• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

105 Courses in Cardiff delivered Live Online

Appointment setting (In-House)

By The In House Training Company

This course has a simple objective: to help gain appointments with potential clients. In most consultative selling situations clients won't commit to purchases over the telephone. This means setting up a meeting to discuss the options with them face-to-face. But getting 'face time' can be tricky. This practical workshop can help. Participants will acquire essential tools, skills and methods; discuss specific organisational issues; and identify areas for improvement. They will discover how to: Increase their effectiveness through proper preparation Construct attention-grabbing opening statements Help potential clients feel comfortable agreeing to a meeting Develop tactics for responding to difficult excuses and objections Stress the benefits of a face-to-face consultation Develop and enhance their questioning and listening skills Prevent customers cancelling booked appointments 1 Introduction to appointment setting Key trends that have changed the way people buy today - and will buy tomorrow Why many sales people avoid picking up the phone The difference that makes a difference - what makes a good appointment-maker? 2 Before you pick up the telephone It all starts with a plan... Who and what to focus our attention How much research should we undertake and why? Setting primary and secondary objectives 3 Making your approach Key considerations Every call is an opportunity - creating a positive mind-set Using a structured approach Using partnership language 4 Gaining an insight into the customer's needs How to quickly 'tune in' to your customers, so that you can serve them more easily Developing speech patterns that put customers at their ease Using effective questioning and listening skills Finding and building pain points 5 Dealing with excuses and objections Pre-empting potential excuses Developing techniques for responding to client objections Keeping the door open for future contact 6 Securing the appointment Selling the benefits of a consultancy meeting Techniques for avoiding cancelled appointments Gaining commitment 7 Action plans Course summary and presentation of action plans

Appointment setting (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for Security EngineersNetwork Engineers Overview This course is intended to provide a top-level overview of Palo Alto Networks© Traps? Endpoint protection product. Upon completion of the class the student will be able to understand these principles: Explain the core technologies of Traps? and how it differs from traditional signature recognition technologies. Understand the advantages of these technologies over existing solutions. Understand Traps? product architecture and deployment requirements. Installation requirements for Traps? installations. Deploy Exploit Prevention Module defenses to endpoints with Policies. Deploy Malware Protection defenses to endpoints. Provide Application Execution Control in conjunction with WildFire?. Understand deployment strategies and tactics for Workstations, VDI and Server endpoints. Gather and analyze Security Event reports and forensics. Foundation classes are just introductory trainings, NOT a full technical training. Compromise isn?t inevitable, or, at least, it shouldn?t be. Traditional endpoint protection simply cannot keep up with the rapidly evolving threat landscape, leaving organizations vulnerable to advanced attacks. A new approach is needed, one that can rebuild confidence in endpoint security. This new approach needs to prevent advanced attacks originating from executables, data files or network-based exploits ? known and unknown ? before any malicious activity could successfully run. Palo Alto Networks© call this ?advanced endpoint protection.? By focusing on the attacker?s core techniques and putting up barriers to mitigate them, the attacker?s path for exploitation becomes known, even when the attack isn?t. Traps? focuses on the core techniques leveraged by exploits in advanced cyberattacks and renders these techniques ineffective by breaking the exploit sequence and blocking the technique the moment it is attempted. IntroductionThe Traps? technology alternative to endpoint defenseTraps? Exploit and Malware protectionTraps? Product ArchitectureTraps? DeploymentTraps? Exploit Policy ManagementTraps? Malware Protection PoliciesTraps? ForensicsPractical Traps? Implementation considerations Additional course details: Nexus Humans Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180)
Delivered OnlineFlexible Dates
Price on Enquiry

Professional administrator (In-House)

