Duration 3 Days 18 CPD hours This course is intended for This course is intended for experienced administrators with a background in either software development or system administration. Team leaders, lead developers, and other accidental Team Foundation Server administrators are also encouraged to take this course. This course will also help a student prepare for the relevant Microsoft certification exam. Overview At course completion, attendees will have had exposure to: - TFS editions and components - Supported topologies and environments - Must-have TFS administration tools - Hardware and software requirements - Required service accounts and permissions - Installing Team Foundation Server - Configuring Team Foundation Server - Managing relevant SQL Server components - Managing relevant SharePoint components - Installing and using Team Explorer - Team project collections and team projects - Using and customizing process templates - TFS licensing and Client Access Licenses - Connecting and using Microsoft Excel & Project - Installing and using Team Explorer Everywhere - Integrating TFS and SharePoint - Using the TFS web portal - Git and TFVC version control systems - Basic and advanced version control workflows - Configuring and using code search - Controlling access to version controlled items - Command-line and third party tools - Configuring automated builds - Deploying and using Visual Studio agents - Configuring agent pools and queues - Creating and queuing automated builds - Configuring Package Management - Configuring Release Management - Creating a release definition - Creating and deploying a release - Strategies for upgrading and migrating to TFS - Integrating TFS with other systems and data - High availability and scalability options - Capacity planning and disaster recovery - Backing up, restoring, and moving TFS data - Managing the data warehouse - Using PowerShell to manage TFS - Customizing Team Foundation Server - Extending Team Foundation Server Provides students with the knowledge and skills to deploy, configure, and manage Microsoft Team Foundation Server 2019 and related software components. Introduction to Team Foundation Server Introduction to Team Foundation Server Editions, components, and configurations Visual Studio Team Services comparison TFS' support of Application Lifecycle Management TFS administrator responsibilities and tasks ?Must-have? tools of a TFS administrator Planning and Deploying TFS Planning the deployment System requirements, software, and accounts Installing and configuring TFS Installing Team Explorer Troubleshooting Configuring TFS Administrator roles and tools Managing team project collections Managing team projects Managing process templates Securing TFS, SharePoint, and SQL Server Renaming and deleting a team project Client Applications TFS Client Access Licenses (CAL) Team Explorer and the web portal Microsoft Excel and Microsoft Project SharePoint project portal Team Explorer Everywhere Command-line and 3rd party tools Version Control Overview of Git and TFVC version control systems Integration with Visual Studio Using TFVC and Git version control Basic and advanced workflows Controlling access to version control Command-line tools and utilities TFS Proxy, MSSCCI Provider, and TFS Sidekicks Building and Releasing Overview of the Visual Studio build system Build agents, agent pools, agent queues Creating and queuing a build Monitoring, and managing a build Securing the build process Running tests as part of the build Overview of Package Management Overview of Release Management Defining, creating, and deploying a release Upgrading, Migrating, and Integrating Upgrading Team Foundation Server In-place vs. migration upgrade Performing post-upgrade tasks Migrating work items Migrating items under version controlled Integrating with Team Foundation Server Custom and 3rd party solutions Advanced Administration Monitoring the health of Team Foundation Server Web-based diagnostic tools Options for scalability and high availability Disaster recovery, backup, and restore Moving Team Foundation Server Managing the data warehouse Using PowerShell to manage TFS Customizing and Extending Customizing vs. extending Customizing a process template Customizing a work item type Creating default work items Creating and using a global list Using Witadmin.exe Using work item templates Creating a custom report Using the REST API to extend Team Foundation Server Additional course details: Nexus Humans Administering Team Foundation Server 2017 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Administering Team Foundation Server 2017 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Transform Your Passion Into Performance** 🌟 Are you ready to take the spotlight and make your acting dreams a reality? Whether you're a budding actor or looking to enhance your skills, our 6-week online acting course is designed to help you shine on stage and screen.
