Overview OBJECTIVES Develop practical skills enabling effective communication at the time of an incident Familiarize students with both techniques & technologies involved in crisis communication Provide a health check for your personal & organizational readiness Provide the confidence to know that your response strategies are appropriate and effective Build relevant knowledge through exploring relevant case studies and practical exercises Develop flexible creative and well-motivated teams Upcoming Events Online (USD 1950) Online Streaming Live (Flexible Dates) At Venue (USD 4500) Dubai 20 Feb - 24 Feb Istanbul 27 Feb - 3 March London 20 March - 24 March For more dates and Venue, Please email sales@gbacorporate.co.uk
Understanding cultural differences in the global sales environment is critical to your salespeople’s success. Developing their intercultural communication skills and knowledge of the sales and negotiation techniques of different cultures and nationalities, will help them to ensure relationships are as effective and rewarding as possible. Bespoke courses include: The impact of language and cultural differences on the sales environment Communication techniques in international sales Effective sales questions A global mindset Culture and its impact on sales Delivering on different cultural expectations Perceptions of time across cultures and the impact on sales cycles and timelines
Microsoft Lync training course description This course teaches IT staff how to plan, design, deploy, configure, and administer a Microsoft Lync Server solution. The course emphasizes Lync Server Enterprise Unified Communications features focussing particularly on coexisting with and migrating from legacy communication services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat. This course helps prepare for Exam 70-336. What will you learn Describe the Lync Server architecture. Install and deploy Lync Server. Use Lync Server management interfaces. Deploy and manage clients. Manage and administer dial-in conferencing. Design audio and video for web conferencing. Plan for instant message and presence Federation. Deploy and configure persistent chat in Lync. Configure archiving and monitoring services. Troubleshoot Lync Server. Describe the required daily, weekly, and monthly maintenance tasks. Use SIP commands and analyze SIP logs. Configure high availability features in Lync. Design load balancing in Lync Server. Backup and restore Lync Server data. Microsoft Lync training course details Who will benefit: Technical staff working with Microsoft Lync. Prerequisites: Supporting Windows 2008 or 2012. Duration 5 days Microsoft Lync training course contents Microsoft Lync Server architecture Lync Server architecture, Lync core capabilities, Lync design process, assessing infrastructure requirements and updating the design, planning for all Microsoft solutions framework phases. Designing a Lync Server topology Infrastructure requirements for Lync Server, using the planning tool, using topology builder, server infrastructure, documentation. Hands on Environment preparation and Lync Server pools. Users and rights in Microsoft Lync Server Managing Lync Server, role based access control. Hands on Using the management shell, configuring role-based access control. Client/device deployment and management Deploy and manage clients, prepare for device deployment, IP phones. Hands on Clients. Conferencing in Lync Server Introduction to conferencing in Lync Server, designing for audio\video and web conferencing, dial-in conferencing in Lync Server, managing and administering conferencing. Hands on Conferencing in Microsoft Lync. Designing and deploying external access Conferencing and external capabilities of Lync Server, planning for IM and presence federation, designing edge services. Hands on Deploying Edge Server and Configuring Remote Access, Validating the Edge Server. Deploying Lync Server persistent chat Overview of persistent chat architecture in Lync Server, designing persistent chat, deploying and persistent chat. Hands on persistent chat server. Monitoring and archiving The archiving service, the monitoring service, configuring archiving and monitoring. Hands on Archiving and monitoring in Lync Server. Administration and maintenance of Lync Lync Server troubleshooting tools, Lync Server operational tasks, Lync Server troubleshooting techniques. Hands on Lync administration tools, centralized logging service, analysing Lync Server logs and traces. High Availability in Lync Server High availability in Lync Server, configuring high availability in Lync Server, planning for load balancing, designing load balancing. Hands on Configuring database mirroring, experiencing a scheduled SQL Server outage, experiencing an unscheduled SQL Server outage. Disaster recovery in Lync Server Disaster recovery in Lync Server, tools for backing up and restoring Lync Server, critical Lync Server data to back up and restore, critical data to export and import, designing branch site resiliency. Hands on Configure pool pairing, experiencing a pool failure or outage. Planning a migration to Lync Server Coexistence and migration, migration steps, planning for clients and devices. Designing a client migration and device migration strategy. Hands on Creating a migration plan, documenting the migration phases.
This course will help you to gain a better knowledge of the policy which underpins end of life care. It will help you to learn about the delivery of great end of life care and improve your communication skills to strengthen working relationships during this period. You will also feel you have a better understanding on how to support the friends and family of the person that you are caring for.