By The In House Training Company

Today's administrative professional needs flexibility and a broad portfolio of skills including self-motivation, assertiveness, and the ability to deal with difficult people. You will benefit from this course if you are an administrator, medical/legal secretary or PA, who wants to enhance your administrative support skills, as well as evaluating your existing techniques. This course will help you identify: your areas of strength and your areas for improvement in the work environment ways to accept new challenges and responsibilities with confidence what motivates you at work techniques to improve your planning and time management ways of improving your influencing and assertiveness skills your preferred working style (and relate it to your interaction with others) ways of using your initiative how to deal with challenging people, using recognised communication methods The course will help you develop a flexible set of skills that will allow you to succeed at work, no matter what the day throws at you. It will help you communicate effectively with a diverse range of colleagues and others with tact and diplomacy. And, finally, it will help you provide the administrative support that is essential for the smooth running of your area and of the organisation as a whole. 1 Introduction Overview Introductions Individual objectives 2 What exactly is your role? Before looking at new skills and techniques, where are you now? Do you have the skills, knowledge and attitude required to be an exceptional administrator? Understand your job criteria Identifying your strengths and areas for development Activity - skills analysis Activity - action plan 3 Building trust How can you build trust? Understanding the links between reliability, consistency and trust What is required to deliver efficient service? Activity: efficient service requirements of the professional administrator 4 Working styles Identifying your working style preference Understanding the importance of a flexible approach Identifying areas of improvement to become a more effective team member Activity: Questionnaire (completing, scoring and charting) Activity: drawbacks of my style Developing your working style 5 Assertiveness Understand the differences between behaviours Activity: Definition and characteristics of assertive / aggressive / passive behaviour Activity: Identifying different behaviours Understanding how to be more assertive How to use assertiveness techniques How to ask for feedback Activity: Making requests assertively Activity: Refusing requests assertively 6 Time management The importance of planning for success The importance of managing interruptions The importance of having clear purpose Time management best practices Activity: How do you plan your time? What prevents you improving your time management? How will you recognise success? 7 Prioritisation How to prioritise work to meet deadlines The prioritisation matrix Activity: Post it! 8 Dealing with interruptions The impact interruptions have on productivity How to manage interruptions Activity: What interruptions do you experience? What tactics can be employed to reduce these interruptions? 9 Close Open forum Summary Action planning

Professional administrator (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Effective Negotiation Skills Course

By Dickson Training Ltd

Negotiation is an everyday challenge for some whether it be in the office, field or at home. Have you ever walked away from a situation thinking "if I'd only put my thoughts, side, opinion or words across better"? This 2-day course is perfect for managers, supervisors and sales people. It will focus on negotiation skills and the techniques that go with it. In this energy-charged provision you'll learn and practice negotiation, assertiveness and influencing techniques. Course Syllabus The syllabus of the Effective Communication and Influencing course is comprised of seven modules, covering the following: Module One An Introduction to Negotiation Assessment of your current sales and negotiation strengths and improvement areas What is negotiation? Identifying objectives and all factors affecting negotiation The negotiation model - the four stages Module Two The Preparation Stage The significance of preparation and why we need to prepare What do you need to prepare? Preparing a set of objectives: yours and theirs Understanding constants and variables Researching the other party Creating a "win-win" situation Preparing yourself for possible set-backs and objections Module Three The Discussion Stage The importance of rapport building Opening the negotiation The power of effective questioning techniques Improving your listening skills Controlling emotions Spotting the signs - non-verbal communication and voice clues Module Four The Proposing Stage Stating your opening position Responding to offers How to deal effectively with adjournments Module Five The Bargaining and Closing Stage Making concessions - the techniques Adopting key bargaining skills Dealing with objections and underhand tactics Closing techniques Confirming the agreement Creating long term, lasting commitment Scheduled Courses Unfortunately this course is not one that is currently scheduled as an open course, and is only available on an in-house basis. Please contact us for more information.

Effective Negotiation Skills Course
Delivered in Bardsey + 3 more or UK Wide or OnlineFlexible Dates
Price on Enquiry

Navigating Difficult Conversations: Turn Tension Into Progress™

4.9(9)

By Noble Foods

What important conversations are your team members avoiding? Side-stepping difficult conversations can trap a team in unresolved problems, strained relationships, and missed chances for growth, which blocks progress and cultivates a lack of trust. But many people avoid difficult conversations or handle them poorly because they’re afraid to address uncomfortable issues and feel unprepared to respond to the emotional reactions that inevitably arise. Navigating Difficult Conversations: Turn Tension Into Progress takes a targeted approach to helping people to manage emotional tension and conduct conversations in a way that enables all parties to stay engaged in collaborative dialogue. Participants will shift their mindset from fearing and avoiding difficult conversations to seeing them as the way to make progress on important issues. And they’ll develop the skills to build trust and respect in every relationship as they navigate sensitive topics. Who Should Attend? This programme is for anyone who finds the thought if having a challenging or difficult conversation, something to be very nervous of, even to the point of avoiding the issue. We recommend that participants have first attended our Aspire programmes, Management Essentials and Performance Coaching, as they provide a strong foundation to the topic, which this session then builds upon. In Navigating Difficult Conversations participants will discover how to balance Courage and Consideration throughout the conversation by: Sharing their Purpose—the issue they need to make progress on—and Positive Intent—how they want the other person to benefit from the conversation Responding to emotional reactions using the skills: Pause, Don’t Panic Observe, Don’t Judge Ask, Don’t Assume Outcomes This module will help participants: Create a strong foundation for difficult conversations by setting a clear and collaborative tone that balances their own and others’ needs. Understand that emotional reactions are a natural, human response—and notice them as a signal that the conversation needs an adjustment to stay on track. Practice a range of tactics to respond in the moment to help everyone stay engaged and make progress.

