Leading Cross-Cultural Virtual Teams: In-House Training High-performing teams are a must in this world of intense competition and higher expectations. Global virtual teaming has become a necessity as organizations become increasingly distributed and suppliers and clients actively engage in joint projects. Teams work across geographical and organizational boundaries to deliver solutions and services to global users where distance and differences, both geographic and cultural, amplify the effect of issues and factors that are relatively straightforward when managing a team of people in the same location. This course delivers practical concepts and techniques that participants will start using immediately on their global projects. What you will Learn At the end of this program, you will be able to: Define relationships among foundational concepts (leadership and three dimensions of diversity) and explain their potential impacts on project performance Describe key components of successful project leadership and build selected Transformational Leadership skills Prepare to convert project challenges stemming from personal or cultural diversity into potential competitive advantage Implement selected best practices to meet key challenges facing virtual project teams Foster and grow an environment that supports continued success for CCVTs Foundation Concepts Basic definitions Critical success factors for leading cross-cultural virtual teams (CCVTs) A roadmap to success for leading CCVTs Leadership Excellence in Any Project Environment Leading effectively in a global environment Transformational leadership The four components of Transformational Leadership Leveraging Personal Diversity Overview of personal diversity Mind styles The theory of multiple intelligences Connecting Transformational Leadership and personal diversity Embracing Cultural Diversity Introduction to cultural intelligence The impact of culture Cultural Dimensions Theory The Culture Map Managing Virtual Diversity Overview of virtual diversity Virtual time management Virtual processes and technology Virtual leadership Creating an Environment for Success Supporting a cross-cultural virtual-team (CCVT-) friendly environment Building a foundation of trust Developing a team charter Recap and review Summary and Next Steps Personal action plan
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
The package includes the following: Enhancing communication in relationships with IBCT Building acceptance and tolerance in couples therapy Promoting positive behaviour change in partnerships Managing conflicts through Integrative Behavioural Therapy Deepening emotional intimacy in relationships Trust-building techniques in couples therapy Overcoming recurrent patterns in relationships Foster harmony and connection with IBCT Transformative couples therapy program Invest in the future of your relationship today and experience the power of Integrative Behavioural Couples Therapy. Our compassionate therapists are dedicated to guiding you and your partner towards lasting harmony and connection. Take the first step towards transformative change by scheduling a session with us now. 3 sessions x 1 hour https://relationshipsmdd.com/product/integrative-behavioural-couples-therapy-package/
Miss Date Doctor’s Communication Skills coaching is designed to help you improve your ability to communicate effectively with your partner or potential partner. Whether you struggle to express yourself clearly, have difficulty understanding your partner’s needs, or frequently find yourselves in arguments or misunderstandings, our coaching can provide you with the tools and skills needed to build stronger, more fulfilling relationships and communication skills are essential in creating solid relationships. Our Communication Skills coaching includes a range of techniques and strategies, such as active listening, non-verbal communication, conflict resolution, and empathy building. We can help you develop the ability to communicate clearly and assertively, express your emotions in a healthy way, and build deeper levels of trust and understanding in your relationships.Have 3 1 hour sessions with your coach. The Miss Date Doctor Communication Skills Package includes the following: Relationship Communication, Effective Communication, Communication Techniques, Active Listening, Conflict Resolution, Empathy Building, Communication Skills Coaching, Communication Strategies, Non-Verbal Communication, Relationship Communication Skills, Communication Training. https://relationshipsmdd.com/product/communication-skills-package/
This Strategy Challenge workshop is designed to provide an opportunity for senior management teams to practice and develop their strategic thinking skills - individually and collectively. It gives a 'safe space' and uses examples designed to 'stretch the strategic thinking muscles'
The package includes the following: Positive change in relationships with CBCT Breaking negative patterns in couples therapy Effective communication techniques for couples Problem-solving skills in relationships Enhancing empathy and understanding in partnerships Building trust through Cognitive-Behavioural Therapy Overcoming conflicts in relationships Promoting healthy behaviours in couples Improving relationship satisfaction with CBCT Transformative couples therapy program Invest in the future of your relationship today and experience the power of Cognitive- Behavioural Couples Therapy. Our compassionate therapists are ready to guide you and your partner towards a more fulfilling and harmonious connection. Take the first step towards positive change by scheduling a session with us now. 3 sessions x 1 hour https://relationshipsmdd.com/product/cognitive-behaviourial-couples-therapy-package/
This package can help you with the following areas: Healing childhood wounds in relationships Strengthening communication through Imago therapy Cultivating empathy and understanding in partnerships Building a conscious relationship Deepening intimacy through Imago therapy Addressing conflicts and triggers in relationships Trust-building techniques for couples Nurturing a lasting connection with Imago therapy Healing and growth in relationships Transformative couples therapy program Invest in the future of your relationship today and embark on a journey of healing and growth with our Imago Relationship Therapy Package. Our dedicated therapists are here to guide and support you as you create a relationship filled with love, understanding, and fulfillment. Take the first step towards a brighter future by scheduling a session with us today. 3 sessions x 1 hour https://relationshipsmdd.com/product/imago-relationship-therapy-package/
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Strategic Thinking: In-House Training The goal of this course is to provide you with the building blocks and the motivation to develop the critical skill of strategic thinking. The participants will consider a four-part model that distinguishes strategic thinking from strategic planning and managing. With that understanding, you will investigate the critical components of strategic thinking and how to apply it effectively. What you Will Learn Define strategic thinking and distinguish it from strategic planning and management Explain a high-level approach to gaining strategic thinking skills Integrate other interpersonal skills, such as self-awareness, systems thinking, leadership, constructive conflict, and collaboration, into the fabric of strategic thinking skills Select appropriate techniques to apply strategic thinking in specific situations Recognize and emulate effective strategic thinking behaviors Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Interactive event: Define Strategic Thinking (ST) Interactive event: Discuss relationship of ST with Strategic Planning, Management and Decision Making Strategic Level Framework - Tying it all together Strategic thinking attributes Strategic Thinking Critical Success Factors Strategic Thinking Critical Success Factors - 5-part model Strategic Thinking and the Organization Critical Success Factors Model applied to an organization Tools Introduction (5): Environmental, 5 Forces, SWOT, Value Proposition, Integral Theory of Worldview Video: Fog of War Strategic Thinking and the Individual Critical Success Factors Model applied to an individual Tools Introduction (5): Thinking Styles, Six Thinking Hats, Reverse Thinking, Systems Thinking, Integral Theory of Worldview Strategic Thinking at the Interpersonal and Team Levels Emotional Intelligence - Self Awareness and Working With Others Team Leadership and Trust Constructive Conflict as the Gateway to Collaboration Interactive event: Testing the Models - Challenge Perspective; What's Missing Applying the critical skill of Strategic Thinking Worldview: Team versus client Trusted Advisor Interactive event: Doing what is asked (Case study, wherein participants review the default case scenario prepared for this workshop and add specific details to make the scenario more relevant to their experiences / needs. Teams develop an action plan for applying ST concepts and techniques they have learned here to the situation, then compare and contrast results.)