Duration 3 Days 18 CPD hours This course is intended for This course is geared for Python experienced developers, analysts or others who are intending to learn the tools and techniques required in building various kinds of powerful recommendation systems (collaborative, knowledge and content based) and deploying them to the web. Overview Working in a hands-on lab environment led by our expert instructor, attendees will Understand the different kinds of recommender systems Master data-wrangling techniques using the pandas library Building an IMDB Top 250 Clone Build a content-based engine to recommend movies based on real movie metadata Employ data-mining techniques used in building recommenders Build industry-standard collaborative filters using powerful algorithms Building Hybrid Recommenders that incorporate content based and collaborative filtering Recommendation systems are at the heart of almost every internet business today; from Facebook to Net?ix to Amazon. Providing good recommendations, whether its friends, movies, or groceries, goes a long way in defining user experience and enticing your customers to use your platform.This course shows you how to do just that. You will learn about the different kinds of recommenders used in the industry and see how to build them from scratch using Python. No need to wade through tons of machine learning theory?you will get started with building and learning about recommenders as quickly as possible. In this course, you will build an IMDB Top 250 clone, a content-based engine that works on movie metadata. You will also use collaborative filters to make use of customer behavior data, and a Hybrid Recommender that incorporates content based and collaborative filtering techniques.Students will learn to build industry-standard recommender systems, leveraging basic Python syntax skills. This is an applied course, so machine learning theory is only used to highlight how to build recommenders in this course.This skills-focused ccombines engaging lecture, demos, group activities and discussions with machine-based student labs and exercises.. Our engaging instructors and mentors are highly-experienced practitioners who bring years of current, modern 'on-the-job' modern applied datascience, AI and machine learning experience into every classroom and hands-on project. Getting Started with Recommender Systems Technical requirements What is a recommender system? Types of recommender systems Manipulating Data with the Pandas Library Technical requirements Setting up the environment The Pandas library The Pandas DataFrame The Pandas Series Building an IMDB Top 250 Clone with Pandas Technical requirements The simple recommender The knowledge-based recommender Building Content-Based Recommenders Technical requirements Exporting the clean DataFrame Document vectors The cosine similarity score Plot description-based recommender Metadata-based recommender Suggestions for improvements Getting Started with Data Mining Techniques Problem statement Similarity measures Clustering Dimensionality reduction Supervised learning Evaluation metrics Building Collaborative Filters Technical requirements The framework User-based collaborative filtering Item-based collaborative filtering Model-based approaches Hybrid Recommenders Technical requirements Introduction Case study and final project ? Building a hybrid model Additional course details: Nexus Humans Applied AI: Building Recommendation Systems with Python (TTAI2360) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Applied AI: Building Recommendation Systems with Python (TTAI2360) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, and Business Process Owners/Team Leads/Power Users. Overview This course will prepare you to:Describe tasks performed by a typical SAP Access Control userDiscuss Harmonization topics as they relate to SAP Access ControlExplain how SAP GRC helps you to address business challengesIdentify authorization risks in typical business processesDescribe the Segregation of Duties Risk Management ProcessDescribe and configure functionality and features for SAP Access Control 10.1Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage usersDescribe the SAP Access Control 10.1 architecture and landscape, SAP Access Control Repository, and Object Level SecurityDescribe the Periodic Access Review processPlan for and manage emergency accessDiscuss the reporting frameworkConfigure workflows, including multi-stage multi-path (MSMP) workflows and BRF+Describe how the different applications of the SAP GRC Solution integrate with each otherDiscuss key steps in the SAP Access Control implementation process In this course, students gain hands-on configuration and implementation experience of SAP Access Control 10.1, as well as important concepts they will need to know in order to prepare for implementation and ongoing access risk prevention. Introduction to SAP Access Control Discussing Business Challenges and Solutions Using SAP Access Control Architecture, Security, and Authorizations Describing the System Architecture Describing Security