An intensive one-year programme that develops the writer’s original voice, embeds professional practice and enhances employability. At LFS you will gain expertise and experience that form the foundations of your professional screenwriting practice. You will forge relationships and develop networks that propel you into the film and television industries. MA Screenwriting focuses on the development of the individual screenwriter’s voice. You will be supported and challenged throughout your one year MA as you explore that voice through your screenwriting. You will work collaboratively within a diverse, international cohort and within the conservatoire atmosphere of LFS. The development of your feature screenplay, at the heart of your MA, is undertaken in small Feature Development Groups of 3 or 4 students, chaired by a tutor. Regular Group meetings are structured around the giving and receiving of feedback and the deep exploration of your feature project from initial idea through several draft screenplays. The ambition and variety of students’ screenplays reflect both the depth of their creativity and the breadth and diversity of their backgrounds and interests. In addition to your feature screenplay you will have opportunities to write short screenplays and to develop a television series idea.
A four-hour workshop on how to retain your talented Neurodiverse colleagues and ensure equality in employment opportunities.
Build confidence, overcome shyness and social anxiety to improve your career prospects. Breakthrough is a powerful course which will enable you to break out of your shell – no matter how inhibited or stuck you feel you are and to build an effortless self-confidence. The Breakthrough Course is based on Claire Schrader's experiences of being an introvert and what really worked in getting her out of her shell so she could express herself powerfully in the world. As a result, she has achieved things in her personal and professional life, she never would have dreamed possible. Claire has helped many thousand quiet, shy and introverted people transform their lives through her unique confidence-building system, the Sunflower Effect, since 1997.
Overview Objectives Define Policies and Procedures Differentiate between Policies and Procedures Explain the importance of Policies and Procedures Build and understand the SOP (Standard Operating Procedures) Define the roles and responsibilities of employees in various departments Abide by the Code of Conduct, the acceptable behaviour standards Justify how the Policies and Procedures help employees safeguard their self-respect Give equal opportunities to all the employees
Overview Competitor Analysis is a key area every professional does to understand their business presence. It gives your insight into your business standings and also knowledge of your competitors and their strength and weakness. Analysing your competitors helps you understand the market and your power to deal with the competitors. It is an essential marketing and strategic tool. It provides both an offensive and defensive strategic tool to analyse opportunities and threats.
Overview By the end of this Fundamentals of Transfer Pricing Strategies training course, participants will be able to: Acquire basic technical knowledge of transfer pricing Appreciate the importance of the arm's length principle Identify the different stages of a typical transfer pricing analysis Developing a high-level appreciation of the transfer pricing including tax areas and opportunities for multinationals Analyze the current transfer pricing legislative framework Be updated on recent developments in transfer pricing
Overview Objectives Define brands and understand the opportunities and challenges facing them in highly competitive business landscapes Plan and craft a powerful brand positioning statement that reflects the brand's promise and the expectations of their most valued customers Build a strategic brand and track its growth and sustainability using researched processes Explore the elements of brand equity and the constituents of brand identity to build consistent and sustainable brands Identify various brand strategies to come up with sound actions aligned with the status of existing and new markets and products Master the process for conducting a full brand audit to evaluate brand performance and take remedial actions
RESILIA™ Foundation AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Overview Digital technologies dramatically reshape your business. Almost all business, companies are trying to pursue significant changes to gain the beneficial effects of this new technological development and some are working hard to attain the benefit of this trend to survive. This has opened new economic opportunities which are progressively opening for organisations that need to reshape. The course will help to gain the knowledge to boost skills and to comprehend the procedures that are obligatory to communicate with clients in new ways and govern the rebellion of the media landscape. It will deliver the delegate's practises and procedures that will explain to them to cope with digital transformation, from organisational change to integrating new competencies. Participants will also learn the methods of developing a marketing strategy and managing a digital marketing Project.