Navigating Difficult Conversations: Turn Tension Into Progress™
Delivered in Lincoln or Online
FREE

Bids and proposals (In-House)

By The In House Training Company

This workshop will help you improve the impact, clarity, accuracy and effectiveness of your sales proposals. It takes bid and proposal teams right through the process, from start to finish - from forming the team and gathering the information, through to writing and reviewing the proposal document, and on to presenting it to the client. The learning points shared in the programme come from the trainer's extensive real-world experience with a wide variety of businesses. As a result of attending this programme, participants will be able to: Write more clearly, more grammatically and more persuasively Structure their written communications more effectively Avoid the 'howlers' that can cost you business Impress your clients Win more business 1 Bid strategy How to combine your knowledge of the market or customer, your products and services, and your competitors, to create a quality bid New insights into your comparative advantages and competitive position in the marketplace Understanding more about how your client views you and other suppliers A plan of attack to build on your strengths and attack the weaknesses of your competition Dealing with RFP/ITT situations 2 Teamwork How a bid or proposal team needs to prioritise and manage preparation time Co-ordinating input from team members Agreeing responsibilities 3 The importance and role of a well-written sales proposal Why bother? - the value of the sales proposal to you and to the customer What the customer wants and needs to make a decision in your favour Understanding and delivering on customer expectations Review and discussion of different proposals - with real-life examples 4 The best way to structure your sales proposals A section-by-section, page-by-page review of best practice in structuring great sales proposals How to improve the way you match your proposal to the customer's objectives and requirements Plan your sales documents systematically - to make them easy to read and more persuasive How to make your proposal look like the 'least risky' option 5 Making your proposal a compelling and persuasive proposition Choosing the right words that sell effectively Selecting the right content and information for your document or proposal Using an option matrix to summarise complex choices and increase final order value How to write an executive summary 6 Well-written and error-free Developing your writing style for maximum impact Expressing the content (ie, selling points) clearly, concisely and correctly Proof-reading and editing work effectively, using formal marks and techniques Improving visual layout, format and appearance Keeping it customer-focused 7 Presenting to the client - overview Presentation options Understanding the client's objectives - as well as your own The proposal review meeting - logistics Managing to the next step Designing and delivering a compelling presentation Isolating objections and concerns Follow-up and follow-through 8 Positioning your final proposal Finalising your bid - presenting the right 'best few' USPs, features and benefits and making them relevant and real to the customer Smart ways to position price and be a strong player - without being the cheapest How to differentiate yourselves by how you present, as well as what you present How to design and deliver a successful bid presentation 9 Bid presentation practice session with structured feedback Participants work in small groups or pairs to prepare and later present a sample section from a real life bid or proposal presentation The trainer will provide assistance and input During group review and discussions, input from others will be encouraged and many best practice ideas summarised 10 Managing the end game How best to draw-out, understand, isolate and answer customer objections, negotiate points and concerns How to read the situation to plan the next step Identifying negotiation tactics - and how to deal with them Planning for a negotiation and how to get the customer feel they have the 'best deal' 11 Workshop summary and close

Bids and proposals (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

C)CSA: Cybersecurity Analyst Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Blue Team?Principles Network Architecture?and how it lays the groundwork Defensive Network Security Data Locations?and how they tie together Security?Operations?Center The People, Processes, and Technology Triage and Analysis Digital Forensics Incident Handling Vulnerability Management Automation, Improvement, and Tuning Digital?Forensics Investigative Theory and?Processes Digital Acquisition Evidence Protocols Evidence Presentation Computer Forensics?Laboratory Protocols Processing Techniques Specialized?Artifacts Advanced Forensics for Today?s?Exploitations Malware Analysis Creating the Safe Environment Static Analysis Dynamic Analysis Behavior Based Analysis What is different about?Ransomware? Manual Code Reversing Traffic Analysis Manual Analysis Principles Automated?Analysis Principles Signatures?compared to?Behaviors Application Protocols Analysis Principles Networking Forensics Assessing the Current State of Defense with the?Organization Network Architecture and Monitoring Endpoint Architecture and Monitoring Automation, Improvement, and continuous?monitoring Leveraging SIEM for Advanced Analytics Architectural Benefits Profiling and?Baselining Advanced Analytics Defeating the Red Team with Purple Team tactics Penetration Testing?with full knowledge Reconnaissance Scanning Enumeration Exploitation Lateral Movement Additional course details: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)CSA: Cybersecurity Analyst Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

