• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

370 Perspective courses in Cardiff delivered Live Online

Dealing with challenging customers (In-House)

By The In House Training Company

Wouldn't sales be a 'walk in the park' without challenging customers? Why is it that some customers are so difficult to please, so quick to call 'foul' at the slightest blip and so mean with their gratitude after we've bent over backwards to accommodate them? Whether we are looking at prospective or existing customers, there is a toolkit for dealing with the most challenging of them. This course will help participants: Use broad open questions to give the customer a platform for their opinions or issues Improve listening skills to really understand what's behind the customer's challenging style Probe specific phrases to show listening and earn deeper disclosure Use silence to let challenging customers 'blow off steam' Understand the negative impact of certain phrases on a challenging customer Summarise effectively and reassure the customer of our understanding of their needs Recognise the 'behaviour cycle' and avoid emotional escalation Understand 'transactional analysis' and how to bring people from 'child' to 'adult' state Create loyalty in customers who are slow to give trust 1 What makes a customer 'challenging'? Why customers challenge us - understanding their drivers 'Wearing their shoes' - seeing things from their perspective Understanding our own personality style How to flex with a style that is different from our own Ways to quickly recognise a customer's style The benefits of flexing with a challenging customer's style 2 Practical exercise - forum theatre Participants take it in turns to deal with the trainer (who plays the role of the challenging customer) Observers stop the action when they hear or see something they deem wrong The participant in the seat gets a chance to use a suggested alternative line The participant who makes the suggestion has the chance to occupy the seat and deliver it themselves Frequent feedback from the trainer as to how the participant's words are making him feel Opportunities to rewind the action if an ill-advised line is suggested and delivered Flipchart for capturing what worked, what didn't work and why Mehrabian principle - the importance of body language and tone over words used 3 Questioning and listening skills How to use open questions to get the customer talking What questions to avoid and why The use of pauses and silence to reduce tension and build trust What listening is and what it isn't Question funnelling - how to earn deeper disclosure through probing The power of summary 4 Transactional analysis explained What is transactional analysis (TA)? Exploring the TA states and why people behave in that way under pressure How to bring challenging customers to 'adult' state to reduce tension How 'parent' or 'child' behaviours can be inadvertently triggered Understanding the 'behavioural cycle' and how to break it Mini-role play 'vignettes' to demonstrate real time impact of ill-chosen words 5 How to build trust with challenging customers Techniques for placating current challenging customers Methods that the participants have already used effectively - understanding why those methods worked and how other participants can model them Participants' experiences of trust having been lost - understanding why those experiences had that negative outcome How to 'go the extra mile' with challenging customers 6 Bringing a 'real' challenging customer to life Participants give the trainer a brief profile of a specific challenging customer of theirs 5-10 minute roleplay in which the trainer brings that individual to life Observing participants - without interrupting - make notes on what is and isn't working Trainer stops the action half-way through to give feedback on how he is feeling Participant goes back into the roleplay having recalibrated their approach based on feedback Observers give feedback on what did and didn't work Trainer comes out of character to explain the impact of the participant's words and behaviours 7 Wrap-up Key learnings from each participant Individual action planning - steps that can and will be implemented in the workplace

Dealing with challenging customers (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Finance for project managers and engineers (In-House)

