Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. Exploring Cisco Tetration Data Center Challenges Define and Position Cisco Tetration Cisco Tetration Features Cisco Tetration Architecture Cisco Tetration Deployment Models Cisco Tetration GUI Overview Implementing and Operating Cisco Tetration Explore Data Collection Install the Software Agent Install the Hardware Agent Import Context Data Describe Cisco Tetration Operational Concepts Examining Cisco Tetration ADM and Application Insight Describe Cisco Tetration Application Insight Perform ADM Interpret ADM Results Application Visibility Examining Cisco Tetration Intent-Based Networking Describe Intent-Based Policy Examine Policy Features Implement Policies Enforcing Tetration Policy Pipeline and Compliance Examine Policy Enforcement Implement Application Policy Examine Policy Compliance Verification and Simulation Examining Tetration Security Use Cases Examine Workload Security Attack Prevention Attack Detection Attack Remediation Examining IT Operations Use Cases Key Features and IT Operations Use Cases Performing Operations in Neighborhood App-based Use Cases Examining Platform Enhancement Use Cases Integrations and Advanced Features Third-party Integration Examples Explore Data Platform Capabilities Exploring Cisco Tetration Analytics Administration Examine User Authentication and Authorization Examine Cluster Management Configure Alerts and Syslog Additional course details: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for System architects, system administrators, IT managers, VMware partners, and individuals responsible for implementing and managing vSphere architectures who want to deploy vSphere 8.0 into their existing vSphere environment. Overview By the end of the course, you should be able to meet the following objectives: Recognize the importance of key features and enhancements in vSphere 8.0 Describe vCenter Server, VMware ESXi, storage, virtual machine, and security enhancements in vSphere 8.0 Describe the purpose of vSphere Distributed Services Engine Update an ESXi host equipped with a Data Processing Unit (DPU) using vSphere Lifecycle Manager Identify devices supported for system storage on ESXi 8.0 Recognize enhancements to VM hardware compatibility settings VMware vSphere Memory Monitoring and Remediation and the improvements to vSphere DRS Recognize the new Virtual Non-Uniform Memory Access (vNUMA) topology settings of a VM in vSphere Client Use vSphere Lifecycle Manager and Auto Deploy to manage the configuration specifications for the hosts in a cluster Recognize the vSphere Lifecycle Manager and Auto Deploy enhancements in vSphere 8.0 Recognize the cloud benefits that VMware vSphere+ brings to on-premises workloads Recognize technology that is discontinued or deprecated in vSphere 8.0 In this two-day course, you explore the new features and enhancements following VMware vCenter Server 8.0 and VMware ESXi 8.0. Real-world use-case scenarios, hands-on lab exercises, and lectures teach you the skills that you need to effectively implement and configure VMware vSphere 8.0. Course Introduction Introductions and course logistics Course objectives Artificial Intelligence and Machine Learning Describe how device groups support AI and ML in vSphere 8 Describe how device virtualization extensions support AI and ML in vSphere 8 vSphere Distributed Services Engine Describe the benefits of Distributed Services Engine Explain how Distributed Services Engine works Recognize use cases for Distributed Services Engine Install ESXi on a host equipped with a DPU View DPU information in vSphere Client Add an ESXi host equipped with a DPU to a cluster Update an ESXi host equipped with a DPU using vSphere Lifecycle Manager Create a vSphere Distributed Switch for network offloads Add a host with a DPU to the vSphere Distributed Switch Configure a VM to use Uniform Passthrough Mode vSphere and vCenter Management Review the improvements to the communication between vCenter and ESXi hosts Review the enhancements to the vCenter recovery process ESXi Enhancements Describe the function of the central configuration store in ESXi Explain how ConfigStore affects your interaction with ESXi configuration files Recognize the supported system storage partition configuration on ESXi 8.0 Identify devices supported for system storage on ESXi 8.0 Configure an RDMA host local device on ESXi vSphere Storage Describe the vSAN Express Storage Architecture Recognize the benefits of using vSAN Express Storage Architecture Describe the benefits of using NVMe Recognize the support for NVMe devices in vSphere Guest OS and Workloads Review the enhancements of the latest virtual hardware versions Describe the features introduced with virtual hardware version 20 Create a snapshot of a VM with an NVDIMM device Resource Management View energy and carbon emission metrics in vRealize Operations Manager Describe the VMware vSphere Memory Monitoring and Remediation (vMMR) functionality Describe how vMMR enhances the performance of vSphere DRS Security and Compliance Describe how to handle vTPM secrets when cloning a VM Manage OVF templates for VMs that are configured with vTPM Deploy an OVF template with vTPM Describe the enhancements to trusted binary enforcement in ESXi Describe ESXi 8 enhanced security features vSphere Lifecycle Manager Describe the enhancements to life cycle management of standalone ESXi hosts Manage the configuration profiles of ESXi hosts in a cluster with vSphere Lifecycle Manager Use Auto Deploy to boot a host with the desired image and configuration specifications Upgrade multiple ESXi hosts in a cluster in parallel Stage an ESXi host image prior to remediation Auto Deploy Manage custom host certificates using Auto Deploy vSphere with Tanzu Describe the features of the Tanzu Kubernetes Grid 2.0 offering Announcing vSphere+ Describe the functionality and benefits of vSphere+