and Authorizations Shared Configuration Settings Configuring Shared GRC Settings Configuring Shared SAP Access Control Settings Authorization Risks and the Segregation of Duties (SoD) Management Process Identifying Authorization Risks Managing Risk by Segregating Duties SAP Access Control Repository Synchronizing Objects into the Repository Scheduling and Viewing Background Jobs Risk Analysis Maintaining Shared Master Data Configuring and Maintaining the Rule Set Configuring and Using Audit Trail Tracking Using the Risk Analysis Framework Remediating Risks Mitigating Risks Mitigating Multiple Risks at One Time Business Rule Framework Creating Rules in the Business Rule Framework (BRF) Defining Business Rules Multi-Stage, Multi-Path (MSMP) Workflow Describing Multi-Stage, Multi-Path (MSMP) Workflow Maintaining MSMP Workflow Building MSMP Workflow User Provisioning Configuring User Provisioning Settings Configuring Access Request Forms Requesting Access Preparing Roles and Owner Data for MSMP Workflow Creating Simplified Access Requests Reviewing Search Request Results SAP Fiori User Experience (UX) for GRC Describing SAP Fiori UX Role Design and Management Configuring Role Management Configuring Role Methodology Configuring Role Search Attributes Planning for Technical Role Definition Planning for Business Role Definition Consolidating Roles Through Role Mining Performing Role Mass Maintenance Operations Emergency Access Management Describing Emergency Access Management Planning for Emergency Access Monitoring Emergency Access Periodic Access Review Process Planning Periodic Review Monitoring Periodic Review Reports and Custom Fields Use the Reporting Framework SAP Access Control Implementation Using the SAP Access Control Implementation Process Designing the SAP Access Control Solution Planning Upgrade and Migration Configuring SAP Access Control Implementing the SAP Access Control solution Optimizing the SAP Access Control Suite Additional course details: Nexus Humans GRC300 SAP Access Control Implementation and Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GRC300 SAP Access Control Implementation and Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This intermediate-level hands-on course is geared for experienced Administrators, Analysts, Architects, Data Scientists, Database Administrators and Implementers Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Oracle Data Integrator is a comprehensive data integration platform that covers all data integration requirements from high-volume, high-performance batch loads, to event-driven integration processes and SOA-enabled data services. Oracle Data Integrator's Extract, Load, Transform (E-LT) architecture leverages disparate RDBMS engines to process and transform the data - the approach that optimizes performance, scalability and lowers overall solution costs. Throughout this course participants will explore how to centralize data across databases, performing integration, designing ODI Mappings, and setting up ODI security. In addition, Oracle Data Integrator can interact with the various tools of the Hadoop ecosystem, allowing administrators and data scientists to farm out map-reduce operations from established relational databases to Hadoop. They can also read back into the relational world the results of complex Big Data analysis for further processing. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Introduction to Integration and Administration Oracle Data Integrator: Introduction Oracle Data Integrator Repositories Administering ODI Repositories Create and connect to the Master Repository Export and import the Master Repository Create, connect, and set a password to the Work Repository ODI Topology Concepts ODI Topology: Overview Data Servers and Physical Schemas Defining Topology Agents in Topology Planning a Topology Describing the Physical and Logical Architecture Topology Navigator Creating Physical Architecture Creating Logical Architecture Setting Up a New ODI Project ODI Projects Using Folders Understanding Knowledge Modules Exporting and Importing Objects Using Markers Oracle Data Integrator Model Concepts Understanding the Relational Model Understanding Reverse-Engineering Creating Models Organizing ODI Models and Creating ODI Datastores Organizing Models Creating Datastores Constraints in ODI Creating Keys and References Creating Conditions Exploring Your Data Constructing Business Rules ODI Mapping Concepts ODI Mappings Expressions, Join, Filter, Lookup, Sets, and Others Behind the Rules Staging Area and Execution Location Understanding Knowledge Modules Mappings: Overview Designing Mappings Multiple Sources and Joins Filtering Data Overview of the Flow in ODI Mapping Selecting a Staging Area Configuring Expressions Execution Location Selecting a Knowledge Module Mappings: Monitoring and Troubleshooting Monitoring Mappings Working with Errors Designing Mappings: Advanced Topics 1 Working with Business Rules Using Variables Datasets and Sets Using Sequences Designing Mappings: Advanced Topics 2 Partitioning Configuring Reusable Mappings