Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent
In the fast-changing world of business, and especially IT, everyone in the organisation should be involved in sales. One of the best ways is to give the customer an outstanding experience. The customer experience is the competitive battlefield of today. Sales may be won or lost here. You can either close a sale for a quick buck, or open a long-term relationship to create a high lifetime value customer. By developing excellent communication skills, rapport and, most of all, a desire to serve and listen to the needs of the customer to the best of their ability, both sales teams and other IT professionals will create trust, nurture relationships and develop awareness of other opportunities with the customer. By the end of this course, participants will be able to: Understand the power of a positive customer experience in developing sales opportunities Recognise and develop a sales opportunity when it arises Engage with customers and develop rapport and trust Use verbal and non-verbal communication skills and pick up on signals Ask powerful questions - and listen to the answers Create 'magic moments' for the customer Turn a complaint into an opportunity Know when to ask for referrals and testimonials Pass on leads to the relevant people 1 Introduction Aims and objectives Beliefs about sales 2 Building rapport First impressions Short cuts to rapport Finding common interests 3 Selling or serving? Managing emotions and behaviour - Transactional Analysis Moments of truth - creating 'magic moments' Speed sells - the follow-up 4 Meetings Planning a successful meeting Pre-meeting connection and assistance Sales meeting failure reasons Right v wrong mindset 5 Communication - verbal and non-verbal The 3 Vs - Visual, Verbal, Vocal Picking up on signals 7 power questions Questioning techniques LISTEN - 3 types of listening skills 6 Influencing 6 levels of influence Framing to change perspectives Turning complaints into opportunities 7 Referrals The power of referrals How and when to ask for a referral 5 steps from rapport to referral 8 Presentation and pitching (optional session) Basic presentation structure and delivery Creating powerful impressions Creating a 60-second pitch The elevator 10-second pitch - answering 'What do you do?' Sales presentations Emotion v Intellect - how to engage Using visuals
Duration 5 Days 30 CPD hours This course is intended for network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio This training combines the following classes into one five day workshop, preparing you for the ACCP certification: ACF-Aruba ClearPass Fundamentals IAC-Implementing Aruba ClearPass Overview Ability to setup ClearPass as a AAA server Demostrate Configuration Guest, Ongurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demostrate Scaling and deployment of best practices It prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both modules and labs to teach participants about the major features of the ClearPass portfolio Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web LoginMonitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications Single Sign-On Deployment Options ClearPass Admin Login SSO Access Network SSO ASO-Auto-Sign On Configuration and Demo ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview
This very practical one-day programme provides participants with the skills and knowledge required to be an effective member of the procurement team and to enable them to procure a wide range of resources for the organisation, in a compliant and cost-effective manner. It also empowers them to be able to collaborate with all key stakeholders. By the end of the programme participants will be able to: Understand the basic concepts of good procurement practice Apply a range of tools and techniques for developing scopes of work and specifications Apply various methods to select and evaluate suppliers Develop robust contract award strategies Appreciate the commercial importance of effective procurement and opportunities to reduce cost and add value Develop appropriate procurement strategies depending on risk and value Appreciate the legal aspects of procurement 1 Welcome Introductions Aims and objectives Plan for the day 2 The basics of procurement The concept of total cost of ownership v price The procurement cycle The roles of the customer and the contractor Impact upon profit 3 Specification process Importance of effective specifications Specification development process Types of specification Team approach Use of performance specifications Early supplier involvement (ESI) / early contractor involvement (ECI) 4 Quality Concepts and practices Defining 'fit for purpose' Conformance to requirements Compliance to standards Role of the supplier Quality assurance tools and techniques 5 Procurement methods RFP RFQ ITT Negotiated procurement Strategic partnerships Outsourcing 6 Tendering How to undertake a formal tendering process Business case to award Critical stages in the process Risks and benefits 7 Tender evaluation How to undertake a quotation analysis Tools of analysis Use of VFM models Role of the customer Comparisons around cost, quality, and delivery 8 Supplier selection and evaluation Developing critical selection criteria Using the 10Cs model Importance of effective selection process Weighting systems Importance of validity and evidence 9 Capital equipment procurement Life cycle cost issues Payback calculations Compatibility issues Maintenance and training issues After-sales support 10 Supplier relationships Corporate social responsibility issues Communication 360 feed-back Open and ethical Initial understanding Clear and fair terms and conditions 11 Close Review of key learning points Personal action planning
Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. Module 1: COURSE INTRODUCTION COURSE INTRODUCTION Module 2: Juniper Security Concept Security Challenges Security Design Overview Juniper Connected Security Module 3: Juniper Connected Security ? SRX Series Devices Connected Security Interfaces Initial Configuration LAB 1: Initial Configuration Module 4: Security Objects Security Zone Objects Security Screen Objects Security Address Objects Security Services Objects LAB 2: Creating Security Objects with J-Web Module 5: Security Policies Security Policy Overview Zone-Based Policies Global Security Policies Application Firewall with Unified Security Policies LAB 3: Creating Security Policies with J-Web Module 6: Security Services ? IDP and User Firewall IDP Security Services Integrated User Firewall LAB 4: Adding IDP and User Firewall Security Services to Security Policies Module 7: Security Services ? UTM Content Filtering Web Filtering Antivirus Antispam LAB 5: Adding UTM Security Services to Security Policies Module 8: Juniper Connected Security ? Sky AT Sky ATP Overview Blocking Threats Lab 6: Demonstrating Sky ATP Module 9: Network Address Translation NAT Overview Source NAT Destination NAT Static NAT Lab 7: Implementing Network Address Translation Module 10: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Tunnel Establishment IPsec Traffic Processing Module 11: Site-to-Site VPNs IPsec Configuration IPsec Site-to-Site Tunne Lab 8: Implementing Site-to-Site IPsec VPNs Module 12: Monitoring and Reporting J-Web monitoring options J-Web Reporting options Lab 9: Using Monitoring and Reporting Appendix A: SRX Series Hardware Appendix D: Sky Enterprise Services Appendix B: Virtual SRX Appendix EJunos Space Security Director Appendix CCLI Prime
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for business leaders and decision makers, including C-level executives, project managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who want to increase their knowledge of and familiarity with concepts surrounding data science. Other individuals who want to know more about basic data science concepts are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus DSBIZ⢠(Exam DSZ-110) credential. Overview In this course, you will identify how data science supports business decisions. You will: Explain the fundamentals of data science Describe common implementations of data science. Identify the impact data science can have on a business The ability to identify and respond to changing trends is a hallmark of a successful business. Whether those trends are related to customers and sales or to regulatory and industry standards, businesses are wise to keep track of the variables that can affect the bottom line. In today's business landscape, data comes from numerous sources and in diverse forms. By leveraging data science concepts and technologies, businesses can mold all of that raw data into information that facilitates decisions to improve and expand the success of the business. Data Science Fundamentals What is Data Science? Types of Data Data Science Roles Data Science Implementation The Data Science Lifecycle Data Acquisition and Preparation Data Modeling and Visualization The Impact of Data Science Benefits of Data Science Challenges of Data Science Business Use Cases for Data Science Additional course details: Nexus Humans CertNexus Data Science for Business Professionals (DSBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Data Science for Business Professionals (DSBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for existing Microsoft SharePoint site users who need to create and manage a SharePoint team site. Overview Upon successful completion of this course, students will be able to create a SharePoint team site and perform basic content management tasks on a single SharePoint site. Students will: Create and configure new sites. Add and configure document libraries. Add and configure lists. Create custom lists and forms. Assign permissions and access rights. Extend SharePoint functionality with web parts. In this course, students will learn how to create, configure, and manage a SharePoint team site so that your team or organization can share information and collaborate effectively. This course is for an on-premise SharePoint environment. 1 - CREATING AND CONFIGURING A NEW SITE Create a New Site Configure the Look and Feel of Your Site 2 - ADDING AND CONFIGURING LIBRARIES Configure a Document Library Configure Document Versioning and Check Out Configure a Content Approval Process 3 - ADDING AND CONFIGURING LISTS Add and Configure an Announcements List Add and Configure a Tasks List Create, Configure, and Integrate Contacts and Calendars 4 - CREATING CUSTOM LISTS AND FORMS Create and Configure Custom Lists Create Custom List Forms 5 - ASSIGNING PERMISSIONS AND ACCESS RIGHTS Share Sites and Set Site Permissions Secure Lists, Libraries, and Documents 6 - EXTENDING SHAREPOINT FUNCTIONALITY WITH WEB PARTS Add and Configure Included Web Parts Add and Configure External Web Parts Additional course details: Nexus Humans Microsoft SharePoint 2016 - Site Owner training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft SharePoint 2016 - Site Owner course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for people in a variety of roles and fields who have a basic understanding of Microsoft Office and want to incorporate digital note-taking and note collaboration by using Microsoft OneNote. In addition to creating and modifying OneNote notebooks, this course will introduce you to inserting images and embedding files into notebooks, categorizing content, sharing content with OneDrive, and exporting content to other file formats. Overview In this