Mergers and Acquisitions - Virtual Learning Why Attend This practical course covers the key steps in the Mergers and Acquisitions(M&A) process, from the initial step of valuing the shares in a company through to closing the deal. Whether or not participants practice M&A, this course will provide them an insider's look into what is an undeniable major force in today's corporate arena. This course will give participants an A-Z understanding of the M&A process and the ability to evaluate whether a merger or acquisition fits with their organization's strategy. As a result they will identify the most lucrative M&A opportunities, select the best partners and get the maximum reward from the deal. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises, and regional and international case studies. Course Objectives By the end of the course, participants will be able to: Identify attractive Mergers and Acquisitions (M&A) opportunities Formulate the initial steps and the preliminary agreements for a merger or acquisition Carry out a full due diligence into the state of affairs of a target company Understand the Share Purchase Agreement (SPA) and the Asset Purchase Agreement (APA) Take an active role in the exchange and completion stages of a merger or acquisition Be an effective part of the post-merger integration to ensure the smooth running of the new organization Target Audience This course is suitable for anyone involved in the identification, planning and execution of a Mergers and Acquisitions opportunity. This includes, CEOs, managing directors, general managers, financial directors, accountants, board members, commercial directors, business development directors, strategy planners and analysts, and in-house council. Target Competencies Identifying M&A opportunities Due Diligence Organizing Acquisitions Structuring Negotiations Post-acquisition Integration Post-acquisition Audit Note The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. Fundamentals of Mergers and Acquisitions ( M&A) Distinction between Mergers and Acquisitions Types of Mergers & Acquisitions Horizontal Vertical conglomerate Knowledge of areas of law required in M& A The Preliminary documents required in M&A Heads of terms- legally binding? Confidentiality - do they need to be in writing? Lockout/exclusivity agreements- requirements for enforceability How to structure the Acquisition Share sale Advantages and disadvantages from the buyer's perspective Advantages and disadvantages from the seller's perspective Business sale Advantages and disadvantages from the buyer's perspective Advantages and disadvantages from the seller's perspective Hive down A combination of assert sale and share sale Looking at different valuation techniques Real Estate Value Relief from Royalty Discounted Cash Flow Market Multiples Dividend Yield Net Assets The Due Diligence Process What is it? Why do it? Scope of due diligence Legal Financial Commercial Operational The Purchase Agreements Share Sale Purchase Agreement v Asset Purchase Agreement v Business Purchase Agreements Provisions in a Share Purchase Agreement Importance of warranties and indemnities in purchase agreements Negotiating warranties from a Share Purchase Agreement Contractual protection for the seller Disclosure letter Intellectual property What happens to IP in M&A Stages of the IP during the M&A process Dispute Resolution in M&A Litigation Arbitration Mediation The Exchange and completion stages of M&A Seller's document Buyer's document The auction process The relevant stages Advantages and disadvantages from the buyer's and the seller's perspective
In this course, you will learn advanced Scrum techniques based on real-world examples and become a Scrum Master. Not only this but you will also be able to educate and influence others by explaining how to use Scrum and become a Scrum master in 7 simple steps that includes 72 reasons to anyone at any level in the business.
This can be introduced in one day but is better offered over a series of twilight or half day workshops with individualised coaching. We will provide background context for this approach and will directly model the process with real live issues facing participants. So bring your most challenging concerns to this training. Course Category Behaviour and Relationships Visioning and Problem Solving Team Building and Leadership Description ‘Insights and Solutions Circle’ a new expanded version of Solution Circle that uses some of the best of the Circle of Adults process. Its a 50 minute process and works really well with families and professionals! Contact us today for a live demo or training… Steps Problem presented Questions asked Theories Shared Strategies listed Dialogue regarding selected strategies Next steps Testimonials Excellent! It was great how we all cam up with ideas and theories including us parents I wish all meeting about my child’s behaviour were like this The whole world is going to be interested in this… The empowerment is great The buzz after the meeting says it all. Learning Objectives Deeper understanding of what is actually happening underneath the presenting behaviour Increased confidence in managing and building relationships with challenging pupils in mainstream schools Learn process for locating richer and wider range of practical strategies to impact on behaviour problems Deeper understanding of yourself and the psychodynamic processes happening between pupils, staff and pupils and families Opportunity to reflect on professional practice Mutual support established with other front line practitioners Who Is It For ? Team Around the Child agencies Parents and Professional working together Families Multi Agency Teams Social workers CAMHS teams Year Managers Primary and secondary staff teams Early Years and School based Practitioners Heads and Deputies SENCOs Advanced Skills Teachers Primary and secondary teachers Local Authority Support Services Course Content This can be introduced in one day but is better offered over a series of twilight or half day workshops with individualised coaching. We will provide background context for this approach and will directly model the process with real live issues facing participants. So bring your most challenging concerns to this training. The course answers the questions: Can we find an alternative to permanent exclusion or special unit or school placement? Cannot understand why a child is behaving as they do? Struggling with a child for whom praise is ineffective? Feeling isolated in your responses to a child’s needs? Worried about where your instinctive reactions are leading you? Cannot seem to get any consensus view of a young person’s behaviour/needs amongst all the family and professionals involved – is everyone pulling in different directions? We will cover: Setting the tone Background and detailed teaching of process Inclusion values underpinning this work Graphic and process facilitation skills Processes modelled and opportunities to try process out with coaching Practical setting up of insights and solutions circles Lessons learned If you liked this you may like: CIRCLES OF ADULTS…
