• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

11006 Professional Skills Course (PSC) courses delivered Online

C)PEH/C)PTE Ultimate Boot Camp Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers Overview A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. Course Outline Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance ? Passive (External Only) Detecting Live Systems ? Reconnaissance (Active) Banner Grabbing and Enumeration Automated Vulnerability Assessment Hacking Operating Systems Advanced Assessment and Exploitation Techniques Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics

C)PEH/C)PTE Ultimate Boot Camp Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Advanced Administration (BCCPP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution

Symantec ProxySG 6.6 Advanced Administration (BCCPP)
Delivered OnlineFlexible Dates
Price on Enquiry

Successful project management (In-House)

By The In House Training Company

The aim of this course is to provide an overview of the key principles and techniques for leading and managing project work. It will focus on the core principles and generic methods of project management, showing how these can be applied to typical projects. The scope of the programme includes: The course also emphasises the importance of the leadership and team-working skills needed by project managers and team members in carrying out their roles. The principal training objectives for this programme are to: Explain and demonstrate the key principles of successful project management Demonstrate a range of useful project management tools and techniques Define the role of, and help participants understand the skills required by, the project leader Illustrate the use of project skills through examples and case studies Identify ways to improve project management, both individually and corporately DAY ONE 1 Introduction (Course sponsor) Why this programme has been developed Review of participants' needs and objectives 2 Key concepts and requirements for success Projects and project management Lessons from past projects; the essential requirements for success Differences between projects; characteristic project life cycles The challenges of project management; the role of the project manager Project exerciseA team exercise to demonstrate the challenges of project management 3 Defining project objectives and scope Identifying the stakeholders; key roles and responsibilities Getting organised; managing the definition process Working with the 'customer' to define the project scope 4 Project case study: part 1 Defining the project objectives: syndicate teams define the objectives and scope for a typical project 5 Project planning The nature of planning; recognising planning assumptions Planning the plan; the importance of team involvement Developing the work breakdown structure Estimating task resources, timescales and costs Developing the project schedule Analysing the plan and identifying the critical path 6 Project case study: part 2 Creating the project plan Syndicate teams begin development of their project plans (for completion after session 7) Team presentations and group discussion (after session 7) DAY TWO 7 Managing project risks Understanding and defining project risks Classifying risks and adopting an appropriate risk strategy Identifying, evaluating and managing project risks Agreeing ownership of project risks; the risk register Integrating planning and risk management 8 Project control Pro-active and re-active control; striking the right balance Pre-requisites for effective, pro-active project control Avoiding unnecessary 'scope creep' and controlling change Selecting the data needed to provide early warning of problems Monitoring project performance: 'S' curves, slip charts, earned value Getting good data and assessing project status Defining the roles and responsibilities for control Setting up a routine process for keeping up to date Managing and controlling multiple projects 9 Project case study: part 3 Controlling the project Teams control their project as new developments take place 10 Course review and transfer planning (Course sponsor present) Identify actions to be implemented individually Identify corporate opportunities for improving project management Sponsor-led review and discussion of proposals Conclusion

Successful project management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Commercial awareness for technical people (In-House)

By The In House Training Company

The aim of this course is to expose the commercial context within which technical work is carried out. It is to allow technical staff to understand how they fit into a larger picture, why they may be asked to undertake tasks that may not appear to be technical and the impact their interactions have within the commercial context. The scope of the programme includes: The course emphasises the collaborative nature of delivery and the need to offer value to customers. The principal training objectives for this programme are to help participants: Understand why technical roles are broader than we might assume Appreciate the importance of, and the need to support, sales Value the idea of 'Good Enough' Recognise what can affect profitability Realise the future needs protecting 1 Introduction (Course sponsor) Why this programme has been developed Review of participants' needs and objectives 2 That's not my job! How we see our own role in work How other people see our role Stakeholders: who are they and why do they matter? The organisational backdrop What is my role really? 3 Sales and marketing Where does the money come from? Where do we find customers? The sales process One-off sales versus repeat business Customer/supplier relationships What something costs versus what the customer will pay The value chain 4 Estimating Purpose of estimates The problem with precision Five estimating techniques 5 Change control Can you just do this for me? When being helpful leads to bankruptcy How to deal with change requests 6 Risk management Risk in projects Risk in operations Categories of risk 7 The value of intellectual property Issues with sharing information Commercial in confidence Non-disclosure agreements 8 Course review and action planning (Course sponsor present) Identify actions to be implemented individually What actions should be implemented to improve working with non-technical people? Conclusion

