• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

12606 Manager courses delivered Online

Memory skills and mind-mapping (In-House)

By The In House Training Company

This is an incredibly practical programme which has been developed to enable participants to improve their memory skills. The session focuses on specific techniques that can be used to improve retention of information. It also introduces the principles of mind-mapping By the end of this programme participants will be able to: Explain how our brain processes and stores information Describe the difference between short-term and long-term memory Use specific techniques to improve retention Explain the principles of mind mapping Be able to use mind maps to plan and order information Each participant, no matter how poor they believe their memory to be, will by the close of the session have learnt techniques that enable them to memorise 53 items in a prescriptive order - a massive boost to their confidence in their memory skills. 1 An introduction to the brain's functions Introductory brain-training How the brain works Left / right brain function Short-term and long-term memory Barriers to a good memory 2 Memory techniques Tips and techniques for improving memory Basic word association Chaining and linking Touchstone techniques Use of mnemonics Memory hooks Remembering names 3 Maximising memory Minimising barriers The importance of sleep and diet Supplements which may affect memory 4 Mind-mapping Purpose and principles Creating a mind map Use of colour to delight the eye and tickle the brain How to use the output from a map

Memory skills and mind-mapping (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Certified IT Specialist (CITS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is most suited for IT professionals who have a need to understand the current requirements and core competences for managing IT in mission-critical environments. Overview After completion of the course the participant will be able to: 1. Provide guidance and implementation for IT strategy as set by senior IT and business management 2. Select and manage staff, implement training programs, career plan development and job rotation programs 3. Select, evaluate and negotiate vendors using RFI, RFP and selection criteria 4. Provide guidance for developing, testing and implementing business applications 5. Manage and/or assist in IT project management 6. Design and implement service management processes for incident, problem and change management 7. Understand the need for business continuity and design the business continuity plan 8. Review and implement information security practices and controls 9. Assist and initiate risk management practices 10. Understand and select new technologies such as cloud computing, big data, Internet of Things and social media to support business change demands 11. Select strategies for information management 12. Measure and improve quality of IT services CITS is designed to teach the skills, knowledge and competencies required of the modern IT specialist working at the senior professional, team-leader, supervisor or management level in IT management. IT Strategy The need for Information Technology Enterprise architecture Service catalogue Service level management Sustainable development IT Organisation Personnel need Roles and responsibilities Sourcing Selection process Hiring staff Managing staff Career planning Training / job rotation Performance appraisal Staff departures Vendor Selection / Management The importance of vendors Vendor selection Request For Information (RFI) Request For Proposal (RFP) Proposal evaluation Vendor reference checks Contract negotiation Contract management Vendor management Re-compete vendors Project Management Methodologies Project organisation Starting up / initiating Planning / initiation a project Risk Quality Scope Work / Product Breakdown Structure PERT diagram / Gantt chart Cost Communication Application Management Software Development Life Cycle (SDLC) Software Quality Assurance (SQA) Requirements Development Testing Adoption (implementation) Maintenance Service Management Incident management Problem management Change management Business Continuity Management Standards and guidelines Objectives Context Interested parties Scope Roles and responsibilities Resources and competences Awareness and communication Documentation Business Impact Analysis Risk Management Guidelines Context establishment Identification Analysis Evaluation Treatment Communication Monitoring and control Information Security Management Standards Confidentiality Integrity Availability Controls types Guideline for controls selection Control categories Information security awareness Security incident response Information and Knowledge Management Information management Data management Information management - technologies Business intelligence Data management - technologies Best practices in data governance Pitfalls in data governance Business Change Management Business change Frameworks, models and techniques Needs identification Cloud computing Social media / digital marketing Big data Internet of Things (IoT) Quality Management Standards, guidelines and frameworks Objectives Activities Services review Customer feedback Customer survey Key Performance Indicators (KPI) Metrics Scorecards and reports Quality register Exam Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified IT Specialist (CITS)
Delivered OnlineFlexible Dates
Price on Enquiry

Train the trainer (In-House)

