Negotiation is an everyday challenge for some whether it be in the office, field or at home. Have you ever walked away from a situation thinking "if I'd only put my thoughts, side, opinion or words across better"? This 2-day course is perfect for managers, supervisors and sales people. It will focus on negotiation skills and the techniques that go with it. In this energy-charged provision you'll learn and practice negotiation, assertiveness and influencing techniques. Course Syllabus The syllabus of the Effective Communication and Influencing course is comprised of seven modules, covering the following: Module One An Introduction to Negotiation Assessment of your current sales and negotiation strengths and improvement areas What is negotiation? Identifying objectives and all factors affecting negotiation The negotiation model - the four stages Module Two The Preparation Stage The significance of preparation and why we need to prepare What do you need to prepare? Preparing a set of objectives: yours and theirs Understanding constants and variables Researching the other party Creating a "win-win" situation Preparing yourself for possible set-backs and objections Module Three The Discussion Stage The importance of rapport building Opening the negotiation The power of effective questioning techniques Improving your listening skills Controlling emotions Spotting the signs - non-verbal communication and voice clues Module Four The Proposing Stage Stating your opening position Responding to offers How to deal effectively with adjournments Module Five The Bargaining and Closing Stage Making concessions - the techniques Adopting key bargaining skills Dealing with objections and underhand tactics Closing techniques Confirming the agreement Creating long term, lasting commitment Scheduled Courses Unfortunately this course is not one that is currently scheduled as an open course, and is only available on an in-house basis. Please contact us for more information.
Duration 3 Days 18 CPD hours This course is intended for Ideal candidates are Network Administrators who monitor and troubleshoot wireless networks, and Network and System Administrators responsible for installing and configuring network monitoring systems. Overview This hands-on course prepares you with the knowledge and experience required to install and use the AirWave Wireless Management Suite: AirWave Management Platform (AMP), RAPIDS, Visual RF, network health diagnostics, client troubleshooting, alerts and reporting. In this course, you learn about AirWave?s capabilities in troubleshooting network health and client status via the various stages of association and authentication, as well as redundancy and master consoles for large networks. Introduction to AWMS Airwave Platform. Features and Benefits of AMP RAPIDS and Visual RF. Airwave products. Basic operations using AWMS Installing AWMS Installing AMP. Hardware requirements. Cent OS and AWMS software. Basic configuration steps. Upgrade AWMS software. Licensing AWMS. AWMS documentation Adding Device to AWMS Folders and Groups. Adding devices general process. Manually adding devices. Device discovery and managing device discovery. Moving a device to a folder. Troubleshooting IAP Organizaion and Groups Overview of IAP.Airwave integration. Golden configuration. IAP Organization options. IAP Whitelist Using Visual RF and Visual RF Plan Navigation. Setup. Heat-maps and location information. Import floorplan graphics. Plan deployments. Provision APs. Manage Visual RF performance Network Health Diagnostics page indicators. Network performance tabs. Source of issues. Network issues Troubleshooting Clients and Wireless Networks Searching for users and Diagnostics tab. Client issues. Network issues. AP issues. Switch/Controller issues. General Issues Rogue Detection and Using RAPIDS Why use RAPIDS. Threat Detection Methods. Rules. Classifications. IDS Events Report. New Rogue Devices Report. Visualization. PCI Compliance.WMS Offload Managing Administrative Access, Alerts, Triggers and Reporting Configure role-based administrative use access to the AMP system. Triggers. Alerts. Define and generate reports Scalability and Redundancy VM Redundancy. Failover for Redundancy. Master Console for large deployments. Multiple AMP Server deployments. Large Deployment example System Administration AMP Maintenance. Device Maintenance Wired Device Management Monitoring wired devices in AWMS. Wired device port and interface information. Wired device bandwith statistics and counters. Managing and configuring wired devices via AWMS templates AirWave Aruba Groups How AWMS configures devices. Using groups to control policies. Creating and controlling groups. Basic Group Design.Configuration Audits IAP Template Configuration Fetching a Template. Template Variables. Templates Configuration IAP GUI Configuration Golden configuration. GUI mode. GUI configuration Additional course details: Nexus Humans Managing Campus Networks with Aruba AirWave, Rev. 19.