By The In House Training Company

What do engineers and project managers need to know of finance? 'Nothing - leave it to the accountants!' No, no, no! Engineers must be conversant with the terminology and statements that accountants use. Technical expertise in projects, service delivery, production or other areas can only really be harnessed if the managers understand the accounting and reporting that drives businesses. This course gives the necessary understanding to project, production and technical managers. It develops their skills in understanding financial and management accounting. Accountants may not always like it but a major part of their work is to be the 'servants of business' and to gather, compile and present your figures. So you must understand the figures - they belong to you, your processes or projects. There are many reasons for maintaining accurate accounts. This course focuses on the strategic issues (those over-used words) - what figures reveal about the drivers of business and what they reveal about the day-to-day issues that accountants bother you with. The course will enhance your understanding of finance and of the accounting issues which affect your projects, production and technical areas of business. This course will help you: Understand the business world in figures - make sense of what the accountants are telling you Appreciate what drives business - and how this affects your role in your part of the business Relate your activities to the success of the business - through figures Gain the skills to advance in management - financial awareness is a 'must have' if you are to progress in your career 1 What do accountants do? The finance function, types of accountant, financial v management accounting and the treasury function Understanding the role of the finance function and how the information you provide may be used 2 The basic financial statements Balance sheets and income statements (P&L accounts) What they are, what they contain and above all what they can reveal - how to read them The accounting process - from transactions to financial statements What underpins the statements - accounting systems and internal controls 3 Why be in business - from a financial perspective The driving forces behind financial information Performance measures - profitability, asset utilisation, sales and throughput, managing capital expenditure 4 Accounting rules - accounting standards Accounting concepts and the accounting rules: accruals, 'going concern' - substance over form and other 'desirable qualities' Accruals - why the timing of a transaction is so important to the finance function Depreciation and amortisation - the concepts and practice Accounting standards - the role of International Financial Reporting Standards 5 Cash The importance of cash flow - working capital management Cash flow statements - monitoring overall cash flows Raising cash - levels of borrowing, gearing Spending cash - an outline of capital expenditure appraisal 6 Budgeting Why budget? - good and bad practice Determining why budgets play a key role and should not be simply an annual ritual Justifying your budgets - the link between the strategic plan and day-to-day budgeting - alignment of company culture Budgets as motivators - the importance of the right culture Techniques to improve budgeting - whether day-to-day or capital budgeting 7 Costing The type and detail of costing very much depends on your business - eg, manufacturing piston rings is quite different from the construction of a power plant Issues with overhead allocation Accounting for R&D 8 Reading financial statements Annual financial statements - why they are produced, what's in them and what you should look for Learning what a set of accounts reveals about a company's current situation, profitability and future prospects 9 Performance measurement - analytical reviews and ratio analysis ROI/ROCE Profitability, margins and cost control Sales - asset turnover Efficiency (asset / stock turnover, debtor / creditor days) 'City' measures Investment (interest / dividend cover, earnings per share, dividend yield)

