More often than not, the people who excel in their job, or are high achievers manage their time effectively, in a way that makes them work in a more efficient manner. This course has been designed to ensure you have the techniques to improve your efficiency, output and ability to function more effectively – whether in your ordinary day or when deadlines loom and the pressure is building.
A leader doesn’t necessarily have to be a ‘manager’, but it’s difficult to see how a manager could be truly effective without having at least some leadership skills. This course will introduce you to some of the import techniques and theories that can help you to improve your leadership skills and be more effective in your role.
This course will start by explaining in detail what team working is and cover some of the basic principles for putting together a group of people who will work well together. It then goes on to cover conflict within teams, explaining some of the reasons conflict occurs and some strategies for managing conflict. It finishes off by exploring some of the different styles of management behaviour and how to develop a resilient team.
This course examines bribery and the legislation, measures and procedures that can uncover, control and reduce the impact of this criminal activity. This information is broken down into the following sections; Why corruption and bribery occur, The UK Bribery Act, Anti-bribery policies, anti-bribery management systems and how to deal with bribery in the workplace.
This course will start with the essentials – defining exactly what we mean by delegation and why it’s so important. It then goes into details about the elements of delegation, overcoming the barriers to delegation, how you can choose which tasks to delegate and who to, the process of delegation and much more.
This course will help you to understand the different types of absence and Identify ways of measuring absence. It covers why you should complete return-to-work forms and how to conduct effective return-to-work meetings. The course finishes off by explaining the formal processes involved in managing absence and how to apply appropriate policies.
This course will start by defining sexual harassment and explaining how protection comes from both employment law and criminal law. You’ll see from workplace statistics how widespread and serious the problem is, and how the management response to concerns raised is often poor or non-existent. It also addresses how allegations should be handled, explains the importance of having clear and robust policies and the role line managers tend to take when it comes to dealing with these situations.
This course aims to help you write effective objectives that deliver results. It covers the importance of goals and objectives and why we need them, the barriers to you achieving your objectives and how to overcome them, what SMART objectives are and how to write and identify them and concludes with some tips for successful objective setting.
This course is intended to provide you with the information you needed to understand and spot the signs of drug and alcohol misuse. It covers the legal and social implications for the individual and for your company if you find out an employee is misusing drugs. This course discusses the law, different types of drugs, and policies that can be put in place to protect yourself, your business and your employees.
Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for system administrators, database administrators, and other technical individuals, who manage and implement DB2 10 for z/OS. Administrators of DB2 11 for z/OS can acquire a view of the architecture and fundamental processes required to manage a DB2 11 for z/OS subsystem. Course Outline Start and stop the DB2 subsystem Explain the allocation CLIST used at logon for DB2 data sets Use Set SYSPARM command Locate the Command recognition character for the DB2 subsystem Query the system log to gain knowledge about the IPL process and information in the system log when DB2 is initialized or stopped Explore DB2 Address Spaces information Select the DB2 functions that best satisfy your site requirements Explain the use of RACF for DB2 connection security Explain the use of Roles and Trusted Context Implement security procedures for a DB2 environment Describe the components and address space structure of a DB2 subsystem Explain DB2 Program Flow for all environments Invoke and use DB2 TSO Facilities Use the DB2 Catalog to monitor authorizations Increase the size of the Active Log data sets Explain DB2 Logging Use SET LOG SUSPEND and SET LOG RESUME Use DSNJU004 to Print Log Map Interpret the output of the Print Log Map Utility DSNJU004 Use DSNJU003 to rename DB2 data sets Plan for recovery of a BSDS failure Monitor and control DB2 Explain transaction flow in IMS and CICS Describe the CICS and DB2 environment Make use and implement the extended 10-byte RBA and LRSN