Front-line communication plays a vital role in shaping the public perception of every organisation. This course is designed to help delegates organise their ideas and communicate clearly and effectively through email. By improving written communication skills, delegates will become more concise, communicate with conviction, and foster meaningful dialogue with their audience. These skills are essential for professionals who interact with the public, as improved communication leads to greater internal and external customer satisfaction. Delegates will learn how to: Write clearly and professionally, enhancing public perception of expertise Communicate more efficiently in writing, reducing wasted time and increasing profitability Craft concise, rapport-building messages for internal and external customers, fostering productivity and a positive workplace environment Topics Covered: Benefits of using email Determining the purpose of an email Steps to take before writing Inflection in written messages Effects of instant messaging and text messaging on communication Basic email structure and planning Writing effective subject lines Paragraph structure and organisation Including relevant details and summarising problems effectively Proper use of CC and BCC fields Why typing in all caps is considered shouting! Proofreading techniques This Email Etiquette course is a 90-minute interactive virtual session. Upon registration, delegates will receive online login instructions prior to the class date. This format allows delegates to enhance their skills conveniently from their home or office while improving their professional communication abilities.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who already have experience creating Modern SharePoint sites and populating them with content, who want to learn advanced features to extend SharePoint's capabilities, make information easier to find and manage, use SharePoint features to improve governance and compliance, and improve the security of information and services within the SharePoint environment. Overview Create a custom site template to reduce the time spent creating similarly configured SharePoint sites. Configure managed metadata, including custom term sets, content types, and metadata-based navigation. Control access through permissions. Improve overall security of sites, lists, libraries, folders, list items, and documents. Microsoft© SharePoint©, in conjunction with the Microsoft 365? productivity and office automation suite, provides tools to create and manage a corporate intranet, facilitate content sharing and collaboration, and enable users to create, access, store, and track documents and data in a central location. Users who already have experience as SharePoint site members and owners may be ready to move on to more advanced site-building tasks such as using custom site templates, custom themes, applying advanced permissions settings, improving security, and preparing sites to support governance and compliance. Advanced site builders may be ready to undertake more advanced site management tasks, working in conjunction with their SharePoint Administrator to create and use custom site templates, term sets and metadata, manage information governance and compliance, and get deeper into SharePoint security configuration. This course focuses on these advanced site-building and administration tasks. Prerequisites To ensure your success in this course, you should have SharePoint site user skills such as the ability to view and enter data in SharePoint lists and libraries, and to navigate a typical SharePoint site. You should also have intermediate site builder skills such as the ability to create a SharePoint site, apply a site template, populate sites with pages, create lists and libraries, and connect a site to a hub site. NOTE: This course was developed using Microsoft 365 Business Standard edition. If you opt to use one of the Enterprise editions, be sure to key the course activities before you deliver the class so you will be able to anticipate any differences that students might see with the edition you use. Lesson 1: Creating Custom Site Templates Topic A: Prepare a Site Script Topic B: Generate and Use a Custom Site Template Lesson 2: Managing Content Services Topic A: Plan and Configure Managed Metadata Topic B: Create and Manage Content Types Topic C: Use Managed Metadata for Navigation and Filtering Lesson 3: Controlling Access Through Permissions Topic A: Assign Permissions Topic B: Manage Permissions Inheritance Lesson 4: Improving Security Topic A: Manage Access at the Site Level Topic B: Manage Access at the Tenant Level
