Follow our guidelines for controlling paperwork and emails. We will show you how to implement the six guidelines to achieve more in less time with less effort. Understand how to effectively delegate work to others and know what to delegate. Uncover the secret to convert obstacles into opportunities and balance your home and career by attending to the eight areas of a balanced life. Learning Objectives Control paperwork and emails, Control file organization, Get more done in less time with less effort, Balance home and career Target Audience Managers, Team Leaders, Young Professionals, Sales Professionals, Customer Service Teams
Prospecting is the search for something of value and persistence is a vital component in prospecting. We will guide you through various techniques to overcome your prospecting fears. Discover the four principles of prospecting psychology so that people will let you into their world and how POWER prospecting engages the right frame of mind. Understand the most vital tool to engage the interest of others in your offerings. Learning Objectives Describe how to create a successful prospecting mindset, Define essential sales terminology, Implement POWER Prospecting techniques Target Audience Managers, Team Leaders, Young Professionals, Sales Professionals, Customer Service Teams
Communication skills are a fundamental aspect of success in the business world. However, many individuals encounter challenges in this area, such as difficulty in conveying their thoughts clearly, struggling to actively listen to others, or feeling anxious during public speaking. Effective communication is essential for building relationships, resolving conflicts, and making impactful presentations. Learning Objectives The following are some of the key outcomes in this course: Understand how communication is a process involving a sender, a message, and a receiver Learn why communication can fail if that process breaks down Learn why great communication skills matter to your professional success Understand five of the most common communication barriers Target Audience Young Professionals
Understand the art of guiding and developing individuals within a leadership role through compassionate and supportive coaching and mentoring practices. This involves fostering a culture of growth and learning by providing personalized guidance, constructive feedback, and encouragement to help individuals reach their full potential. By demonstrating empathy, active listening, and a genuine interest in the well-being and development of others, the goal is to create an environment where individuals feel supported, empowered, and motivated to excel both personally and professionally. Learning Objectives The following are some of the key outcomes in this course: Understand the importance of team learning for high performance and psychological safety Identify best practices to coach and mentor your team Apply tools that help build a self-coaching team Target Audience Managers, Team Leaders, Young Professionals
Understand the importance of an inclusive and supportive work environment where diverse perspectives are not only acknowledged but also valued and respected. This involves promoting empathy, understanding, and appreciation for the unique backgrounds, experiences, and viewpoints of team members. By embracing diversity, fostering open dialogue, and actively listening to the perspectives of others, the goal is to cultivate a workplace where differences are celebrated, collaboration thrives, and collective success is achieved. Learning Objectives The following are some of the key outcomes in this course: Understand where our differences come from: essential elements that make us different Identify different ways in which individuals make an impact and contribution in leading and in teams Apply an understanding of differences in how teams perform Target Audience Managers, Team Leaders, Young Professionals
In the fast-paced and often stressful world of business, one common challenge that people face is neglecting their holistic well-being. The pressures of work can lead to physical, mental, and emotional burnout, impacting not only the individual's health but also their productivity and overall performance. Participants will learn how prioritizing their well-being not only benefits them personally but also contributes to a more positive and productive work environment. This training provides valuable insights and strategies for leading with kindness towards oneself and others. Learning Objectives The following are some of the key outcomes in this course: Analyze the connection between well-being and leading with kindness Identify the benefits of a holistic well-being dimension Apply well-being initiatives as part of a regular kind leadership practice Build trust and psychological safety Target Audience Managers, Team Leaders, Young Professionals
Duration 5 Days 30 CPD hours This course is intended for System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organization's security policies. Be a Red Hat Certified Engineer (RHCE©), or demonstrate equivalent Red Hat Enterprise Linux knowledge and experience. Overview Students that complete this course should be able to demonstrate these skills: - Analyze and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customizing baseline policy content provided with Red Hat Enterprise Linux. - Monitor security-relevant activity on your systems with the kernel's audit infrastructure. - Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines. - Confirm the integrity of files and their permissions with AIDE. - Prevent unauthorized USB devices from being used with USBGuard. - Protect data at rest but provide secure automatic decryption at boot using NBDE. - Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights. - Analyze and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower. This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat© Enterprise Linux©, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible© Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. 