Duration 1 Days 6 CPD hours This course is intended for To gain the most from attending this course you should possess the following incoming skills: Basic knowledge of programming concepts and syntax in Python. Familiarity with common data formats such as CSV, JSON, and XML. Experience using command-line interfaces and basic text editing tools. Understanding of basic machine learning concepts and algorithms. Overview Working in an interactive learning environment, led by our engaging expert, you will: Gain a solid understanding of prompt engineering concepts and their applications in software development and AI-driven solutions. Master the techniques for preprocessing and cleaning text data to ensure high-quality inputs for AI models like GPT-4. Develop expertise in GPT-4 tokenization, input formatting, and controlling model behavior for various tasks and requirements. Acquire the ability to design, optimize, and test prompts effectively, catering to diverse business applications and use cases. Learn advanced prompt engineering techniques, such as conditional text generation and multi-turn conversations, to create more sophisticated AI solutions. Practice creating prompts to generate, run, and test code in a chosen programming language using GPT-4 and OpenAI Codex. Understand the ethical implications and best practices in responsible AI deployment, ensuring fair and unbiased AI applications in software development. Prompt Engineering offers coders and software developers a competitive edge by empowering them to develop more effective and efficient AI-driven solutions in their projects. By harnessing the capabilities of cutting-edge AI models like GPT-4, coders can automate repetitive tasks, enhance natural language understanding, and even generate code suggestions, boosting productivity and creativity. In addition, mastering prompt engineering can contribute to improved job security, as professionals with these in-demand skills are highly sought after in the rapidly evolving tech landscape. Quick Start to Prompt Engineering for Coders and Software Developers is a one day course designed to get you quickly up and running with the prompting skills required to out AI to work for you in your development efforts. Guided by our AI expert, you?ll explore key topics such as text preprocessing, data cleansing, GPT-4 tokenization, input formatting, prompt design, and optimization, as well as ethical considerations in prompt engineering. In the hands-on labs you?ll explore tasks such as formatting inputs for GPT-4, designing and optimizing prompts for business applications, and implementing multi-turn conversations with AI. You?ll work with innovative tools like the OpenAI API, OpenAI Codex, and OpenAI Playground, enhancing your learning experience while preparing you for integrating prompt engineering into your professional toolkit. By the end of this immersive course, you?ll have the skills necessary to effectively use prompt engineering in your software development projects. You'll be able to design, optimize, and test prompts for various business tasks, integrate GPT-4 with other software platforms, and address ethical concerns in AI deployment. Introduction to Prompt Engineering Overview of prompt engineering and its importance in AI applications Major applications of prompt engineering in business Common challenges faced in prompt engineering Overview of GPT-4 and its role in prompt engineering Key terminology and concepts in prompt engineering Getting Things Ready: Text Preprocessing and Data Cleansing Importance of data preprocessing in prompt engineering Techniques for text cleaning and normalization Tokenization and n-grams Stop word removal and stemming Regular expressions and pattern matching GPT-4 Tokenization and Input Formatting GPT-4 tokenization and its role in prompt engineering Understanding and formatting GPT-4 inputs Context windows and token limits Controlling response length and quality Techniques for handling out-of-vocabulary tokens Prompt Design and Optimization Master the skills to design, optimize, and test prompts for various business tasks. Designing effective prompts for different tasks Techniques for prompt optimization GPT-4 system and user parameters for controlling behavior Importance of prompt testing and iteration Best practices for prompt engineering in business applications Advanced Techniques and Tools in Prompt Engineering Learn advanced techniques and tools for prompt engineering and their integration in business applications. Conditional text generation with GPT-4 Techniques for handling multi-turn conversations Overview of tools for prompt engineering: OpenAI API, OpenAI Codex, and OpenAI Playground Integration of GPT-4 with other software platforms and tools Monitoring and maintaining prompt