Finance for project managers and engineers (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Developing Applications with Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Application developers who want to build cloud-native applications or redesign existing applications that will run on Google Cloud Platform Overview This course teaches participants the following skills: Use best practices for application development. Choose the appropriate data storage option for application data. Implement federated identity management. Develop loosely coupled application components or microservices. Integrate application components and data sources. Debug, trace, and monitor applications. Perform repeatable deployments with containers and deployment services. Choose the appropriate application runtime environment; use Google Container Engine as a runtime environment and later switch to a no-ops solution with Google App Engine flexible environment. Learn how to design, develop, and deploy applications that seamlessly integrate components from the Google Cloud ecosystem. This course uses lectures, demos, and hands-on labs to show you how to use Google Cloud services and pre-trained machine learning APIs to build secure, scalable, and intelligent cloud-native applications. Best Practices for Application Development Code and environment management. Design and development of secure, scalable, reliable, loosely coupled application components and microservices. Continuous integration and delivery. Re-architecting applications for the cloud. Google Cloud Client Libraries, Google Cloud SDK, and Google Firebase SDK How to set up and use Google Cloud Client Libraries, Google Cloud SDK, and Google Firebase SDK. Lab: Set up Google Client Libraries, Cloud SDK, and Firebase SDK on a Linux instance and set up application credentials. Overview of Data Storage Options Overview of options to store application data. Use cases for Google Cloud Storage, Cloud Firestore, Cloud Bigtable, Google Cloud SQL, and Cloud Spanner. Best Practices for Using Cloud Firestore Best practices related to using Cloud Firestore in Datastore mode for:Queries, Built-in and composite indexes, Inserting and deleting data (batch operations),Transactions,Error handling. Bulk-loading data into Cloud Firestore by using Google Cloud Dataflow. Lab: Store application data in Cloud Datastore. Performing Operations on Cloud Storage Operations that can be performed on buckets and objects. Consistency model. Error handling. Best Practices for Using Cloud Storage Naming buckets for static websites and other uses. Naming objects (from an access distribution perspective). Performance considerations. Setting up and debugging a CORS configuration on a bucket. Lab: Store files in Cloud Storage. Handling Authentication and Authorization Cloud Identity and Access Management (IAM) roles and service accounts. User authentication by using Firebase Authentication. User authentication and authorization by using Cloud Identity-Aware Proxy. Lab: Authenticate users by using Firebase Authentication. Using Pub/Sub to Integrate Components of Your Application Topics, publishers, and subscribers. Pull and push subscriptions. Use cases for Cloud Pub/Sub. Lab: Develop a backend service to process messages in a message queue. Adding Intelligence to Your Application Overview of pre-trained machine learning APIs such as Cloud Vision API and Cloud Natural Language Processing API. Using Cloud Functions for Event-Driven Processing Key concepts such as triggers, background functions, HTTP functions. Use cases. Developing and deploying functions. Logging, error reporting, and monitoring. Managing APIs with Cloud Endpoints Open API deployment configuration. Lab: Deploy an API for your application. Deploying Applications Creating and storing container images. Repeatable deployments with deployment configuration and templates. Lab: Use Deployment Manager to deploy a web application into Google App Engine flexible environment test and production environments. Execution Environments for Your Application Considerations for choosing an execution environment for your application or service:Google Compute Engine (GCE),Google Kubernetes Engine (GKE), App Engine flexible environment, Cloud Functions, Cloud Dataflow, Cloud Run. Lab: Deploying your application on App Engine flexible environment. Debugging, Monitoring, and Tuning Performance Application Performance Management Tools. Stackdriver Debugger. Stackdriver Error Reporting. Lab: Debugging an application error by using Stackdriver Debugger and Error Reporting. Stackdriver Logging. Key concepts related to Stackdriver Trace and Stackdriver Monitoring. Lab: Use Stackdriver Monitoring and Stackdriver Trace to trace a request across services, observe, and optimize performance.

Developing Applications with Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered OnlineFlexible Dates
Price on Enquiry

