Many managers question the value of appraisal programmes and many line managers believe appraisals are unduly time-consuming and bureaucratic. Yet the appraisal is a vital starting point when it comes to managing performance effectively and it is vital that managers appreciate this. Handled well, the benefits of formal appraisals are enormous. This thoroughly practical workshop has been designed to give line managers the knowledge, skills and confidence to deliver a well-structured appraisal - even in the most challenging circumstances. This course will help participants: Appreciate the benefits of the appraisal process Assess standards of performance objectively Plan and prepare for appraisals effectively Conduct a well-structured appraisal meeting Acquire the essential skills required for effective appraisals Improve their ability to discuss difficult issues more confidently Identify training and development requirements Agree clear and measurable development objectives Complete essential paperwork Understand the need to facilitate continual informal dialogue between appraisals 1 Introduction and course objectives 2 The appraisal process The aim of the appraisal process Understanding the bigger picture - the appraisal process as part of the employee development process The benefits of the appraisal process Common pitfalls Five steps to an effective performance appraisal 3 Step 1 - Assessment Using job standards as the basis for objective assessment Assessment of previous objectives 4 Step 2 - Preparation Documentation required Data on each appraisee Planning the meeting 5 Step 3 - The meeting The skills of appraisal interviewing The structure of the appraisal interview Dealing with poor performance and difficult situations Taking notes and completing documentation 6 Step 4 - Planning ahead and objective setting Identifying action to improve performance and enhance skills Establishing relevant training needs Agreeing SMART performance objectives Formulating a personal development plan 7 Step 5 - Action after the interview Essential paperwork Follow-up and action required between appraisal interviews Continuing informal dialogue 8 Video case study Bullets 9 Conclusion Course review / discussion Preparation of action plans for building on the skills learnt Close
M&O of engineering plant and services is becoming more important to the success of the core business. To select the right M&O technique for specific plant and equipment it is necessary to know what options are available, what they deliver and how they should be implemented. This course will help you consider options and techniques that provide best value based on that thorough understanding of the business need. M&O will increasingly be required to demonstrate it is delivering the optimum of cost and value and the main purpose of the course is to show how this can be achieved. Note: this is a purely indicative list of topics that can be covered. The content, duration, objectives and material used would all be adapted to match your specific requirements. This course will help you: Determine what the business needs from the M&O service Determine the cost and value of the various M&O options Prepare and present the business case for the selected M&O strategy Introduce meaningful KPIs based on performance-based service by the M&O provider Undertake a review of current M&O and make recommendations for improvement Introduce energy and carbon management performance criteria in M&O Better deal with project risk and uncertainties Motivate others to deliver a reliable and cost effective M&O service Note: this is a purely indicative list of topics that can be covered. The content, duration, objectives and material used would all be adapted to match your specific requirements. 1 What is maintenance and what is operation? - their relative importance to the business 2 Comparison of the various maintenance options and techniques, including: Planned preventative Run to failure Condition monitoring Business focused Business critical Total productive Reliability centred maintenance 3 Forms of contracts and service, including: Comprehensive Input driven Output driven Limited replacement Performance based M&O 4 Selecting the right options and making the business case 5 Continuous commissioning as a tool for delivering best value 6 Case studies
Health and safety awareness training is mandatory for staff at all levels of an organisation. This is the ideal course to satisfy that requirement - a stimulating 'entry-level' programme explaining how health and safety should be managed in any working environment. The course outlines the basics of health and safety law and how organisations and individuals can become liable for health and safety offences. Roles and responsibilities for health and safety are discussed by reference to the key legislation and the expert trainer will explore with the delegates how these responsibilities are managed in practice in different types of organisation. The principles of risk assessment will be considered and their practical implementation discussed in relation to the management of the various hazards that are likely to be present in a typical workplace. This course will give staff: An understanding of health and safety law, liability and enforcement An explanation of the principles of health and safety management in the workplace and an understanding of who should be responsible for different aspects of health and safety A practical explanation of risk assessment and what constitutes a suitable and sufficient assessment A broad knowledge of the typical hazards in a workplace and how these should be managed 1 Overview of health and safety law Statute and civil law Liability and enforcement Statutory duties Contract law 2 Legislative framework The workplace - extent of responsibility / shared responsibility Relevant legislation 3 Management of Health and Safety Health and Safety at Work etc Act 1974 Management of Health and Safety at Work Regulations 1999 Workplace (Health, Safety and Welfare) Regulations 1992 Accident Reporting (RIDDOR) Consultation with Employees and Safety Committees 4 Risk management within your organisation Business risk management Health and safety risk management The principles of risk assessment Transferring the risk to contractors and third parties 5 Risk assessment exercise - 'Challenge Anneka' 6 Managing the hazards in the workplace Work equipment Lifting equipment Display screens Manual handling Fire Chemicals (COSHH) Personal protective equipment (PPE) 7 Practical exercise - Workplace inspection 8 Questions, discussion and review
If you are interested in improving your vocal abilities while singing Schubert, Schumann or Mendelssohn, our classical singing courses for adults is the perfect choice for you. Enhance both your technical and musical abilities thanks to the support of master singing instructors.