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Identify key benefits of Workspace ONE Access to address your specific use case Describe the different identity sources supported by Workspace ONE Access and apply the most appropriate to your organization's use case Differentiate common authentication methods in Workspace ONE Access and select the most suitable method to fit your business needs Illustrate how to use access policies and implement best practices within your organization Outline various authentication methods and workflows that can be implemented to ensure a robust end-user experience, while meeting your security requirements Summarize the capabilities and benefits of VMware Workspace ONE Intelligent Hub and Hub Services and learn how to effectively implement both Discuss how to implement Workspace ONE Intelligent Hub and Hub Services effectively Describe features of VMware Workspace ONE Intelligence⢠and how to use it to support daily administration and maintenance Explain how to use the Workspace ONE UEM and Workspace ONE Access APIs to perform administration and maintenance Outline Workspace ONE design methodology and how it can apply to your organization In this five-day course, you build on the foundations learned in VMWare Workspace ONE: Deploy & Manage to accelerate the advancement of your deployment and management systems with VMware Workspace ONE© UEM and VMware Workspace ONE© Access?.Through a series of hands-on labs, simulations, and interactive lectures, you effectively evaluate your organization?s current practices and discover opportunities to target improvements in identity, authentication, and access management. Additionally, you learn the strategies and techniques necessary to construct an integrated management strategy, utilizing a comprehensive set of VMware Workspace ONE© services, including Hub Services, the Unified Catalog, Intelligence, and the API. Course Introduction Introduction and course logistics Course objectives Workspace ONE Platform List the high-level components of the Workspace ONE platform Identify benefits of integrating Workspace ONE Access with other Workspace ONE products Explain what services Workspace ONE Access offers Outline the use cases for Workspace ONE Access Connector Identity Sources Identify different directory types in Workspace ONE Access based on identity sources Explain supported web standards for identity Explain Workspace ONE Access workflows of an Active Directory and an LDAP directory Identify features and use cases of third-party identity sources Identify the features and use cases of the VMware AirWatch© Provisioning app Authentication Identify the benefits of modern identity and access management Explain the workflows of connector-based authentication methods, such as Kerberos, RADIUS, and RSA SecureID Explain the workflows of cloud-based authentication methods, such as mobile SSO for iOS, mobile SSO for Android, and Workspace ONE Verify Access Policies Explain access policies and their importance Describe how identity providers (IdPs) and authentication methods work with access policies Explain how to create policy rules following best practice Catalog Define the types of resources in the Workspace ONE Access catalog Outline the common SAML authentication initiation methods for web applications in Workspace ONE Access Describe the high-level integration steps of a Horizon Cloud integration with Workspace ONE Access Hub Services Describe the relationship between Hub Services, Workspace ONE Intelligent Hub, Workspace ONE UEM, and Workspace ONE Access Illustrate the primary components of Hub Services Describe the features and use cases of Workspace ONE Verify Explain how to deploy mobile flows according to a use case Workspace ONE Intelligence Describe how Workspace ONE Intelligence supports your deployment and management strategy Explain how the Digital Employee Experience Management Solution helps improve employees' Anywhere Workspace journey Explain how you can use Dashboards to access different data for your device management use cases Explain how integration works to connect and share data with third parties Workspace ONE Application Programming Interface Outline the use cases for using the Workspace ONE API Explain how to perform Workspace ONE UEM administration and maintenance through the API Explain how to perform Workspace ONE Access administration and maintenance through the API Design Methodology Explain the Workspace ONE business drivers and use case definition Define Workspace ONE services Discuss how to make architectural design decisions Explain how to create component designs Discuss which third-party components are required for infrastructure design Discuss the process of platform integration Explain the required services for service integration Explain how to design user experience
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview After completing this course, students will be able to: •Analyze data by using queries and reports. •Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server. •Deploy and manage the Configuration Manager client. •Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. •Identify and configure the most appropriate method to distribute and manage content used for deployments. •Distribute, deploy, and monitor applications for managed users and systems. •Maintain software updates for PCs that Configuration Manager manages. •Implement Endpoint Protection for managed PCs. •Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices. •Configure an operating-system deployment strategy by using Configuration Manager. •Manage and maintain a Configuration Manager site. In this course, students will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot Lab : Creating and running queries Lab : Configuring SSRS Lab : Analyzing the real-time state of a device by using CMPivot Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections Lab : Configuring boundaries and resource discovery Lab: Configuring user and device collections Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations Lab : Deploying the Microsoft System Center Configuration Manager client software Lab: Configuring and monitoring client status Lab : Managing client settings Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Lab : Configuring software metering Lab : Configuring and managing Asset