Growth Leadership Programme

By The Power Within Training & Development Ltd

Workplace Innovation Are You A Leader Who Wants To Enhance Your Team’s Accountability, Adaptability, Resilience, And Well-Being? Consider joining our newly launched Growth Leadership Programme: Workplace Innovation, subsided by Scottish Enterprise, which offers a unique approach to leadership development and workplace Innovation, emphasising Motivational Intelligence (MQ). Our programme will help you build on your leadership capabilities and confidence while creating a more innovative, productive, and fair workplace for employee development and growth. Growth Leadership: Workplace Innovation Leading with Motivational Intelligence (MQ) You’ll learn to: Develop MQ leadership skills that encourage fair and innovative workplace practices and inclusive economic growth. Increase engagement, innovation, and productivity among your team. Enhance your strategic decision-making skills. Build a resilient, agile, and change-driven team culture. Identify and integrate organisational values into your workplace culture. Create a successful business that is also a fair place to work. Session Overview Our comprehensive programme, consisting of eight engaging and insightful sessions, is meticulously crafted to provide a world-class education in Leadership, Workplace Innovation and Motivational Intelligence (MQ). We combine some of the most potent, powerful and cutting-edge research in workplace innovation, neuroscience and the most promising discoveries in cognitive and social psychology of the 20th century. 01 Self-Leadership and The Secret to Personal Success Session 1: Self-Leadership and The Secret to Personal Success This comprehensive kick-off session delves into the foundations of self-leadership and personal success. Participants will explore various aspects, from setting course expectations and creating a conducive learning environment to understanding motivational intelligence and managing negative thoughts. Through essential resources like the Leadership Reference Manual and Roadmap Workbook, multi-sensory perception, and spaced repetition learning techniques, participants will solidify their learnings and enhance personal and professional growth. Key Learning Outcomes: Understand the critical role of self-leadership in personal and professional success and the impact of external and internal factors on performance Develop strategies to optimise motivation, communication, and effectiveness within teams and organisations, leveraging diverse learning styles and adult learning techniques Utilise essential resources like the Leadership Reference Manual and Roadmap Workbook for ongoing growth and development while implementing practical tools like the Start, Stop, Continue plan for self-reflection and improvement Explore the power of adaptability, self-awareness, and resilience in navigating through challenging times and maintaining a positive mindset Discover the importance of a positive mental diet, gratitude, and consistent small decisions that compound over time, leading to personal and professional growth 02 The Role of Intelligence in Leadership and Management Session 2: The Role of Intelligence in Leadership and Management It's time to delve into Motivational Intelligence and its role in our personal and professional lives. In this comprehensive and interactive session, participants will explore the multifaceted aspects of intelligence in Leadership and management, focusing on IQ, EQ, and MQ. Participants will learn how to cultivate a growth mindset and motivational intelligence within themselves and their teams, fostering a culture of learning and resilience. The session will also cover the importance of crafting a clear vision for the team or organisation and provide practical strategies for effectively communicating the vision to internal and external stakeholders. Key Learning Outcomes: Understand the roles of IQ, EQ, and MQ in Leadership and management and their impact on individual and team performance Develop strategies to improve your levels of intelligence and foster a growth mindset within individuals and teams Discover the importance of vision in Leadership and management and learn to craft it using the WHERE (performance), HOW (perception), and WHY (purpose) perspectives Gain insights into effectively communicating the vision to stakeholders, ensuring alignment, ownership, and motivation Reflect on the role of a growth mindset and motivational intelligence in achieving the team's vision and fostering a culture of continuous improvement and adaptability 03 The Pillars of Human Performance: Unlocking Potential Session 3: The Pillars of Human Performance: Unlocking Unlimited Potential Discover the keys to unlocking your unlimited potential and becoming a more effective leader in this interactive course. Through engaging discussions and self-reflection, participants will dive deep into unlimited potential, understand its significance in Leadership, and learn to overcome challenges in their teams or businesses. Participants will gain insights into the characteristics of influential leaders, the importance of asking the right questions, and the value of embracing failure as a part of success. With a focus on personal and professional growth, this session will equip you with the tools and techniques to become a better manager and leader. Key Learning Outcomes: Understand the concept of unlimited potential and its importance in Leadership and personal growth Identify personal and team visions, challenges, and the role of asking the right questions in gaining insights Recognise the role of practice and reflection in transforming weaknesses into strengths Explore the characteristics and impact of great leaders and learn how to apply these traits in your leadership style Embrace the importance of failure as a crucial part of success and create a supportive environment for personal and team development 04 Defining Management and Vertical Alignment Session 4: Defining Management and Vertical Alignment In this engaging session, participants will delve into the essential differences between management and Leadership and discover how understanding these distinctions can significantly impact team culture