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Campus Networks with Aruba AirWave, Rev. 19.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following participants: Cloud architects, administrators, and SysOps/DevOps personnel Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview This course teaches participants the following skills: Understand how software containers work Understand the architecture of Kubernetes Understand the architecture of Google Cloud Platform Understand how pod networking works in Kubernetes Engine Create and manage Kubernetes Engine clusters using the GCP Console and gcloud/ kubectl commands Launch, roll back and expose jobs in Kubernetes Manage access control using Kubernetes RBAC and Google Cloud IAM Managing pod security policies and network policies Using Secrets and ConfigMaps to isolate security credentials and configuration artifacts Understand GCP choices for managed storage services Monitor applications running in Kubernetes Engine This class introduces participants to deploying and managing containerized applications on Google Kubernetes Engine (GKE) and the other services provided by Google Cloud Platform. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as pods, containers, deployments, and services; as well as networks and application services. This course also covers deploying practical solutions including security and access management, resource management, and resource monitoring. Introduction to Google Cloud Platform Use the Google Cloud Platform Console Use Cloud Shell Define cloud computing Identify GCPs compute services Understand regions and zones Understand the cloud resource hierarchy Administer your GCP resources Containers and Kubernetes in GCP Create a container using Cloud Build Store a container in Container Registry Understand the relationship between Kubernetes and Google Kubernetes Engine (GKE) Understand how to choose among GCP compute platforms Kubernetes Architecture Understand the architecture of Kubernetes: pods, namespaces Understand the control-plane components of Kubernetes Create container images using Google Cloud Build Store container images in Google Container Registry Create a Kubernetes Engine cluster Kubernetes Operations Work with the kubectl command Inspect the cluster and Pods View a Pods console output Sign in to a Pod interactively Deployments, Jobs, and Scaling Create and use Deployments Create and run Jobs and CronJobs Scale clusters manually and automatically Configure Node and Pod affinity Get software into your cluster with Helm charts and Kubernetes Marketplace GKE Networking Create Services to expose applications that are running within Pods Use load balancers to expose Services to external clients Create Ingress resources for HTTP(S) load balancing Leverage container-native load balancing to improve Pod load balancing Define Kubernetes network policies to allow and block traffic to pods Persistent Data and Storage Use Secrets to isolate security credentials Use ConfigMaps to isolate configuration artifacts Push out and roll back updates to Secrets and ConfigMaps Configure Persistent Storage Volumes for Kubernetes Pods Use StatefulSets to ensure that claims on persistent storage volumes persist across restarts Access Control and Security in Kubernetes and Kubernetes Engine Understand Kubernetes authentication and authorization Define Kubernetes RBAC roles and role bindings for accessing resources in namespaces Define Kubernetes RBAC cluster roles and cluster role bindings for accessing cluster-scoped resources Define Kubernetes pod security policies Understand the structure of GCP IAM Define IAM roles and policies for Kubernetes Engine cluster administration Logging and Monitoring Use Stackdriver to monitor and manage availability and performance Locate and inspect Kubernetes logs Create probes for wellness checks on live applications Using GCP Managed Storage Services from Kubernetes Applications Understand pros and cons for using a managed storage service versus self-managed containerized storage Enable applications running in GKE to access GCP storage services Understand use cases for Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Bigtable, Cloud Firestore, and Bigquery from within a Kubernetes application
Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for application programmers who need to write embedded SQL COBOL or PL/I programs in either a DB2 9 or DB2 10 for z/OS environment. Overview Incorporate static SQL statements in an application program Prepare the program for execution Validate execution results are correct Produce code to support multiple rows being returned from the database manager using cursors Identify considerations regarding units of work, concurrency, and restart of programs Identify differences between static and dynamic SQL Provide test data for applications Discuss program and DB2 options relative to performance of static SQL This course enables you to acquire the skills necessary to produce application programs that manipulate DB2 databases. Emphasis is