Using User Functions Substitution Methods Modifying Knowledge Modules Using ODI Procedures Procedures: Overview Creating a Blank Procedure Adding Commands Adding Options Running a Procedure Using ODI Packages Packages: Overview Executing a Package Review of Package Steps Model, Submodel, and Datastore Steps Variable Steps Controlling the Execution Path Step-by-Step Debugger Starting a Debug Session New Functions Menu Bar Icons Managing ODI Scenarios Scenarios Managing Scenarios Preparing for Deployment Using Load Plans What are load plans? Load plan editor Load plan step sequence Defining restart behavior Enforcing Data Quality with ODI Data Quality Business Rules for Data Quality Enforcing Data Quality with ODI Working with Changed Data Capture CDC with ODI CDC implementations with ODI CDC implementation techniques Journalizing Results of CDC Advanced ODI Administration Setting Up ODI Security Managing ODI Reports ODI Integration with Java
Duration 5 Days 30 CPD hours This course is intended for Anyone who plans to work with Kubernetes at any level or tier of involvement Any company or individual who wants to advance their knowledge of the cloud environment Application Developers Operations Developers IT Directors/Managers Overview All topics required by the CKAD exam, including: Deploy applications to a Kubernetes cluster Pods, ReplicaSets, Deployments, DaemonSets Self-healing and observable applications Multi-container Pod Design Application configuration via Configmaps, Secrets Administrate cluster use for your team A systematic understanding of Kubernetes architecture Troubleshooting and debugging tools Kubernetes networking and services Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on training, you will go back to work with all necessary commands and practical skills to empower your team to succeed, as well as gain knowledge of important concepts like Kubernetes architecture and container orchestration. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Application Developer (CKAD) exam. You will command and configure a high availability Kubernetes environment (and later, build your own!) capable of demonstrating all ?K8s'' features discussed and demonstrated in this course. Your week of intensive, hands-on training will conclude with a mock CKAD exam that matches the real thing. Kubernetes Architecture Components Understand API deprecations Containers Define, build and modify container images Pods Master Services Node Services K8s Services YAML Essentials Creating a K8s Cluster kubectl Commands Kubernetes Resources Kubernetes Namespace Kubernetes Contexts Pods What is a Pod? Create, List, Delete Pods How to Access Running Pods Kubernetes Resources Managing Cloud Resource Consumption Multi-Container Pod Design Security Contexts Init Containers Understand multi-container Pod design patterns (e.g. sidecar, init and others) Pod Wellness Tracking Networking Packet Forwarding ClusterIP and NodePort Services Provide and troubleshoot access to applications via services Ingress Controllers Use Ingress rules to expose applications NetworkPolicy resource Demonstrate basic understanding of NetworkPolicies Network Plugins Defining the Service Mesh Service mesh configuration examples ReplicaSets Services ReplicaSet Function Deploying ReplicaSets Deployments Deployment Object Updating/Rolling Back Deployments Understand Deployments and how to perform rolling updates Deployment Strategies Use Kubernetes primitives to implement common deployment strategies (e.g. blue/green or canary) Scaling ReplicaSets Autoscaling Labels and Annotations Labels Annotations Node Taints and Tolerations Jobs The K8s Job and CronJob Understand Jobs and CronJobs Immediate vs. scheduled internal use Application Configuration Understanding and defining resource requirements, limits and quotas Config Maps Create & consume Secrets Patching Custom Resource Definition Discover and use resources that extend Kubernetes (CRD) Managing ConfigMaps and Secrets as Volumes Storage Static and dynamic persistent volumes via StorageClass K8s volume configuration Utilize persistent and ephemeral volumes Adding persistent storage to containers via persistent volume claims Introduction to Helm Helm Introduction Charts Use the Helm package manager to deploy existing packages Application Security Understand authentication, authorization and admission control Understand ServiceAccounts Understand SecurityContexts Application Observability and Maintenance Use provided tools to monitor Kubernetes applications How to Troubleshoot Kubernetes Basic and Advanced Logging Techniques Utilize container logs Accessing containers with Port-Forward Debugging in Kubernetes Hands on Labs: Define, build and modify container images Deploy Kubernetes using Ansible Isolating Resources with Kubernetes Namespaces Cluster Access with Kubernetes Context Listing Resources with kubectl get Examining Resources with kubectl describe Create and Configure Basic Pods Debugging via kubectl port-forward Imperative vs. Declarative Resource Creation Performing Commands inside a Pod Understanding