course, you will develop digital note-taking skills by creating, modifying, and managing OneNote notebooks that work with other Microsoft Office programs. You will: Navigate and customize the OneNote interface and environment. Add and format text, images, audio, links, and drawing objects to a notebook. Embed Excel spreadsheets and attach other files to a notebook. Categorize, organize, and search notebook content. Check spelling in, print, and password-protect notebooks. Use Outlook and OneDrive to send and share notebook content. Export notebook content and manage notebook history and backups. In our fast-paced digital world, the need to capture ideas, meeting notes, and to-do items is ever present. Microsoft© Office OneNote© for the Desktop provides a way for you to efficiently create and collect your notes in an electronic notebook. This course will introduce you to using OneNote notebooks to store a wide variety of content in an organized structure, access the content from anywhere, and also share it with others. Additionally, learning how OneNote and the other applications in the suite are integrated increases your productivity with Microsoft Office. This courseware is applicable to all users of the current OneNote desktop software. The classroom environment setup is based on the Office 2016 desktop application. Getting Started with OneNote Topic A: Navigate the OneNote 2016 Environment Topic B: Use Templates Topic C: Customize the OneNote User Interface Adding and Formatting Notebook Content Topic A: Apply Formatting to Notebook Content Topic B: Insert Images and Audio into a Notebook Topic C: Add Quick Notes and Links Topic D: Use Drawing Tools Embedding and Attaching Files Topic A: Embed Excel Spreadsheets Topic B: Attach Other File Types Organizing and Searching Notebooks Topic A: Use Tags Topic B: Organize and Search Notebooks Finalizing a Notebook Topic A: Proof and Print a Notebook Topic B: Configure Password Protection and Notebook Properties Managing Notebook Files Topic A: Export Content from OneNote Notebooks Topic B: Back Up and Restore Notebook Content Sending and Sharing OneNote Content Topic A: Send OneNote Content in Other Formats Topic B: Share OneNote Content by Using OneDrive
Learn the ‘Essentials’ of gift wrapping in just 60 minutes! Do you grab the nearest gift bag because you’re so embarrassed by your attempts at gift wrapping? Maybe you always cut too much (or too little) wrapping paper and end up in a sticky tape mess? Perhaps you’ve already decided you want to join a class but know you’d struggle in a group and worry that you’d slow everyone down? Or it could be that the dates or venue for joining an in person class don’t work for you (or fit your busy schedule)? If any of these sound familiar, then you’ll love my 60 minute 1-2-1 virtual class. 60 Minute 1-2-1 Class No Replay £67 How to measure exactly how much gift wrapping paper you need so you always know how much to cut (and why it’s important Wrap a box (using the paper & only 3 pieces of tape Learn to tie 2 different styles of bow (and when to use each one) 60 Minute 1-2-1 Class Includes replay £87 How to measure exactly how much gift wrapping paper you need so you always know how much to cut (and why it’s importnat) Wrap a box (using the paper & 3 pieces of tape Learn how to tie 2 different styles of bow (and when to use each one) A replay of the class FREQUENTLY ASKED QUESTIONS 1. What’s included in a 60 minute virtual Gift Wrapping Class You’ll learn the essentials of gift wrapping including as listed in the package you choose. 2. How much is a 60 minute 1-2-1 virtual class? Depending on the package you choose, prices start at £67. 3. How do I book a date for my class? Once payment is received, I will send you an email confirming your payment and a link to book your class 4. Are materials provided? No, materials are not provided. I will send you a list of what you need at least 2 weeks ahead of the class (or once the date is confirmed if less than 2 weeks until the class) 5. What is the difference between an in person & a virtual class? At a 60 minute virtual class you will get 1-2-1 tuition on the techniques which I cannot guarantee you’d get at a group in person class (although I always try to do my best). In person classes usually last a full day and include lunch/refreshments which is not included with a virtual class. 6. Can I change the date/time of my class? If you can no longer attend the class on the date/time you chose, you can change the date once at no futher cost. Please email me for your options. 7. Can I bring a friend? No – the 1-2-1 classes are as the name suggests for one person only. If you want to bring a friend(s) email me louise@louiselewis.co.uk for your options & a quote. 8. Who is a virtual 1-2-1 gift wrapping class suitable for? The classes are suitable for any skill level from beginner to anyone that has already tried the basics and wants to learn more. A 1-2-1 class is ideal if you struggle to attend an inperson class that fits in with your schedule and prefer the idea of personal tuition 9. Who is gift wrapping class not suitable for? There are no exclusions to suitability 10. What kind of results can I expect if I join a class? That all depends on you and if you’re prepared to go away and practice/use the skills you have learned in the class.
A light and compassionate guide for parents on the art of creating space in a world where there isn't any and of why it matters. Packed with practical tips for wrangling the chaos and conflicting priorities that come with parenthood, the webinar is aimed at anyone who'd like to regain a little bit of 'me' time in a schedule that revolves around everyone else. Available as a live event and as a recording on request.