and performance. We'll examine common management mistakes and their effects, uncover the best practices of excellent management, and discuss the development of management skills and the management hierarchy. This interactive session will provide valuable insights and actionable strategies that can be applied to personal and professional life, helping participants become more effective and successful managers and leaders. Key Learning Outcomes: Differentiating between management and Leadership: Gain a deeper understanding of how these concepts differ and their impact on team culture and performance Identifying common management mistakes: Learn about these pitfalls and their consequences on team culture and performance and develop strategies to avoid them Mastering the best practices of excellent management: Discover the five essential techniques to help you become a more effective manager Developing management skills and understanding the management hierarchy: Enhance your ability to grow as a leader and manager Embracing Ultimate Responsibility: Learn the importance of taking ownership and responsibility for your and your team's success and understand the role of motivational intelligence in achieving this 05 Workplace Innovation and High-Payoff Activities Session 5: Workplace Innovation and High-Payoff Activities n (Job Crafting) This session provides a comprehensive overview of the critical principles of workplace innovation, job crafting, people leadership, and coaching in the workplace. Participants will learn about job crafting, our MQ workplace innovation process, and the crucial role of Leadership in managing and monitoring performance in the workplace. By adopting a proactive and creative approach to their work, individuals can improve their job satisfaction, contribute to their organisation's success, and drive economic health for the nation. Key Learning Outcomes: Understanding of Leadership in the job crafting innovative process Skills in job crafting and workplace innovation Knowledge of the critical role of Leadership in performance management Techniques for effective coaching and positive feedback, through trust and mutual respect in the workplace Helping individuals reflect on their role in the success of the team and company and developing a written plan to achieve their goals 06 Defining and Exploring Leadership Session 6: Defining and Exploring Leadership In this session, we will define and explore the essence of Leadership, dispelling the myths and providing a definition that will guide you through the course. We will also explore the three-tier hierarchy of success and how leaders can influence MQ (motivational intelligence) by doing five things consistently. As a manager or leader, you may have found that your team's success is not guaranteed even with the best plans, processes, and strategies. This is because not all team members will adopt new ideas or changes unless they first believe they can achieve the desired outcome. Key Learning Outcomes: Understanding the essence of Leadership to provide an in-depth understanding of the essence of successful Leadership, dispelling the myths and providing a definition that will guide you through the course Psychology of your team: Leaders understand that to achieve their goals, they need to focus on the psychology of their team Power of questions in Leadership: Leaders can gain insight into the minds of their team members and unlock the key to motivating and developing them by asking the right questions Explore the three-tier hierarchy of success and the importance of each level in determining a person's likelihood of success Five things great leaders do each day to influence a culture of responsibility, consistently build esteem and confidence, and always work on coaching and mentoring employees 07 Building a Leadership Toolbox Session 7: Building a Leadership Toolbox: Trust & Inspiration Fostering Adaptability, Responsibility, Resilience, and Courage, this step focuses on leaders' tools and techniques to promote greater team accountability and ownership. It starts to delve into the critical role of self-esteem in a person's motivational intelligence and adaptability. We also explore how self-esteem is formed and influences a person's interpretation of feedback. We also look at self-esteem's critical role in a person's motivational intelligence and adaptability, examining how self-esteem is formed and influences a person's interpretation of feedback. Key Learning Outcomes: Understanding the tools and techniques leaders can use to foster greater team accountability and ownership Delving into the critical role of self-esteem in a person's motivational intelligence and adaptability Exploring how self-esteem is formed and influences a person's interpretation of feedback Examining the levels of self-esteem and associated behaviours of each group Understanding the influence of comfort zones and tools leaders can use to help people overcome the fear of change 08 Developing a Healthy Perspective and Resilient Attitude Session 8: Developing a Healthy Perspective and Resilient Attitude This step explores how developing a healthy perspective and resilient attitude is crucial for success as a leader. In this session, we will explore the critical role of self-reflection in building motivation and adaptability. We will examine how self-esteem is formed and how it influences a person's interpretation of feedback. We will also delve into the levels of self-esteem and the associated behaviours of each class. We will provide practical strategies for cultivating resilience and adaptability in facing challenges and setbacks. Through reflection and analysis of your moments of surprise, frustration, and failure, you will develop a growth mindset that fosters continuous learning and improvement. Key Learning Outcomes: The critical role of self-reflection in building motivation and adaptability How self-esteem is formed and influences a person's interpretation of feedback The levels of self-esteem and the associated behaviours of each class Strategies for cultivating resilience and adaptability in the face of challenges and setbacks The influence of affirmations and tools leaders can use to help people overcome the fear of change