Labels and Selectors Insert an Annotation Create and Configure a ReplicaSet Writing a Deployment Manifest Perform rolling updates and rollbacks with Deployments Horizontal Scaling with kubectl scale Implement probes and health checks Understanding and defining resource requirements, limits and quotas Understand Jobs and CronJobs Best Practices for Container Customization Persistent Configuration with ConfigMaps Create and Consume Secrets Understand the Init container multi-container Pod design pattern Using PersistentVolumeClaims for Storage Dynamically Provision PersistentVolumes with NFS Deploy a NetworkPolicy Provide and troubleshoot access to applications via services Use Ingress rules to expose applications Understand the Sidecar multi-container Pod design pattern Setting up a single tier service mesh Tainted Nodes and Tolerations Use the Helm package manager to deploy existing packages A Completed Project Install Jenkins Using Helm and Run a Demo Job Custom Resource Definitions (CRDs) Patching Understanding Security Contexts for Cluster Access Control Utilize container logs Advanced Logging Techniques Troubleshooting Calicoctl Deploy a Kubernetes Cluster using Kubeadm Monitoring Applications in Kubernetes Resource-Based Autoscaling Create ServiceAccounts for use with the Kubernetes Dashboard Saving Your Progress With GitHub CKAD Practice Drill Alta Kubernetes Course Specific Updates Sourcing Secrets from HashiCorp Vault Example CKAD Test Questions
Duration 4.875 Days 29.25 CPD hours This course is intended for VMware vSphere: Install, Configure, Manage features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere. This course prepares you to administer a vSphere infrastructure for an organization of any size and forms the foundation for most otherVMware technologies in the software-defined data center. Overview Describe the software-defined data center (SDDC) Explain the vSphere components and their function in the infrastructure Describe the benefits and capabilities of VMware Skyline Install and configure ESXi hosts Deploy and configure VMware vCenter Server Appliance⢠Use VMware vSphere Client⢠to manage the vCenter Server inventory and the vCenter Server configuration Manage, monitor, back up, and protect vCenter Server Appliance Create virtual networks with vSphere standard switches Describe the storage technologies supported by vSphere Configure virtual storage using iSCSI and NFS storage Create and manage VMware vSphere VMFS datastores Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create a content library and deploy virtual machines from templates in the library Manage virtual machine resource use Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphere Distributed Resource Scheduler ⢠Discuss solutions for managing the vSphere life cycle Use VMware vSphere Lifecycle Manager⢠to perform upgrades to ESXi hosts and virtual machines This is an official VMware IT Academy course with official courseware and labs. Course introduction Introductions and course logistics Course objectives Introduction to vSphere and the Software-Defined Data Center Explain basic virtualization concepts Describe how vSphere fits into the software-defined data center and the cloud infrastructure Explain how vSphere interacts with CPUs, memory, networks, and storage Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts Describe the ESXi host architecture Navigate the Direct Console User Interface (DCUI) to configure an ESXi host Recognize ESXi host user account best practices Install an ESXi host Use VMware Host Client? to configure ESXi host settings Describe how to proactively manage your vSphere environment using VMware Skyline Virtual Machines Create and provision a virtual machine Explain the importance of VMware Tools? Install VMware Tools Identify the files that make up a VM Recognize the components of a VM Recognize virtual devices supported by a VM Describe the benefits and use cases for containers Identify the parts of a container system vCenter Server Describe the vCenter Server architecture Discuss how ESXi hosts communicate with vCenter Server Deploy and configure vCenter Server Appliance Use vSphere Client to manage the vCenter Server inventory Add data center, organizational objects, and hosts to vCenter Server Use roles and permissions to enable users to access objects in the vCenter Server inventory Back up vCenter Server Appliance Monitor vCenter Server tasks, events, and appliance health Use VMware vCenter Server© High Availability to protect a vCenter Server Appliance Configuring and Managing Virtual Networks Create and manage standard switches Describe the virtual switch connection types Configure virtual switch security, traffic-shaping, and load-balancing policies Compare vSphere distributed switches and standard switches Configuring and Managing Virtual Storage Identify storage protocols and storage device types Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage Create and manage VMFS and NFS datastores Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage Recognize the components of a VMware