Duration 5 Days 30 CPD hours This course is intended for This course is designed for: IT Professionals in the BC/DR or system administration domain, business continuity and disaster recovery consultants, individuals wanting to establish themselves in the field of IT business, continuity and disaster recovery, IT risk managers and consultants, and CISOs and IT directors. Before taking this course, some experience in the IT BC/DR domain is recommended. More info can be found here: https://www.eccouncil.org/wp-content/uploads/2017/05/edrpv3-brochure.pdf Overview EC-Council Disaster Recovery Professional (EDRP) is a comprehensive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. EDRP teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization's critical data in the aftermath of a disaster. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization?s critical data in the aftermath of a disaster. The program is designed to provide much needed step-by-step guidance to attendees and then tests their knowledge through case studies. EDRPv3 addresses gaps in other BC/DR programs by providing helpful templates that are applied to BC/DR efforts in an enterprise. Course Outline Introduction to Disaster Recovery and Business Continuity Business Continuity Management (BCM) Risk Assessment Business Impact Analysis (BIA) Business Continuity Planning (BCP) Disaster Recovery Planning Process Data Backup Strategies Data Recovery Strategies Virtualization-Based Disaster Recovery System Recovery Centralized and Decentralized System Recovery BCP Testing, Maintenance, and Training Additional course details: Nexus Humans EC-Council Disaster Recovery Professional (EDRP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Disaster Recovery Professional (EDRP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
What important conversations are your team members avoiding? Side-stepping difficult conversations can trap a team in unresolved problems, strained relationships, and missed chances for growth, which blocks progress and cultivates a lack of trust. But many people avoid difficult conversations or handle them poorly because they’re afraid to address uncomfortable issues and feel unprepared to respond to the emotional reactions that inevitably arise. Navigating Difficult Conversations: Turn Tension Into Progress takes a targeted approach to helping people to manage emotional tension and conduct conversations in a way that enables all parties to stay engaged in collaborative dialogue. Participants will shift their mindset from fearing and avoiding difficult conversations to seeing them as the way to make progress on important issues. And they’ll develop the skills to build trust and respect in every relationship as they navigate sensitive topics. Who Should Attend? This programme is for anyone who finds the thought if having a challenging or difficult conversation, something to be very nervous of, even to the point of avoiding the issue. We recommend that participants have first attended our Aspire programmes, Management Essentials and Performance Coaching, as they provide a strong foundation to the topic, which this session then builds upon. In Navigating Difficult Conversations participants will discover how to balance Courage and Consideration throughout the conversation by: Sharing their Purpose—the issue they need to make progress on—and Positive Intent—how they want the other person to benefit from the conversation Responding to emotional reactions using the skills: Pause, Don’t Panic Observe, Don’t Judge Ask, Don’t Assume Outcomes This module will help participants: Create a strong foundation for difficult conversations by setting a clear and collaborative tone that balances their own and others’ needs. Understand that emotional reactions are a natural, human response—and notice them as a signal that the conversation needs an adjustment to stay on track. Practice a range of tactics to respond in the moment to help everyone stay engaged and make progress.