Carried out by qualified instructors, the Manual Handling Training course is designed to cover a number of Manual Handling topics. It will enable the candidate on completion to recognise a manual handling problem. It will give them the tools to be able to initiate a risk assessment and lift or carry in a safe manner. We can deliver these courses in-house or to gain Qualsafe certification. Fully Qualified and Highly Experienced Instructors. Half day course (2-3 Hours). Our courses include the following subject areas: The requirements of the Manual Handling Operations Regulations. The legal requirements to provide Manual Handling Training. Principles of good movement. The anatomy of the spine. Manual Handling related injuries. Mechanics of incorrect and correct manual handling techniques. Practical exercises. Principles of manual handling techniques will include: The task. The load. The working environment. The individual capability. Practical applications of lifting, pushing, pulling and carrying. Risk Assessment and its practical application. There is a Maximum of up to 20 Candidates per Manual Handling training course, however we can run two courses per day with one manual handling instructor. We also have more manual handling instructors available, if it is required. This means we can run courses simultaneously should the facilities be available to do so. The course information is based on the Manual Handling Operations Regulations 1992, amended 2002. It is also covered under the Health and Safety at Work Act 1974. At MHA Training we like to make our Manual Handling Training courses fun and use the best training aids available whilst also covering the serious points of the subject. MHA Training was established in 2008 based at our training centre in Warrington, Cheshire. We provide a wide range of services On-Site also for clients around the North West in areas such as Manchester, Liverpool, Widnes, St Helens, Runcorn, Wigan, Preston and Leeds. Over the years we have expanded and have instructors available for all of our courses Nationwide.
This course is designed for those already using Power BI Desktop and are ready to work with more comprehensive elements of analysing and reporting in Power BI. The course maintains a balanced look at data analysis including the Power Query Editor, with a deep dive into writing DAX formulas, and enhanced dashboard visualisations. The aim of this course is to provide a more complete understanding of the whole Power BI analytics process, by working with business examples that will equip you with the necessary skills to output comprehensive reports and explore Power BI's analytical capabilities in more depth. 1 The Query Editor Grouping rows in a table Split row by delimiter Add days to determine deadlines The query editor 2 Fuzzy Matching Joins Matching inconsistencies by percentage Matching with transformation table 3 The Query Editor M Functions Adding custom columns Creating an IF function Nested AND logics in an IF function 4 DAX New Columns Functions Including TRUE with SWITCH Using multiple conditions The FIND DAX function The IF DAX function Logical functions IF, AND, OR 5 Editing DAX Measures Making DAX easier to read Add comments to a measure Using quick measures 6 The Anatomy of CALCULATE Understanding CALCULATE filters Add context to CALCULATE with FILTER Using CALCULATE with a threshold 7 The ALL Measure Anatomy of ALL Create an ALL measure Using ALL as a filter Use ALL for percentages 8 DAX Iterators Anatomy of iterators A closer look at SUMX Using RELATED with SUMX Create a RANKX RANKX with ALL 9 Date and Time Functions Overview of functions Create a DATEDIFF function 10 Time Intelligent Measures Compare historical monthly data Create a DATEADD measure Creating cumulative totals Creating cumulative measures Visualising cumulative totals 11 Visualisations In-Depth Utilising report themes Applying static filters Group data using lists Group numbers using bins Creating heatmaps Comparing proportions View trends with sparklines 12 Comparing Variables Visualising trendlines as KPI Forecasting with trendlines Creating a scatter plot Creating dynamic labels Customised visualisation tooltips Export reports to SharePoint
Duration 2 Days 12 CPD hours This course is intended for Todas aquellas personas que tengan relaci¢n con proyectos que requieran de una gesti¢n gil: Clientes, Promotores, Project Managers, Proveedores o Subcontratas, Equipo del Proyecto: Perfiles Tâcnicos, Perfiles de apoyo o Staff. En definitiva a cualquier persona que tenga relaci¢n con un proyecto gil. Overview Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?mâtodo??Desde finales del siglo pasado, se viene analizando la gesti¢n de proyectos cl sica conocida como Gesti¢n de Proyectos Predictiva, comprobando que no puede/debe ser aplicada a todo tipo de proyecto. Existen multitud de proyectos donde el nivel de detalle de las caracter¡sticas de los entregables est asociado al concepto IKIWISI (I?ll Know It When I See It -> Lo sabrâ cuando lo vea), otros proyectos que tienen muy bien definido el objetivo, pero dadas unas necesidades cambiantes, la manera de abordarlo puede ser bien diferente, otros proyectos que? En definitiva se ha puesto de manifiesto que la gesti¢n de proyectos predictiva, no es del todo til para estos tipos de proyecto. Durante este curso, analizaremos otra forma de hacer las cosas. Veremos c¢mo abordar estos otros tipos de proyectos que requieren de una gesti¢n diferente: una Gesti¢n µgil. Existen proyectos peque¤os, otros enormes, con una complejidad tecnol¢gica extrema otros en cambio muy sencillos. ¨Debemos gestionar todo tipo de proyectos con el mismo ?mâtodo?? Introducci¢n a Agile y Scrum Primeros conceptos Metodolog¡as µgiles Agile Manifesto y Principios µgiles ¨Quâ hay bajo el paraguas de Agile? Las 3 grandes aproximaciones a Agile: LEAN, XP y Scrum El entorno de trabajo µgil Roles µgiles Trabajando de forma gil Definir la Visi¢n del Producto Planificar la Release y los Sprints El trabajo del d¡a a d¡a La revisi¢n del producto Preparando la entrega Gestionando de forma gil Gesti¢n del Alcance y los Proveedores Gesti¢n de Tiempos y Costes Gesti¢n del Equipo y las Comunicaciones Gesti¢n de Riesgos y la Calidad Garantizando el âxito Construir una base s¢lida Impulsar el cambio
Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls
Duration 2 Days 12 CPD hours This course is intended for NetApp Customers, IT Generalists, Academic Alliance Students Overview Explain ONTAP operation system, Use the CLI and OnCommand System Manager to identify storage components, configure storage systems and storage virtual machines for NAS and SAN client access, create FlexVol volumes, qtrees, and LUNs, manage snapshot copies Introduces introductory concepts covered through instructor led discussions and hands-on labs are how to create aggregates, virtual interfaces, snapshots, volumes, qtrees, and storage virtual machines. Getting Started with Data ONTAP List basic storage concepts such as aggregates, RAID groups, volumes, qtrees, and LUNs Describe Data ONTAP features such as Snapshot copies, unified storage, and storage efficiency Describe the similarities and differences between the 7-Mode and clustered Data ONTAP operating systems Use the CLI and GUI for administrative purposes Hardware Basics Describe the NetApp storage system hardware platforms and the types of disks that they support Describe the hardware components of NetApp storage controllers Use OnCommand System Manager or the CLI to identify hardware components in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system Creating & Managing Aggregates Describe aggregates and RAID groups Create aggregates in Data ONTAP operating in 7-Mode Create aggregates in the clustered Data ONTAP operating system Manage aggregates Managing NAS Client Access Configure NAS client access in Data ONTAP operating in 7-Mode Configure data storage virtual machines (SVMs*) for NAS client access in clustered Data ONTAP Create FlexVol volumes and qtrees Managing SAN Client Connections Describe SAN protocol implementation in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system Use OnCommand System Manager to create iSCSI-attached LUNs Use NetApp SnapDrive for Windows to create and format iSCSI-attached LUNs Access and manage a LUN from a Windows host Managing Volumes Explain the relationship between space guarantees, volumes, and aggregates Define thin provisioning and explain how it is used Define deduplication and describe the benefits that it provides Use OnCommand System Manager to set quotas Managing Snapshot Copies Define the function of Snapshot copies Create and delete a Snapshot copy Create Snapshot policies in the clustered Data ONTAP operating system Restore a volume from a Snapshot copy Create FlexClone volume clones that are backed by Snapshot copies Steps to Certification Recall the steps to NetApp Certification
Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce System Architect credential, for consultants or technical experts working to earn their individual Architect Designer credential, and for Salesforce Developers and Administrators looking to expand their overall capabilities with the Salesforce Platform. Overview Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes) to address integration requirements. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, canvas, Workflow outbound, Apex, and Salesforce Connect) to address integration requirements. Recommend the appropriate SSO Flow or OAuth flow to address identity and access management requirements. Dive into the two cornerstone domains of being a System Architect: Integration Architecture, and Identity and Access Management. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing integration and identity solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Integration Capabilities Create, Retrieve, Update, or Delete Records with SOAP API Integrate with Salesforce Using REST API Insert, Update, Upsert, or Delete Large Volumes of Data with BULK API Push Relevant Data to Users in Real Time with Streaming API Send Information to a Designated Endpoint with Outbound Message Integrate Your Apex with an External Service Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Connect Business Processes in Salesforce with Platform Events Publish Change Events with Change Data Capture Integration Patterns Invoke Remote Call-In Patterns Invoke Request and Reply Patterns Invoke Fire and Forget Patterns Synchronize Batch Data Update UI Based on Data Changes Visualize Data Identity Management Review SSO Fundamentals Review Identity Management Review Identity Management Concepts Understand Salesforce as an Identity Provider Accept Third-Party Identity in Salesforce Understand Social Sign-On and Open ID Connect Enable Users to Authenticate with SSO Flows Initiate Flows with IDP Initiate Flows with SP Troubleshoot Identity Issues Authentication Grant Client Application Access with OAuth Flow Generate Access Tokens with Username Password Flow Initiate Web Server Flow Grant Application Access with User Agent Flow Connect to Salesforce Using JWT Flow