A 6-week inner child healing course to help you to improve your mental health and wellbeing by understanding your childhood experiences and the beliefs and limitations these may have created in your present-day life. An introduction to connecting with your inner child, developing a relationship with them, learning how to parent them, protect them and empower them. This will enable you to understand your feelings, needs and boundaries and give you a set of tools to develop acceptance, love and compassion for yourself.
We often find ourselves working in fast-paced matrix environments, working in/with virtual teams or simply trying to get something done by someone in another part of the business. This common aspect of our working lives has a common challenge: how to influence other people to help us or do something for us, when they don't report to us. Pulling rank or strong nudging might work once, but we need to build a supportive and collaborative relationship over the long term. What Does This Course Offer? Fortunately, there are really effective tips for influencing, and our program offers an influencing model in detail. Through activity and discussion we explore how you can apply these principles and use it when you need help from other people. Even when we are not in a leadership position it can sometimes be extremely difficult to get people's help, especially when we have no authority over them. This is where an approach and an influencing model can help us identify what we and other people value in a given influencing situation. We can then explore that information so that everyone can view and pursue a common purpose. This course will enhance and promote the skill set necessary for any leader or manager, allowing our in-depth influencing knowledge to be applied into your working environment. From an employer's perspective this award can be a significant long-term return on investment by developing your leaders and managers. Our learning experiences are successful because the outcomes are quickly embedded and demonstrate an immediate visible impact on the day-to-day working environment. Our engaging learning inspires employees to want to personally add value to the companies they work for. We also offer our Paradigm Trait-Map™ online assessment and report as a frame of reference for your own influencing styles and that of others. This assessment should be completed before attending the program, and will be expanded upon during the program delivery. Course Content The Influencing for Leadership and Management course covers the following topics: Two key influencing models that you can apply back in your daily work Different types of influencing How to create the right environment for influencing Barriers you may face and how to overcome these barriers Accreditation Activity Our accredited tutors deliver training that encourages delegates to confidently and practically apply all they have learnt as soon as they get back into the business. To achieve this award, delegates need to prepare and deliver a 3 minute presentation* on the highlights of their learning and immediate application avenues when back in their working environment. *Participants will be given 30 minutes during the program to prepare for their 3 min presentation at the end of the program. Scheduled Course Dates Unfortunately this course is not currently scheduled as an open course as it is primarily run as an in-house programme. For more information, please contact us. In-House Courses This is our own management training course which has been developed and refined over the many years we have been providing it to delegates from organisations in virtually every industry. This means that the course syllabus is extremely flexible and can be tailored to your specific requirements. If you would like to discuss how we can tailor this management training course for you and/or run it at your premises, please contact us.
Duration 5 Days 30 CPD hours This course is intended for Technology ConsultantSystem AdministratorSystem ArchitectHelp Desk / COE Support Overview Explain the architecture of SAP NetWeaver AS JavaStart and stop SAP NetWeaver AS JavaCarry out basic configurations for SAP NetWeaver AS JavaClassify network security conceptsSet up SSL encryption for SAP NetWeaver AS JavaExplain the architecture of the User Management EngineConfigure the User Management EngineCarry out user and authorization maintenanceUnderstand and change the standard logon procedure of SAP NetWeaver AS JavaMaintain destinations and the JCo RFC ProviderUnderstand the architecture and the tasks of the SAP NetWeaver Development InfrastructureExplain the process flow of the development process using the SAP NetWeaver Development InfrastructureSpecify the options for monitoring SAP NetWeaver AS JavaConnect SAP NetWeaver AS Java to a central Monitoring systemDisplay Monitoring and logging data using the SAP NetWeaver