In the fast-changing world of business, and especially IT, everyone in the organisation should be involved in sales. One of the best ways is to give the customer an outstanding experience. The customer experience is the competitive battlefield of today. Sales may be won or lost here. You can either close a sale for a quick buck, or open a long-term relationship to create a high lifetime value customer. By developing excellent communication skills, rapport and, most of all, a desire to serve and listen to the needs of the customer to the best of their ability, both sales teams and other IT professionals will create trust, nurture relationships and develop awareness of other opportunities with the customer. By the end of this course, participants will be able to: Understand the power of a positive customer experience in developing sales opportunities Recognise and develop a sales opportunity when it arises Engage with customers and develop rapport and trust Use verbal and non-verbal communication skills and pick up on signals Ask powerful questions - and listen to the answers Create 'magic moments' for the customer Turn a complaint into an opportunity Know when to ask for referrals and testimonials Pass on leads to the relevant people 1 Introduction Aims and objectives Beliefs about sales 2 Building rapport First impressions Short cuts to rapport Finding common interests 3 Selling or serving? Managing emotions and behaviour - Transactional Analysis Moments of truth - creating 'magic moments' Speed sells - the follow-up 4 Meetings Planning a successful meeting Pre-meeting connection and assistance Sales meeting failure reasons Right v wrong mindset 5 Communication - verbal and non-verbal The 3 Vs - Visual, Verbal, Vocal Picking up on signals 7 power questions Questioning techniques LISTEN - 3 types of listening skills 6 Influencing 6 levels of influence Framing to change perspectives Turning complaints into opportunities 7 Referrals The power of referrals How and when to ask for a referral 5 steps from rapport to referral 8 Presentation and pitching (optional session) Basic presentation structure and delivery Creating powerful impressions Creating a 60-second pitch The elevator 10-second pitch - answering 'What do you do?' Sales presentations Emotion v Intellect - how to engage Using visuals
CWAP training course description This WiFi analysis course consists of hands-on learning using the latest enterprise wireless LAN analysis and troubleshooting tools. The course takes an in-depth look at the functionality of WLANs, intended operation of the 802.11 protocol and Wi-Fi Alliance specifications, WLAN frame formatting and structure, troubleshooting methodology, and protocol analysis. It also includes extensive training in modern spectrum analysis with a focus on advanced RF behaviour analysis, data collection methods, interpreting spectrum plots and charts, and understanding advanced features of WLAN spectrum analysers. What will you learn Analyse WiFi frames using Wireshark. Explain 802.11 protocol operation. Troubleshoot WiFi networks using Wireshark. Troubleshoot WiFi networks using spectrum analysers. CWAP training course details Who will benefit: Technical Network Staff Anyone looking to become a CWAP Prerequisites: Certified Wireless Network Administrator Duration 4 days CWAP training course contents Principles of WLAN Communication 802.11 Working Group, OSI reference model and the 802.11 PHY and MAC, Communication sublayers and data units, WLAN architecture components, Organization of station forwarding Addressing and internetworking operation, Modern WLAN product architectures. Physical (PHY) and MAC Layer Formats and Technologies Physical layer functions, Preamble function and format, Header purpose and structure, Analysis of PHY problems, Physical PPDU formats, 802.11b, 802.11a, 802.11g, 802.11n, MAC frame components, MAC encapsulation, Fields and subfields of the MAC header, Frame Control, Frame types and subtypes and their uses, Addressing, Frame body, Data frame format, Control frame format, Management frame format, Information elements and fields. Beaconing and synchronization Scanning, Client state machine, 802.11 contention, QoS, Admission control, Band steering and airtime fairness mechanisms Fragmentation, Acknowledgments and Block acknowledgments, Protection mechanisms and backward compatibility, Power management, Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC), Security components, methods, and exchanges, Roaming procedures exchanges, Future protocol enhancements. 802.11n Transmit beamforming, Spatial multiplexing, Maximal Ratio Combining (MRC), Space-Time Block Coding, 40 MHz channels, Frame aggregation, HT-OFDM format, Modulation and Coding Schemes (MCS), HT frame formatting and more. Protocol Analysis Tools and Methodology Troubleshooting methodology, Protocol analyser types, Analysis NIC/adapter selection and constraints, Interpreting results based on location, Analyzer settings and features, Filtering and channel scanning, Interpreting decodes, Using advanced analysis features, Assessing WLAN health and behaviour factors, Evaluating network statistics, Troubleshooting common problems, Wired analysis to support wireless network issues. Spectrum Analysis Tools and Methodology Radio frequency behaviour review, Visualizing RF domains using spectrum measurement tools, Spectrum analyser types and operation, Analyser specifications and characteristics, Understanding spectrum data presentation, Interpreting plots and charts, Common WLAN spectrum analyser features, Identifying transmit patterns, Device classification and network impact, Recognizing transmit signatures. Hands on lab exercises Wireshark Setup, Use, and In-Depth Analysis Wireshark is fundamental to troubleshooting. Labs include: - Capabilities, configuration, and data display - Opening, collecting, saving, and modifying capture files. - Filtering traffic, and using colouring rules as analysis aides. - Live captures based on a set of desired collection criteria. - Identify