Front-line communication plays a vital role in shaping the public perception of every organisation. This course is designed to help delegates organise their ideas and communicate clearly and effectively through email. By improving written communication skills, delegates will become more concise, communicate with conviction, and foster meaningful dialogue with their audience. These skills are essential for professionals who interact with the public, as improved communication leads to greater internal and external customer satisfaction. Delegates will learn how to: Write clearly and professionally, enhancing public perception of expertise Communicate more efficiently in writing, reducing wasted time and increasing profitability Craft concise, rapport-building messages for internal and external customers, fostering productivity and a positive workplace environment Topics Covered: Benefits of using email Determining the purpose of an email Steps to take before writing Inflection in written messages Effects of instant messaging and text messaging on communication Basic email structure and planning Writing effective subject lines Paragraph structure and organisation Including relevant details and summarising problems effectively Proper use of CC and BCC fields Why typing in all caps is considered shouting! Proofreading techniques This Email Etiquette course is a 90-minute interactive virtual session. Upon registration, delegates will receive online login instructions prior to the class date. This format allows delegates to enhance their skills conveniently from their home or office while improving their professional communication abilities.
Are you doing sanction checks in your law firm? In the intricate landscape of legal practice, understanding and adhering to the UK's sanctions regime is not just a recommendation; it is mandatory and it is imperative. This course aims to set clear expectations and offer practical support to firms, guiding them away from the pitfalls of breaching the UK's sanctions regime. This course will cover: What are sanctions What do you need to know about the sanctions for your firm How is it different to the AML regime? What controls to put in place? If the firm offers services to sanction areas – what controls? My client has been sanctioned – what do I do? Reporting obligations Using screening tools Licensing How does this impact Legal Professional Privilege? Sanction Risk Assessment Red flags factors Enforcement actions Target Audience This 90 minute course is for all legal firms, irrespective of the services provided. Whether you are navigating the sanctions regime independently or operating under a license from the Office of Financial Sanctions Implementation (OFSI), this course is for you. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Helen Torresi, Consultant, DG Legal Helen is a qualified solicitor with a diverse professional background spanning leadership roles in both the legal and tech/corporate sectors. Throughout her career, she has held key positions such as COLP, HOLP, MLCO, MLRO and DPO for law firms and various regulated businesses and services. Helen’s specialised areas encompass AML, complaint and firm negligence handling, DPA compliance, file review and auditing, law management, and operational effectiveness in law firms, particularly in conveyancing (CQS).
Overview This course examines the major tools, techniques, and principles aimed at improving quality and productivity in the public sector. To provide students with practical methods for improving public organizations, this course will cover accountability systems, performance measurement, pay-for-performance reward systems, contracting out, and organizational assessment
Overview This course is for PR Professionals and for those looking to make a career in PR. Through this course, you will be able to enhance your Communication skills and will learn new Public Relations techniques. Have Effective communication skills is very important if you want to achieve success in PR. PR is all about making relationships within the corporate sector or with the consumers and maintaining them with effective communication skills and techniques.
Overview Sales is one of the backbone of the company. Every company success is depended on their sales strategies. This course will deal with the sales techniques and sales communication required to increase sales.
Overview Accounting is the methodical approach of updating and keeping track of all the required information related to financial transactions. This course is designed to gain knowledge of how to interpret and analyse financial statements effectively. This course will emphasize in-depth knowledge of financial reporting elements used in Advance Accounting highlighting transactions recognizing, differentiating and efficiently recording information. Advanced Accounting Techniques course covers difficult complex accounting topics like forecasting, hedging, data aggregation, interval accounting, segment reporting and many more including deeply understanding the financial statement Advanced accounting techniques were developed to provide information appropriate for decision-making in changing internal and external environments.
Overview This sales coaching can offer sales those who square measure needed to create outgoing sales calls with a spread of verified skills, techniques and best practices to make sure additional sure-fire outcomes from a better proportion of the calls they create.
The Alternative Energy Technology Course is a practically based alternative energy course designed to give participants an understanding of alternative energy options and provide them with that practical knowledge and skills to build solar to electric and wind to electric systems at a foundation level. The course is designed to be of benefit to people either working or intending to work as:- Alternative Energy Installers or anyone just wishing to gain practical knowledge of Practical Alternative Energy Systems
Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).
Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management