Intelligence Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Lab : Managing application supersedence and removal Lab : Deploying virtual applications by using Configuration Manager (Optional) Lab : Using Configuration Manager to deploy Windows Store apps Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates Lab : Configuring the site for software updates Lab : Deploying and managing software updates Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies Lab : Implementing Microsoft System Center Endpoint Protection Lab : Implementing advanced threat policies Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access Lab : Managing compliance settings Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service Lab : Preparing the site for operating -system deployment Lab : Deploying operating -system images for bare-metal installations Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance Backing up and recovering a Configuration Manager site Lab : Configuring role-based administration Lab : Configuring Remote Tools Lab : Maintaining a Configuration Manager site Additional course details: Nexus Humans 20703-1 Administering System Center Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20703-1 Administering System Center Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize the basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize the alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze a Workspace ONE UEM deployment Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionalities that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform, endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge for effectively implementing Workspace ONE UEM.Also, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to securely distribute business-critical applications from any device and to configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure Workspace ONE Access and Workspace ONE UEM system and productivity integrations.You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Overall, the course lays out the foundational principles of identity and access management.Please note - This course is a combination of the VMware Workspace ONE: Skills for UEM and the VMware Workspace ONE: Integrations course. Course Introduction Introductions and course logistics Course objectives Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for the Workspace ONE solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process of integrating with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize the platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use case for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable. Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway Describe the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List view and the Details view. Analyze endpoint deployment and compliance data from the Workspace ONE UEM Monitor page. Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline the authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application SSO authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile SSO Outline the mobile SSO workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Workspace ONE: Deploy and Manage [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Workspace ONE: Deploy and Manage [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Searching in the Configuration Manager console Using Windows PowerShell with Configuration Manager Using Configuration Manager Service Manager to manage components Monitoring site and component status Reviewing log files by using the Configuration Manager Trace tool Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. Describe the Configuration Manager architecture. Describe the management tools that you use to perform administrative functions for Configuration Manager. Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. Analyzing data using queries and reports Introduction to queries Configuring Microsoft SQL Server Reporting Services (SSRS) Lab : Creating and running queriesConfiguring boundaries and resource discovery Creating data queries Creating subselect queries Creating status message queries Lab : Configuring SSRS Configuring a reporting services point Creating a report by using Report Builder Create and configure data and status message queries. Configure and manage SSRS and the reporting services point. Preparing the management infrastructure to support PCs and mobile devices Configuring site boundaries and boundary groups Configuring resource discovery Configuring the Exchange Server Connector for mobile device management Configuring user and device collections Lab : Configuring boundaries and resource discovery Configuring boundaries, boundary groups, and fallback relationships Configuring Active Directory discovery methods Lab : Configuring user and device collections Creating a device collection Creating a user collection Configuring a maintenance window Configure boundaries and boundary groups. Configure resource discovery. Configure the Exchange Server connector mobile device management. Organize resources using device and user collections. Deploying and managing clients Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings in Configuration Manager Lab : Deploying the Microsoft System Center Configuration Manager client software Preparing the site for client installation Deploying the Configuration Manager client software by using client push installation Lab : Configuring and monitoring client status Configuring and monitoring client health status Lab : Managing client settings Configuring client settings Describe the requirements and considerations for installing the Configuration Manager client software. Deploy the Configuration Manager client software. Configure and monitor client status. Manage Configuration Manager client settings. Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Configuring and managing hardware inventory Lab : Configuring software metering Configuring software metering Lab : Configuring and managing Asset Intelligence Preparing the site for Asset Intelligence Configuring Asset Intelligence Monitoring license agreements by using Asset Intelligence Viewing Asset Intelligence reports Describe inventory collection. Configure and collect hardware and software inventory. Manage inventory collection. Configure software metering. Configure Asset Intelligence. Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Installing a new distribution point Managing content distribution Prepare the infrastructure for content management. Distribute and manage content on distribution points. Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Installing and configuring the Application Catalog roles Creating applications with requirements Deploying applications Lab : Managing application supersedence and removal Managing application supersedence Uninstalling the Excel Viewer application Lab : Deploying virtual applications by using Configuration Manager (Optional) Configuring support for App-V Deploying virtual applications Lab : Using Configuration Manager to deploy Windows Store apps Configuring support for sideloading Windows Store apps Configuring a Windows Store app Deploying Windows 10 apps to users Describe the application management features of Configuration Manager. Create applications. Deploy applications. Manage applications. Configure and deploy virtual applications. Configure and deploy Windows Store apps. Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Lab : Configuring the site for software updates Configuring and synchronizing the software update point Lab : Deploying and managing software updates Determining software update compliance Deploying software updates to clients Configuring automatic deployment rules Describe how the software updates feature integrates with Configuration Manager. Prepare the Configuration Manager site for software updates. Manage the evaluation and deployment of software updates. Configure automatic deployment rules. Monitor and troubleshoot software updates. Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Lab : Implementing Microsoft System Center Endpoint Protection Configuring the System Center Endpoint Protection point and client settings Configuring and deploying Endpoint Protection policies Monitoring Endpoint Protection Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. Configure, deploy, and manage Endpoint Protection policies. Managing compliance and secure data access Overview of Compliance Settings Configuring compliance sett
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze Workspace ONE UEM deployments Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce Summarize basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway⢠platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist⢠In this extended five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge necessary to implement Workspace ONE UEM effectively.In addition, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to distribute business-critical applications securely from any device and configure access management controls. You will learn how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on, and you will leave with an understanding of the fundamental principles of identity and access management.Finally, you learn to investigate, analyze, and determine issues that might occur with the different components of Workspace ONE UEM. Troubleshooting is the backbone of service maintenance and management. By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management. Course Introduction Introductions and course logistics Course objectives Online resources and references Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for Workspace ONE Solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process and needs to integrate with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager? and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use cases for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway and the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List View and the Device Details View pages Analyze endpoint deployment and compliance data from the Monitor Overview page Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions that Workspace ONE Access enables Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Explain the integrations workflow Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by Unified Access Gateway Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of VMware Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common issues related to group management and assignment Outline common issues related to Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain Workspace ONE Access integration and Workspace ONE Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Understand how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Application Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway And Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify
Supporting Women in Leadership Throughout The UK Our women in leadership course is specifically designed to target challenges and support women in developing their leadership and management careers. AWARD WINNING LEADERSHIP DEVELOPMENT PROGRAMME Discover Our Women in Construction Management Course The Power Within is dedicated to helping women in construction across England and Scotland achieve business success through our Motivational Intelligence framework. Motivational Intelligence is the third level of intelligence, and the science behind it has won a Nobel Prize. Our women leadership in construction course supports women by improving their motivation, self-belief, decision-making, and leadership skills. This programme is designed to help female business leaders adapt more quickly to their environment, handle adversity more effectively, take productive action, and thrive during times of change. Each is a vital skill needed in today’s ever-changing business environment. When completed, you’ll have the skills needed to make decisions more effectively that help your business grow, become more resilient, and take opportunities when others are stuck. "This course has completely changed my outlook on my responsibilities as a manager/leader. In 26 years with Pfizer, I have never