Agile project management, already widely used for software development, is increasingly recognised as having much more general application. Continuous improvement programmes, business change projects, new technology development, research and development and a variety of other scenarios characterised by rapid change and high uncertainty can all benefit from an Agile approach. This programme presents the concepts and methods of Agile project management, and shows how to apply them to a range of project and change management situations. Participants will learn: how Agile project management can help with project and change management the 4 values and 12 principles of the Agile 'manifesto' and the range of Agile methodologies how to apply Agile project management methods and techniques in a range of project scenarios alternative Agile project management methods and how they can be applied and adapted what makes Agile project teams succeed the key roles and responsibilities needed to enable Agile project teams to work effectively how to encourage an Agile mindset within their organisation and how to move toward an Agile approach to managing projects 1 Introduction to Agile project management Overview of 'classical' project management and methodologies The link between project success and management performance Limitations of classical approaches and the need for Agile methods The 4 values and 12 principles of the Agile manifesto explained Agile project management values:Individuals and interactions over processes and toolsWorking outputs over comprehensive documentationCustomer collaboration over contract negotiationResponding to change over following a plan The cultural challenges of using Agile project management Choosing when and how to adopt Agile project management 2 Initiating a project using Agile project management Some key Agile methodologies explained: SCRUM, XP, Crystal Identifying and engaging project stakeholders; defining roles and responsibilities Setting the project vision and goals; defining project scope The Agile approach to requirements capture and elicitation of needs Tools and techniques for capturing and characterising requirements The role of documentation, reporting and process management 3 The Agile approach to definition and planning Understanding Agile planning; the 'planning onion' concept Developing the culture needed for collaborative involvement and iterative planning Defining project deliverables; the 'product backlog' concept Tools and techniques for defining and prioritising requirements in Agile projects Understanding and applying Agile estimating techniques Dealing with uncertainty and managing risks 4 The Agile approach to execution and delivery The results orientated, fast adapting culture of Agile teams The monthly 'Sprint' process for project planning and review The disciplines needed for effective daily SCRUM meetings Reviewing progress, managing change and project reporting Testing, completing and handing over of work packages Managing the interface between the project team and the business 5 Leadership and teamwork in Agile project teams Why Agile teams are different: the importance of individuals and interactions The skills and attributes needed to lead an Agile project team The challenges faced and skills needed by Agile team members Recognising team development needs; adopting the right leadership style Making the transition from project manager to Agile coach Key coaching skills explored: mentoring, facilitating, managing conflict
Duration 2 Days 12 CPD hours This course is intended for This course is intended for Data Warehouse Administrator, Database Administrator, Database Designer, Support Engineer, and Technical Administrator. Overview Upon successful completion of this course, students will be able to Install Oracle Grid Infrastructure for a Standalone Server, Configure ASMLIB and create ASM disk groups, Apply the latest patch set updates to the Grid Infrastructure software, Install Oracle Database software, Use Oracle Restart to manage components, Prepare the Linux operating system for Oracle software installation, Upgrade Oracle Database, Create a container database, Install Oracle Grid Infrastructure for an Independent Server, Create an Oracle Database using DBCA, and Install the latest patch set updates to the Oracle database software. This Oracle Database: Deploy, Patch and Upgrade Workshop gives you detailed information to help you install Oracle Database software. In this course, you will be introduced to Oracle Database Cloud Service. Oracle Database Overview Oracle Database Introduction Oracle Database Architecture Overview Oracle Database Instance Configurations Oracle Database Memory Structures Process Structures Database Storage Architecture Logical and Physical Database Structures Container and Pluggable Database Overview Installing Oracle Grid Infrastructure for a Standalone Server Overview of Oracle Grid Infrastructure for a Standalone Server System Requirements for Oracle Grid Infrastructure Configuring Storage for Oracle Automatic Storage Management (ASM) Installing Oracle Grid Infrastructure for a Standalone Server Upgrading Oracle Grid Infrastructure for a Standalone Server Installing Oracle Database Software Planning Your Installation System Requirements for Oracle Database Preparing the Operating System Using 4 KB Sector Disks Setting Environment Variables Checking the System Requirements Using the Oracle Universal Installer (OUI) Performing a Silent Mode Installation Creating an Oracle Database by Using DBCA Planning the Database Storage Structure Choosing non-CDB or CDB Types of Databases (based on workload) Choosing the Appropriate Character Set Understanding How Character Sets are Used Setting the NLS_LANG Initialization Parameter Using the Database Configuration Assistant (DBCA) Using