on embedding Structured Query Language (SQL) statements and preparing programs for execution. CV720G;CF82G;DB2 Concepts Identify DB2 family products Explain DB2 workstation component functions Identify DB2 objects Identify the key differences between static SQL and other application alternatives for accessing DB2 data Program Structure I Embed INSERT, UPDATE, DELETE and single-row SELECT statements in application programs Effectively communicate with DB2 when processing NULL values and determining success of statement execution Demonstrate use of DB2 coding aids Code CONNECT statements within an application program Identify connection types and impacts on a unit of work Program for the Call Attach Facility (CAF) Program Preparation Identify the additional steps necessary to prepare a program that contains embedded SQL for execution Describe the functions of the DB2 PRECOMPILE and BIND processes Describe factors relevant to the BIND process, including RUNSTATS positioning, package status, parameters, and authorization requirements Program Structure II Use DECLARE, OPEN, FETCH, and CLOSE CURSOR statements to handle select criteria that may return multiple rows in application programs Issue positioned UPDATE and DELETE statements Identify how scrollable cursors can be used Recovery and Locking Concepts Define a unit of recovery Identify the basic locking strategies used by DB2 Dynamic SQL Introduction Describe the difference between static and dynamic SQL List the types of dynamic statements Code dynamic SQL in a program Managing Test Data Identify methods to insert data into a table Use the LOAD or IMPORT utility Identify the purpose of the RUNSTATS utility Identify the purpose of the REORG utility Performance Considerations Use programming techniques that enhance DB2 application performance by following general guidelines, using indexable predicates, and avoiding unnecessary sorts Identify the access paths available to DB2 List common causes of deadlocks and avoid such causes when possible Use the EXPLAIN tools as aids to develop applications that emphasize performance Additional course details: Nexus Humans CV722 IBM DB2 11 for z/OS Application Programming Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV722 IBM DB2 11 for z/OS Application Programming Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for individuals who may need to present information effectively in a professional environment. Overview Define what makes a presentation effective. Plan presentations. Design a presentation framework. Develop the presentation body. Create supporting materials. Prepare for your presentation. Deliver presentations. Conduct a question-and-answer session. Deliver group presentations and virtual presentations. The ability to deliver presentations is vital to achieving advancement for yourself and for your ideas. Few skills in life will contribute to your success as much as presentation skills. Without a dynamic and coherent presentation, even stellar ideas can fail to convince your audience. In this course, you will learn to organize your ideas to create coherent and convincing oral presentations, while also utilizing available visual aids and using public-speaking techniques to strengthen your delivery. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. Prerequisites To ensure your success, you will need to have experience writing in a professional context and creating presentations using Microsoft Office PowerPoint. 1. Defining Presentation Effectiveness Identify Qualities of Effective Presentations Evaluate Yourself as a Presenter 2. Planning Presentations Analyze the Audience Establish Your Presentation\'s Objectives 3. Designing the Presentation Create the Presentation Structure Organize the Presentation Body Write the Conclusion First Write the Introduction 4. Developing the Presentation Body Select Evidence Write the Presentation Body Create Visuals 5. Creating Supporting Materials Create a Slide Deck Create Speaker Aids Create Audience Handouts 6. Preparing for Your Presentation Rehearse the Presentation Plan Event Logistics 7. Delivering Presentations Connect with Your Audience Present Powerfully Utilize a Slide Deck Effectively 8. Conducting a Question-and-Answer Session Answer Questions Handle Challenging Questions 9. Presenting in Common Business Scenarios Plan and Deliver a Virtual Presentation Plan and Deliver Group Presentations 10. Key Course Information This course focuses on the skills necessary to prepare and deliver an effective presentation; that being said, the learner will not be creating, delivering, or designing a specific presentation from start to finish in this course (this course only provides the foundational knowledge for doing this work back at the office). This course consists of instructor lecture along with course activities corresponding with the main course objectives. In terms of the course activities, 50% will be discussion based - 25% will be in a group-work format - and 25% will be hands-on/involve a digital tool, such