participated in a programme that has as profoundly changed my perspective on my role, my responsibilities and my ability to positively impact my team." FEMALE DIRECTOR OF BUSINESS SERVICES, PFIZER LEADING WITH MOTIVATIONAL INTELLIGENCE What is our Women in Construction Course? In the past five years, we’ve supported thousands of business leaders and managers in nurturing the skills and mindset needed to achieve and exceed their business goals. The Power Within knows women are incredibly effective and consistent at applying our Motivational Intelligence techniques to their lives and business. Our women in construction management course is designed to give you the skills you need to take charge of your business and ensure constant growth while future-proofing your business. The training is perfect for women in construction who are managers or leaders looking to: Quickly Adapt Their Team to Change Effectively Mentor Every Team Member Improve Communication and Collaboration Gain More Buy-In to New Goals or Strategies Transform Their Team Culture Increase Initiative and Self-Motivation Across Their Team How We Help Women in the Construction Industry Our course focuses on imparting fundamental skills, tactical best practices, and powerful insights into the human side of the business. You’ll be provided with valuable knowledge needed to be successful leaders and managers of all levels. We’ll focus on addressing the challenges new businesses around the world face, like leading teams and developing businesses in turbulent and transitional times as well as overcoming the challenges of being women in the construction industry. Throughout the course, particular emphasis is given to helping leaders raise motivational intelligence and foster a growth mindset within their team. LEADING WITH MOTIVATIONAL INTELLIGENCE Our Leading with Motivational Intelligence (MQ) Executive Diploma Programme is specifically designed to help participants create the “complete game” of leadership and management. Leveraged by more than 40% of the largest Fortune 500 companies and implemented around the world, the Leading with Motivational Intelligence (MQ) consistently receives a participant buy-in rate in excess of 97%. However, the most important statistic is: 12 months after completing the course more than 93% of participants continue to use the skills and techniques taught on a daily basis. SQA APPROVED EXECUTIVE DIPLOMA What Skills Do We Help Women in Construction Develop? The skills we teach through our women in construction management courses are delivered through seven modularised sessions, each between three and three-and-a-half hours per session, with all sessions starting at 9:30 am via Zoom. An additional two hours per week is spent working on the online training assignments and leadership development plan. Each session will provide the education and information needed to establish yourself in your business. Here is more information regarding each session and the skills taught: SESSION 1: SELF-LEADERSHIP & THE SECRET TO PERSONAL SUCCESS Our first module is focused on setting course expectations and creating the right environment for learning. We’ll introduce the format and logistics, then discuss leading through turbulent times and how we can take control of ourselves, our thoughts, and our actions to lead growth. There is also a discussion on adult learning techniques and how leaders can leverage them to improve the effectiveness of their teams. We’ll also explore how turbulence and transition have changed how we manage and lead our teams. SESSION 2: THE ROLE OF INTELLIGENCE WHEN LEADING In this session, we’ll discuss the three levels of human intelligence and show how they each play in an individual’s performance and behaviors. Through two distinct mindsets, you’ll be shown how an individual’s motivational intelligence ultimately influences their emotional intelligence and intelligence quotient (IQ). Depending on which mindset a person operates under ultimately dictates their view of themselves, opportunities, and the work at which they will allow themselves to succeed. Finally, we’ll discuss switching your team to a growth mindset. SESSION 3: THE PILLARS OF HUMAN PERFORMANCE Completing this session will allow you to deconstruct the components that create a motivational intelligence growth mindset. Through discussion, you’ll see how most organizational challenges can be directly tied back to lapses in these components. We’ll review the leaders who’ve had the most significant influence on the meeting participants and shows the commonalities that make these leaders stand out. Lastly, we’ll introduce terminology, tools, and techniques that leaders can leverage to better coach and mentor their team. SESSION 4: MANAGEMENT VERSUS LEADERSHIP: THE TWO CRITICAL AND CO-DEPENDENT SKILLSETS FOR CREATING TEAM SUCCESS We’ll discuss the difference between a manager’s and a leader’s focus. The discussion focuses on the two most common management mistakes and how they undermine team culture and individual performance. The final debate focuses on the five critical best practices of excellent management, including clearly defining and communicating goals, creating alignment and buy-in, setting proper expectations, monitoring performance, and recognizing and rewarding performance. Our final portion will work to define what management is. Session 5: Exploring and Defining Leadership: Dispelling the Myths that Surround It Session 5 strives to define leadership. Building on this definition is a follow-up discussion regarding how people develop their leadership abilities. We’ll explore the underpinnings of what creates a successful leader. It also includes the importance of asking questions and active listening. We’ll review the five behavioral characteristics associated with motivational intelligence and how leaders can assess the relative strengths or weaknesses of the characteristics within their team. Lastly, we’ll explore great leaders’ five critical best practices, including communicating a compelling vision, modeling the correct behaviors, establishing a team culture anchored in responsibility, consistently