1 - MANAGE SECURITY AND RISK Define strategies to manage security on Red Hat Enterprise Linux servers. 2 - AUTOMATE CONFIGURATION AND REMEDIATION WITH ANSIBLE Remediate configuration and security issues with Ansible Playbooks. 3 - PROTECT DATA WITH LUKS AND NBDE Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted. 4 - RESTRICT USB DEVICE ACCESS Protect system from rogue USB device access with USBGuard. 5 - CONTROL AUTHENTICATION WITH PAM Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs). 6 - RECORD SYSTEM EVENTS WITH AUDIT Record and inspect system events relevant to security, using the Linux kernel's audit subsystem and supporting tools. 7 - MONITOR FILE SYSTEM CHANGES Detect and analyze changes to a server's file systems and their contents using AIDE. 8 - MITIGATE RISK WITH SELINUX Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses. 9 - MANAGE COMPLIANCE WITH OPENSCAP Evaluate and remediate a server's compliance with security policies by using OpenSCAP. 10 - AUTOMATE COMPLIANCE WITH RED HAT SATELLITE Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite. 11 - ANALYZE AND REMEDIATE ISSUES WITH RED HAT INSIGHTS Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights. 12 - PERFORM A COMPREHENSIVE REVIEW Review the content covered in this course by completing hands-on review exercises. Additional course details: Nexus Humans Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
In the corporate world, one significant challenge often faced is the effective implementation of inclusive communication within an organization's culture. Ensuring that every member of the team feels valued, heard, and included is essential for a harmonious and productive work environment. Issues can arise when there is a lack of awareness or understanding about the importance of inclusive communication, leading to unintentional bias or exclusion. To address these challenges, training on organizational culture and inclusive communication becomes crucial. This training equips employees with the skills to recognize and overcome communication barriers, fostering a culture where diverse perspectives are respected and embraced. Learning Objectives The following are some of the key outcomes in this course: Explore why seemingly innocuous terms and phrases may hurt others, why being mindful of your language matters, and how to communicate more inclusively. Learn how offensive comments can damage a workplace and explore ways to respond to offensive comments at work. Understand the difference between intent and impact and why they sometimes misalign. Learn how to recover after unintentionally hurting someone by following some time-tested do's and don'ts. Learn what shared agreements are, explore their benefits, and dive into some easy steps to develop your own. Target Audience Managers, Team Leaders, Young Professionals
Family Law Learn how to bridge the gap with families and support them to strengthen their bonds. The Family Law course will equip you with the knowledge and expertise to resolve family issues and help others build a perfect home. The Family Law course is designed to show you the ins and outs of family law. In this course, you will learn about marriage law and nullity in marriage. The easy-to-follow modules will help you understand the basics of divorce law. You will be able to grasp an elaborate understanding of the child support process. It will also equip you with valuable information on child custody and the adoption system. Within no time, you will acquire the essential skills and expertise to deal with domestic violence issues. The Family Law course is ideal for building a solid foundation on family law. Enrol in the course if you desire to establish a promising career in this sector. Learning Outcomes of Family Law Bundle Familiarize yourself with the fundamentals of family law Build a clear understanding of the key aspects of marriage law Understand the principles of divorce law and child custody Deepen your understanding of the child support and adoption system Acquire the skills to deal with domestic violence Know the importance of gender equality and feminist perspective on family law With a single payment, you will gain access to Family Law including 10 additional premium courses, an original hard copy certificate, a transcript and a student ID card which will allow you to get discounts on things like music, food, travel and clothes etc. Courses are included with this Family Law Complete Bundle: Course 01: Family Law Course 02: Family Support Worker Diploma Course 03: English Law and Legal System Level 3 Course 04: Understanding Wills and Probate Laws - Level 2 Course 05: Parenting Skills Training Course Course 06: Marriage and Family Therapy Course 07: Couples Therapy & Counselling Course 08 Child Psychology Course 09: Child Protection Level 3 Course 10: Adult Safeguarding Course 11: Domestic Violence and Abuse Awareness - Level 2 Whether you are looking to brighten up your CV, just starting out in the industry, looking for a career change or just fancy learning something new, this Family Law course is perfect! Family Law Course Curriculum of Family Law Course 01: Family Law 01: Introduction 02: Framing 03: Marriage 04: Civil Partnership and Cohabitation 05: Nullity in Marriage 06: Divorce and Family Law 07: Child Custody 08: Property and Finance on Divorce 09: Child Support and Family Law 10: Adoption Process 11: Domestic Violence 12: Gender Equality 13: Feminist Perspectives How will I get my Certificate? After successfully completing the Family Law course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £10 * 11 = £110) Hard Copy Certificate: Free (For The Title Course) P.S. The delivery charge inside the U.K. is £3.99 and the international students have to pay £9.99. CPD 110 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Family Law Requirements Family Law There is no time limit for completing this Family Law course, it can be studied in your own time at your own pace. Career path Family Law Certificates Certificate of completion Digital certificate - Included