vSAN? configuration Virtual Machine Management Use templates and cloning to deploy new virtual machines Modify and manage virtual machines Create a content library and deploy virtual machines from templates in the library Use customization specification files to customize a new virtual machine Perform vSphere vMotion and vSphere Storage vMotion migrations Describe the Enhanced vMotion Compatibility feature Create and manage virtual machine snapshots Examine the features and functions of VMware vSphere© Replication? Describe the benefits of VMware vSphere© Storage APIs ? Data Protection Resource Management and Monitoring Discuss CPU and memory concepts in a virtualized environment Describe what overcommitment of a resource means Describe methods for optimizing CPU and memory usage Use various tools to monitor resource use Create and use alarms to report certain conditions or events vSphere Clusters Describe the functions of a vSphere DRS cluster Create a vSphere DRS cluster Monitor a vSphere cluster configuration Describe options for making a vSphere environment highly available Explain the vSphere HA architecture Configure and manage a vSphere HA cluster Examine the features and functions of VMware vSphere© Fault Tolerance Describe the function of the vSphere© Cluster Service vSphere Lifecycle Management Recognize the importance of vCenter Server Update Planner Describe how VMware vSphere© Lifecycle Manager? works Describe how to update ESXi hosts using baselines Validate ESXi host compliance using a cluster image Describe how to upgrade VMware Tools and VM hardware Describe VMware vSphere© Lifecycle Manager? and VMware vSAN? integration
At some point in your life you will have attended a training course or workshop, but what happens when you are asked to deliver one? Some people relish the opportunity while others are challenged by it. Whatever you feel about training others, it is a skill that is admired and can be studied and learned. With the trainer you will be learning the techniques, skills and understanding you need and you will have the chance to deliver a short training session to others, receive feedback and having the confidence to deliver it for real in your job. The training will comprise one day followed by a half day when all those able to attend will deliver and have feedback on a 20 minute training activity. To be able to create and maintain an environment conducive to learning and engagement To understand basic learning theory and practice and the difference between training, facilitating and learning To understand how adults learn and how to apply it as a trainer To be able to plan and deliver a training activity using the appropriate set of skills and behaviours To be able to review and evaluate learning and identify how outcomes are met To manage the learning process and the participant engagement in the training environment To be able to present effectively and appropriately to a variety of audiences To deliver and receive feedback on a short delivered training activity with peers To review and evaluate learning and have an action plan to take back and put into practice DAY ONE (full-day) 1 Welcome, housekeeping, how the day will be run Introductions (and making the most of them) Warm up - breaking the ice followed by review and feedback Creating an environment conducive to learning and engagement; managing expectations well as a trainer Group task with feedback and review in plenary 2 What is training and how do adults learn? Trainer input: David Kolb's Learning Cycle Group tasks 3 How to plan a session and what to include - trainer input Starting at the end and working backwards Linking outcomes to purposeful activities Practice task and planning time for day two using a template 4 The skills and behaviours of a brilliant trainer Modelling skills and behaviours Creative task and discussion 5 Mini reviewing task De-brief - using reviewing in training 6 How to manage the process Trainer input followed by practice Paying conscious attention to language (verbal and non verbal), feelings and responses in the room and managing yourself as a trainer 7 The trainer's toolkit #1 Key tools, materials and templates Choosing different tools and approaches with different audiences Know your audience 8 The trainer's toolkit #2 Key tools, materials and templates continued Addressing trainer good practice 9 Review, evaluation and action planning activities Why and what should we be evaluating and why it's important Action planning task Group review task DAY TWO (half-day) The day will comprise a series of 30 minute timed sessions where each delegate will present and deliver a training activity with the group. The training activity will be prepared and planned in advance and will take 20 minutes (+ or - 2 minutes) to deliver in real time. This will be followed by review and feedback from the trainer and peers to complete the total of 30 minutes as a time slot. Reiteration of the task and discussion can take place with the trainer if needed, and there is time included in Day One to support the training planning.