DOG BEHAVIOUR

5.0(84)

By Cheshire Dog Services Ltd

DOG BEHAVIOUR At Cheshire Dog Services, emphasis is placed on modification of the dog’s behaviour through non-coercive and non-aversive methods. While basic training is a component of any behaviour modification program, it is likely you require assistance in devising a course of action that will help you and your dog successfully overcome any problems that arise during your dogs’ lifetime. Plenty of the problem behaviours that dogs’ develop can be a result of an owner’s misunderstanding of their dogs’ behaviour and can make matters worse when responding in an inappropriate way. Harsh methods can deteriorate your relationship with your dog and build distrust on both sides so using aggression to cure aggression does not work. Many nuisance behaviours or aggression problems are often very normal dog behaviours, therefore using harsh or aversive tactics to remove these undesirable actions are unwarranted and only delay in “fixing” the problem in the first place. Helping you understand dog psychology can give you the foundation to a happier life together! Glyn has a diploma (merit pass) in Advanced Canine Behaviour from the esteemed British College of Canine Studies. Are you experiencing problems with your dog such as: Jumping up Object guarding or stealing Aggression to other dogs, children & strangers Over guarding of you or your house Fear / nervousness / anxiety Excessive barking Getting into the car Barking at people or cars Behaviour Modification takes into account: Ensuring the Health & physical wellbeing of your dog. (physical health – diet, rest, exercise, medical illness ) & emotional wellbeing. Setting the dog up for Success – Avoiding putting the dog in a situation where he/she is likely to fail. Desensitisation & Counter Conditioning – presenting less threatening versions of the triggering stimulus & pairing it with things the dog enjoys. Positive Reinforcement / Differential reinforcement of Alternative Behaviour – teaching other skills the dog can do instead of the unwanted behaviour. Please contact us with the behaviour problems you are encountering and we’ll review what’s involved to help you. We would normally like to carry out a visit to your home, discuss the issue on full, meet your dog and set out what we need to do to help you. At this stage, we’ll set out costs involved as I’m sure you can understand that some behavioural issues can take longer to resolve than others. We would normally like to carry out at least one follow up visit and will provide you with a written report too. Please contact us for prices (they vary depending on what’s required)

DOG BEHAVIOUR
Delivered OnlineFlexible Dates
Price on Enquiry

Credit control training 'menu' (In-House)