Oracle Restart Oracle Restart Overview Oracle Restart Process startup Controlling Oracle Restart Choosing the Correct SRVCTL Utility Oracle Restart Configuration Using the SRVCTL Utility Obtaining Help for the SRVCTL Utility Starting Components by Using the SRVCTL Utility Introduction to Upgrading to Oracle Database Upgrade Methods Data Migration Methods Supported Releases for Direct Upgrade Overview of Upgrade Process Performing a Rolling Upgrade Upgrading a CBD Preparing to Upgrade to Oracle Database Developing a Test Plan Performance Testing Requirements for Databases Using Oracle Label Security or Oracle Database Vault Requirement for Databases Using Oracle Warehouse Builder Using the Pre-Upgrade Information Tool Backing Up the Database Installing the Oracle Database Software Preparing the New Oracle Home Upgrading to Oracle Database Upgrading by Using the Database Upgrade Assistant (DBUA) Manually Upgrading to Oracle Database Migrating a non-CDB to a CDB Performing Post-Upgrade Tasks Migrating to Unified Auditing Performing Post-Upgrade Tasks Following a Manual Upgrade Migrating Data by Using Oracle Data Pump Data Pump Overview Migrating by Using Data Pump Importing by Using a Network Link
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture, components, and main functions Explain the key features and benefits of NSX Advanced Load Balancer Explain and configure local load-balancing constructs such as virtual services, pools, health monitors, and related components Recognize web application breaches and threats Recognize multiple attack vectors such as web scraping, Layer 7 Denial of Service, brute force, and code injections Explain the components of NSX Advanced Load Balancer WAF that build a security pipeline to protect a web application from being attacked Describe how to configure the NSX Advanced Load Balancer WAF components Describe an NSX Advanced Load Balancer WAF operational task such as setting up an application with WAF, tuning the WAF Policy, and working with logs and analytics Explain the NSX Advanced Load Balancer WAF best practices for on-boarding a web application; configuring WAF settings for effective application security Explain how to size the NSX Advanced Load Balancer WAF data plane Explain the WAF Application learning feature, configuration of Application learning, Virtual Patching concepts, common caveats, and troubleshooting while deploying in any environment Recognize NSX Advanced Load Balancer Cloud Services that include threat Intelligence services Describe the Threat Intelligence service provided by NSX Advanced Load Balancer WAF and how the NSX Advanced Load Balancer WAF Threat Intelligence service receives live security threat feed for multiple attack vectors from Cloud Services (formerly Avi Pulse) Describe the NSX Advanced Load Balancer DataScript capabilities for detecting and defending against advance and zero-day attacks. Discuss the relevant NSX Advanced Load Balancer WAF logs and perform basic troubleshooting of applications that are protected by NSX Advanced Load Balancer WAF Explain the NSX Advanced Load Balancer WAF capability to protect Personally Identifiable Information (PII) This three-day course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer Web Application Firewall (WAF) solution. This course covers key NSX Advanced Load Balancer WAF features and functionality offered in the NSX Advanced Load Balancer 22.1.3 release for web security and application attack protection. Features include security pipeline, application learning, policy tuning, false positive mitigation, virtual patching, threat intelligence, troubleshooting, logs, analytics, and solution monitoring. Hands-on labs provide access to an NSX Advanced Load Balancer environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Illustrate NSX Advanced Load Balancer Explain NSX Advanced Load Balancer architecture and components Describe control plane clustering and high availability Describe data plane high availability mode Understand the common terminologies used with NSX Advanced Load Balancer Explain the NSX Advanced Load Balancer service elements Explain virtual service components and how to configure a virtual service Explain application profiles and network profiles Explain the pool configuration options and how to configure a pool Explain the available load-balancing algorithms Explain and configure SSL profiles and certificates Explain cloud connectors and cloud connector integration modes Explain multiple health monitor types Understand client logs Introduction to Application Security Understand web application security breaches and the implication of breaches Explain common terminologies related to Web Application Security Understand the different teams involved to secure applications Attacking Web Applications Understand the various web application security testing methodologies Understand the OWASP Top 10 vulnerabilities Understand the tools to generate a web application attack Describe a few types of web application attacks Types of Transport Understand different web traffic transport modes Describe web traffic and API traffic NSX Advanced Load Balancer WAF Components Understand the core design principles of NSX Advanced Load Balancer WAF Describe the NSX Advanced Load Balancer WAF components that build the WAF security pipeline Understand the NSX Advanced Load Balancer WAF configuration objects NSX Advanced Load Balancer WAF Operations Examine how to set up an application with WAF Describe considerations for the WAF policy Work with WAF logs and analytics Describe WAF policy tuning Describe the options available to remediate false positive mitigation NSX Advanced Load Balancer WAF Best Practices Describe technical and application considerations for onboarding an application front ended by WAF Describe best practices to remediate