and isolate network problems. - Conversation analysis. - Remote packet capture with an AP. Understanding Frame Components Familiarity with the frame structure and contents is essential in real -world troubleshooting efforts. Labs include: - Understanding the MAC header - Comparing the three major frame types and their subtypes - Analysing frame formats of individual frame types - Analysing 802.11n frame components - Additional information is reported by protocol analysers - Information not visible in protocol analysers Frame Exchanges Understanding frame exchange rules and behaviors is critical to identifying expected and unexpected. It is also necessary to understand what is normal so that aberrations can be properly troubleshot. Labs include: - Connectivity exchanges and sequences - Legacy and modern security exchanges - ERP and HT protection mechanisms - Power save behaviour - Acknowledgments, block acknowledgments, and supporting action frames - Dynamic rate switching - Band steering Troubleshooting Common Problems This lab exposes students to hands-on troubleshooting skills by setting up common problems in WLANs and allowing students to attempt to solve them. - Trouleshooting connectivity exchanges - Troubleshooting 802.1X and EAP exchanges - Troubleshooting roaming Spectrum Analyzer Setup, Use, and In-Depth Analysis Specifically, it will explore the plots and charts used to display spectrum data and how to interpret this data to define a transmitter's impact on the network. The following are covered: - Installing the analyser and using display and navigation - The 'RF perspective' provided by each plot and chart - Using built-in features and automated device identification - Characterizing the behaviours of an interference source - Assessing the impact of an interference source - Determining the impact of transmitter proximity on interference. - Identifying signatures of common transmitters - Remote spectrum analysis with an AP
We communicate daily in many ways, including email, phone, text, Zoom, Teams, Google Meets, Slack, and even that old-fashioned thing, what was it now... oh yes, talking face-to-face. But, when we look at communication closely and really drill down into what we are doing in conjunction with how our brain works (neuroscience), how internal, organisational, and social politics control what we believe we can say, how hierarchical positioning impacts our honesty and how the lack of psychological safety means we say what we know others want to hear rather than what they need to hear…. It is oh so complicated! This workshop not only explores the concept of excellent communication, but we also want to hear what you believe it is too. We also delve into how organisational culture influences our perception of speaking up. Factors that hinder open and honest communication, and we work collaboratively towards removing these barriers to achieve a communication style that fosters trust and transparency, creating psychological safety. This workshop is particularly relevant to our Emotional Intelligence workshop (EI and Me). We firmly believe that developing emotional intelligence is the key to unlocking Clean Communication, a skill that is crucial for all of us, regardless of our roles and responsibilities, so that we thrive in our professional environment. If you want to see if we are correct, why not have us facilitate a workshop for you and see what you get by the end of it? LENGTH - Normally, one day. But please contact us to discuss your specific needs, or we can offer advice. NEXT WORKSHOP START - Please ask for more information as we deliver bespoke closed events for your people at your location or a mutually suitable location. WORKSHOP DELIVERY - The best environment for this workshop is face-to-face, but we can facilitate this workshop online. Suitability - Who should attend? Who Should Attend and Why? Who? - Perhaps think of this another way… who shouldn’t attend to ensure we can attain Clean Communication? There’s your answer. Why? - Every person needs to understand what we are saying above about how we get trapped in this organisational formatting which changes how we communicate and how it prevents us from communicating cleanly. EVERY organisation has this, despite what our values profess. And 'Values', that’s a whole other story. Workshop Content Using the 'Moccasin Approach'® to clean our personal and organisational communication LaPD’s Communication Cycle and what we must consider. (Can you work out what the ? represent above? Accountability and Responsibility raises its head in Communication. It has to. Bias, unconscious bias and its impacts on our communication. The conundrum of communicating with others and their styles (The TRAP). How would my perfect Manager/Leader communicate with me? Nonverbal communication (body language), rapport, Clean Communication. Negative communication can go viral (Self-Fulfilling Prophecy). Reflections, findings and goals (individual and team). Meeting our workshop objectives by listing five areas for development. Workshop delivery and venue This workshop is usually one day in duration, and it focuses solely on how we communicate with each other. It can also be a two-day event incorporating aspects of Emotional Intelligence (EI) with group, and individual activities to allow discussions about the various communication we need in your organisation. When you consider the content we deliver, we are sure you will understand why we always prefer to deliver our workshops, courses and programmes face-to-face. Face-to-face workshops and courses can be held at a location of your choice or, if you wish, a central UK location, such as the Macdonald Burlington Hotel in Birmingham, located directly across from the Birmingham New Street train station. We can deliver our workshops, courses and programmes online, although this will mean splitting elements into manageable learning events to suit the online environment.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
Facilitation Skills Training