as a PowerPoint or Word file. The intent is for students leaving this course to take the skills learned and apply them to their efforts of creating more effective presentations upon returning to the workplace. Additional course details: Nexus Humans Effective Presentations (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Effective Presentations (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This beginning DB2 basic course is for z/OS database administrators who need to acquire the basic skills required to administer a DB2 database in a z/OS environment. Overview Describe several services provided in a z/OS environmentExplain workloads in the batch environmentExplain workloads in the online environmentDescribe job roles in a z/OS environmentLog On to TSO/ENavigate TSO/E and ISPFUse TSO commandsSetup and utilize JCL (Job Control Language)Utilize SDSFDescribe the different types of data sets in a z/OS environmentAllocate data sets and list data set information and contentCreate and modify data set contentGive an overview of the DB2 9 environmentDescribe and utilize DB2 ObjectsDescribe and utilize several DB2 UtilitiesDescribe the DB2I (DB2 Interactive Facility) environmentUse SPUFI (SQL Processing Using File Input) to compose and execute SQLSetup and execute DB2 CommandsUnderstand DB2 LoggingDescribe DB2 program preparation processUnderstand DB2 startup and shutdownUnderstand and utilize DB2 recovery strategies This course is intended for students looking to develop fundamental skills or recognition through lectures and hands-on exercises of TSO/E and ISPF, data sets, DB2 objects, Structured Query Language, DB2 commands, JCL and SDSF. Day 1 Welcome Unit 1: Introduction Unit 2: TSO/E and ISPF Exercise 1: TSO and ISPF Exercise 1 Review Unit 3: Data Sets (Data Sets and Sequential Data Sets) Exercise 2: Sequential Data Sets Exercise 2 Review Day 2 Unit 3: Data Sets (Partitioned Data Sets) Exercise 3: Partitioned Data Sets Exercise 3 Review Unit 3: Data Sets (VSAM Data Sets) Exercise 4: VSAM Data Sets Exercise 4 Review Unit 4: JCL and SDSF Exercise 5: JCL and SDSF Exercise 5 Review Day 3 Unit 5: DB2 Relational Database Concepts Unit 6: Structured Query Language (SQL) and SPUFI Exercise 6: SQL and SPUFI Exercise 6 Review Unit 7: DB2 Objects (Databases and Table Spaces) Exercise 7: Databases and Table Spaces Exercise 7 Review Unit 7: DB2 Objects (Tables, Indexes, and Views) Exercise 8: Tables, Indexes, and Views Exercise 8 Review Day 4 Unit 7: DB2 Objects (Qualified Names, Implicit Object Creation, and SQL Statements) Exercise 9: Qualified Names, Implicit Object Creation, and SQL Statements Exercise 9 Review Unit 8: The DB2 System Exercise 10: The DB2 System Exercise 10 Review Unit 9: DB2 Commands and Program Preparation Exercise 11: DB2 Commands Exercise 11 Review Day 5 Unit 10: DB2 Utilities Exercise 12: DB2 Utilities Exercise 12 Review Unit 11: DB2 Shutdown, Startup, and Recovery Exercise 13: DB2 Recovery Exercise 13 Review Unit 12: Course Summary Additional course details: Nexus Humans CV041 IBM z/OS and DB2 Basics for DB2 for z/OS DBA Beginners training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV041 IBM z/OS and DB2 Basics for DB2 for z/OS DBA Beginners course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Change Managers: Responsible for documentation, approval and change processes System Landscape Architects: Responsible for the design of the transport landscape topology System Administrators: Responsible for executing transports Development Managers: Responsible for performing development changes Application Manager: Responsible for approving and performing changes in an application Support Manager and members of the customer's SAP competence center: Responsible for Reporting and Diagnostics capabilities Partners and System Integrators Overview This course will prepare you to: Describe the concept and methods of E2E Change Control Management. Leverage the SAP Solution Manager 7.2 as application platform for E2E Change Control Management. In this course you will learn how change control management coordinates changes that are introduced into a software landscape so that the changes do not conflict with each other and how to make sure the changes are executed without disrupting ongoing business. This results in improved quality of the software landscape, higher availability of IT solutions, and lower total cost of ownership. Also important, change control management ensures that the changes introduced remain transparent, traceable and are made available for reporting and change analysis. Becoming adept at change control management requires skill in the efficient use of standardized methods and procedures. In this ?how to use? training, SAP imparts best-in-class knowledge of solution operations. The End-to-End Change Control Management course introduces participants to what change control management is and the standard tools used to accomplish it, tools provided by SAP Solution Manager. Introduction to E2E Change Control Management