performance Code Generation and Testing with Prompt Engineering Develop the skills to generate, integrate, and test AI-generated code effectively, enhancing productivity and creativity in software development projects. Introduction to code generation with AI models like GPT-4 Designing prompts for code generation across programming languages Techniques for specifying requirements and constraints in prompts Generating and interpreting code snippets using AI-driven solutions Integrating generated code into existing projects and codebases Best practices for testing and validating AI-generated code Ethics and Responsible AI Understand the ethical implications of prompt engineering and the importance of responsible AI deployment in business. Ethical considerations in prompt engineering Bias in AI systems and its impact on prompt engineering Techniques to minimize bias and ensure fairness Best practices for responsible AI deployment in business applications Monitoring and addressing ethical concerns in prompt engineering
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. Module 1: Methodology & Assessment The Citrix Consulting Methodology Citrix Consulting Methodology Use Business Drivers Prioritize Business Drivers User Segmentation User Segmentation Process App Assessment Introduction App Assessment Analysis Why Perform a Capabilities Assessment? Common Capabilities Assessment Risks Module 2: User Layer Endpoint Considerations Peripherals Considerations Citrix Workspace App Version Considerations Citrix Workspace App Multiple Version Considerations Network Connectivity and the User Experience Bandwidth and Latency Considerations Graphics Mode Design Considerations HDX Transport Protocols Considerations Media Content Redirection Considerations Session Interruption Management Session Reliability Feature Considerations Session Interruption Management Auto-Client Reconnect Feature Considerations Session Interruption Management ICA Keep-Alive Feature Considerations Module 3: Access Layer Access Matrix Access Layer Access Layer Communications Double-Hop Access Layer Considerations Citrix Cloud Access Layer Considerations Use Cases for Multiple Stores Define Access Paths per User Group Define Number of URLs Configuration and Prerequisites for Access Paths Citrix Gateway Scalability Citrix Gateway High Availability StoreFront Server Scalability StoreFront Server High Availability Module 4: Resource Layer - Images Flexcast Models VDA Machine Scalability VDA Machine Sizing with NUMA VDA Machine Sizing VDA Machine Scalability Cloud Considerations Scalability Testing and Monitoring Secure VDA Machines Network Traffic Secure VDA Machines Prevent Breakouts Secure VDA Machines Implement Hardening Secure VDA Machines Anti-Virus Review of Image Methods Citrix Provisioning Overall Benefits and Considerations Citrix Provisioning Target Device Boot Methods Citrix Provisioning Read Cache and Sizing Citrix Provisioning Write Cache Type Citrix Provisioning vDisk Store Location Citrix Provisioning Network Design Citrix Provisioning Scalability Considerations Citrix Machine Creation Services Overall Benefits and Considerations Citrix Machine Creation Services Cloning Types Citrix Machine Creation Services Storage Locations & Sizing Citrix Machine Services Read and Write Cache App Layering Considerations Image Management Methods Module 5: Resource Layer - Applications and Personalization Application Delivery Option Determine the Optimal Deployment Method for an App General Application Concerns Profile Strategy Profile Types Review Citrix Profile Management Design Considerations Citrix Profile Management Scaling Citrix Profile Management Permissions Policies Review Optimize Logon Performance with Policies Printing Considerations Module 6: Control Layer Pod Architecture Introduction Pod Architecture Considerations Citrix Virtual Apps and Desktops Service Design Considerations Implement User Acceptance Testing Load Balancing the Machine Running the VDA Citrix Director Design Considerations Management Console Considerations Change Control Delivery Controller Scalability and High Availability Control Layer Security Configuration Logging Considerations Session Recording Module 7: Hardware/Compute Layer Hypervisor Host Hardware Considerations Separating Workloads Considerations Workload Considerations VMs Per Host and Hosts Per Pool Citrix Hypervisor Scalability VM Considerations in Azure and Amazon Web Services Storage Tier Considerations Storage I/O Considerations Storage Architecture Storage RAID & Disk Type Storage Sizing LUNs Storage Bandwidth Storage in Public Cloud Datacenter Networking Considerations Securing Hypervisor Administrative Access Secure the Physical Datacenter Secure the Virtual Datacenter Module 8: Module 8: High Availability and Multiple