Self-understanding is a prerequisite for leading and managing others responsibly and honourably. The field of Neuro Linguistic Programming has helped us to gain a better insight into how we all think and behave. Upon completion of this course participants will be able to: Gain an insight into the purpose and functions of the unconscious mind Develop flexibility to increase their for behaviours in different circumstances Appreciate how different people experience the world Create and set effective goals and direction Understand the NLP Model of Communication Adapt their communication style to maximise effectiveness Influence and persuade others by connecting with people Understand how empowerment can make life easier Appreciate how creativity works Learn creativity techniques to tap into the power of the team 1 Self-awareness Autopilot - your unconscious mind Developing flexibility How identify, values & beliefs shape our behaviour Models of the world 2 Creating direction Describing present and desired state Designing your direction Making it happen Self-mastery 3 Communication The NLP Model of Communication Insights to the way people think Understanding representation systems Reframing the way people think about negative experiences Using metaphor 4 Influence and persuasion Building trust Connecting with people Purpose intention and outcomes The difference empowerment makes 5 Creativity and innovation Hindrances to creativity and innovation Your natural state of creativity Getting unblocked Creativity techniques 6 Action plan Course summary and presentation of action plans
Take your sales people from average to high performance. Motivate and develop experienced sales professionals with some new insights and learning. Applying NLP principles, techniques and models, this workshop will introduce the core attitudes and behaviours that differentiate the excellent sales person from the average one. The programme will help participants: Understand and adopt the mindset and beliefs needed for sales excellence Build rapport and connect with buyers at a deeper and more personal level Recognise some of the thinking and language patterns that make each individual unique Ask powerful questions to further understand the unique world of the individual and how they make decisions Apply tools and techniques to empathise with clients - seeing things from their perspectives Tailor their sales approach to the individual buyer's style, and talk in their language Influence with integrity and sell to organisations and individuals successfully 1 Introduction Aims and objectives of the programme Personal introductions and objectives Workshop overview 2 An introduction to NLP and sales excellence with NLP An overview of NLP and applying it to selling The pillars of NLP The NLP model of communication The difference that makes the difference 3 Building enhanced rapport Defining rapport and why it is important when selling Going beyond the initial small talk Building relationships with individual decision-makers Matching and mirroring Levels of rapport 4 Understanding the buyer's personal buying map How we take in, filter and process information How we judge others based on our own experiences of the world The different ways in which we communicate when selling Recognising and understanding the language and thinking patterns of others Adapting your sales communication style to different buyers 5 Making sense of the buying process How we filter information through our senses Understanding how we see, hear and experience the world Visual, auditory and kinaesthetic buyers Listening for key insights What different buyers want from you to help them to buy Applying sensory awareness to the sales process 6 Successful sales mindset The connection between thoughts and actions The sales beliefs of excellence Identifying negative thoughts and beliefs that are holding you back How to change your mindset Adopting the sales beliefs of excellence 7 Powerful questions Reviewing and honing your questioning skills Understanding the questions that great sales people ask Avoiding assumptions Clean language questions Getting to the bottom of it - precision questions Turbo-charging how you qualify 8 Influencing with integrity Understanding empathy Stepping into the buyer's shoes Speaking the buyer's language Tailoring your sales approach to the individual Match, pace, lead - how to take your buyer with you 9 Putting it all together Personal learning summary and action plans
Today's administrative professional needs flexibility and a broad portfolio of skills including self-motivation, assertiveness, and the ability to deal with difficult people. You will benefit from this course if you are an administrator, medical/legal secretary or PA, who wants to enhance your administrative support skills, as well as evaluating your existing techniques. This course will help you identify: your areas of strength and your areas for improvement in the work environment ways to accept new challenges and responsibilities with confidence what motivates you at work techniques to improve your planning and time management ways of improving your influencing and assertiveness skills your preferred working style (and relate it to your interaction with others) ways of using your initiative how to deal with challenging people, using recognised communication methods The course will help you develop a flexible set of skills that will allow you to succeed at work, no matter what the day throws at you. It will help you communicate effectively with a diverse range of colleagues and others with tact and diplomacy. And, finally, it will help you provide the administrative support that is essential for the smooth running of your area and of the organisation as a whole. 