Duration 1 Days 6 CPD hours This course is intended for This course is intended for anyone who wants to develop a toolbox of personal stress management skills. Overview Upon successful completion of this course, students will be able to identify the best approach to handle a stressful situation; understand what lifestyle elements, routines and relaxation techniques can help reduce stress. In this course, students will apply a three-option method to address any stressful situation. Module One: Getting Started Workshop Objectives Pre-Assignment Pre-Test Action Plan Form Evaluation Form Module Two: Understanding Stress What is Stress? What is Eustress? Understanding the Triple ?A? Approach Practical Illustration Module Two Review Questions Module Three: Creating a Stress-Reducing Lifestyle Eating Properly Exercising Regularly Sleeping Well Practical Illustration Module Three Review Questions Module Four: Altering the Situation The First A Identifying Appropriate Situations Creating Effective Actions Practical Illustration Module Four Review Questions Module Five: Avoiding the Situation The Second A Identifying Appropriate Situations Creating Effective Actions Practical Illustration Module Five Review Questions Module Six: Accepting the Situation The Third A Identifying Appropriate Situations Creating Effective Actions Practical Illustration Module Six Review Questions Module Seven: Using Routines to Reduce Stress Planning Meals Organizing Chores Using a To-Do List Practical Illustration Module Seven: Review Questions Module Eight: Environmental Relaxation Techniques Finding a Sanctuary Using Music Seeing the Humor Practical Illustration Module Eight: Review Questions Module Nine: Physical Relaxation Techniques Soothing Stretches Deep Breathing Tensing and Relaxing1 Meditation1 Practical Illustration Module Nine: Review Questions Module Ten: Coping with Major Events Establishing a Support System Creating a Plan Knowing When to Seek Help Practical Illustration Module Ten: Review Questions Module Eleven: Our Challenge to You Creating a Stress Log Week One: Recording Events1 Week Two: Identifying Stressors and Creating a Plan1 Week Three: Creating New Habits Reviewing and Evaluating Practical Illustration Module Eleven: Review Questions Module Twelve: Wrapping Up Words from the Wise Lessons Learned
Duration 1 Days 6 CPD hours This course is intended for This course is for anyone who finds themselves needing to improve their negotiating skills in the workplace. Overview Develop the skills necessary for successful negotiation. Identify key negotiation concepts and strategies. Learn the key elements in preparing for negotiation to help ensure success. Develop a BATNA (Best Alternative to a Negotiated Agreement) before starting negotiation. Identify what we bring to the negotiation table that could get in the way of successful negotiation. Generate options to getting to a shared agreement Prepare for and practice negotiating in a safe environment Being able to negotiate well is critical for any project professional. You need to clarify what you hope to gain from negotiating, as well as understand the other side?s objectives to reach a mutually beneficial result. This course provides essential tips on how to prepare for negotiation, including managing emotions and understanding what all parties contribute to the process. You will also learn the difference between positions and interests and how to bargain to generate options to find the win-win. The course provides an opportunity to apply concepts taught to a real-life situation and to practice negotiating in a safe environment. Note: This course will earn you 7 PDUs. 1 - Negotiation Overview Negotiation defined Negotiation strategies 3 Negotiation approaches Negotiation Process 2 - Preparing your Negotiation Mindset Mental models Personal values Forms of power Managing emotions Identifying your personal hot buttons Cooling down techniques 3 - Prepare for Negotiation Determine if negotiation is your best path Determine negotiation goal Collect relevant information Identify your BATNA Identify your interests under your position Build an effective environment Prepare your opening statements 4 - Negotiation Tips to Remember Before you Begin Negotiating Present your opening statement Exchange information - identify interests Bargain and generate options for mutual gain Finalize agreement & conclude negotiation Overcoming negotiation challenges
