
Corporate Training
Coaching and Mentoring
- Overview
- Course Outline
Description
In today’s highly competitive business environment, employees must be managed and developed effectively, which is part of the coaching and mentoring training for modern work skills.
Both coaching and mentoring are essential skills for any leader in an organization.
Objectives
This Coaching and Mentoring training course enables you to build better relationships with your team members through continuous and guided learning. It also helps to develop your coaching or mentoring skills at any level of business. This Coaching and Mentoring training course focuses on developing skills required to create stronger teams that enable organizations to grow.
Learning Outcomes
At the end of the course the participant will be able to:
- Understand coaching and mentoring and the difference between the two approaches
- Applying the coaching and mentoring techniques in different situations
- Practice Train the Trainer techniques
- Understand the relationship between coach and coachee, mentor and mentee
- Design and develop an action plan for coaching and mentorship sessions
Who should attend:
- Professionals at all levels can benefit from this course
- Line managers and senior officers
- HR professionals and managers
- Communication specialists
- Relationship managers
- CEOs and executive managers
- Every person who needs to improve their leadership skills
Course Outline
- Introduction to Coaching
- What is coaching?
- Why coaching is important?
- What is the role of a coach
- Coaching for professional development
- Understand Mentoring
- What is a mentor?
- Role and responsivities of a Mentor
- Benefits of mentoring
- Difference between coach and mentor
- Coaching Techniques
- Importance of planning
- Understanding coaching from the coachee’s perspective
- Building rapport
- Listening is key
- Asking the right questions
- Understanding the importance of different approaches for different team members
- Train the Trainer
- Practice as both coach and coachee
- Understand the relationship between coach and coachee
- Practice change of approach for different individuals and scenarios
- Obtaining feedback and improvement points
- Mentoring Sessions
- Importance of pre-planning a mentoring session
- The structure of a session
- Different styles of mentoring
- Selecting the correct style for your mentee
- Creating a Mentoring Action Plan
- Consider the needs of each team member
- Create individual action plans
- Continual Development
- Importance of keeping track of individual development
- Putting the action plan into place
- Following-up on mentoring sessions
- Asking for feedback
- Continually changing processes to find the most effective options for each team member
Security Management
Security Management is the identification of an organization’s assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
Course Outline
Threats and Vulnerabilities
- Threats
- Physical Threats
- Vulnerabilities
The Information Security Manager
- Information Security Job Roles
- Training, Experience, and Professionalism
- Started in Security Management
Organizational Security
- Security in Organizational Structures
- Working with Specialist Groups
- Working with Standards and Regulations
- Working with Risk Management
- Working with Enterprise Architecture
- Working with Facilities Management
Information Security Implementation
- Integration with Risk Management
- Secure Development
- Organizational Interfaces
- Post Implementation
Standards, Frameworks, Guidelines, and Legislation
- Why Do We Need Standards?
- Legislation
- ISO/IEC 27000 Series of Standards
- Business Continuity
- Risk Management Standards
Protection of Information
- Information Classification
- Identification, Authentication, and Authorization
Protection of People
- Human Vulnerabilities
- Building a Security Culture
- Personnel Security Life Cycle
Protection of Premises
- What Is Physical Security?
- Start with a Risk Assessment
- Perimeter Design
- Internal Building Security
Protection of Systems
- Introducing Malware
- Threat Vectors
- Technical Countermeasures
- Network Security
Digital Evidence and Incident Response
- The Digital Forensic Process
- Forensic Readiness
- Incident Response and Digital Investigations
- Investigating a Malware Outbreak
Cloud Computing Security
- Cloud Computing
- Cloud Security
- Cloud Security Architectures
- Old Threat with New Targets
- Virtualization
Secure Systems Development
- Secure Development
- Secure Development Business Processes
- Security Testing
- Auditing
- Overview
Description
In today’s highly competitive business environment, employees must be managed and developed effectively, which is part of the coaching and mentoring training for modern work skills.
Both coaching and mentoring are essential skills for any leader in an organization.
Objectives
This Coaching and Mentoring training course enables you to build better relationships with your team members through continuous and guided learning. It also helps to develop your coaching or mentoring skills at any level of business. This Coaching and Mentoring training course focuses on developing skills required to create stronger teams that enable organizations to grow.
Learning Outcomes
At the end of the course the participant will be able to:
- Understand coaching and mentoring and the difference between the two approaches
- Applying the coaching and mentoring techniques in different situations
- Practice Train the Trainer techniques
- Understand the relationship between coach and coachee, mentor and mentee
- Design and develop an action plan for coaching and mentorship sessions
Who should attend:
- Professionals at all levels can benefit from this course
- Line managers and senior officers
- HR professionals and managers
- Communication specialists
- Relationship managers
- CEOs and executive managers
- Every person who needs to improve their leadership skills
- Course Outline
Course Outline
- Introduction to Coaching
- What is coaching?
- Why coaching is important?
- What is the role of a coach
- Coaching for professional development
- Understand Mentoring
- What is a mentor?
- Role and responsivities of a Mentor
- Benefits of mentoring
- Difference between coach and mentor
- Coaching Techniques
- Importance of planning
- Understanding coaching from the coachee’s perspective
- Building rapport
- Listening is key
- Asking the right questions
- Understanding the importance of different approaches for different team members
- Train the Trainer
- Practice as both coach and coachee
- Understand the relationship between coach and coachee
- Practice change of approach for different individuals and scenarios
- Obtaining feedback and improvement points
- Mentoring Sessions
- Importance of pre-planning a mentoring session
- The structure of a session
- Different styles of mentoring
- Selecting the correct style for your mentee
- Creating a Mentoring Action Plan
- Consider the needs of each team member
- Create individual action plans
- Continual Development
- Importance of keeping track of individual development
- Putting the action plan into place
- Following-up on mentoring sessions
- Asking for feedback
- Continually changing processes to find the most effective options for each team member
Security Management
Security Management is the identification of an organization’s assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
Course Outline
Threats and Vulnerabilities
- Threats
- Physical Threats
- Vulnerabilities
The Information Security Manager
- Information Security Job Roles
- Training, Experience, and Professionalism
- Started in Security Management
Organizational Security
- Security in Organizational Structures
- Working with Specialist Groups
- Working with Standards and Regulations
- Working with Risk Management
- Working with Enterprise Architecture
- Working with Facilities Management
Information Security Implementation
- Integration with Risk Management
- Secure Development
- Organizational Interfaces
- Post Implementation
Standards, Frameworks, Guidelines, and Legislation
- Why Do We Need Standards?
- Legislation
- ISO/IEC 27000 Series of Standards
- Business Continuity
- Risk Management Standards
Protection of Information
- Information Classification
- Identification, Authentication, and Authorization
Protection of People
- Human Vulnerabilities
- Building a Security Culture
- Personnel Security Life Cycle
Protection of Premises
- What Is Physical Security?
- Start with a Risk Assessment
- Perimeter Design
- Internal Building Security
Protection of Systems
- Introducing Malware
- Threat Vectors
- Technical Countermeasures
- Network Security
Digital Evidence and Incident Response
- The Digital Forensic Process
- Forensic Readiness
- Incident Response and Digital Investigations
- Investigating a Malware Outbreak
Cloud Computing Security
- Cloud Computing
- Cloud Security
- Cloud Security Architectures
- Old Threat with New Targets
- Virtualization
Secure Systems Development
- Secure Development
- Secure Development Business Processes
- Security Testing
- Auditing