Location Environments Redundancy vs. Fault Tolerance vs. High Availability Multi-Location Architecture Considerations Multi-Site Architecture Considerations Global Server Load Balancing Optimal Gateway Routing Zone Preference and Failover StoreFront Resource Aggregation StoreFront Subscription Sync Hybrid Environment Options Citrix Provisioning Across Site Site Database Scalability and High Availability Citrix Provisioning Across Sites Considerations Citrix Machine Creation Across Sites App Layering Across Sites Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices Profile Management Multi-Site Replication Considerations Folder Redirections and Other User Data in a Multi-Location Environment Application Data Considerations Cloud-Based Storage Replication Options Multi-Location Printing Considerations Zone Considerations Active Directory Considerations Module 9: Disaster Recovery Tiers of Disaster Recovery Disaster Recovery Considerations Business Continuity Planning and Testing Citrix Standard of Business Continuity
Duration 5 Days 30 CPD hours This course is intended for Anyone who plans to work with Kubernetes at any level or tier of involvement Any company or individual who wants to advance their knowledge of the cloud environment Application Developers Operations Developers IT Directors/Managers Overview All topics required by the CKAD exam, including: Deploy applications to a Kubernetes cluster Pods, ReplicaSets, Deployments, DaemonSets Self-healing and observable applications Multi-container Pod Design Application configuration via Configmaps, Secrets Administrate cluster use for your team A systematic understanding of Kubernetes architecture Troubleshooting and debugging tools Kubernetes networking and services Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on training, you will go back to work with all necessary commands and practical skills to empower your team to succeed, as well as gain knowledge of important concepts like Kubernetes architecture and container orchestration. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Application Developer (CKAD) exam. You will command and configure a high availability Kubernetes environment (and later, build your own!) capable of demonstrating all ?K8s'' features discussed and demonstrated in this course. Your week of intensive, hands-on training will conclude with a mock CKAD exam that matches the real thing. Kubernetes Architecture Components Understand API deprecations Containers Define, build and modify container images Pods Master Services Node Services K8s Services YAML Essentials Creating a K8s Cluster kubectl Commands Kubernetes Resources Kubernetes Namespace Kubernetes Contexts Pods What is a Pod? Create, List, Delete Pods How to Access Running Pods Kubernetes Resources Managing Cloud Resource Consumption Multi-Container Pod Design Security Contexts Init Containers Understand multi-container Pod design patterns (e.g. sidecar, init and others) Pod Wellness Tracking Networking Packet Forwarding ClusterIP and NodePort Services Provide and troubleshoot access to applications via services Ingress Controllers Use Ingress rules to expose applications NetworkPolicy resource Demonstrate basic understanding of NetworkPolicies Network Plugins Defining the Service Mesh Service mesh configuration examples ReplicaSets Services ReplicaSet Function Deploying ReplicaSets Deployments Deployment Object Updating/Rolling Back Deployments Understand Deployments and how to perform rolling updates Deployment Strategies Use Kubernetes primitives to implement common deployment strategies (e.g. blue/green or canary) Scaling ReplicaSets Autoscaling Labels and Annotations Labels Annotations Node Taints and Tolerations Jobs The K8s Job and CronJob Understand Jobs and CronJobs Immediate vs. scheduled internal use Application Configuration Understanding and defining resource requirements, limits and quotas Config Maps Create & consume Secrets Patching Custom Resource Definition Discover and use resources that extend Kubernetes (CRD) Managing ConfigMaps and Secrets as Volumes Storage Static and dynamic persistent volumes via StorageClass K8s volume configuration Utilize persistent and ephemeral volumes Adding persistent storage to containers via persistent volume claims Introduction to Helm Helm Introduction Charts Use the Helm package manager to deploy existing packages Application Security Understand authentication, authorization and admission control Understand ServiceAccounts Understand SecurityContexts Application Observability and Maintenance Use provided tools to monitor Kubernetes applications How to Troubleshoot Kubernetes Basic and Advanced Logging Techniques Utilize container logs Accessing containers with Port-Forward Debugging in Kubernetes Hands on Labs: Define, build and