This programme is aimed at helping participants to manage their time more effectively and to be more productive with the time available to them.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who desire to supervise others more effectively. Overview Upon successful completion of this course, students will be equipped to supervise others more effectively and efficiently, contributing to job satisfaction and productivity. In this course, students will develop the skills required to be more efficient and proficient supervisors. 1 - GETTING STARTED Icebreaker Housekeeping Items The Parking Lot Workshop Objectives 2 - SETTING EXPECTATIONS Defining the Requirements Identifying Opportunities for Improvement and Growth Setting Verbal Expectations Putting Expectations in Writing 3 - SETTING GOALS Understanding Cascading Goals The SMART Way Helping Others Set Goals 4 - ASSIGNING WORK General Principles The Dictatorial Approach The Apple-Picking Approach The Collaborative Approach 5 - DEGREES OF DELEGATION Level One: Complete Supervision Level Two: Partial Supervision Level Three: Complete Independence 6 - IMPLEMENT DELEGATION Deciding to Delegate To Whom Should You Delegate? Providing Instructions Monitoring the Results Troubleshooting Delegation 7 - PROVIDING FEEDBACK Characteristics of Good Feedback Feedback Delivery Tools Informal Feedback Formal Feedback 8 - MANAGING YOUR TIME The 80/20 Rule Prioritizing with the Urgent-Important Matrix Using a Productivity Journal Using Routines and Rituals to Simplify Your Workday 9 - RESOLVING CONFLICT Using a conflict Resolution Process Maintaining Fairness Seeking help from Within the Team Seeking Help for Outside the Team 10 - TIPS FOR SPECIAL SITUATIONS What to Do If You?ve Been Promoted from within the Team What to Do If You're Leading a Brand New Team What to Do if You're Taking on an Established Team 11 - A SURVIVAL GUIDE FOR THE NEW SUPERVISOR Ask the Right Questions of the Right People Go to Gemba Keep Learning 12 - WRAPPING UP Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations
Introducing the Occupational Therapy Package: Empowering Independence and Enhancing Daily Living Are you seeking specialized support to enhance your daily living skills and regain independence in your life? Miss Date Doctor’s Occupational Therapy Package offers you expert guidance and personalized interventions to overcome challenges and achieve your goals. Occupational therapy is a client-centered approach that focuses on improving functional abilities and promoting independence in various aspects of life. Our experienced occupational therapists are committed to empowering you to participate fully in meaningful activities and overcome obstacles that may be affecting your daily functioning. Here’s how the Occupational Therapy Package can support you: Comprehensive Assessment: Our occupational therapists will conduct a thorough assessment of your physical, cognitive, and emotional abilities to understand your unique needs and challenges. Personalized Goals: Based on the assessment, we’ll work with you to set personalized goals that align with your aspirations and desired outcomes. Functional Interventions: Through a range of evidence-based interventions, we’ll address challenges related to self-care, productivity, and leisure activities, helping you regain independence in your daily life. Adaptive Techniques: Our therapists will introduce you to adaptive techniques and assistive devices that can support your engagement in various activities and promote greater autonomy. Workplace Support: For individuals seeking occupational therapy for work-related challenges, we’ll provide support and recommendations to improve workplace ergonomics, time management, and productivity. Cognitive Strategies: If cognitive challenges are affecting your daily functioning, our occupational therapists will introduce cognitive strategies to enhance memory, attention, and executive functions. Sensory Integration: For individuals experiencing sensory processing difficulties, our therapists will employ sensory integration techniques to help you better process sensory information and improve daily functioning. Lifestyle Modification: Occupational therapy goes beyond managing symptoms; it aims to improve overall well-being. We’ll work with you to make lifestyle modifications that promote health and balance. The Occupational Therapy Package at Miss Date Doctor is tailored to meet your unique needs and goals. Our compassionate occupational therapists will collaborate with you every step of the way to ensure that your therapy experience is positive, empowering, and transformative. Experience the benefits of occupational therapy and embrace a more independent and fulfilling life. Invest in your well-being and unlock your potential to thrive in everyday activities. Take the first step towards empowerment and enhanced daily living with the Occupational Therapy Package. Let our expert therapists guide you towards a life filled with greater independence, productivity, and satisfaction. 4 X 1 hour https://relationshipsmdd.com/product/occupational-therapy-package/