By The In House Training Company

At some point in your life you will have attended a training course or workshop, but what happens when you are asked to deliver one? Some people relish the opportunity while others are challenged by it. Whatever you feel about training others, it is a skill that is admired and can be studied and learned. With the trainer you will be learning the techniques, skills and understanding you need and you will have the chance to deliver a short training session to others, receive feedback and having the confidence to deliver it for real in your job. The training will comprise one day followed by a half day when all those able to attend will deliver and have feedback on a 20 minute training activity. To be able to create and maintain an environment conducive to learning and engagement To understand basic learning theory and practice and the difference between training, facilitating and learning To understand how adults learn and how to apply it as a trainer To be able to plan and deliver a training activity using the appropriate set of skills and behaviours To be able to review and evaluate learning and identify how outcomes are met To manage the learning process and the participant engagement in the training environment To be able to present effectively and appropriately to a variety of audiences To deliver and receive feedback on a short delivered training activity with peers To review and evaluate learning and have an action plan to take back and put into practice DAY ONE (full-day) 1 Welcome, housekeeping, how the day will be run Introductions (and making the most of them) Warm up - breaking the ice followed by review and feedback Creating an environment conducive to learning and engagement; managing expectations well as a trainer Group task with feedback and review in plenary 2 What is training and how do adults learn? Trainer input: David Kolb's Learning Cycle Group tasks 3 How to plan a session and what to include - trainer input Starting at the end and working backwards Linking outcomes to purposeful activities Practice task and planning time for day two using a template 4 The skills and behaviours of a brilliant trainer Modelling skills and behaviours Creative task and discussion 5 Mini reviewing task De-brief - using reviewing in training 6 How to manage the process Trainer input followed by practice Paying conscious attention to language (verbal and non verbal), feelings and responses in the room and managing yourself as a trainer 7 The trainer's toolkit #1 Key tools, materials and templates Choosing different tools and approaches with different audiences Know your audience 8 The trainer's toolkit #2 Key tools, materials and templates continued Addressing trainer good practice 9 Review, evaluation and action planning activities Why and what should we be evaluating and why it's important Action planning task Group review task DAY TWO (half-day) The day will comprise a series of 30 minute timed sessions where each delegate will present and deliver a training activity with the group. The training activity will be prepared and planned in advance and will take 20 minutes (+ or - 2 minutes) to deliver in real time. This will be followed by review and feedback from the trainer and peers to complete the total of 30 minutes as a time slot. Reiteration of the task and discussion can take place with the trainer if needed, and there is time included in Day One to support the training planning.

Train the trainer (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Sales Level 4

By Rachel Hood

Leading end-to-end sales interaction with customers and managing sales internally within an organisation.

Sales Level 4
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified CISO (C|CISO) w/exam

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for CCISOs are certified in the knowledge of and experience in the following CISO Domains:Governance (Policy, Legal & Compliance)IS Management Controls and Auditing Management (Projects, Technology & Operations)Management ? Projects and OperationsInformation Security Core CompetenciesStrategic Planning & Finance Overview Please refer to Overview. The Certified CISO (C|CISO) course has certified leading information security professionals around the world and is the first of its kind training and certification program aimed at producing top-level Information Security Leaders. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by seasoned CISOs for current and aspiring CISOs. Governance Drivers that Influence Governance Corporate Governance Activities Information Security Governance Activities Governance and Ethical Decision Making Security Risk Management, Controls, and Audit Management Risk Management Audit Management Risk Treatment Risk Management Frameworks Risk Communication and Organizational Reporting Security Program Management and Operations Information Security Portfolio Management Information Security Program Management Information Security Project Management Security Operations Information Security Core Competencies Access Control Physical Security Network and Communications Security Threat and Vulnerability Management System and Application Security Encryption Concepts and Technology Strategic Planning, Financial Management, and Vendor Management Strategic Planning Financial Management Vendor Risk Management Additional course details: Nexus Humans EC-Council Certified CISO (C|CISO) w/exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified CISO (C|CISO) w/exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified CISO (C|CISO) w/exam
Delivered OnlineFlexible Dates
Price on Enquiry