Growth Leadership Programme
Delivered in Motherwell or UK Wide or OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including Students pursuing a technical degree Current IT professionals Recent college graduates with a technical degree Overview After taking this course, you should be able to Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst's perspective. Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. Explain the data that is available to the network security analyst. Describe the basic concepts and uses of cryptography. Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts. Understand common endpoint security technologies. Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors. Identify resources for hunting cyber threats. Explain the need for event data normalization and event correlation. Identify the common attack vectors. Identify malicious activities. Identify patterns of suspicious behaviors. Conduct security incident investigations. Explain the use of a typical playbook in the SOC. Explain the use of SOC metrics to measure the effectiveness of the SOC. Explain the use of a workflow management system and automation to improve the effectiveness of the SOC. Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT). Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format. The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. Course Outline Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Additional course details: Nexus Humans Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS)
Delivered OnlineFlexible Dates
Price on Enquiry

Emotional Intelligence for Today’s Leadership and Management

By Dickson Training Ltd

EQ is a pattern of how people's biases in their thinking leads them to think one choice or thing is better than another, as well as their clarity in differentiating within those biases to exercise clear and sound judgement. Where your thinking and responses lie within your biases spectrum, and your ability in adjusting to the situation you find yourself in, will determine responses equating to poor or strong Emotional Intelligence (EI). This course will enhance and promote the skill set necessary for any working leader or manager, allowing our in-depth emotional intelligence knowledge to be applied into your working environment. From an employer's perspective, this award can be a significant long-term return on investment by further developing your leaders and managers. What Does This Course Offer? Our program offers an EQ-SWOT™ assessment and EI Model in detail, and through activity and discussion we explore how applying and possibly adjusting, you may offer an improved Emotional Intelligence. Our learning experiences are successful because the outcomes are quickly embedded and demonstrate an immediate visible impact on the day-to-day working environment. Our engaging learning inspires employees to want to personally add value to the companies they work for. We also offer our Paradigm EQ-SWOT™ online assessment and report as a frame of reference within the program. This assessment should be completed before attending the program, and will be expanded upon during the program delivery. Course Content The Emotional Intelligence for Today’s Leadership and Management course covers the following topics: What makes EI so important within the workplace Self-Awareness and your EQ Profile The EQ unpacked Unconscious Bias & EI How to develop your EI quotient Accreditation Activity Our accredited tutors deliver training that encourages delegates to confidently and practically apply all they have learnt as soon as they get back into the business. To achieve this award, delegates need to prepare and deliver a 3 minute presentation* on the highlights of their learning and immediate application avenues when back in their working environment. *Participants will be given 30 minutes during the program to prepare for their 3 min presentation at the end of the program. Scheduled Course Dates Unfortunately this course is not currently scheduled as an open course as it is primarily run as an in-house programme. For more information, please contact us. In-House Courses This is our own management training course which has been developed and refined over the many years we have been providing it to delegates from organisations in virtually every industry. This means that the course syllabus is extremely flexible and can be tailored to your specific requirements. If you would like to discuss how we can tailor this management training course for you and/or run it at your premises, please contact us.

Emotional Intelligence for Today’s Leadership and Management
Delivered in Bardsey + 3 more or UK Wide or OnlineFlexible Dates
Price on Enquiry

NIST Cyber Security Professional (NCSP) Practitioner

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.

NIST Cyber Security Professional (NCSP) Practitioner
Delivered OnlineFlexible Dates
Price on Enquiry

Level 7 Diploma In Education Management And Leadership Pathway To (MA In Education Management And Leadership)

4.9(261)

