VPN operates. Explain how PBB-EVPN operates. Explain how E-VPN provides: Multi homing Multi pathing Auto discovery. Essential EVPN training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers Concise MPLS for engineers Duration 2 days Essential EVPN training course contents Introduction to EVPN Network virtualization What Is network virtualization? types of virtual networks, network tunnelling, the consequences of tunnelling, packet load balancing, network interface card behaviour. maximum transmission unit, lack of visibility, VXLAN, protocols to implement the control plane, support for network virtualization technologies, merchant silicon Software, standards. The building blocks of Ethernet VPN A brief history of EVPN, architecture and protocols for traditional EVPN deployment, EVPN in the data center BGP constructs for Virtual networks, address family indicator/subsequent address family indicator, route distinguisher, route target, RD, RT, and BGP processing, route types, modifications to support EVPN over eBGP, keeping the NEXT HOP unmodified, retaining route targets, FRR support for EVPN, automatic propagation of NEXT HOP, RT/RD derivation, what Is not supported in FRR. Bridging with Ethernet VPN An overview of traditional bridging, overview of bridging with EVPN, what Ifs, why does NVE L3 get an advertisement for MACA? handling BUM packets, handling MAC moves, support for dual-attached hosts, the host-switch Interconnect, VXLAN model for dual-attached hosts, switch peering solutions, handling Link failures, duplicate multi-destination frames, ARP/ND suppression. Routing with Ethernet VPN The case for routing in EVPN, routing use cases in the data center, routing models, where is the routing performed? centralized routing, distributed routing, how routing works in EVPN, asymmetric routing, symmetric routing, VRFs in EVPN routing, summarized route announcements, BGP support for EVPN routing, comparing asymmetric and symmetric models, vendor support for EVPN routing. Configuring and administering Ethernet VPN The sample topology, configuration cases, configuring the MTU, the end first: complete FRR configurations, the Invariants: configuration for the spines, firewall, and servers, centralized routing, asymmetric distributed routing, symmetric routing, dissecting the configuration, configuring the underlay, configuring the overlay: FRR configuring the overlay: interfaces, examining an EVPN network, show running configuration, show BGP summary, show EVPN VNIs and VTEPs, identify which VTEP advertised a MAC address, comparing FRR and Cisco EVPN configurations, considerations for deploying EVPN in large networks.
Video coding training course description This course investigates the characteristics of video coding with an emphasis on compression and the standards used in IP networks. What will you learn Explain how video coding works. Describe the main video coding standards. Evaluate and compare the major video coding standards. Video coding training course details Who will benefit: Anyone working with MPEG. Prerequisites: None. Duration 2 days Video coding training course contents Introduction Video coding systems, encoding, transmission, decoding. Digital video formats: Old formats (CIFâ¦), PC formats (VGAâ¦), SD, HD, UHD. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing. Codec types Lossy, lossless, uncompressed. Quality, bandwidth. Video Fps, bitstreams, pictures, frames, fields. Aspect ratios. Colour Colour perception, RGB, YUV, YCbCr sampling, 4:00, 4:2:0, 4:2:2, 4:4:4. Hybrid video coding scheme Picture partitioning, intra prediction, inter prediction, motion estimation, residual coding, in loop filtering, entropy coding. Containers Relationship with codecs, audio, video. Audio Video Interleave (.avi), .asf, QuickTime, AVCHD, Flash, .mp4, 3gp. MPEG-TS. MPEG Analysing MPEG frames. Video coding standards H.264/AVC: Profiles MPEG, bit rates, resolution. I, B, P frames, GOP. MPEG 2, MPEG 4, H.264, H.265, VP9, AV1. Hands onand levels, how it works. H.265/HEVC: Profiles and levels, Quadtrees, slices, how it works. Open video coding: VP8, VP9, AV1.