Commercial awareness for technical people (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Arcserv (3 - Days )

By Nexus Human

Duration 3 Days 18 CPD hours

Arcserv (3 - Days )
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Service Provider Advanced Routing Solutions v1.0 (SPRI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for professionals who need knowledge about implementing various Service Provider core technologies and advanced routing technologies. Network administrators System engineers Project managers Network designers Overview After taking this course, you should be able to: Describe the main characteristics of routing protocols that are used in Service provider environments Implement advanced features of multiarea Open Shortest Path First (OSPFv2) running in Service Provider networks Implement advanced features of multilevel Intermediate System to Intermediate System (ISIS) running in Service Provider networks Configure route redistribution Configure Border Gateway Protocol (BGP) in order to successfully connect the Service Provider network to the customer or upstream Service Provider Configure BGP scalability in Service Provider networks Implement BGP security options Implement advanced features in order to improve convergence in BGP networks Troubleshoot OSPF, ISIS, and BGP Implement and verify MPLS Implement and troubleshoot MPLS traffic engineering Implement and verify segment routing technology within an interior gateway protocol Describe how traffic engineering is used in segment routing networks Implement IPv6 tunneling mechanisms Describe and compare core multicast concepts Implement and verifying the PIM-SM protocol Implement enhanced Protocol-Independent Multicast - Sparse Mode (PIM-SM) features Implement Multicast Source Discovery Protocol (MSDP) in the interdomain environment Implement mechanisms for dynamic Rendezvous Point (RP) distribution The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) 5-day course teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks. This course prepares you for the 300-510 Implementing Cisco© Service Provider Advanced Routing Solutions (SPRI) exam. The course qualifies for 40 Cisco Continuing Education credits (CE) towards recertification. This course will help you: Gain the high-demand skills to maintain and operate advanced technologies related to Service Provider core networks Increase your knowledge and skills for implementing Service Provider core advanced technologies though hands-on application and practical instruction Prepare to take the 300-510 SPRI exam Course Outline Implementing and Verifying Open Shortest Path First Multiarea Networks Implementing and Verifying Intermediate System to Intermediate System Multilevel Networks Introducing Routing Protocol Tools, Route Maps, and Routing Policy Language Implementing Route Redistribution Influencing Border Gateway Protocol Route Selection Scaling BGP in Service Provider Networks Securing BGP in Service Provider Networks Improving BGP Convergence and Implementing Advanced Operations Troubleshooting Routing Protocols Implementing and Verifying MPLS Implementing Cisco MPLS Traffic Engineering Implementing Segment Routing Describing Segment Routing Traffic Engineering (SR TE) Deploying IPv6 Tunneling Mechanisms Implementing IP Multicast Concepts and Technologies Implementing PIM-SM Protocol Implementing PIM-SM Enhancements Implementing Interdomain IP Multicast Implementing Distributed Rendezvous Point Solution in Multicast Network

Cisco Implementing Cisco Service Provider Advanced Routing Solutions v1.0 (SPRI)
Delivered OnlineFlexible Dates
Price on Enquiry

Arcserv (5 - Days )