building team confidence and self-esteem, and proactively coaching and mentoring. SESSION 6: BUILDING A LEADERSHIP TOOLBOX FOSTERING ADAPTABILITY, RESILIENCE, AND COURAGE We’ll provide information regarding tools and techniques that leaders can utilize to foster greater accountability and ownership win their teams. The Power Within will explore self-esteem’s critical role in the relative strength or weakness of a person’s motivational intelligence and adaptability in life. We’ll discuss how self-esteem has formed and how it will influence how a person interprets feedback in life. Lastly, we’ll explore levels of self-esteem and the associated behaviors of each. SESSION 7: HELPING EMPLOYEES DEVELOP A HEALTHY PERSPECTIVE AND RESILIENT ATTITUDE During the final session, we’ll explore self-esteem’s critical role in the relative strength or weakness of a person’s motivational intelligence and adaptability in life. We’ll talk about how self-esteem is formed and how it influences how a person interprets feedback. Finally, we’ll explore levels of self-esteem and the behaviors of each and the influence of comfort zones, and the tools that leaders can use to help people escape the fear of change. Our Course Leaders The Power Within was founded by husband and wife team James and Enas Fleming, to inspire people worldwide to think bigger, be better, and achieve more. They both work on a personal level with individuals, businesses, and organisations to help them create leaders and build environments where they can thrive. James and Enas challenge the limits with the Motivational Intelligence formula to help you broaden your perspective and create a future on your terms. Here is more about your course instructors: James Fleming James Fleming – James Fleming, the co-creator of The Power Within. He wanted to inspire people around the world to think better, be better, and achieve more. James believes everyone can do whatever they set their minds to. Founding The Power Within allowed James to turn that deep knowledge into a business that helps others think bigger, better, and achieve more daily. He strives to give leaders the tools and knowledge to achieve their full potential while increasing their self-confidence and self-belief through the Motivational Intelligence Revolution. James wants to support today’s businesses to become tomorrow’s leaders. Mari Steyn Mari is the go-to person for building self-esteem, offering new perspectives and stepping up in Life. With an endless abundance of excitement and love for all people, combined with degrees in Psychology, Knowledge and Information Management and is a Master NLP and Transformation Coach and International NLP and Coaching Trainer and Executive Coach, Mari offers an attractive, fresh, expert approach to Emotional Freedom, Motivational Intelligence, Leadership Development and ReWriting your Story. We undoubtedly have the power within to alchemize ourselves and any situation! Seeing the light go on in someone’s eyes is my ultimate joy. Take Charge with Our Women in Construction Course The Power Within is a Motivational Intelligence company dedicated to helping businesses and leaders become more accountable, resilient, adaptable, and capable of handling all challenges, regardless of the complexity. Our women in construction management course build upon best practices, strategic insights, and lessons learned over three decades of building leadership universities for Fortune 500 companies. Throughout the course, emphasis is given to helping leaders raise their motivational intelligence and foster a growth mindset within their team. You’ll gain the skills you need to successfully lead your team and overcome adversity while ensuring your company is profitable. To learn more about our course or to register, reach out today.
Workplace Innovation Are You A Leader Who Wants To Enhance Your Team’s Accountability, Adaptability, Resilience, And Well-Being? Consider joining our newly launched Growth Leadership Programme: Workplace Innovation, subsided by Scottish Enterprise, which offers a unique approach to leadership development and workplace Innovation, emphasising Motivational Intelligence (MQ). Our programme will help you build on your leadership capabilities and confidence while creating a more innovative, productive, and fair workplace for employee development and growth. Growth Leadership: Workplace Innovation Leading with Motivational Intelligence (MQ) You’ll learn to: Develop MQ leadership skills that encourage fair and innovative workplace practices and inclusive economic growth. Increase engagement, innovation, and productivity among your team. Enhance your strategic decision-making skills. Build a resilient, agile, and change-driven team culture. Identify and integrate organisational values into your workplace culture. Create a successful business that is also a fair place to work. Session Overview Our comprehensive programme, consisting of eight engaging and insightful sessions, is meticulously crafted to provide a world-class education in Leadership, Workplace Innovation and Motivational Intelligence (MQ). We combine some of the most potent, powerful and cutting-edge research in workplace innovation, neuroscience and the most promising discoveries in cognitive and social psychology of the 20th century. 