Sockets programming training course description A hands on course for programmers using Sockets. It is important to recognise that the course assumes that delegates are already familiar with TCP/IP and Python. Practical exercises follow all the major theory sessions. What will you learn Read Python programs which use Sockets. Write Python programs which use Sockets. Debug Python programs which use Sockets. Sockets programming training course details Who will benefit: Programmers working with network applications. Prerequisites: TCP/IP foundation for engineers Python for network engineers Duration 2 days Sockets programming training course contents What is a socket? Review of IP, ICMP, UDP vs TCP, IP addresses, protocol numbers, ports. API's, UNIX I/O, sockets. SOCK_STREAM, SOCK_DGRAM. Hands on Compile and run code. The systems calls Clients and servers, structs, socket(), bind(), connect(), listen(), accept(), send(), recv(), sendto (), recvfrom(), close(), shutdown(), getpeername(), gethostname(). Hands on Walk through of example client and server code. First code TCP connections, passive opens, active opens. Hands on Write a simple 'hello world' server and client. Application protocols User character stream, ASCII turn taking, binary protocols. Hands on Raw SMTP, Writing a mail client. Clients Concurrency, polling, threads, event driven programming. Hands on Conferencing application. Servers Concurrency, stateful, stateless. Forks and execs. inetd. Hands on Running servers with and without inetd, chroot jails, conferencing server modifications. Advanced techniques Blocking, select(), partial send(s). Raw sockets, example sockets using Java, Perl and PHP. Hands on A broadcast application.
Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.
An opportunity to learn about a structured assessment of chest pain. Primarily looking at Acute Coronary Syndrome (ACS), but also other differentials such as myopericarditis, dissection.
Course Objectives At the end of this course you will be able to: Manage project costs Consolidate and reuse project plan information Exchange project plan data with other applications Update a project plan Customise Project to meet specific requirements ' 1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk Customer Feedback Really useful and engaging course. Learnt a lot that will be very beneficial in my job. Trainer was great. Kelly Moreley - TACT Very happy with the course. Worked as a good refresher from what I knew already and enhanced my knowledge further Jenny Price - Acer ' With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Exchanging Project Plan Data with Other Applications Import a list of tasks from Outlook Import a Task List from an Excel File Create a Custom Import Map Export Project Plan Cost Data into Excel Save Project Plan Information as a Web Page Updating a Project Plan Enter Task Progress Information View Task Progress Split a Task Reschedule a Task Creating Custom Fields Text fields Lookup fields Calculated fields with the use of formulas and functions Inserting Graphical Indicators Customizing how you look at data Filter Tasks in a Project Plan Create a Custom Table Create a Custom View Copy custom Views and Tables between projects Earned value analysis Understanding Earned Value Fields View Multiple Baselines in a Single Project Tracking progress between interim plans Creating Custom Reports Create a Custom Report Modify a Custom Report's Header and Footer Add a Picture to a Report Modify a Custom Report's Margins Print a Custom Report Re-using Project Plan Information Create a Project Plan Template Create a Custom Combination View Make Custom Views Available to Other Project Plans Share Resources between Projects, Create a Master Project Plan with sub projects Who is this course for? Who is this course for? This course is designed for those that who already have the skills to create and modify project plans and would like to acquire a more in depth and thorough knowledge of more advanced functionalities in project planning and tracking. Requirements Requirements Preferably, delegates would have attended the MS Project Introduction course. Career path Career path Microsoft Office know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills
Definitive 802.1X training course description A hands-on training course concentrating solely on 802.1X. Hands on sessions follow major chapters to reinforce the theory. What will you learn Describe 802.1X. Explain how 802.1X works Configure 802.1X Troubleshoot 802.1X. Definitive 802.1X training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: SIP for engineers Duration 2 days Definitive 802.1X training course contents Introduction What is 802.1X? Authentication access, 802.3, 802.11. IEEE, 802, 802.1X-2001, 802.1X-2010. Architecture Supplicant, Authenticator, Authentication server, EAP, EAPOL, RADIUS, Diameter. Port configuration 802.1X in a switch environment. Hands on Configuring 802.1X. How it works Controlled ports, uncontrolled ports. Authentication flow chart, Initialisation, initiation, negotiation, authentication. Hands on 802.1X packet analysis. 802.1X and 802.11 WiFi, WiFi security. Hands on 802.1X WiFi port access. EAP Extensible Authentication Protocol, RFC 3748, RFC 5247. EAP methods: Weak, MD5, LEAP, Strong: TTLS, TLS, FAST. Encapsulation: 802.1X, PEAP, RADIUS, Diameter, PPP. 802.1X accounting RADIUS, accounting messages, 802.1X accounting AV pairs. 8021.X and VLANS VLANs, Guest VLAN, restricted VLAN, voice VLAN. Hands on VLAN assignments with 802.1X.