By The In House Training Company

This is not a single course but a set of menu options from which you can 'pick and mix' to create a draft programme yourself, as a discussion document which we can then fine-tune with you. For a day's training course, simply consider your objectives, select six hours' worth of modules and let us do the fine-tuning so that you get the best possible training result. Consider your objectives carefully for maximum benefit from the course. Is the training for new or experienced credit control staff? Are there specific issues to be addressed within your particular sector (eg, housing, education, utilities, etc)? Do your staff need to know more about the legal issues? Or would a practical demonstration of effective telephone tactics be more useful to them? Menu Rather than a generic course outline, the expert trainer has prepared a training 'menu' from which you can select those topics of most relevance to your organisation. We can then work with you to tailor a programme that will meet your specific objectives. Advanced credit control skills for supervisors - 1⁄2 day Basic legal overview: do's and don'ts of debt recovery - 2 hours Body language in the credit and debt sphere - 1⁄2 day County Court suing and enforcement - 1⁄2 day Credit checking and assessment - 1 hour Customer visits and 'face to face' debt recovery skills - 1⁄2 day Data Protection Act explained - 1⁄2 day Dealing with 'Caring Agencies' and third parties - 1 hour Debt counselling skills - 2 hours Elementary credit control skills for new staff - 1⁄2 day Granting credit and collecting debt in Europe - 1⁄2 day Identifying debtors by 'type' to handle them accurately - 1 hour Insolvency: Understanding bankruptcy / receivership / administration / winding-up / liquidation / CVAs and IVAs - 2 hours Late Payment of Commercial Debts Interest Act explained - 2 hours Liaison with sales and other departments for maximum credit effectiveness - 1 hour Suing in Scottish Courts (Small Claims and Summary Cause) - 1⁄2 day Telephone techniques for successful debt collection - 11⁄2 hours Terms and conditions of business with regard to credit and debt - 2 hours Tracing 'gone away' debtors (both corporate and individual) - 11⁄2 hours What to do if you/your organisation are sued - 1⁄2 day Other topics you might wish to consider could include: Assessment of new customers as debtor risks Attachment of Earnings Orders Bailiffs and how to make them work for you Benefit overpayments and how to recover them Cash flow problems (business) Charging Orders over property/assets Credit policy: how to write one Council and Local Authority debt recovery Consumer Credit Act debt issues Using debt collection agencies Director's or personal guarantees Domestic debt collection by telephone Exports (world-wide) and payment for Emergency debt recovery measures Education Sector debt recovery Forms used in credit control Factoring of sales invoices Finance Sector debt recovery needs Third Party Debt Orders (Enforcement) Government departments (collection from) Harassment (what it is - and what it is not) Health sector debt recovery skills Hardship (members of the public) Insolvency and the Insolvency Act In-house collection agency (how to set up) Instalments: getting offers which are kept Judgment (explanation of types) Keeping customers while collecting the debt Late payment penalties and sanctions Letter writing for debt recovery Major companies as debtors Members of the public as debtors Monitoring of major debtors and risks Negotiation skills for debt recovery Old debts and how to collect them Out of hours telephone calls and visits Office of Fair Trading and collections Oral Examination (Enforcement) Pro-active telephone collection Parents of young debtors Partnerships as debtors Positive language in debt recovery Pre-litigation checking skills Power listening skills Questions to solicit information Retention of title and 'Romalpa' clauses Sale of Goods Act explained Salesmen and debt recovery Sheriffs to enforce your judgment Students as debtors Statutory demands for payment Small companies (collection from) Sundry debts (collection of) Terms and Conditions of Contract Tracing 'gone away' debtors The telephone bureau and credit control Taking away reasons not to pay Train the trainer skills Utility collection needs Visits for collection and recovery Warrant of execution (enforcement)

Credit control training 'menu' (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Web Application Firewall Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators and security professionals Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Describe NSX Advanced Load Balancer Web Application Firewall architecture Describe the NSX Advanced Load Balancer Web Application Firewall components and main functions Explain the NSX Advanced Load Balancer Web Application Firewall key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components Understand and modify application behavior leveraging Profiles, Policies and DataScripts Configure and customize the NSX Advanced Load Balancer Web Application Firewall Describe and leverage NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer Web Application Firewall application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of Web Application Firewall applications leveraging built-in NSX Advanced Load Balancer tooling This three-day course provides comprehensive training on how to configure, maintain and troubleshoot the Web Application Firewall component of the VMware NSX Advanced Load Balancer (Avi Networks) solution as well as provide an understanding of additional security related functionality. This course covers key NSX Advanced Load Balancer (Avi Networks) Web Application Firewall features and functionality offered in the NSX Advanced Load Balancer 18.2 release, including the overall infrastructure, virtual services and application components as well as application troubleshooting and solution monitoring. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Introduction to NSX ALB Web Application Firewall Introduce the NSX Advanced Load Balancer Web Application Firewall Discuss NSX Advanced Load Balancer Web Application Firewall use cases and benefits Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Attacking and Defending Web Applications Introduce the processes and methodologies used when attacking and defending web applications Introduce the tools used to attack web applications Explain with examples terminology such as Reflected XSS and SQL injection Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies DDOS Protection Introduce the NSX Advanced Load Balancer rate limiting functionality Explain the NSX Advanced Load Balancer rate limiting functionality Hands on examples of rate limiting in action Customizing Application Delivery with Datascripts Introduce the concept of datascripts to manipulate data Explain the various components and inspection points IWAF Deep Dive Describe the building blocks of the iWAF implementation Explain the various iWAF components Introduce both Positive and Negative security models Explain the iWAF Policies, profiles and rule sets IWAF Core Rule Set Explain the history and rationale of the core rule set Describe the NSX ALB (Avi) Core Rule Set IWAF Custom Rules Describe the power and complexity available via custom rules Explain the rule language Implement various use cases Explain common errors and possible solutions IWAF Operations Describe the iWAF application onboarding process Tuning the iWAF policies Working with iWAF logs and analytics Explaining false positive mitigation tactics IWAF Best Practices Provide guidance on how to get the best results Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Web Application Firewall Security
Delivered OnlineFlexible Dates
Price on Enquiry