By Nexus Human

Duration 5 Days 30 CPD hours

Arcserv (5 - Days )
Delivered OnlineFlexible Dates
Price on Enquiry

CONSULTATIVE SELLING Training Programme Framework

By Dickson Training Ltd

Key Objectives for the Training provision Effective listening to a client's needs and requirements during various stages of the sales process. Engage in meaningful communication with clients, learn to identify challenges and opportunities that relate to the prospects. Overcome the identified challenge. Build long term rapport and establish trust with the prospect throughout the sales process, Ensure continued customer satisfaction that can turn into repeat business. Be able to build rapport with customers or clients. Know the right questions to ask to fully understand the customer or client’s needs without putting on any pressure. Be able to check you have the right information from the customer or client. Be able to match products and services to the customer or client using the information you have gathered. Be able to influence effectively. Know how to stand out from your competitors. Stage 1 – Research the Company’s ‘Value Propositions’ and USP Analysis  Conducting 30 min confidential interviews with a cross-section of the eligible Attendees & the Stakeholders, in order to gain an objective understanding of the various scenarios and clients that the Participants work with. the Company’s ‘Value Propositions’ Unique Selling Points The Customers’ journey(s) The Competition’s offers for analysis and comparisons. From these findings, a carefully calibrated bespoke Programme will be designed and delivered.  Stage 2 - Design the Bespoke 2 x day Course  nd Stage 3 - Delivery of the Course Programme This Programme can be delivered in 2 x consecutive days, or split between 2 – 3 weeks, to make it more ‘work-friendly’ – if required. It is very practical and commercially focussed in approach, with lots of interactive exercises designed to draw out the learning applications via the debriefings. The ‘Real Play’ scenarios on day 2 will be based on specific case studies drawn from the Research findings so that they are authentic to optimise the learning. Individual Action Plans will be captured at the end of each day to be debriefed by the Participants’ respective Line Managers.  Template Programme Day One – Foundation – Strategic Approach Section One – The Principles of Consultative Selling Defining ‘Consultative Selling’ The Company’s ‘Unique Selling Points’ & Value Proposition The Consultative Selling model – the five stages Avoiding appearing ‘pushy’, ‘pressurising’ or ‘talking through the sale’ Section Two –Strategy & Preparation  ‘Buy-Class’ Matrix Strategic plan Template – matching services/products to identified needs & opportunities. Preparing a range of objectives Constants and variables – USP’s Researching key Client/Decision Makers’ priorities, profile & background (LinkedIn etc.) Preparing for potential & likely Objections Section Three – Email etiquette & ‘influencing’ email correspondence.  Email etiquette A.B.S.U.R.D model Clarity and tone – discovery of clients’ needs & motivational factors. Techniques to influence and ‘nudge’. Ensuring the data and content have a ‘gentle’ motivational & appealing message. Top Tips Day Two – Practical Application Section Four – Rapport Building & Effective Communication skills ‘Behaviour Labelling’ techniques – setting a positive tone. Asking Open Questions – gaining a full understanding of the clients’ priorities & expectations. EQ - Inviting opinions; perspectives; experiences – winning confidence. Active Listening – focus and commitment to understand. ‘Reading the room’ – adapting to responses and reactions. Maintaining focus on relevant topics that the Client cares about; carefully consider the opportunities to influence. But NO PRESSURE! Building a ‘bond of trust’ with commitments and authentic, shared values. Section Five – Explaining the Benefits – aligned to the Customers’ Priorities Understanding ‘Why do People Buy?’ Research data analysis. Open questions that lead to understanding the key issues and Clients’ priorities. Avoiding the danger of ‘pressurising’ the Client. Responding to objections effectively, with confidence and sensitivity. Explaining the benefits that are aligned to the Clients’ stated requirements. Making the Data ‘sing’ – memorable takeaways for the Client. Augmented benefits – Brand confidence; Case studies; Warranty; Service; Range; Flexibility etc. in alignment with their stated preferences/requirements Differentials compared to Competitors Section Six – Winning Commitment Inviting commitment – with confidence Consultative Selling Closing techniques (e.g. Alternative Close/Assumptive Close et al) Avoiding ‘talking through the sale’ – knowing when to ‘Shut UP!’ Confirming agreement – ensuring Clients’ motivation for repeat business Section Seven – Practical Application ‘Real Play’ From the Research findings, carefully devised scenarios can be generated to provide the most valuable learning opportunities to underpin all the skills & techniques covered in the Programme.  Potential Real Play scenarios: A well-established customer has indicated that they are soon to be opening up additional new offices – this presents an opportunity to arrange for the Company to support them with their upcoming needs. After some very positive feedback and with the upcoming contract renewal imminent – how can the Company give the Customer more high-quality support in other areas of their business? A Competitor has been to see the client and they have prompted some concerns about ‘value for money’ & ‘quality of service’. How Real Play works… The group is split the group into 2 sub-groups, one with our Professional Actor (option available); the other with the Trainer or a willing Participant. Each group has a brief and has to instruct their Trainer/Actor/Participant on how to approach the scenario supplied. The Actor and Trainer (or willing Participant) perform the role play(s) as instructed by their respective teams; however, during the action they can be paused for further recommendations or direction. The outcome is the responsibility of the team(s) – not the performers. Debrief the full Programme Individual Action Plans - to be followed through. ‘Best Practices’ for application into the business Options for Exercises within the Programme  Sample Exercise – Red & White  There is a specific time managed agenda and itinerary, which puts the group under pressure.  The key challenge is for the sub-groups to maximise the commercial value from the task, however there is always a great danger that the individuals attempt to gain financial progress at the expense of the other group! Debriefing points: Persuasive communication and influence across barriers Gaining buy-in when others are sceptical Strategic planning accounting for others’ behaviours Sample Exercise – Communication Challenge Each Participant has different pieces of information, but are not allowed to share it visually. They are only allowed to communicate to work out the solution hidden among the large amount of data. Debrief: Structured approach Maintaining focus through distractions/interference Active Listening Controlled communication Sample Exercise – Persuasive emails Sample emails are shared to be critiqued and improved upon to be debriefed: Tone & impact Making the Data ‘sing’ Influential & motivational language Customer centric message. Sample Exercise –Juggling   Each Participant has to pass the ‘Customers’ (Juggling balls) carefully through the system with all the other Participants to reach a profitable conclusion  Debrief: EQ to read the room and effectively communicate, when the pressure is on Customer focus and adapting to challenges Devising a plan that wins buy-in Overcoming competing ideas to get to ‘best practice’ Consistent commitment, communication and motivational drivers that influenced performance. Sample Exercise –Critical Path  The group are provided with 30 x discs and some ‘post-it’ notes. (no pens or pencils are allowed) Their brief is to create a grid shape with the 30 x discs, which will act as ‘stepping stones’ for the ‘Critical Path’ But they have to follow the correct order through the grid from the start to finish, which they will have to work out through ‘trial & error’ All of the team must pass through the ‘Critical Path’ worked out on the grid, observing the constraints, within the time limit. No talking is permitted once they start using the materials Debrief: - Clear communication focussing on the ‘client’s journey’ Planning for challenges Identifying risks and mitigating them Role allocations & support Quality control and disciplines  Sample Exercise –Back to Back  Each Participant is positioned back-to-back with a partner. They have to work out precisely what the ‘statement’ given to the other person is without looking around. Each person has a different brief. Debrief: - Asking Open Questions Active Listening Accuracy in identifying the objective.