modify container images Deploy Kubernetes using Ansible Isolating Resources with Kubernetes Namespaces Cluster Access with Kubernetes Context Listing Resources with kubectl get Examining Resources with kubectl describe Create and Configure Basic Pods Debugging via kubectl port-forward Imperative vs. Declarative Resource Creation Performing Commands inside a Pod Understanding Labels and Selectors Insert an Annotation Create and Configure a ReplicaSet Writing a Deployment Manifest Perform rolling updates and rollbacks with Deployments Horizontal Scaling with kubectl scale Implement probes and health checks Understanding and defining resource requirements, limits and quotas Understand Jobs and CronJobs Best Practices for Container Customization Persistent Configuration with ConfigMaps Create and Consume Secrets Understand the Init container multi-container Pod design pattern Using PersistentVolumeClaims for Storage Dynamically Provision PersistentVolumes with NFS Deploy a NetworkPolicy Provide and troubleshoot access to applications via services Use Ingress rules to expose applications Understand the Sidecar multi-container Pod design pattern Setting up a single tier service mesh Tainted Nodes and Tolerations Use the Helm package manager to deploy existing packages A Completed Project Install Jenkins Using Helm and Run a Demo Job Custom Resource Definitions (CRDs) Patching Understanding Security Contexts for Cluster Access Control Utilize container logs Advanced Logging Techniques Troubleshooting Calicoctl Deploy a Kubernetes Cluster using Kubeadm Monitoring Applications in Kubernetes Resource-Based Autoscaling Create ServiceAccounts for use with the Kubernetes Dashboard Saving Your Progress With GitHub CKAD Practice Drill Alta Kubernetes Course Specific Updates Sourcing Secrets from HashiCorp Vault Example CKAD Test Questions
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Our telephone training takes place in your normal working situation, using the actual telephones and software, and the programming software clients that trainees will use when fully trained. Our trainers will travel anywhere in the world to train you face to face, or if you prefer, we can offer our whole training catalogue remotely using Teams or Zoom. On-site and live remote telecoms training sessions have a general reputation as most effective for trainees to continue to efficiently carry out their telecoms usage, programming and own in-house training of future new employees. On-site training involves employees training at their place of work while they are doing their actual job, or in pre-organised classroom training sessions, based around hands-on interaction, trainer Q&A and all carried out using your own site telephone system. Our telephone trainers also offer consultations on your new or current telephone systems: looking into how you currently use your system, making suggestions on how programming could be tweaked and changed to improve your current usage, how to improve on call handling methods, and informing you of additional products which may be available on your system that you may not be aware of. This could help improve the level of communication across your company and interactions with your customers. We believe telephone handset and voicemail training sessions are essential to the smooth and efficient running of your company, making sure your staff are aware of all the features and benefits that the telephone handsets can offer, and ensuring calls are dealt with quickly and effectively. System administration training is available to teach new administrators how to manage and control a variety of system features. This type of training is especially important when new administrators have little or no previous telecom knowledge or experience, but it is equally important at all levels to ensure the new system is utilised to its maximum capability. Administration days or Call Centre Software training days take one full day to complete. Full Day Example: 9:30 - 16:00 Day Structure 09:30 - 10:45 Handset & VM session for up to 8 people 10:45 - 12:00 Handset & VM session for up to 8 people 12:00 - 12:45 Lunch 12:45 - 14:00 Handset & VM session for up to 8 people 14:00 - 15:15 Handset & VM session for up to 8 people 15:15 - 16:30 Handset & VM session for up to 8 people Half Day Example: 9:30 - 13:00 Switchboard training takes half a day (3-4 hours for up to 3 people). If you want to train more than 3 people, you may need to extend the day to a full day, to ensure everyone gets to have hands-on training on the switchboard. Super Users and Train the Trainer Sessions Super User sessions can also be organised to show advanced system features in order to provide an ongoing training service to their colleagues, once the trainers have left the site.