Duration 1 Days 6 CPD hours This course is intended for This course is for individuals who are new to Adobe Acrobat Pro, but need to create and share PDF files and PDF portfolios. Students should have some experience using office productivity applications, such as word processor, a multimedia presentation application, or a spreadsheet application. Overview In this course, you will create and work with PDF documents. You will: Access information in a PDF document Create and save PDF documents Navigate content in a PDF document Modify PDF documents Review PDF documents Convert PDF documents Adobe Acrobat Pro DC puts the power of the Portable Document Format, literally, at your fingertips. By taking advantage of the functionality & features available in Acrobat, you will ensure the integrity of your documents regardless of who views them. Prerequisites To ensure your success in this course, you should have basic experience with computers and exposure to Windows 8, as well as common productivity tools such as Microsoft Office Word & Microsoft Office PowerPoint. You can obtain this level of skill & knowledge by taking the following courses: Using Microsoft Windows 8 Microsoft Windows 8 Transition from Windows 7 Microsoft Office Word 2013: Part 1 Microsoft Office PowerPoint 2013: Part 1 1 - Accessing PDF Documents Topic A: Open a PDF Document Topic B: Browse a PDF Document 2 - Creating and Saving PDF Documents Topic A: Create and Save a PDF Document from an Existing Document Topic B: Create a PDF Document from a Web Page Topic C: Combine Multiple PDF Documents 3 - Navigating Content in a PDF Document Topic A: Perform a Search in a PDF Document Topic B: Search Multiple PDF Documents Topic C: Work with Bookmarks Topic D: Create Links and Buttons 4 - Modifying PDF Documents Topic A: Manipulate PDF Document Pages Topic B: Edit Content in a PDF Document Topic C: Add Page Elements 5 - Reviewing PDF Documents Topic A: Add Comments and Markup Topic B: Compare PDF Documents Topic C: Initiate and Manage a Review Topic D: Digitally Sign PDF Documents 6 - Converting PDF Files Topic A: Reduce the File Size of a PDF Document Topic B: Optimize PDF Files Topic C: Convert and Reuse PDF Document Content
Duration 1 Days 6 CPD hours Time management training most often begins with setting goals. These goals are recorded and may be broken down into a project, an action plan, or a simple task list. Activities are then rated based on urgency and importance, priorities assigned, and deadlines set. This process results in a plan with a task list or calendar of activities. Routine and recurring tasks are often given less focus to free time to work on tasks that contribute to important goals. This entire process is supported by a skill set that should include personal motivation, delegation skills, organization tools, and crisis management. 1 - Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives 2 - Setting SMART Goals The Three P?s The SMART Way Prioritizing Your Goals Visualization 3 - Prioritizing Your Time The 80/20 Rule The Urgent/Important Matrix Being Assertive 4 - Planning Wisely Creating Your Productivity Journal Maximizing the Power of Your Productivity Journal The Glass Jar: Rocks, Pebbles, Sand, and Water Chunk, Block, and Tackle Ready, Fire, Aim! 5 - Tackling Procrastination Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog! 6 - Crisis Management When the Storm Hits Creating a Plan Executing the Plan Lessons Learned 7 - Organizing Your Workspace De-Clutter Managing Workflow Dealing with E-mail Using Calendars 8 - Delegating Made Easy When to Delegate To Whom Should You Delegate? How Should You Delegate? Keeping Control The Importance of Full Acceptance 9 - Setting a Ritual What is a Ritual? Ritualizing Sleep, Meals, and Exercise Example Rituals Using Rituals to Maximize Time 10 - Meeting Management Deciding if a Meeting is Necessary Using the PAT Approach Building the Agenda Keeping Things on Track Making Sure the Meeting Was Worthwhile 11 - Alternatives to Meetings Instant Messaging and Chat Rooms Teleconferencing E-mail Lists and Online Groups Collaboration Applications 12 - Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations Additional course details: Nexus Humans Time Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Time Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
About this VILT Tripod can be used in any area of business where the organisation has a management system in place to prevent unwanted events e.g., health, safety, environment, quality, security, productivity, project management, and many more Tripod Beta is one of several tools based on Tripod's fundamental principles. Tripod Beta is based on proven theories, man years of academic research, and testing in the workplace. The Swiss Cheese Model originated from this work. Features of the methodology are: 1) the Tripod Beta diagram; it provides an easy-to-read summary of the entire investigation on a single page, 2) it accommodates deficiencies in leadership and worker participation, 3) it accommodates deficiencies in human behaviour, and 4) it highlights missing controls (not just controls that failed). Quality throughout all aspects of Tripod is