Duration 4 Days 24 CPD hours This course is intended for This course is intended for: Network administrators Network engineers with little or no programming or Python experience Network managers Systems engineers Overview After taking this course, you should be able to: Create a Python script Describe data types commonly used in Python coding Describe Python strings and their use cases Describe Python loops, conditionals, operators, and their purposes and use cases Describe Python classes, methods, functions, namespaces, and scopes Describe the options for Python data manipulation and storage Describe Python modules and packages, their uses, and their benefits Explain how to manipulate user input in Python Describe error and exception management in Python Describe Python code debugging methods The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts. Course Outline Introducing Programmability and Python for Network Engineers Scripting with Python Examining Python Data Types Manipulating Strings Describing Conditionals, Loops, and Operators Exploring Classes, Methods, Functions, Namespaces, and Scopes Exploring Data Storage Options Exploring Python Modules and Packages Gathering and Validating User Input Analyzing Exceptions and Error Management Examining Debugging Methods Course Summary
Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Network administrators Network engineers with little or no programming or Python experience Network managers Systems engineers Overview After taking this course, you should be able to: Create a Python script Describe data types commonly used in Python coding Describe Python strings and their use cases Describe Python loops, conditionals, operators, and their purposes and use cases Describe Python classes, methods, functions, namespaces, and scopes Describe the options for Python data manipulation and storage Describe Python modules and packages, their uses, and their benefits Explain how to manipulate user input in Python Describe error and exception management in Python Describe Python code debugging methods The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts. Course outline Introducing Programmability and Python for Network Engineers Scripting with Python Examining Python Data Types Manipulating Strings Describing Conditionals, Loops, and Operators Exploring Classes, Methods, Functions, Namespaces, and Scopes Exploring Data Storage Options Exploring Python Modules and Packages Gathering and Validating User Input Analyzing Exceptions and Error Management Examining Debugging Methods Course Summary Lab outline Execute Your First Python Program Use the Python Interactive Shell Explore Foundation Python Data Types Explore Complex Python Data Types Use Standard String Operations Use Basic Pattern Matching Reformat MAC Addresses Use the if-else Construct Use for Loops Use while Loops Create and Use Functions Create and Use Classes Use the Python main() Construct Traverse the File Structure Read Data in Comma-Separated Values (CSV) Format Read, Store, and Retrieve Data in XML Format Read, Store, and Retrieve Date in JavaScript Object Notation (JSON) Format Read, Store, and Retrieve Data in a Raw or Unstructured Format Import Modules from the Python Standard Library Import External Libraries Create a Python Module Prompt the User for Input Use Command-Line Arguments Manage Exceptions with the try-except Structure Manage Exceptions with the try-except-finally Structure Use Assertions Use Simple Debugging Methods Use the Python Debugger Code a Practical Debugging Script
Duration 3 Days 18 CPD hours This course is intended for This course is designed for existing Python programmers who have at least one year of Python experience and who want to expand their programming proficiency in Python 3. Overview In this course, you will expand your Python proficiencies. You will: Select an object-oriented programming approach for Python applications. Create object-oriented Python applications. Create a desktop application. Create data-driven applications. Create and secure web service-connected applications. Program Python for data science. Implement unit testing and exception handling. Package an application for distribution. Python© continues to be a popular programming language, perhaps owing to its easy learning curve, small code footprint, and versatility for business, web, and scientific uses. Python is useful for developing custom software tools, applications, web services, and cloud applications. In this course, you'll build upon your basic Python skills, learning more advanced topics such as object-oriented programming patterns, development of graphical user interfaces, data management, creating web service-connected apps, performing data science tasks, unit testing, and creating and installing packages and executable applications. Lesson 1: Selecting an Object-Oriented Programming Approach for Python Applications Topic A: Implement Object-Oriented Design Topic B: Leverage the Benefits of Object-Oriented Programming Lesson 2: Creating Object-Oriented Python Applications Topic A: Create a Class Topic B: Use Built-in Methods Topic C: Implement the Factory Design Pattern Lesson 3: Creating a Desktop Application Topic A: Design a Graphical User Interface (GUI) Topic B: Create Interactive Applications Lesson 4: Creating Data-Driven Applications Topic A: Connect to Data Topic B: Store, Update, and Delete Data in a Database Lesson 5: Creating and Securing a Web Service-Connected App Topic A: Select a Network Application Protocol Topic B: Create a RESTful Web Service Topic C: Create a Web Service Client Topic D: Secure Connected Applications Lesson 6: Programming Python for Data Science Topic A: Clean Data with Python Topic B: Visualize Data with Python Topic C: Perform Linear Regression with Machine Learning Lesson 7: Implementing Unit Testing and Exception Handling Topic A: Handle Exceptions Topic B: Write a Unit Test Topic C: Execute a Unit Test Lesson 8: Packaging an Application for Distribution Topic A: Create and Install a Package Topic B: Generate Alternative Distribution Files