01 Self-Leadership and The Secret to Personal Success Session 1: Self-Leadership and The Secret to Personal Success This comprehensive kick-off session delves into the foundations of self-leadership and personal success. Participants will explore various aspects, from setting course expectations and creating a conducive learning environment to understanding motivational intelligence and managing negative thoughts. Through essential resources like the Leadership Reference Manual and Roadmap Workbook, multi-sensory perception, and spaced repetition learning techniques, participants will solidify their learnings and enhance personal and professional growth. Key Learning Outcomes: Understand the critical role of self-leadership in personal and professional success and the impact of external and internal factors on performance Develop strategies to optimise motivation, communication, and effectiveness within teams and organisations, leveraging diverse learning styles and adult learning techniques Utilise essential resources like the Leadership Reference Manual and Roadmap Workbook for ongoing growth and development while implementing practical tools like the Start, Stop, Continue plan for self-reflection and improvement Explore the power of adaptability, self-awareness, and resilience in navigating through challenging times and maintaining a positive mindset Discover the importance of a positive mental diet, gratitude, and consistent small decisions that compound over time, leading to personal and professional growth 02 The Role of Intelligence in Leadership and Management Session 2: The Role of Intelligence in Leadership and Management It's time to delve into Motivational Intelligence and its role in our personal and professional lives. In this comprehensive and interactive session, participants will explore the multifaceted aspects of intelligence in Leadership and management, focusing on IQ, EQ, and MQ. Participants will learn how to cultivate a growth mindset and motivational intelligence within themselves and their teams, fostering a culture of learning and resilience. The session will also cover the importance of crafting a clear vision for the team or organisation and provide practical strategies for effectively communicating the vision to internal and external stakeholders. Key Learning Outcomes: Understand the roles of IQ, EQ, and MQ in Leadership and management and their impact on individual and team performance Develop strategies to improve your levels of intelligence and foster a growth mindset within individuals and teams Discover the importance of vision in Leadership and management and learn to craft it using the WHERE (performance), HOW (perception), and WHY (purpose) perspectives Gain insights into effectively communicating the vision to stakeholders, ensuring alignment, ownership, and motivation Reflect on the role of a growth mindset and motivational intelligence in achieving the team's vision and fostering a culture of continuous improvement and adaptability 03 The Pillars of Human Performance: Unlocking Potential Session 3: The Pillars of Human Performance: Unlocking Unlimited Potential Discover the keys to unlocking your unlimited potential and becoming a more effective leader in this interactive course. Through engaging discussions and self-reflection, participants will dive deep into unlimited potential, understand its significance in Leadership, and learn to overcome challenges in their teams or businesses. Participants will gain insights into the characteristics of influential leaders, the importance of asking the right questions, and the value of embracing failure as a part of success. With a focus on personal and professional growth, this session will equip you with the tools and techniques to become a better manager and leader. Key Learning Outcomes: Understand the concept of unlimited potential and its importance in Leadership and personal growth Identify personal and team visions, challenges, and the role of asking the right questions in gaining insights Recognise the role of practice and reflection in transforming weaknesses into strengths Explore the characteristics and impact of great leaders and learn how to apply these traits in your leadership style Embrace the importance of failure as a crucial part of success and create a supportive environment for personal and team development 04 Defining Management and Vertical Alignment Session 4: Defining Management and Vertical Alignment In this engaging session, participants will delve into the essential differences between management and Leadership and discover how understanding these distinctions can significantly impact team culture and performance. We'll examine common management mistakes and their effects, uncover the best practices of excellent management, and discuss the development of management skills and the management hierarchy. This interactive session will provide valuable insights and actionable strategies that can be applied to personal and professional life, helping participants become more effective and successful managers and leaders. Key Learning Outcomes: Differentiating between management and Leadership: Gain a deeper understanding of how these concepts differ and their impact on team culture and performance Identifying common management mistakes: Learn about these pitfalls and their consequences on team culture and performance and develop strategies to avoid them Mastering the best practices of excellent management: Discover the five essential techniques to help you become a more effective manager Developing management skills and understanding the management hierarchy: Enhance your ability to grow as a leader and manager Embracing Ultimate Responsibility: Learn the importance of taking ownership and responsibility for your and your team's success and understand the role of motivational intelligence in achieving this 05 Workplace Innovation and High-Payoff Activities Session 5: Workplace Innovation and High-Payoff Activities n (Job Crafting) This session provides a comprehensive overview of the critical principles of workplace innovation, job crafting, people leadership, and coaching in the workplace. Participants will learn about job crafting, our MQ workplace innovation process, and the crucial role of Leadership in managing and monitoring performance in the workplace. By adopting a proactive and creative approach to their work, individuals can improve their job satisfaction, contribute to their organisation's success, and drive economic health for the nation. Key Learning Outcomes: Understanding of Leadership in the job crafting innovative process Skills in job crafting and workplace innovation Knowledge of the critical role of Leadership in performance management Techniques for effective coaching and positive feedback, through trust and mutual respect in the workplace Helping individuals reflect on their role in the success of the team and company and developing a written