assured by the Stichting Tripod Foundation (STF) and the Energy Institute. The participants will gain a theoretical understanding of the Tripod Beta methodology and terminology. They will be able to read Tripod diagrams and reports, and be able to assist incident investigation/analysis as a team member. This is the first step to becoming an accredited silver or gold practitioner. Tripod Beta Practitioner Accreditation is meant to build these skills, through a blend of support, coaching and assessments. Feedback is provided on Tripod incident investigation reports, giving the Practitioner the opportunity to hone their skills and become confident in their ability to use Tripod effectively. Training Objectives Upon completion of this course, participants will be able to: Pass the Tripod Beta Practitioner (Bronze Level) exam Act as a team member or Tripod facilitator on an incident investigation Plan and schedule activities for an incident investigation Focus line of enquiry during an investigation Engage with the most relevant people at each stage of the investigation Describe the incident causation paths in terms that align with their management system Consider issues relating to leadership, worker participation and human behaviour Assess the quality of an incident report Apply the process to any type of unwanted event that should have been prevented by a management system e.g., health, safety, environment, financial, security, productivity, quality, project management etc. Combine the findings from many incidents with data from other initiatives e.g., audits and inspections, to spot trends to prioritise actions and product a single improvement plan Target Audience The course is recommended for anyone who is expected to play a role in designing, reviewing, auditing, and following your organizations OH&S management system. Successful participants will be awarded the Stitching Tripod Foundation Tripod Beta Bronze certificate. The following oil & gas company personnel will benefit from the knowledge shared in this course: CEO Team Leaders Legal, insurance and finance departments Managers (Line and Function) Maintenance Engineers Quality Assurance Engineers Process Engineers Incident Investigators (Team member & Tripod facilitator) Project Managers System Custodians Technical Authorities Key Contractor's Management Contract Managers/Holders Safety Representatives Risk Management Engineers HSE Advisors Supervisors Auditors Regulators Course Level Basic or Foundation Trainer Your expert course leader has over 30 years of experience in construction, operations and maintenance with the upstream exploration and production sector. He joined Shell International E&P in 1971 and for 28 years worked in several locations around the world. Following the Piper Alpha incident he led Shell's two year, £10M major overhaul of their permit to work system. He first made use of the Tripod Beta principles during this period and since then he has delivered over 100 Tripod Beta courses in more than 25 locations around the world. He is a Chartered Engineer, a member of the Institution of Engineering and Technology and holds a postgraduate diploma from the University of Birmingham (UK). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
KNOW THE RULES! POOR GRAMMAR SHOWS A LACK OF ATTENTION TO DETAIL AND ULTIMATELY CAN SLOW DOWN COMMUNICATIONS AS WELL AS PRODUCTIVITY. Business people who know grammar judge others based on their correct (or incorrect) usage. Be the professional who is able to be clear and correct in writing. Business Grammar & Usage: ENGLISH BOOT CAMP is the answer for today’s business competitive environment. Interactive instruction and collaboration with your fellow attendees means that you will master the skills and apply your new knowledge to the classroom exercises and activities. When you return to work, you’ll have new confidence about what is right and wrong, when it comes to writing. Attendees Will Be Able To: Know the Parts of Speech and their correct uses; Understand Sentence Structure, including applying rules for Subject-Verb and Pronoun-Antecedent Agreement; Be able to create Plurals and Possessives accurately and with certainty; Review and use the rules of Spelling, Mechanics (Capitalization, Abbreviation, Number Use), and Punctuation; Create original email / documents to employ newly-learned class material. Online Format—Business Grammar and Usage is a 4-hour interactive virtual class for up to ten people. Register for this class and you will be sent ONLINE login instructions prior to the class date. It was great to have the opportunity to learn some new techniques and to gain more awareness of how I present myself. The most immediately applicable uses have been in reducing my “ums” and “ahs” and in trying to come to my point in a more succinct way. I’ve been cultivating this awareness in one-on-one settings; meetings and individual conversations. Christina Vargas
Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.