This very practical one-day programme provides participants with the skills and knowledge required to be an effective member of the procurement team and to enable them to procure a wide range of resources for the organisation, in a compliant and cost-effective manner. It also empowers them to be able to collaborate with all key stakeholders. By the end of the programme participants will be able to: Understand the basic concepts of good procurement practice Apply a range of tools and techniques for developing scopes of work and specifications Apply various methods to select and evaluate suppliers Develop robust contract award strategies Appreciate the commercial importance of effective procurement and opportunities to reduce cost and add value Develop appropriate procurement strategies depending on risk and value Appreciate the legal aspects of procurement 1 Welcome Introductions Aims and objectives Plan for the day 2 The basics of procurement The concept of total cost of ownership v price The procurement cycle The roles of the customer and the contractor Impact upon profit 3 Specification process Importance of effective specifications Specification development process Types of specification Team approach Use of performance specifications Early supplier involvement (ESI) / early contractor involvement (ECI) 4 Quality Concepts and practices Defining 'fit for purpose' Conformance to requirements Compliance to standards Role of the supplier Quality assurance tools and techniques 5 Procurement methods RFP RFQ ITT Negotiated procurement Strategic partnerships Outsourcing 6 Tendering How to undertake a formal tendering process Business case to award Critical stages in the process Risks and benefits 7 Tender evaluation How to undertake a quotation analysis Tools of analysis Use of VFM models Role of the customer Comparisons around cost, quality, and delivery 8 Supplier selection and evaluation Developing critical selection criteria Using the 10Cs model Importance of effective selection process Weighting systems Importance of validity and evidence 9 Capital equipment procurement Life cycle cost issues Payback calculations Compatibility issues Maintenance and training issues After-sales support 10 Supplier relationships Corporate social responsibility issues Communication 360 feed-back Open and ethical Initial understanding Clear and fair terms and conditions 11 Close Review of key learning points Personal action planning
Duration 3 Days 18 CPD hours This course is intended for This advanced course is designed for those individuals who are responsible for operating and managing the operation of an IBM i system. Overview Explain the concept of how LPAR works Explain the functions served by the HMC Explain how user versus resource security are implemented Explain the difference between group profiles and authorization lists Describe how adopted authority works Describe how work is managed on the system and the concepts of the performance tuning process on the system Explain how Management Central can be used to manage a single system or a network of System i servers Perform the steps to create a basic CL program using both the traditional (PDM and SEU) and the newer GUI (RSE and LPEX) application development tools Perform the steps to create a menu using SDA Provide some tips on how you can improve your operations This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC LPAR concepts and overview . Console options and HMC overview . IASP concepts and overview . Security concepts and overview . System values . User security (user and group profiles) . Resource security . Authorization lists and adopted authority . Management Central overview . Commands and tasks using Management Central . Inventory using Management Central . System values using Management Central . Other Management Central functions . Work management: Concepts and overview . Work management: Subsystem concepts and overview . Work management: Job processing concepts and interactive jobs . Work management: Job processing concepts of other job types . Work management: Submitting and tracking of batch jobs . Programming concepts . CL programming concepts . Using PDM and SEU to create a CL program . Starting and setting up RSE . Creating a CL program using RSE and LPEX Editor . Creating a menu using SDA . Tips for improved operation .
Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with 1+ years of experience in implementing IT security technologies (Network, Applications, and Systems) and are also SNSAcertified. Overview The students will learn how to monitor, investigate, analyze, and configure SonicWall Next-Gen firewalls running SonicOS to enable advanced functionality related to Secure and Remote Connectivity, Network Optimization, and Threat Prevention. Upon successful completion of the SNSP program, the students will be able to demonstrate SonicWall product expertise and the application skill sets required to mount a proactive, effective defense against current and evolving network and cyber security threats. A key issue affecting an organization?s business productivity and employee efficiency today is its ability to respond to dynamic changes in the cyber threat landscape. Coming up on the heels of the highly successful SNSA program launched earlier this year, SonicWall now presents the SonicWall Network Security Professional (SNSP) course, an expert-level training and certification program that builds on the enterprise security skills learned in the SNSA course. Previously known as the Network Security Advance Administration (NSAA) course, the revamped SNSP curriculum expands on the topics covered in SNSA and features advanced SonicWall firewall configuration and administration tasks aimed at helping enterprises adapt to dynamic security environments. Relevant changes to the curriculum include an enhanced and deeper scope of SonicOS 6.5.x features and functionality, as well as changes in the learning and delivery methodologies to better balance the professional needs of the students and the business requirements for network and cyber security. Course Outline Course Introduction and Overview Configuring VPN Auto Provisioning Configuring Advanced Routing Configuring Advanced Interface Settings Using SonicOS CLI Configuring Capture Client Capturing and Replaying Packets Configuring DPI-SSL/TLS Server Configuring DPI-SSH Configuring App Rules Configuring App Control Configuring Advanced High Availability Excluding Trusted Content Resolving and Reporting False Positives Configuring Content Filtering Implementing Best Practices
Duration 5 Days 30 CPD hours This course is intended for Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers Overview A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. Course Outline Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance ? Passive (External Only) Detecting Live Systems ? Reconnaissance (Active) Banner Grabbing and Enumeration Automated Vulnerability Assessment Hacking Operating Systems Advanced Assessment and Exploitation Techniques Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics
It is important for Officers to understand the roles and responsibilities, processes and procedures involved when working with Elected Members. They also need to appreciate the significance of Elected Members as the decision-makers in local government. Officers have a responsibility to work and communicate with Elected Members effectively. This very successful course is designed to help Officers with this. Note: this is very much an indicative outline. The programme is tailored to the needs of each particular organisation. To provide managers with the knowledge and understanding they need to have productive working relationships with Elected Members and provide appropriate support. By the end of the course participants will: Understand the roles, responsibilities, processes and procedures in place for working with Elected Members Be able to identify the best way to approach potentially sensitive issues Understand the skills and behaviours required for working effectively with Members Be able to deploy their influencing skills more successfully Review their learning and have an action plan to take back and implement at work Note: this is very much an indicative outline. The programme is tailored to the needs of each particular organisation. 1 Introduction Welcome and introductions Objectives and programme overview 2 Working in a political environment What is political awareness? Contact and experience with Members Importance of the role of Members 3 Why be an Elected Member? Perceptions of what Elected Members are and do Values of Members and their motivations for doing what they do 4 Political decision-making in local government Current challenges and drivers affecting the organisation / the council Roles and responsibilities of Officers and Members Centrality of Members' strategic role 5 (Option) A day in the life of an Elected Member An Elected Member gives a talk about what they do 6 Having a beneficial relationship between Officers and Members 7 Member / Officer communication Discussion of the formal processes, service procedures, etc (whether enshrined in a protocol, Memorandum of Understanding, etc) Response times and requirements Procedures required by Heads of Service [if appropriate] 8 Influencing styles and strategies Different forms of power and how they impact Developing an appropriate 'influencing style' Exploring strategies for improving communication and influencing at work 9 Review and evaluation Review and evaluation of learning Personal action plans