RADIUS training course description A fast paced hands-on introduction to RADIUS. Moves from installation and configuration through to packet analysis and accounting. Practical exercises are spread throughout the course to maintain student interest. What will you learn Configure PPP and PAP/CHAP. Install and configure RADIUS servers. Describe how RADIUS works. Setup RADIUS accounting. Analyse RADIUS packets. Troubleshoot RADIUS installations. RADIUS training course details Who will benefit: Network Administrators. Support personnel. Anyone who will be working with RADIUS. Prerequisites: Knowledge of the TCP/IP protocols would be advantageous. Duration 2 days RADIUS training course contents What is RADIUS? AAA services, Authentication, Authorisation, Accounting, local AAA services, remote AAA services, What is RADIUS? RADIUS as a protocol, RADIUS as an architecture, RADIUS as a standard. Installing RADIUS RADIUS platforms, RADIUS servers, client server communications, services, daemons. Hands on Installing RADIUS and testing with NTRadPing. Server configuration Configuring clients on the server, shared secrets, usernames and passwords. IP address pools. Hands on Configuring a server and testing with NTRadPing. Client configuration Example clients, client configuration steps, enabling RADIUS, pointing clients to the server, shared secrets, example Cisco authentication, example Cisco authorization. Hands on Configuring clients for RADIUS. How RADIUS works RADIUS architecture, RADIUS and authentication, PPP, PAP, CHAP, RADIUS SUCCESS, RADIUS FAILURE, the RADIUS protocol stack, the RADIUS protocol, the RADIUS header, RADIUS codes, RADIUS attributes, ACCESS-REQUEST example, ACCESS-ACCECPT example, CHAP example, proprietary attributes, using unassigned type codes, RADIUS attribute 26, Cisco specific attributes. Hands on Analysing RADIUS packets, configuring PPP CHAP to work with RADIUS. RADIUS accounting Simplified operation, Accounting codes, Accounting attributes, client and server configuration for accounting. Hands on Configuring RADIUS accounting. RADIUS architectures Traditional architecture, multiple RADIUS servers for resilience, Proxy RADIUS servers, Realms, RADIUS in VPNs, RADIUS with 802.1x. Hands on Using multiple RADIUS servers, Proxies. Troubleshooting RADIUS General problem solving, basic tools, RADIUS troubleshooting, Common configuration errors, log files, RADIUS design and performance. Hands on Fixing RADIUS problems.
Duke of Ed Adventurous Journey Risk Management Running A Duke of Ed program? If so, you need to understand what risks are involved and how to effectively manage them. This course steps you through exactly what you need to know when planning and running an Adventurous Journey with your students.
AgileSHIFT® AgileSHIFT® is the change your organization needs: the business landscape is changing and transformation is necessary. But it is also hard. This program is aimed to drive transformational change throughout an organization. This new enterprise agility guidance empowers individuals to use a lightweight tailorable framework to understand, engage with, and champion change by embracing agile and lean ways of working. Taking a holistic view of an organization, AgileSHIFT® will create and support the champions of change your business needs in order to thrive in an increasingly competitive and disruptive workplace. What You Will Learn At the end of this program you will be able to: Identify why organizations need to create a culture of enterprise agility in response to a changing context Recognize how to think and work differently to enable change Explore agile and lean thinking concepts and how they relate to running and changing your organization Utilize key concepts of the AgileSHIFT® framework Describe the AgileSHIFT® delivery approach Getting Started A changing context Enterprise agility The Purpose of AgileSHIFT® The AgileSHIFT® Framework AgileSHIFT® principles AgileSHIFT® practices AgileSHIFT® roles AgileSHIFT® workflow Benefits of AXELOS.com Summary and Next Steps
AgileSHIFT®: In-House Training AgileSHIFT® is the change your organization needs: the business landscape is changing and transformation is necessary. But it is also hard. This program is aimed to drive transformational change throughout an organization. This new enterprise agility guidance empowers individuals to use a lightweight tailorable framework to understand, engage with, and champion change by embracing agile and lean ways of working. Taking a holistic view of an organization, AgileSHIFT® will create and support the champions of change your business needs in order to thrive in an increasingly competitive and disruptive workplace. What You Will Learn At the end of this program you will be able to: Identify why organizations need to create a culture of enterprise agility in response to a changing context Recognize how to think and work differently to enable change Explore agile and lean thinking concepts and how they relate to running and changing your organization Utilize key concepts of the AgileSHIFT® framework Describe the AgileSHIFT® delivery approach Getting Started A changing context Enterprise agility The Purpose of AgileSHIFT® The AgileSHIFT® Framework AgileSHIFT® principles AgileSHIFT® practices AgileSHIFT® roles AgileSHIFT® workflow Benefits of AXELOS.com Summary and Next Steps
Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices
The ability to effectively manage conflict is a core competency in the 21st-century workplace.