1 Introduction Overview Introductions Individual objectives 2 What exactly is your role? Before looking at new skills and techniques, where are you now? Do you have the skills, knowledge and attitude required to be an exceptional administrator? Understand your job criteria Identifying your strengths and areas for development Activity - skills analysis Activity - action plan 3 Building trust How can you build trust? Understanding the links between reliability, consistency and trust What is required to deliver efficient service? Activity: efficient service requirements of the professional administrator 4 Working styles Identifying your working style preference Understanding the importance of a flexible approach Identifying areas of improvement to become a more effective team member Activity: Questionnaire (completing, scoring and charting) Activity: drawbacks of my style Developing your working style 5 Assertiveness Understand the differences between behaviours Activity: Definition and characteristics of assertive / aggressive / passive behaviour Activity: Identifying different behaviours Understanding how to be more assertive How to use assertiveness techniques How to ask for feedback Activity: Making requests assertively Activity: Refusing requests assertively 6 Time management The importance of planning for success The importance of managing interruptions The importance of having clear purpose Time management best practices Activity: How do you plan your time? What prevents you improving your time management? How will you recognise success? 7 Prioritisation How to prioritise work to meet deadlines The prioritisation matrix Activity: Post it! 8 Dealing with interruptions The impact interruptions have on productivity How to manage interruptions Activity: What interruptions do you experience? What tactics can be employed to reduce these interruptions? 9 Close Open forum Summary Action planning
The leadership role of the project manager is increasingly recognised as a key determinant in delivering success. These skills can often be critical in project situations, where tight budgets and deadlines demand the highest levels of team performance and where the working environment presents fresh challenges on a daily basis. This programme focuses on the leadership skills required of project managers and will benefit anyone involved in managing projects large or small wishing to extend or enhance those skills. The objectives of this programme are to help the participants: Understand the significance of leadership skills to the project manager and the impact of these skills on project performance Review the key skills needed to be an effective 'multi-dimensional' project leader and learn how to develop, adapt and apply them in practice Learn how to identify the preferred leadership style for the context and organisational culture of a project and how to develop personal style versatility Understand the role of the project leader in building an effective team and the skills required to promote and sustain team performance Gain a better understanding of the interpersonal skills needed to motivate individual team members and harness the full potential of the team DAY ONE 1 Introduction Aims and objectives Personal objectives 2 Project management and leadership What is a leader? How much can leadership be learned? The project environment and the impact of leadership skills The characteristics of high performance project teams and their leaders 3 Principles of effective leadership Some useful models and theories of leadership explored Types of leadership; choosing how to use leadership power Evaluating personal leadership style; how to develop style flexibility 4 Syndicate case study: Leadership in action Review of the role of leadership in a contemporary project Feedback and plenary discussion: effective project leadership 5 Team exercise: Leadership skills of the project manager Teams compete in performing a project simulation Project review and feedback Discussion of the outcome: role and skills of the project leader 6 Leadership skills for project managers The 3 dimensions of project leadership: inwards, outwards, and upwards The vital role of communication skills and how to develop them Developing a 'project vision': strategic thinking skills Understanding others; emotional intelligence skills Being a visible leader; behavioural and influencing skills Building effective relationships; the importance of trust and respect DAY TWO 7 Leading the project team The role of leadership in developing team performance Understanding individual strengths; recognising team role preferences Managing conflict and promoting positive team dynamics Setting standards, maintaining discipline and rewarding performance Harnessing team potential: building motivation within the team Promoting team learning; the team leader as coach / mentor 8 Leading through the organisation Gaining the support others; developing effective influencing skills Getting empowerment from key stakeholders Knowing when and how to take the initiative and lead Building and maintaining rapport with key partners Becoming an effective team player in leadership teams Becoming a business leader; leading colleagues and co-workers 9 Team exercise: Leadership and negotiation Teams engage in a negotiation exercise Exercise review and feedback Discussion of the outcome: negotiation skills of the project leader 10 Negotiation skills for project leaders Characteristics of effective negotiators Classic problem behaviours and mind-sets to avoid Getting to win-win; building partnership and trust 11 Leading more senior stakeholders The challenges and skills of leading and managing upwards Communicating with more senior stakeholders; building credibility Negotiating upwards: knowing when and how The role of networking skills; building and maintaining rapport Handling disagreements; the art of diplomacy Handling personality and style conflicts with more senior people