AdministratorImplement corrections for SAP NetWeaver AS Java In this course, students learn how to explain the architecture of SAP NetWeaver AS Java, carry out basic configurations for SAP NetWeaver AS Java, and much more. Fundamental Concepts of Java Describing the Fundamental Concepts of Java Describing the Architecture of the SAP NetWeaver Application Server (SAP NetWeaver AS) Outlining the Java Cluster Architecture Describing the Internal Structure of SAP NetWeaver AS for Java SAP NetWeavear AS for Java Start and Stop Procedures Starting and Stopping Procedures in SAP NetWeaver AS for Java Evaluating the Tools for Starting and Stopping an SAP System Evaluating Load Balancing Options in SAP NetWeaver AS for Java Operating the Java Startup and Control Framework Analyzing the Logs of Start and Stop Processes in SAP NetWeaver AS for Java Basic Configuration of SAP NetWeaver AS for Java Identifying the Administration Tools Used in Configuration Maintaining the Basic Configuration of SAP NetWeaver AS for Java with the Config Tool Configuring SAP NetWeaver AS for Java with SAP NetWeaver Administrator Configuring the Properties of the Central Services Instance Administering the Internet Communication Manager (ICM) Process Infrastructure Security Describing Network Security Setting Up the Secure Sockets Layer (SSL) User and Authorization Administration Configuring the SAP User Management Engine (UME) Maintaining Users and Groups Managing Java Authorization Administrating Special Principles Configuring the Logon Procedure in SAP NetWeaver AS for Java Java Connectors and Destinations Creating Connections to Other Systems Creating Connections to Other Systems with J2EE Connector Architecture (JCA) Change Management and Software Logistics Structuring the Java Development Approach Describing the Components of SAP NetWeaver Development Infrastructure Developing and Releasing Java Changes with SAP NetWeaver Development Infrastructure Transporting Java Developments Monitoring Monitoring SAP NetWeaver AS for Java Connecting to a Central Monitoring System (CEN) Configuring Availability Monitoring Configuring the Log and Trace Files Monitoring a System with SAP Solution Manager Software Maintenance Preparing for Software Maintenance Describing Java Support Packages, Stacks, and Patches Deploying Corrections with Software Update Manager (SUM) in SAP NetWeaver AS for Java Deploying Java Archives with Alternative Tools Outlining the Backup Strategy in SAP NetWeaver AS for Java
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows:Anyone interested in knowing about DNA Center and SD-AccessPersonnel involved in SD-Access Design and ImplementationNetwork Operations team with SD-Access solutionNetwork admin staff that deal with User AccessChannel Partner SEs and other sales supportNetwork Access Control administrationNetwork AdministratorsNetwork ArchitectsNetwork Engineers Overview Upon completing this course, the learner will be able to meet these overall objectives:Know and understand Cisco?s SD-Access concepts, features, benefits, terminology and the way this approach innovates common administrative tasks on today?s networks.Differentiate and explain each of the building blocks of SD-Access SolutionExplain the concept of ?Fabric? and the different node types that conform it (Fabric Edge Nodes, Control Plane Nodes, Border Nodes)Describe the role of LISP in Control Plane and VXLAN in Data Plane for SD-Access SolutionUnderstand the role of DNA Center as solution orchestrator and Intelligent GUIBe familiar with workflow approach in DNA Center and its 4 Steps: Design, Policy, Provision and Assurance DNA Center and SD-Access offer Cisco?s next-generation programmable digital network to help automate common network access security features and streamline the redundant, complex configuration required to allow different groups of users access to the network infrastructure. This network security training course allows network administrators to quickly allow differentiated access for end users on the network while allowing the network to react automatically to day zero and other types of attacks. Introduction to Cisco?s Software Defined Access (SD-Access) SD-Access Overview SD-Access Benefits SD-Access Key Concepts SD-Access Main Components SD-Access Campus Fabric The concept of Fabric Node types Fabric Edge Nodes Control Plane Nodes Border Nodes LISP as protocol for Control Plane VXLAN as protocol for Data Plane Concept of Virtual Network Fabric-enabled WLAN DNA Center and Workflow for SD-Access Introduction to DNA Center Workflow for SD-Access in DNA Center Integration with Cisco ISE for Policy Enforcement Integration with Cisco NDP for Analytics and Assurance Relationship with APIC-EM controller DNA Center Workflow First Step - Design Creating Enterprise and Sites Hierarchy Discuss and Demonstrate General Network Settings Loading maps into the GUI IP Address Administration