By Metropolitan School of Business & Management UK

Level 7 Diploma In Education Management And Leadership Pathway To (MA In Education Management And Leadership) Level 7 Diploma in Strategic Marketing (QCF) – 6 - 8 Months Credits: 120 Credits Level 7 Diploma in Strategic Marketing qualification provides the learners with the skills and understanding in marketing & branding that align with good strategic decision making to maintain organisations’ competitive advantage.  Successful completion of this qualification will develop learners’ strategic marketing management, consumer behaviour and branding skills and their ability to focus on the requirements of implementing an organisation’s strategy. This programme is a Pathway to MSc in Strategic Marketing. Course Details The Level 7 Diploma in Education Management and Leadership qualification consists of 6 mandatory units for a combined total of 120 credits, 1200 hours Total Qualification Time (TQT) and 600 Guided Learning Hours (GLH) for the completed qualification.Modules: Contemporary Issues in Education: Theory, Policy and Practice The Management of Educational Change Managing Effective Intercultural Communication and Perspectives Pedagogy and Practice in Education Leading Reflective Practice in Education Research Methods in Education Accreditation All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. University Progression University Top-up On completion of this course, students have the opportunity to complete a Master degree programme from a range of UK universities. The top-up programme can be studied online or on campus. The top-up comprises the final 60 credits which consist of either a dissertation or a dissertation and one module. (The course tuition fee listed above does NOT include the top-up fees) University Progression Click here to see University routes and fee information for progression. Entry Requirements For entry onto the Level 7 Diploma in Education Management and Leadership leading to the MA Education Management and Leadership qualification, learners must possess: An honours degree in related subject or UK level 6 diploma or equivalent overseas qualification i.e. Bachelors Degree or Higher National Diploma OR Mature learners (over 25) with at least 5 years of management experience if they do not possess the above qualification (this is reviewed on a case by case basis) Workshops Workshops are conducted by live webinars for all students. Visa Requirements There is no Visa requirement for this programme.

Level 7 Diploma In Education Management And Leadership Pathway To (MA In Education Management And Leadership)
Delivered OnlineFlexible Dates
£3,250

BA17 - Advanced Root Cause Analysis

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to:Identify the different types of tools and techniques availableApply change management successfullyReview what to look for when applying business case thinking to Root Cause AnalysisDevelop a process to systematically approach problems Problem determination skills cannot be acquired by reading a book. They mostly come from experience. After this course, you will have a general understanding of a structured problem determination approach, which you can then apply in your daily work. RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? Exercise 1a: Why is RCA important What is Root Cause? RCA Benefits and Approaches Exercise 1b: Why are multiple approaches important? Event and Casual Analysis Exercise 1c: Apply Event and Causal Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Exercise 1D: Prepare for Case Study Section Summary and Conclusions Enhance Use of RCA Tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Exercise 2a: Apply Change Analysis Exercise 2b: Change Analysis Worksheet Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Exercise 2b: Apply 5 Why?s Sequence-of-Events Exercise 2b: Worksheet Tool: Cause and Effect Exercise 2c: Apply Cause and Effect Exercise 2c: Cause and Effect Worksheet Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Exercise 2D: Apply Fault Tree Analysis Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Exercise 2E: Apply FMEA Tool: Design / Application Review Exercise 2d: Apply Design/Application Review Section summary & conclusions Problem Resolution & Prevention Section Objectives The Secret of Solving Problems A Note about Statistical Control A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Exercise 3A: Problem as IGOE Exercise 3A: IGOE Template Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Exercise 3B: Apply Lean Six Sigma Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN) What is Business Process Modeling Notation (BPMN)? Benefits of BPMN Basic Components of BPMN Exercise 3C: Use BPMN to Document a Current State Technique: Business Process Maturity Model Five Levels of Maturity Exercise 3D: Appraise Business Process Maturity Level Section Summary and Conclusions Capability Improvement for RCA Section Learning Objectives Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Exercise 4A: Apply RCA to RCA Process Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey Exercise 4B: Apply Strengths, Weakness, Opportunities and Threats (SWOT) to RCA SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? Awareness of the need for change Desire to participate and support the change Knowledge on how to change Ability to implement required skills and behaviors Reinforcement to sustain the change Exercise 4C: Create an Ability Checklist The ADKAR Model: Reinforcement Exercise 4D: Find two examples of how ADKAR will be different Section Summary and Conclusions Course Summary & Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Exercise 5A: Creating Action Plans Resource Guide Questions Additional course details: Nexus Humans BA17 - Advanced Root Cause Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA17 - Advanced Root Cause Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA17 - Advanced Root Cause Analysis
Delivered OnlineFlexible Dates
Price on Enquiry