Are your sales people too stressed, running on adrenalin, perhaps driving towards burnout, struggling to reach targets? Wouldn't you rather they delivered consistently good performance, sustainable over longer periods of time, with less stress (for both them and you)? This uniquely empowering workshop will help your team develop naturally high levels of focus, energy and motivation. They will attain a sense of grounded euphoria, giving them a very distinct and ethical edge in selling. A one-day programme, it gives salespeople an introduction to the 'Natural Superheroes' concepts and resources, tools and techniques, to help them improve their sales performance - realising greater sales potential, developing deeper and more profitable client relationships, winning more business. Through this experience, sales teams gain: Information about profiling clients to instantly understand more about their deepest drives and true needs so they can be genuinely met and, where possible, exceeded Insights into deep, honest and very 'real' reasons for sales procrastination - participants are given specific workable strategies they can easily apply to overcome sales resistance, by tapping their natural motivational styles An understanding of communicating at the very highest levels with different people so they truly understand your sales message and have a significantly more positive sales experience A realisation of their very specific natural sales talents as individuals and as a team A deeper level of experience and understanding of what specifically drives their own behaviour and the behaviour of their clients - these unique insights explain not only how but exactly why people behave the way they do An experience of what it takes to be unshakeable under pressure and manage the sales processes and relationships to a positive outcome for all Brand-new insights into working with and handling difficult people across all levels of authority An understanding of the pitfalls and the psychological traps we set ourselves which cause unnecessary stress, anxiety and frustration on a daily basis and, in turn, limit our sales performance Access to very simple and practical tools that massively increase self-awareness, engender accountability and responsibility and develop emotional sales mastery 1 Introducing 'Natural Superheroes' for sales What is a 'Natural Superhero'? Defining emotional intelligence in the context of sales and why it is so important Knowing yourself - why most people don't know themselves at all and how we can understand exactly what drives our behaviour for the purpose of improving sales performance specifically Knowing exactly why others, and specifically clients and team members, behave the way they do - understanding the real motives behind people's good and bad behaviour in a sales meeting Simple steps to freeing yourself of any anxiety, pressure and false sense of limitation when selling Being yourself in sales - why this is not as easy as it sounds but how you can make it effortless How to take control of achieving the sales performance you really need and want for yourself and others Strategies that raise your self-awareness, increase an authentic and sustainable sense of self-confidence, in difficult situations and in moments of crisis 2 Understanding yourself, your team members and your customers - using the Enneagram Introducing the Enneagram and why it is so valuable to sales people and their clients Exploring the 9 types of motivational drives and why people have different reasons for buying from you Core types and wings - understanding the influence of other motivations either side of the core Enneagram type How to confirm the profile of your client - using celebrities from the world of politics, cinema, sports - we explore how to identify each type - what are their core drives, why have they arisen and how can we use these insights to help you in improving your sales performance The 3 levels of behaviour within your personal profile and that of your clients Lookalike Enneagram types - mistaken identities - how to avoid these traps when profiling your clients and your team How to communicate effectively in a sales environment with each of the different Enneagram types - communication strategies for positive impact on morale, performance and, ultimately, sales results How to interpret and make use of the results of your online personal profile - participants complete an online profile before the event and have the opportunity to analyse their results with a view to improving their sales performance How sales teams sabotage their own performance and that of other people within the team - and how to stop it Uncovering your particular edge in a sales role - what unconsciously trips you up as a sales person? How the Enneagram helps us in sustaining a truly great sales performance over time 3 Why positive thinking alone doesn't work in sales Why 'PMA' does not stand for positive mental attitude when selling - learn its alternative meaning that can serve you even more effectively in a sales role 3 steps and exercises that naturally increase PMA The value of making unconscious thinking conscious and how to do this without any pain or discomfort in a sales meeting Why each Enneagram type has a different experience of PMA in terms of their outward behaviour and how to know when you are maximising your sales performance 4 Measuring success How to measure the development of your individual profile as a sales person Development planning and review Into the future - how to continue your Natural Superhero development