false positive mitigation. Describe how to manage a response from a back-end application server and client upload to the application server Describe the consideration for setting the rigidity of a WAF signature rule set Describe the options available to identify client traffic NSX Advanced Load Balancer WAF Sizing Understand how to do WAF data plane sizing in Greenfield and Brownfield deployments NSX Advanced Load Balancer WAF Custom Rules Understand WAF custom rules Describe the need and recommendation for custom rules Describe ModSecurity rules Understand the ModSecurity rule structure and explain how to construct the rule Analyze a sample custom rule for the use-case scenario for in-depth understanding of a custom rule NSX Advanced Load Balancer WAF Application Learning Understand the significance of Application Learning Explain the Positive Security Model architecture Describe the WAF multifaceted Application Learning technique to build an application model for creating positive security rules Describe how to view the data that is learned by the Application learning module Describe the WAF Virtual Patching technique to construct a WAF policy from Dynamic Application Security Testing (DAST) scanner results Understand the conditions for sharing WAF Learning Data and PSM Group in WAF Policy. Malware Protection Through ICAP in NSX Advanced Load Balancer Understand Malicious File Upload Protection and ICAP workflow Describe ICAP configuration and log analytics NSX Advanced Load Balancer IP Reputation Understand IP Reputation concepts and their integration with NSX Advanced Load Balancer Describe IP Reputation configuration, log analytics, and troubleshooting DataScript for Application Security Describe DataScript events and reference Describe application security using DataScript Explain how to troubleshoot DataScript issues Rate Limiting and DOS Describe and configure the NSX Advanced Load Balancer rate limiter technique Describe protection from denial of service (DoS) attacks and distributed DoS (DDoS) attacks in NSX Advanced Load Balancer Explain the Service Engine general advice and guidance for DDOS Bot Management Understand Bots Describe the Bot Management mechanism in NSX Advanced Load Balancer Describe how to configure NSX Advanced Load Balancer Bot Management Managing Personally Identifiable Information in NSX Advanced Load Balancer Understand Personally Identifiable Information (PII) Understand the scope of managing PII in NSX Advanced Load Balancer Describe how to configure the hidden PII in NSX Advanced Load Balancer logs using profiles and WAF rules. Threat Intelligence Introduce the Threat Intelligence service Describe the Threat Intelligence live security threat feed for multiple attack vectors Describe how to configure Threat Intelligence in NSX Advanced Load Balancer Application Programming Interface Security Define Application Programming Interface (API) Security Understand API authentication and authorization using virtual service authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Understand API Rate Limiting in NSX Advanced Load Balancer Understand the NSX Advanced Load Balancer WAF Protection for API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2.75 Days 16.5 CPD hours This course is intended for Complete beginners who have never programmed before to experienced developers coming from another programming language. Overview You will learn how to leverage the power of Python to solve tasks. You will build games and programs that use Python libraries. You will be able to use Python for your own work problems or personal projects. You will create a portfolio of Python based projects you can share. Learn to use Python professionally, learning both Python 2 and Python 3! Create games with Python, like Tic Tac Toe and Blackjack! Learn advanced Python features, like the collections module and how to work with timestamps! Learn to use Object Oriented Programming with classes! Understand complex topics, like decorators. Understand how to use both the Jupyter Notebook and create .py files Get an understanding of how to create GUIs in the Jupyter Notebook system! Build a complete understanding of Python from the ground up! Our Introduction to Python course is designed to take complete beginners or experienced developers up to speed on Python?s capabilities, setting up students for success in using Python for their specific field of expertise. Whether you have never programmed before, already know basic syntax, or want to learn about the advanced features of Python, this course is for you! In this course we will teach you Python 3. Learn how to use Python for real-world tasks, such as working with PDF Files, sending emails, reading Excel files, scraping websites for information, working with image files, and much more! This course will teach you Python in a practical manner and provides a full coding screencast and a corresponding code notebook to review the concepts and exercises conducted in class. Please note, this course is able to be offered in either 3 full day sessions or 5 partial day sessions. See the schedule below. This course includes 6-months access to the full course content in on-demand format to support post-class reference and review. Command Line Basics Python System Setup Jupyter Notebooks Python Data Types Key Data Structures Logic and Control Flow Functions Debugging Modules Object Oriented Programming File I/O Testing Decorators Generators Automation of Tasks Web Scraping Graphical User Interfaces Additional course details: Nexus Humans Introduction to Python training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Python course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is intended for: System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe Cisco DWDM platform basics Describe DWDM network