Explain the scope of End-to-End Change Control Management Explain the role of SAP Solution Manager to manage changes in your solution landscape Enhanced Change and Transport System Explain how the Enhanced Change and Transport System (CTS+) works Understand the basic concepts of Enterprise Portal and how it is supported by CTS+ Describe the best practices for the setup and usage of CTS+ in different scenarios Configuration Validation Understand the concepts and architecture of E2E Change Diagnostics Find current configuration information with the Change Reporting tool Find recent changes in the solution landscape with the E2E Change Analysis tool Compare multiple systems with the Configuration Validation tool Create targets, use operators and run validation reports Know how to use predefined reports in the report directory Transport and Execution Analysis Service and Transport and Execution Analysis Service for Projects Know how to run and use this self-check services within SAP Solution Manager Understand how to interpret the software change management KPIïs that are collected for your landscape Software Change Strategy Understand the limitations of a three-system landscape Understand the benefits of bundling changes in cycles and synchronized releases Transport Management with SAP Solution Manager Understand the change control landscape concept for transport management in SAP Solution Manager 7.2 Understand the usage of critical objects, cross system object locking and downgrade protection Know how to use retrofit in a dual landscape Understand the features of cCTS, which can be used for Quality Gate Management and Change Request Management parallel to CTS. Quality Gate Management Explain the concept of Solution Transports and Track Synchronization Setup and use Quality Gate Scenario as a central Transport Management Tool Create and release transport requests centrally in SAP Solution Manager for ABAP and Non-ABAP environments Know how to work within the Quality Gate Scenario Change Request Management Understand the different use cases for Change Request Management Describe the various elements of Change Request Management as part of SAP Solution Manager Understand SAP?s best practices for transport management which are implemented in Change Request Management Know how to work with Change Request Management Release Management Learn how to manage Release Management with SAP Solution Manager Understand how to manage the successful deployment of all related changes into the productive environment.
The aim of this course is to provide an overview of the principles and practice for leading and managing a portfolio of smaller projects in a multi-project / multi-task environment. It presents a range of practical methods and techniques relevant to the smaller project scenario, using exercises and case studies to show how these can be applied. The scope of the programme includes: The course also emphasises the importance of the leadership and team-working skills needed by project managers and team members in carrying out their roles. The principal training objectives for this programme are to: Explain and demonstrate the key principles of successful project management Demonstrate a range of useful project management tools and techniques Define the role, and help participants understand the skills required by, the project leader Provide a structured framework to help participants manage multiple projects Identify opportunities to improve project management within the organisation DAY ONE 1 Introduction (Course sponsor) Why this programme has been developed Review of participants' needs and objectives 2 Managing smaller projects Projects and project management Lessons from past projects; the essential requirements for success Differences between projects; characteristic project life cycles Key issues and challenges of smaller projects The multi-project world; project portfolio management 3 Project exercise Syndicate teams plan and manage a small project Review of the project exercise: What are the keys to successful management of small projects? 4 Setting up the project Getting organised Managing the definition process Identifying and managing project stakeholders Working with the customer to define the scope and agree deliverables 5 Case study 1 Defining the project scope and deliverables Syndicate teams define the scope and deliverables for a typical project 6 Project planning The importance and cost benefit of effective planning Planning the plan; deciding how detailed a plan to create Packaging the work and estimating timescales and costs Developing project / resource schedules; setting milestones for control v Identifying and managing critical path activities 7 Case study 2 Creating the project plan Syndicate teams develop and analyse the project plan DAY TWO 8 Managing project risks Identifying risks to the project outcome, timescale and cost Evaluating risks and adopting an appropriate risk strategy Defining risk ownership; keeping a simple risk log Keeping