CEM-205 Manage Citrix Endpoint Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developed for IT Professionals interested in learning how to manage Citrix Endpoint Management on-premises or cloud environments using leading practices. Potential students include Administrators and Implementers. Overview How to manage a Citrix Endpoint Management implementation in a On-premises or cloud environment How to perform common enterprise mobility management tasks and mobile application managementUnderstand the device enrollment processHow to perform monitoring, troubleshooting, and reporting on a Citrix Endpoint Management Enterprise solution Students will explore how to manage Citrix Endpoint Management in this course. Venture into the cloud as students learn to manage devices, apps, and users. Students will learn how the architecture, management, and communication flow function with Citrix Endpoint Management Service and how they can fit their organization?s needs. Students will learn how to administer their Citrix Endpoint Management environment and how to support your end users, as well as working with applications and securing a variety of endpoints. Introduction to Citrix Endpoint Management Citrix Endpoint Management Features Citrix Cloud and Citrix Endpoint Management Citrix Endpoint Management User Experience and Security Citrix Endpoint Management Entitlements Citrix Endpoint Management Architecture Citrix Endpoint Management Prerequisites Citrix Endpoint Management Server Citrix Endpoint Management and Microsoft Intune Apple APNs and Google Firebase Cloud Messaging MDX Architecture and Features Cloud Components Cloud Component Overview Onboarding and Access Cloud Connector and Cloud Resource Locations Cloud Migration Cloud Updates and Features Common Device Management Tasks Administrative Console Overview Delivery Groups Device Policies Device Enrollment Enrollment Methods iOS Device Enrollment Android Device Enrollment Windows 10 Enrollment Other Devices Managing Device Security Security Policies Automated Actions Android for Work ActiveSync Filtering Shared Devices Working with Apps Application Integration Citrix Endpoint Management Productivity Apps Application Security with MDX 3rd Part Applications Integrating Citrix Content Collaboration Citrix Content Collaboration Overview Integrating Citrix Endpoint Management with Content Collaboration Content Collaboration Workflows Maintaining and Troubleshooting Maintaining Citrix Endpoint Management Maintaining Certificates Troubleshooting Citrix Gateway (formerly NetScaler Gateway) Troubleshooting Tools for Citrix Productivity Apps Firewall Issues Monitoring and Reporting Monitoring and Reporting of Devices Monitoring and Reporting of Citrix Content Collaboration Additional course details: Nexus Humans CEM-205 Manage Citrix Endpoint Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CEM-205 Manage Citrix Endpoint Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CEM-205 Manage Citrix Endpoint Management
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Maturity Model Certification (CMMC): Certified Professional

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study

Cybersecurity Maturity Model Certification (CMMC): Certified Professional
Delivered OnlineFlexible Dates
Price on Enquiry

CMMC for Business Professionals: A Practical Guide to Getting Ready for CMMC

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course provides an introductory overview of the CMMC program for organizational decision makers. Business and IT leaders and IT staff might consider taking this course to learn about the CMMC Model to get a sense of what's required for a successful assessment, and the various ways they can start preparing. Overview In this course, you will identify the key elements and potential impacts of the Cybersecurity Maturity Model Certification (CMMC) program. You will: Identify the crucial elements that are driving the CMMC initiative. Describe the architecture of the CMMC Model and the rationale behind it. Prepare your organization for a successful CMMC Assessment. Identify the roles and responsibilities in the CMMC ecosystem and describe the phases of an Assessment. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices. This course provides a complete review of the key elements of this important program and will entitle you to a CMMC Trailblazer badge.Important: This curriculum product is not considered CMMC-AB Approved Training Material (CATM). This course is not intended as certification preparation and does not qualify students to sit for the CMMC CP certification exam. Identifying What's at Stake Topic A: Identify the Threats and Regulatory Responses Topic B: Identify Sensitive Information Describing CMMC Topic A: Describe the CMMC Model Architecture Topic B: Describe the CMMC Program Getting Ready for a CMMC Assessment Topic A: Scope Your Environment Topic B: Analyze the CMMC Assessment Guides Topic C: Foster a Mature Cybersecurity Culture Topic D: Identify Helpful Documents Topic E: Evaluate Your Readiness Interacting with the CMMC Ecosystem Topic A: Identify the CMMC Ecosystem Topic B: Describe a CMMC Assessment

CMMC for Business Professionals: A Practical Guide to Getting Ready for CMMC
Delivered OnlineFlexible Dates
Price on Enquiry

CMMC: Organizational Foundations v2.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment

CMMC: Organizational Foundations v2.2
Delivered OnlineFlexible Dates
Price on Enquiry

Managing Safely Refresher - IOSH Award (In-House)

By The In House Training Company

The IOSH Managing Safelyaward is valid for three years. Award-holders need to undertake this one-day refresher programme every three years in order to maintain their status. This very interactive, practical programme covers: An interactive case study exercise is used throughout the day to apply refreshed knowledge to the plan-do-check-act model and then link it back to the workplace. For example, participants examine the elements of a safety and health policy, come up with ideas to influence safety culture, and select the best communication methods to engage a workforce.

Managing Safely Refresher - IOSH Award (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry