Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp
Duration 5 Days 30 CPD hours This course is intended for In order to be successful in this course you should have incoming hands-on experience with another programming language. This course is not for non-developers or new developers. Possible roles that may attend this course include: Software Developers: Professionals who have been working with other programming languages and want to expand their skillset by learning Java and its object-oriented features. Web Developers: Those who work on web applications and want to enhance their back-end development capabilities with Java. Mobile App Developers: Developers who wish to enter the world of Android app development, where Java is a widely used language for creating mobile applications. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in core OO coding and Java development skills, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Understand what OO programming is and what the advantages of OO are in today's world Work with objects, classes, and OO implementations Understand the basic concepts of OO such as encapsulation, inheritance, polymorphism, and abstraction Understand not only the fundamentals of the Java language, but also its importance, uses, strengths and weaknesses Understand the basics of the Java language and how?it relates to OO programming and the Object Model Learn to use Java exception handling Understand and use classes, inheritance and polymorphism Understand and use collections, generics, autoboxing, and enumerations Become familiar with the concept of functional programming using Lambda Expressions Process large amounts of data using the Stream API introduced in Java 8 Discover the new Date/Time API Use the JDBC API for database access Work with annotations Take advantage of the Java tooling that is available with the programming environment being used in the class Java 8 Features: Lambda Expressions, Method and Constructor references, The Streams API, Collectors, The Optional class Geared for experienced developers, Basic Java Programming for Developers New to OO, this hands-on, workshop-style course will provide you with an immersive learning experience that will expand your skillset and open doors to new opportunities within the ever-growing technology landscape. Mastering Java and its powerful capabilities will provide you with the competitive edge you need to stand out in today's fast-paced development world. Working in a hands-on learning environment led by our expert coach, you?ll thoroughly explore the foundations of the Java platform, essential programming concepts, and advanced topics, ensuring you acquire a strong understanding of the language and its ecosystem. The object-oriented programming principles taught in this course promote code reusability and maintainability, enabling you to streamline development processes and reduce long-term costs. As you progress through the course, you will also gain familiarity with using an IDE, enhancing your development workflow and collaboration with other Java developers, enabling you to integrate seamlessly into new projects and teams. You?ll also gain practical experience in applying the concepts and techniques learned, solidifying your newly acquired skills and facilitating their direct application in real-world scenarios. You?ll exit this course empowered to create robust, scalable, and efficient Java-based applications that drive innovation and growth for your organization The Java Platform The Java Platform Lifecycle of a Java Program Responsibilities of JVM Documentation and Code Reuse Using the JDK Explain the JDK?s file structure Use the command line compiler to compile a Java class Use the command line Java interpreter to run a Java application class The IntelliJ Paradigm Introduce the IntelliJ IDE The Basics of the IntelliJ interface IntelliJ Projects and Modules Creating and running Java applications Writing a Simple Class Write a Java class that does not explicitly extend another class Define instance variables for a Java class Create object instances Primitives vs Object References Implement a main method to create an instance of the defined class Adding Methods to the Class Write a class with accessor methods to read and write instance variables Write a constructor to initialize an instance with data Write a constructor that calls other constructors of the class to benefit from code reuse Use the this keyword to distinguish local variables from instance variables Object-Oriented Programming Real-World Objects Classes and Objects Object Behavior Methods and Messages Inheritance, Abstraction, and Polymorphism Encapsulation Inheritance Method Overriding Polymorphism Essential Java Programming Essential Java Programming Language Statements Arithmetic operators Operators to increment and decrement numbers Comparison operators Logical operators Return type of comparison and logical operators Use for loops Switch Expressions Switch Expressions and yield Using Strings and Text Blocks Create an instance of the String class Test if two strings are equal Get the length of a string Parse a string for its token components Perform a case-insensitive equality test Build up a string using StringBuffer Contrast String, StringBuffer,and StringBuilder Compact Strings Text Blocks Specializing in a Subclass Constructing a class that extends another class Implementing equals and toString Writing constructors that pass initialization data to parent constructor Using instanceof to verify type of an object reference Pattern matching for instanceof Overriding subclass methods Safely casting references to a more refined type Fields and Variables Discuss Block Scoping Rules Distinguish between instance variables and method variables within a method Explain the difference between the terms field and variable List the default values for instance variables Final and Static fields and methods Local Variable type inference Using Arrays Declaring an array reference Allocating an array Initializing the entries in an array Writing methods with a variable number of arguments Records Data Objects in Java Introduce records as carrier of immutable data Defining records Java Packages and Visibility Use the package keyword to define a class within a specific package Discuss levels of accessibility/visibility Using the import keyword to declare references to classes in a specific package Using the standard type naming conventions Visibility in the Java Modular System Correctly executing a Java application class The Java modular system Defining Modules Inheritance and Polymorphism Write a subclass with a method that overrides a method in the superclass Group objects by their common supertype Utilize polymorphism Cast a supertype reference to a valid subtype reference Use the final keyword on methods and classes to prevent overriding Interfaces and Abstract Classes Define supertype contracts using abstract classes Implement concrete classes based on abstract classes Define supertype contracts using interfaces Implement concrete classes based on interfaces Explain advantage of interfaces over abstract classes Explain advantage of abstract classes over interfaces Static, default and private methods in interfaces Sealed classes Introduce Sealed classes The sealed and permits modifiers Sealed Interfaces Exception Handling Introduction to Exception Handling Introduce the Exception architecture Defining a try/catch blocks Checked vs Unchecked exceptions Exceptions Defining your own application exceptions Automatic closure of resources Suppressed exceptions Handling multiple exceptions in one catch Helpful Nullpointers Enhanced try-with-resources Java Developer's Toolbox Developing applications Introduce the wrapper classes Explain Autoboxing and Unboxing Converting String representations of primitive numbers into their primitive types Defining Enumerations Using static imports Deprecating methods Advanced Java Programming Introduction to Generics Generics and Subtyping Bounded Wildcards Generic Methods Legacy Calls To Generics When Generics Should Be Used Lambda Expressions and Functional Interface Understanding the concept of functional programming Writing lambda expressions Understanding functional interfaces Collections Provide an overview of the Collection API Review the different collection implementations (Set, List and Queue) Explore how generics are used with collections Examine iterators for working with collections Using Collections Collection Sorting Comparators Using the Right Collection Lambda expressions in Collections Bonus Topics: Time Permitting Streams Understanding the problem with collections in Java Thinking of program solutions in a declarative way Use the Stream API to process collections of data Understand the difference between intermediate and terminal stream operations Filtering elements from a Stream Finding element(s) within a Stream Collecting the elements from a Stream into a List takeWhile and dropWhile intermediate operations Collectors Using different ways to collect the items from a Stream Grouping elements within a stream Gathering statistics about numeric property of elements in a stream
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze Workspace ONE UEM deployments Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce Summarize basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway⢠platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist⢠In this extended five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge necessary to implement Workspace ONE UEM effectively.In addition, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to distribute business-critical applications securely from any device and configure access management controls. You will learn how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on, and you will leave with an understanding of the fundamental principles of identity and access management.Finally, you learn to investigate, analyze, and determine issues that might occur with the different components of Workspace ONE UEM. Troubleshooting is the backbone of service maintenance and management. By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management. Course Introduction Introductions and course logistics Course objectives Online resources and references Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for Workspace ONE Solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process and needs to integrate with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager? and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use cases for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway and the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List View and the Device Details View pages Analyze endpoint deployment and compliance data from the Monitor Overview page Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions that Workspace ONE Access enables Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Explain the integrations workflow Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by Unified Access Gateway Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of VMware Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common issues related to group management and assignment Outline common issues related to Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain Workspace ONE Access integration and Workspace ONE Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Understand how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Application Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway And Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify
Introduction to Diabetes (2-Day Course) - Norfolk ICB OnlyThis course is for those from the Norfolk ICB only using the unique booking code. Applicants not using this code nor Identifying themselves as Norfolk ICB employees will not be able to attend.Course Description:These two days of comprehensive training are designed for nurses, nurse associates, pharmacists, paramedics, and other Allied Healthcare Professionals (AHPs), and experienced healthcare assistants (HCAs) who are new to or fairly new to the field of diabetes care. If you've recently started seeing patients with diabetes, or are planning to; this course is tailored to provide you with the fundamental knowledge and skills required to confidently care for individuals with diabetes. The primary focus is on adults with Type 2 diabetes, although key recommendations and signposting for patients with Type 1 diabetes will also be covered.Diabetes presents a significant healthcare challenge, costing the NHS £10 billion each year and impacting patients and their families. Primary care professionals play a pivotal role in managing the ever-increasing numbers of people diagnosed with Type 2 diabetes. Good diabetes care is crucial and aligns with national and local policies supported by robust NICE guidance.These interactive days of learning will incorporate various methods, including case studies, to help you progress from basic knowledge to a more confident and positive approach in reviewing and managing patients with diabetes. 2 Day Introduction to diabetes management in primary care (This is intended to provide an overview the programme may change slightly) DAY ONE 09.15 Coffee and registration 09.30 Introduction and course objectives 09.45 Setting the scene - screening, diagnosis, prediabetes, patho-physiology and symptoms, remission in Type 2 diabetes 10.45 Coffee 11.00 Type 1 Vs Type 2 Diabetes 11.20 Metabolic Syndrome and Diagnostic Criteria 11.45 Diabetes Prevention Programme 12.15 Managing Diabetes in Primary Care and Supporting Lifestyle 12.30 Lunch 13.30 Pharmacological Management of Type 2 Diabetes 14.30 Methods for Monitoring Glucose 14.45 Diabetic Emergencies (hypos, HHS and DKA) 15.15 Sick Day Rules 15.30 Action plan, evaluation, and resources 15.45 Close DAY TWO 09.15 Coffee and registration 09.30 Review progress since Day 1 09.45 Macrovascular Complications 10.15 Modifiable Risk Factors leading to CVD 11.00 Coffee 11.20 Cholesterol & Hypertension Management 12.00 Microvascular Complications 12.30 Lunch 13.30 Diabetes and Emotional Wellbeing 14.30 Case Studies 15.30 Q&A, Evaluations 15.45 CloseKey Learning Outcomes for Both Days:Upon completing this course, participants will be able to:1. Explain the physiology of diabetes and differentiate between Type 1 and Type 2 diabetes.2. Discuss methods for diagnosing diabetes and provide information to individuals newly diagnosed with Type 2 diabetes.3. Describe approaches that support achieving remission in Type 2 diabetes.4. Explain basic advice related to a healthy diet, various dietary approaches, and carbohydrate awareness.5. Discuss the modes of action of commonly used non-insulin medications.6. Identify major complications that may arise in individuals with long-standing diabetes and measures to limit or prevent them.7. Describe key advice for patients regarding the recognition and appropriate treatment of hypoglycaemia.8. Discuss DVLA guidance concerning driving and diabetes.9. Explain the risks of acute hyperglycaemia and provide advice to patients on self-managing illness periods.10. Provide examples of referral pathways to other services such as weight management, secondary care, podiatry, structured education, activity, and psychological services.11. Describe the process of routine foot review and factors influencing diabetic foot risk status.12. Discuss local recommendations for the appropriate use of blood glucose and ketone monitoring.13. Explain the key components and processes of an annual diabetes review and a self-management plan.Join us for this comprehensive 2-day course via Zoom and enhance your ability to provide effective diabetes care within primary care settings.
Tartan design course.
he role of a CFO extends beyond day-to-day financial management and plays a pivotal role in preparing a business for an exit. The role of a CFO extends beyond day-to-day financial management and plays a pivotal role in preparing a business for an exit, whether it be through a merger, acquisition, or other strategic transaction. Here are some key points to consider: Financial Due Diligence: CFOs play a crucial role in conducting financial due diligence to assess the company’s financial health and identify any potential risks or issues. This involves reviewing financial statements, accounting practices, contracts, and other financial data to ensure accuracy and transparency. Valuation and Financial Modeling: CFOs work closely with the executive team, external advisors, and investment bankers to determine the company’s valuation. They develop financial models, assess growth projections, and analyze market comparables to arrive at a fair and realistic valuation range. Financial Documentation and Reporting: CFOs ensure that financial documentation and reporting are in order, accurate, and compliant with regulatory requirements. This includes preparing financial statements, management reports, and other financial disclosures necessary for the exit process. Negotiation and Deal Structuring: CFOs collaborate with legal and executive teams to negotiate the terms of the exit transaction. They provide financial insights and expertise to structure the deal in a way that maximizes value for the company and its stakeholders. Tax Planning and Optimisation: CFOs work closely with tax advisors to develop tax-efficient strategies for the exit transaction. They assess potential tax implications, explore tax-saving opportunities, and ensure compliance with applicable tax laws and regulations. Financial Communication and Investor Relations: CFOs play a critical role in communicating the financial aspects of the exit to internal and external stakeholders. They work with investor relations teams to ensure that key messages are effectively conveyed, providing transparency and clarity throughout the exit process. https://www.fdcapital.co.uk/podcast/the-vital-role-of-cfos-in-business-exit-preparation/ Tags Online Events Things To Do Online Online Seminars Online Business Seminars #business #cfo #preparation #exit #vital
Are you an EDI Officer, HR Specialist, Leader or Manager? Or the nominated EDI champion for your team? Maybe you've been given the EDI portfolio on behalf of your Board or department? Or if you're aiming to make a difference via your diverse staff network or union, all change-makers are welcome!
This five-day programme empowers participants with the skills and knowledge to understand and effectively apply best practice commercial and contracting principles and techniques, ensuring better contractor performance and greater value add. This is an assessed programme, leading to the International Association for Contracts & Commercial Management (IACCM)'s coveted Contract and Commercial Management Practitioner (CCMP) qualification. By the end of this comprehensive programme the participants will be able to: Develop robust contracting plans, including scopes of work and award strategies Undertake early market engagements to maximise competition Conduct effective contracting and commercial management activities, including ITT, RFP, negotiated outcomes Understand the legalities of contract and commercial management Negotiate effectively with key stakeholders and clients, making use of the key skills of persuading and influencing to optimise outcomes Undertake effective Supplier Relationship Management Appreciate the implications of national and organisational culture on contracting and commercial activities Appreciate professional contract management standards Set up and maintain contract and commercial management governance systems Take a proactive, collaborative, and agile approach to managing commercial contracts Develop and monitor appropriate and robust KPIs and SLAs to manage the contractor and facilitate improved contractor performance Appreciate the cross-functional nature of contract management Collaborate with clients to deliver sustainable performance and to manage and exceed client expectations Understand the roles and responsibilities of contract and commercial managers Use effective contractor selection and award methods and models (including the 10Cs model) and use these models to prepare robust propositions to clients Make effective use of lessons learned to promote improvements from less than optimal outcomes, using appropriate templates Effectively manage the process of change, claims, variations, and dispute resolution Develop and present robust propositions Make appropriate use of best practice contract and commercial management tools, techniques, and templates DAY ONE 1 Introduction Aims Objectives KPIs Learning strategies Plan for the programme 2 The contracting context Key objectives of contract management Importance and impact on the business 3 Critical success factors Essential features of professional commercial and contract management and administration The 6-step model 4 Putting the 'management' into commercial and contract management Traditional v 'new age' models The need for a commercial approach The added value generated 5 Definitions 'Commercial management' 'Contract management' 'Contracting' ... and why have formal contracts? 6 Stakeholders Stakeholder mapping and analysis The 'shared vision' concept Engaging with key functions, eg, HSE, finance, operations 7 Roles and responsibilities Contract administrators Stakeholders 8 Strategy and planning Developing effective contracting plans and strategies DAY TWO 1 Contract control Tools and techniques, including CPA and Gantt charts A project management approach Developing effective contract programmes 2 The contracting context Key objectives of contract management Importance and impact on the business 3 Tendering Overview of the contracting cycle Requirement to tender Methods Rationale Exceptions Steps Gateways Controls One and two package bids 4 Tender assessment and contract award I - framework Tender board procedures Role of the tender board (including minor and major tender boards) Membership Administration Developing robust contract award strategies and presentations DAY THREE 1 Tender assessment and contract award II - processes Pre-qualification processes CRS Vendor registration rules and processes Creating bidder lists Disqualification criteria Short-listing Using the 10Cs model Contract award and contract execution processes 2 Minor works orders Process Need for competition Role and purpose Controls Risks 3 Contract strategy Types of contract Call-offs Framework agreements Price agreements Supply agreements 4 Contract terms I: Pricing structures Lump sum Unit price Cost plus Time and materials Alternative methods Target cost Gain share contracts Advance payments Price escalation clauses 5 Contract terms II: Other financial clauses Insurance Currencies Parent body guarantees Tender bonds Performance bonds Retentions Sub-contracting Termination Invoicing 6 Contract terms III: Risk and reward Incentive contracts Management and mitigation of contractual risk DAY FOUR 1 Contract terms IV: Jurisdiction and related matters Applicable laws and regulations Registration Commercial registry Commercial agencies 2 Managing the client-contractor relationship Types of relationship Driving forces Link between type of contract and style of relationships Motivation - use of incentives and remedies 3 Disputes Types of dispute Conflict resolution strategies Negotiation Mediation Arbitration DAY FIVE 1 Performance measurement KPIs Benchmarking Cost controls Validity of savings Balanced scorecards Using the KPI template 2 Personal qualities of the contract manager Negotiation Communication Persuasion and influencing Working in a matrix environment 3 Contract terms V: Drafting skills Drafting special terms 4 Variations Contract and works variation orders Causes of variations Risk management Controls Prevention Negotiation with contractors 5 Claims Claims management processes Controls Risk mitigation Schedules of rates 6 Close-out Contract close-out and acceptance / completion HSE Final payments Performance evaluation Capturing the learning 7 Close Review Final assessment Next steps
This practical, enjoyable day will give you the tools to go and do your job effectively and the opportunity to practise using them in a safe and supportive environment before putting them into practice for real back in the workplace. To inspire, you need to be inspired!Having the right set of skills, tools and techniques helps us to manage in a productive and beneficial way. Above all, the workshop will inspire you with the determination to engage with the people you manage to produce greater levels of achievement. This workshop will enable you to: Understand what the role of the manager is Engage and inspire a team to perform Recognise the range of styles appropriate for different situations and how your communication style impacts Provide clear direction on your team's purpose, role and responsibilities Understand how to create a motivating environment for those who report to you Hold them accountable for delivery Hold performance conversations Review and evaluate your learning and have a plan to take back and implement at work 1 Bringing the role to life Starting the day with sharing your current ideals and approaches using the pre workshop task Understanding what you bring to your role and your objectives for the day 2 The role and responsibilities of a manager: an overview Responsibility and accountability Producing results Managing teams Developing individuals 3 Communication excellence The model of a team communicator What type of communicator are you and what about your team? Practical interactive group exercise 4 Your role as a team leader - shaping how we work using the organisation's values Your role Your team's role Enabling your team to deliver in a changing mindset 5 Engaging and motivating your team Exercise: using a leadership model to explore how you are enabling your team to engage with current change, what's getting in the way and how you will manage this in your organisational context Peer and group task and discussion 6 Addressing motivation at team and individual level in times of change Exercises:Identifying approaches to motivating people at work based on a work based model of motivation: team taskExploring a behavioural model of motivation: team discussion Review in plenary 7 Holding people accountable The work cycle model of team performance: Agree purposeSet objectivesMonitor performanceProvide feedbackCompliance vs. commitment Professional discussion in small groups Exercise: Practising short conversations using peer coaching support 8 Review of learning and action planning Personal review and action planning Group review of learning Evaluation
SAP HANA Training | Online Courses | UK Provider Stay Ahead of the competition by gaining skills on SAP HANA with Osborne Training. SAP HANA training builds the foundation for seamless SAP applications, which helps deliver ground-breaking innovations without disruption. SAP HANA provides powerful features like significant processing speed, predictive capabilities, the ability to handle large amount of data, and text mining capabilities. SAP HANA course is designed to make you ready for SAP certification and Job market. Introduction In-Memory Computing Evolution of In-Memory computing at SAP History of SAP HANA HANA compare to BWA In-Memory Basics HANA Use cases Architecture Hana Engine Overview Different HANA Engine Types Row Store Column Store Persistency Layer Business Impact of new architecture Backup & Recovery Modeling Key Concepts in Data Modeling Components of HANA data model & Views Analytical ViewsAttribute viewsCalculation ViewsJoins Measures Filters Real Time Scenarios HANA SQL Intro Functions & Expressions Procedures Data Provisioning Overview Trigger Based Replication ETL Based Replication Log Based Replication Intro to BODS 4 Basic Data service Connection types Flat File upload in to HANA Reporting Connectivity options Business Objects BI 4 Security Creating Users Creating Roles Privileges User Administration