CONSULTATIVE SELLING Training Programme Framework
Delivered in Bardsey + 3 more or UK Wide or OnlineFlexible Dates
Price on Enquiry

BOHS P400 - Asbestos Foundation Module Online

By Airborne Environmental Consultants Ltd

P400 - Asbestos Surveying and Analysis is a one day foundation level course, which provides candidates with the fundamental knowledge to start a career in the asbestos surveying and analysis professions, and as a progression route to the asbestos Proficiency qualifications. It gives candidates an introductory level of knowledge on the health risks of asbestos fibres, and how to manage asbestos-containing materials in their work. Candidates for this course are not expected to have prior knowledge and experience but having an awareness of the contents of both HSG248 Asbestos: The analysts' guide (July 2021) and HSG264 Asbestos: the survey guide January 2010), would be advantageous.

BOHS P400 - Asbestos Foundation Module Online
Delivered in Manchester + 1 more or OnlineFlexible Dates
Price on Enquiry

RSPH - Level 3 Award in Asbestos Bulk Analysis

By Airborne Environmental Consultants Ltd

This course is aimed at those who analyse and identify asbestos from within samples collected on site

RSPH - Level 3 Award in Asbestos Bulk Analysis
Delivered in Manchester + 1 more or OnlineFlexible Dates
Price on Enquiry