topologies Describe the management software used for managing Cisco DWDM networks List the different hardware components of the Cisco ONS and Cisco NCS DWDM systems Provision nodes and circuits in a Cisco DWDM network Perform node and multishelf configurations Implement SMR-based rings Provision optical circuit protection mechanisms Configure Any Rate cards Describe the function of Raman amplifiers Perform basic maintenance and troubleshooting of a Cisco DWDM network The Cisco Optical Technology Intermediate (OPT200) v3.0 course is designed to teach you the skills necessary to deploy the Cisco© Optical Networking System (ONS), 15454 Multiservice Transport Platform (MSTP), and Cisco Network Convergence System (NCS) 2000 Series Dense Wavelength-Division Multiplexing (DWDM) networks from installation to protection. Through a combination of lecture and hands-on experience, you will learn installation, configuration, circuit protection, maintenance, and basic troubleshooting using the Cisco Transport Controller for the Cisco ONS 15454 M6 and M12 shelves, and for the Cisco NCS 2016 shelf.Additionally, in this course you will review DWDM terminology and components, explore available chassis and cards, and discuss hardware installation. You will learn to use the Cisco Transport Controller server software to connect to the nodes, perform network turn-up and circuit creation, and deploy linear and single-module ROADM (SMR) DWDM multishelf topologies. Using this software, you will also configure Raman amplifiers and Any Rate cards, and configure protected and unprotected circuits. The course covers a variety of card options: controllers, transponders, multiplexer-demultiplexer, add/drop, Raman amplifiers, and Cisco Any Rate muxponder cards. You will use the various cards to configure terminal, amplifier, mesh, split, Optical Service Channel (OSC) regenerator, and Reconfigurable Optical Add/Drop Multiplexing (ROADM) nodes. Finally, you will learn how to use many of the tools and features available with the Cisco Transport Controller to perform maintenance, testing, and basic troubleshooting of your optical network. Course Outline DWDM Optical Platform Foundation Chassis and Cards Hardware Installation Node Turn-Up and Circuit Creation Node and Multishelf Configurations SMR-Based Rings 10Gb Circuit Protection Any Rate Card Configuration Raman Amplifiers Maintenance and Basic Troubleshooting Additional course details: Nexus Humans Cisco Optical Technology Intermediate v3.0 (OPT200) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Optical Technology Intermediate v3.0 (OPT200) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Bad news - people don't buy your product. Better news - they don't buy anyone else's product either. Best news - they do buy what a product gives them, whether it be removing 'pain' or giving 'pleasure'. So what a challenge it is that every single person buys your product for a slightly different reason! What's the secret to selling in that sort of sales environment? This programme provides a great roadmap. This course will help participants: Build rapport with authenticity Use open questions, listening and summary to properly understand the prospect Use 'impact' questions to 'stack the pain' of remaining with the status quo Convert features into personalised benefits that reflect stated needs Handle objections with calm confidence Identify buying signals Close effectively Convey credible urgency centred on the prospect's - not the salesperson's - interests 1 What makes a customer buy any product? Moving towards 'pleasure' Moving away from 'pain' Robert Cialdini's Psychology of Influence - buying motives Understanding what your product does for customers Why there is never a 'one size fits all' approach What are the real 'unique selling points' and why the salesperson is the real 'USP' At what point does the customer emotionally buy your product? 2 Getting past gatekeepers What gatekeepers' motivations are How to make them your friend rather than your enemy How to make your call harder to block than to put through How to control the gatekeeper with questions, not answers Using Cialdini's 'reciprocity' law to get put through more often Practical exercise in which the trainer poses as gatekeeper 3 Questioning and listening skills How to use open questions to get the customer talking What questions to avoid and why How to 'stack the pain' of the status quo with 'impact questions' Practical 'pain stacking' exercise in pairs What listening is and what it isn't Question funnelling - how to earn deeper disclosure through probing Practical funnelling exercise in pairs The power of summary 4 How to create tailored benefits and not 'dive into solution' What is 'diving into solution'? Examples and analogies Why it is to be avoided Practical exercise in pairs - how it feels to have solutions offered up too early How to avoid 'feature-dumping' What is 'value selling'? How to create tailored benefits How to convert product features into benefits How to deal with the prospect's competitor allegiance 5 Handling objections and testing the water How to overcome the price objection by selling value Common objections the participants encounter and answers that work The objections salespeople carry in their own heads The 'A-C-E' objection-handling model How to uncover objections When - and when not - to trial close 6 Closing skills Why salespeople often close too early How to identify buying signals How to use urgency with skill and effectiveness Four killer closing techniques that work How to avoid buying the product back by careless post-sale talk How to ask for referrals for your product How to 'farm' the account for future opportunities 7 Wrap-up Key learnings from each participant Individual action planning - steps that can and will be implemented in the workplace