About this Virtual Instructor Led Certificate Training Course (VILT) Asset maintenance and equipment reliability teams play a significant role to ensure that there is no room for downtime and losses in production. They are often recognised for their contribution and ability to keep assets running productively in today's organisations. The Certificate in Asset Management Virtual Instructor Led Training (VILT) course will provide those involved in Asset Management with a full explanation of the key processes to manage assets across their lifecycle. This recognised VILT course has been designed to equip participants with practical skills to take back to work. This VILT course enables participants to ensure their organisation's assets are realising their full value in support of the organisation's objectives. Accredited by the Institute of Asset Management (IAM), this VILT course will prepare participants to sit for the IAM Asset Management Certificate qualification. The IAM exam is offered as an option for participants of this VILT course. Training Objectives By the end of this VILT course, participants will be able to: Understand the key principles, tools and terminology of Asset Management, and demonstrate how it will benefit your organisation Gain familiarity in the application of ISO 55000 in practice Access a range of models that will support the implementation of asset management in your organisation Assess your understanding of the current tools and concepts applied in Asset Management Capture new ideas and skills that will enhance performance and be better prepared for the Institute of Asset Management (IAM) Certificate Examination Target Audience This VILT course will benefit maintenance managers, operations managers, asset managers and reliability professionals, planners and functional specialists. It will also be useful for facilities engineers, supervisors/managers and structural engineers/supervisors/ and managers. IAM Qualifications Syllabi This document details the scope of the individual topics which comprise the examination modules, and how the exams are assessed. It is important that prospective candidates understand the scope of the modules to determine the preparation required. Download here IAM Qualifications Candidate Handbook This handbook provides more detailed information on registering as a candidate, learning resources, training courses, booking an exam, exam regulations and what happens after an exam - whether you are successful or unsuccessful. Download here Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 15 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total) Other than world-class visuals and slides, this VILT course will include a high level of interaction between the facilitator and participants and group discussion among the participants themselves. There will be a number of exercises & quizzes to demonstrate key points and to give participants the chance to apply learning and appreciate key aspects of best practice. Participants will also have the chance to share examples from their own experience, discuss real problems they are facing and develop actions for improvement when they return to work. Examples of the exercises that are used in this VILT course are as follows: Exercises: Aligning Assets to Business Objectives, Planning for Contingencies, Understanding Function and Failure. Group exercises: Asset Management Decision Making, Incident Review & Operations Optimisation. The workshop content will be adjusted based on the discussions, interests and needs of the participants on the course. Trainer Your expert course leader is a is a highly experienced in maintenance and turnaround specialist. He is a Chartered Mechanical Engineer, having spent 19 years working for BP in engineering, maintenance and turnaround management roles. During this time, he worked on plants at all ages in the lifecycle, from construction, commissioning and operating new assets to maintaining aging assets and decommissioning. He has taken roles in Projects, Human Resources and Integrity Management which give real breadth to his approach. He also specialized in Continuous Improvement, gaining the award of International Petrochemical Coach of the year. He stays up to date with the latest industrial developments through his consulting support for major clients. He is also the Asset Management lead and a VILT specialist, having delivered over 70 days of VILT training in the last year. He has an engaging style and will bring his current industrial experience, proficiency of VILT techniques and diverse content, gathered from a comprehensive training portfolio, to deliver a distinctive training experience. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Following on from the Macros course look at how you can write your own Visual Basic code within Excel to fully automate tasks and save time. Course overview Duration: 2 days (13 hours) Our VBA in Excel course is an introduction to using the Visual Basic for Applications language for programming in Excel. It looks at structures, syntax and coding standards. This course is designed for existing experienced users of Excel who can record and run macros and those who have dabbled in VBA but would like some formal training and help to put some structure to their code. Objectives By the end of the course you will be able to: Write visual basic procedures Create event and general procedures Use commands from the Excel data model Use statements and functions Use a selection of debugging tools Create and use variables and constants Use different types of loops Create an Excel user form Content The VBA environment Project explorer Excel objects Modules Properties window Code window Code structure Code structure Navigating within your code Adding comments Using WITH Steps to creating a VBA procedure Procedures Sub procedures Event procedures Calling procedures The Excel data model Workbook commands Worksheet commands Excel selection methods Data manipulation commands Debugging Using breakpoints Stepping through code The immediate window The watch window The locals window points Variables and Constants Declaring variables Declaring multiple variables Variable data types Concatenation Scope of variables Constants Declaring constants Using constants Scope of constants Looping Do while loops Do until loops For next loops Conditional Statements IF statement SELECT CASE statement Comparison statements Logical operators Creating a User Form Form layout The control toolbox Naming conventions Adding objects Naming objects Captions Displaying the form Object properties Object properties Setting properties at design time Setting properties at run time Interconnectivity between the user form and Excel Comparing values Transferring information Running code