Administering Software Images Network Device Profiles DNA Center Workflow Second Step - Policy 2-level Hierarchy Policy Types ISE Integration with DNA Center Cross Domain Policies DNA Center Workflow Third Step - Provision Devices Onboarding Fabric Domains Adding Nodes DNA Center Workflow Fourth Step ? Assurance Introduction to Analytics NDP Fundamentals Overview of DNA Assurance Components of DNA Assurance DNA Center Assurance Dashboard Implementing WLAN in SD-Access Solution WLAN Integration Strategies in SD-Access Fabric SD-Access Wireless Architecture Sample Design for SD-Access Wireless Campus Fabric External Connectivity for SD-Access Enterprise Sample Topology for SD-Access Role of Border Nodes Types of Border Nodes Single Border vs. Multiple Border Designs Collocated Border and Control Plane Nodes Distributed (separated) Border and Control Plane Nodes
Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues Additional course details: Nexus Humans Managing and Troubleshooting PCs - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing and Troubleshooting PCs - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Stress can affect your ability to think clearly and rationally and to perform well. This session aims to help you better deal with stress by sharing key insights and strategies to reduce stress and optimize your work-life balance, particularly as we face uncertainties in the economy, the workplace and the environment.
Historical Association webinar series: Direct history teaching Presenters: Mike Hill and Jacob Olivey In this opening session, Jacob and Mike will outline what they mean by direct history teaching. They will explain how this differs from some methods that have become common in history teaching – and why a more direct approach can be more effective, inclusive, and enjoyable for pupils. To use your corporate recording offer on this webinar please fill in this form: https://forms.office.com/e/Qr1PfgRHSS We are able to offer the webinars in this series at a subsidised cost as the presenters' time has been partially funded by their school, Ark Soane Academy. We are open to developing partnerships across schools and trusts. If you are interested in discussing this further, please contact Mel Jones at melanie.jones@history.org.uk
Historical Association webinar series: Direct history teaching Presenters: Mike Hill and Jacob Olivey In this second session, Jacob and Mike will share how history teachers can teach substantive knowledge (what we know about the past) in more direct ways – whilst still challenging and engaging pupils. They will share ideas about using lean resources and high-quality images, worldbuilding through storytelling, and building lessons around extended texts. To use your corporate recording offer on this webinar please fill in this form: https://forms.office.com/e/Qr1PfgRHSS We are able to offer the webinars in this series at a subsidised cost as the presenters' time has been partially funded by their school, Ark Soane Academy. We are open to developing partnerships across schools and trusts. If you are interested in discussing this further, please contact Mel Jones at melanie.jones@history.org.uk
Historical Association webinar series: Direct history teaching Presenters: Mike Hill and Jacob Olivey In this third session, Jacob and Mike will argue that a history teacher should always be a sage on the stage – and not a guide on the side. They will share strategies that allow history teachers to drive learning for an entire class, ensuring that all pupils pay attention, take part in the lesson, and feel successful. To use your corporate recording offer on this webinar please fill in this form: https://forms.office.com/e/Qr1PfgRHSS We are able to offer the webinars in this series at a subsidised cost as the presenters' time has been partially funded by their school, Ark Soane Academy. We are open to developing partnerships across schools and trusts. If you are interested in discussing this further, please contact Mel Jones at melanie.jones@history.org.uk
Historical Association webinar series: Direct history teaching Presenters: Mike Hill and Jacob Olivey In this fifth session, Jacob and Mike will argue that 'source work' often doesn’t work. They will suggest that common classroom approaches to sources are often ineffective and inaccessible. Instead, they will share examples of lessons that teach pupils very directly about sources – rather than getting them to do 'source work'. To use your corporate recording offer on this webinar please fill in this form: https://forms.office.com/e/Qr1PfgRHSS We are able to offer the webinars in this series at a subsidised cost as the presenters' time has been partially funded by their school, Ark Soane Academy. We are open to developing partnerships across schools and trusts. If you are interested in discussing this further, please contact Mel Jones at melanie.jones@history.org.uk