risk management up to date; staying pro-active Integrating planning and risk management 9 Project control Managing change, minimising scope creep Selecting the data needed to provide early warning of problems Monitoring performance easily with 'S' curves and slip charts Using trend forecasting to assess true project status Running project review meetings 10 Managing a multi-project portfolio Understanding the world of multiple projects Establishing ownership of project / programme management Classifying projects and creating the 'master schedule' Defining and applying project lifecycle management Resource management: essential pre-requisites and mechanisms Project prioritisation criteria and techniques; pain / gain analysis 11 Managing the multi-project team Characteristics of small project teams / part-time team membership Clarifying line and project management responsibilities Implementing effective manpower planning Establishing professional working practices in the team Developing project management competences in the team Establishing team roles and integrating team members 12 Course review and transfer planning (Course sponsor present) Identify actions to be implemented individually Identify corporate opportunities for improving project management Sponsor-led review and discussion of proposals Conclusion
A question of trust. Leadership implies followership. And that means trust. Because who's going to follow a leader they don't trust? This programme takes a values-driven approach to leadership. It gets current and aspiring leaders to hold up the mirror to themselves and to see their reflections as leaders of people. It asks them whether what they see justifies their view of themselves as leaders. It helps them understand just what it takes to be an effective leader. And it does so in a highly practical, constructive manner. It helps the course participants to truly understand the core skills of effective leadership. It focuses on the difference between leadership and management, defining what high performing teams do and how they do it. It helps people to see their teams from different perspectives, allowing them to adapt their styles to maximise team outputs. And it explores concepts such as emotional intelligence, authentic leadership and the RAIV approach (relationships-achievement-independence-vocation) to help explore underlying values and use them to drive effective leadership. Because what worth do our values have unless we put them into practice? The course will help you:• Appreciate the key skills a leader needs to be effective• Understand what the organisation expects of you as a leader• Recognise your leadership style and the impact it has on others• Consider your role models - who inspires you?• See leadership from the 'followers' perspective - how do you like to be led?• Discover what holds you back - limiting beliefs• Examine your core values -do they support your ambition?• Explore the concept of Emotional Intelligence - how do we manage ourselves?• Discover how to lead through change• Explore the concept of 'Authentic Leadership' - consider how it can work for you• Practice some of the skills essential to motivating and influencing for success• Use the RAIV approach to generating enthusiasm and commitment• Plan how best to 'walk the leadership talk' - in your role, in your organisation Above all, this course will help you put theory into practice, values into actions, in a mature, considered, effective way. Day 1 1 Welcome and introduction Participants are welcomed to the programme and invited to share their personal objectives and people challenges Participants given an action plan template to complete throughout the workshop Participants required to bring an inspirational quote to share with the group 2 What is leadership? The concept of 'leadership' The role of a leader Skills assessment for all participants# Leadership v Management Assess your team effectiveness 3 Your leadership style Leadership questionnaire You and your role models Push v Pull styles of leadership Empowerment v Control Team goals and role profiling Day 2 1 You, the leader Your core values Your communication style Situational leadership The Emotional Bank Account Buy Me Today 2 Are you Emotionally Intelligent? (EI) What is emotional intelligence? Self-assessment exercise Manage your emotions Nine strategies for promoting EI 3 Leading through change Identify the major changes affecting you / your team Types of change The roles of resistance How safe are you to talk to? Forcefield Analysis Day 3 1 Authentic Leadership (AL) What is AL? Managing perceptions is managing their truth A leadership challenge 2 Motivating and influencing for success What motivates you? Motivational theory Leading by example Influencing skills required Influencing styles The influence challenge! 3 Creating enthusiasm and commitment The RAIV approach (relationships-achievement-independence-vocation) Building self-worth What drives your team? Your leadership legacy Your commitment to leadership