plan to achieve their goals 06 Defining and Exploring Leadership Session 6: Defining and Exploring Leadership In this session, we will define and explore the essence of Leadership, dispelling the myths and providing a definition that will guide you through the course. We will also explore the three-tier hierarchy of success and how leaders can influence MQ (motivational intelligence) by doing five things consistently. As a manager or leader, you may have found that your team's success is not guaranteed even with the best plans, processes, and strategies. This is because not all team members will adopt new ideas or changes unless they first believe they can achieve the desired outcome. Key Learning Outcomes: Understanding the essence of Leadership to provide an in-depth understanding of the essence of successful Leadership, dispelling the myths and providing a definition that will guide you through the course Psychology of your team: Leaders understand that to achieve their goals, they need to focus on the psychology of their team Power of questions in Leadership: Leaders can gain insight into the minds of their team members and unlock the key to motivating and developing them by asking the right questions Explore the three-tier hierarchy of success and the importance of each level in determining a person's likelihood of success Five things great leaders do each day to influence a culture of responsibility, consistently build esteem and confidence, and always work on coaching and mentoring employees 07 Building a Leadership Toolbox Session 7: Building a Leadership Toolbox: Trust & Inspiration Fostering Adaptability, Responsibility, Resilience, and Courage, this step focuses on leaders' tools and techniques to promote greater team accountability and ownership. It starts to delve into the critical role of self-esteem in a person's motivational intelligence and adaptability. We also explore how self-esteem is formed and influences a person's interpretation of feedback. We also look at self-esteem's critical role in a person's motivational intelligence and adaptability, examining how self-esteem is formed and influences a person's interpretation of feedback. Key Learning Outcomes: Understanding the tools and techniques leaders can use to foster greater team accountability and ownership Delving into the critical role of self-esteem in a person's motivational intelligence and adaptability Exploring how self-esteem is formed and influences a person's interpretation of feedback Examining the levels of self-esteem and associated behaviours of each group Understanding the influence of comfort zones and tools leaders can use to help people overcome the fear of change 08 Developing a Healthy Perspective and Resilient Attitude Session 8: Developing a Healthy Perspective and Resilient Attitude This step explores how developing a healthy perspective and resilient attitude is crucial for success as a leader. In this session, we will explore the critical role of self-reflection in building motivation and adaptability. We will examine how self-esteem is formed and how it influences a person's interpretation of feedback. We will also delve into the levels of self-esteem and the associated behaviours of each class. We will provide practical strategies for cultivating resilience and adaptability in facing challenges and setbacks. Through reflection and analysis of your moments of surprise, frustration, and failure, you will develop a growth mindset that fosters continuous learning and improvement. Key Learning Outcomes: The critical role of self-reflection in building motivation and adaptability How self-esteem is formed and influences a person's interpretation of feedback The levels of self-esteem and the associated behaviours of each class Strategies for cultivating resilience and adaptability in the face of challenges and setbacks The influence of affirmations and tools leaders can use to help people overcome the fear of change
It's a fact of life that costs generally increase and as a result prices must go up too. Implementing an increase without losing customers is challenging. Talking about a price increase with customers never makes for an easy conversation. Your customers will generally decide whether to accept the increase based upon value, as well as the hassle cost of switching and going elsewhere. Even the most experienced salesperson who has implemented price increases before will be fighting back the nerves when faced with the task of 'selling' the increase. In this flexible programme, we will support your internal preparations at whichever stage you and your colleagues are at. From making the decision to increase prices, right through to those on the frontline already dealing with any push-back. This programme will help participants: Understand the business case for increasing prices Take steps to research the market Consider their customers' motivations Use the six principles of influence Identify and adapt for different personality styles Assess their level of trust with customers Build rapport rapidly with their customers and prospects 1 Raising prices - keys to success Understanding the business case Researching the market Assessing the value of your offering 2 Understanding your customer base Assessing your key accounts What is your 'target' customer range? Creating consistency in pricing approach 3 Planning the increase Timing your implementation Communication strategy Elements of a good price increase letter 4 Developing influencing skills The Trust Equation The six principles of influence Discovering your customer's buying decisions 5 Emotional intelligence and price increases The part emotion plays Developing strategies for keeping calm Handling your customer's responses 6 Understanding different customer styles Discover your own style Recognising behaviour traits in others Adapting your approach to their style 7 Preparing for customer contact Preparing for specific customers Anticipating their response Dealing with challenging customers 8 Following through Maintaining a consistent approach Resisting requests for discounts Confirming the increase in writing