• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

26043 Courses

VMware NSX-T Data Center for Intrinsic Security [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight™ for NSX™ and VMware vRealize Network Insight™ to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response

VMware NSX-T Data Center for Intrinsic Security [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced security administrators and security analysts who are already familiar with VMware Carbon Black Cloud Overview By the end of the course, you should be able to meet the following objectives: Describe and determine use cases for integrating with VMware Carbon Black Cloud Configure, automate, and troubleshoot the VMware Carbon Black Cloud Syslog Integration Use VMware Carbon Black Cloud APIs to pull data with Postman Install and use the VMware Carbon Black Cloud Python SDK Automate operations using the VMware Carbon Black Cloud SDK and APIs Identify and troubleshoot VMware Carbon Black Cloud sensor installations Gather troubleshooting data within the browser to remediate or escalate problems Identify and resolve sensor usage, networking, and performance problems with the VMware Carbon Black Cloud sensor This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in performing advanced operations and troubleshooting of VMware Carbon Black Cloud. This course will go into integrating VMware Carbon Black Cloud with other third-party components and utilizing the API and the SDK to automate operations within the product and your security stack. This course will also enable you to troubleshoot common problems during sensor installation, operations, and within the VMware Carbon Black Cloud console with hands-on lab problems. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black Cloud Integrations Describe the integration capabilities with VMware Carbon Black Cloud Determine integration use cases for VMware Carbon Black Cloud Identify required components for integrating VMware Carbon Black Cloud Differentiate VMware Carbon Black Cloud integration vendors VMware Carbon Black Cloud Syslog Integration Describe the function of the Syslog Connector Generate API and SIEM keys from the Cloud console Validate a successful Syslog integration Describe how to automate the Syslog Connector Troubleshoot problems with the Syslog integration Using Postman Explain the concept and purpose of an API Interpret common REST API Status codes Recognize the difference between platform and product APIs Using the Postman Client to initiate API calls Create a custom access level and respective API key Create a valid API request Using the VMware Carbon Black Cloud Python SDK Install the VMware Carbon Black Cloud Python SDK Describe the different authentication methods Evaluate the best authentication method for a given task Automating Operations Automate basic Incident Response tasks using the VMware Carbon Black Cloud SDK and API Automate basic watchlist interactions using the VMware carbon Black Cloud SDK and API Sensor Installation Troubleshooting Describe sensor install log collection process Identify sensor install log parameters Create a detailed sensor install log Locate sensor install logs on an endpoint Interpret sensor install success from an install log Determine likely cause for install failure using sensor logs Propose resolution steps for a given sensor install failure VMware Carbon Black Cloud Console Troubleshooting Identify sensor bypass status reasons Simplify console data exports using search Describe differences in Audit Log detail levels Locate built-in browser tools Gather console diagnostics logs from a browser Review console diagnostics logs Sensor Operations Troubleshooting Identify available types of diagnostic logs Gather appropriate diagnostic logs for a given issue Identify steps for resolving software interoperability problems Identify steps for resolving resource problems Identify steps for resolving network problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud:Advanced Operations and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud:Advanced Operations and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

VMware End User Computing: Design

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Assess the business and application requirements of an environment Analyze design choices and design an EUC infrastructure architecture that addresses the needs of the environment Design an EUC architecture that addresses the needs of the organization and follows VMware best practices Document a design that can be implemented Design a comprehensive VMware EUC solution This five-day course presents a methodology for designing a VMware end-user computing (EUC) solution. The design methodology includes recommendations for the types of information and data that must be gathered and analyzed to make sound design decisions for the client systems, the desktop options, the VMware vSphere© infrastructure, VMware Horizon©, VMware Horizon© Cloud ServiceTM, VMware Workspace ONE© UEM, VMware Workspace ONE© AccessTM, VMware NSX-TTM, and VMware Unified Access GatewayTM. VMware best practices are presented for each phase of the design process. In this course, you apply your new knowledge by working with other participants to design a VMware EUC solution for a real-world project. Course Introduction Introductions and course logistics Course objectives VMWare EUC Design Methodology Recognize the characteristics of a good design. Identify the phases of VMware EUC Design Methodology Presenting Solutions to Executive Management Identify behaviors that can affect team performance negatively List common mistakes when working in a team Describe how to tailor a presentation to the company?s values, and stakeholders? backgrounds and roles List questions you should ask to identify how to address a problem a client is trying to solve Infrastructure Assessment and Services Definition Define customer business objective Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes Horizon Architecture and Components Determine the components required for a Horizon on-premises or Horizon Cloud deployment Implement the design considerations and recommendations for various Horizon components Analyze the use-case scenarios for various the Horizon deployment options Component Design: Horizon Pods Design a single-site Horizon desktop block and pod configuration for a given use case Design Cloud Pod Architecture for multisite pool access Design Control Plane Services Architecture for multisite pool access Component Design: App Volumes and Dynamic Environment Manager Identify the functionalities of the components in App Volumes Logical Architecture Implement the recommended practices when designing an application delivery mechanism using App Volumes Component Design: Workspace ONE Map the Horizon desktop building block and the Horizon management building block to VMware vSphere. Identify factors and design decisions that determine the sizing for ESXi hosts Workspace ONE & Horizon Infrastructure Design Design the environment resources required to support a Workspace ONE and Horizon deployment Identify factors and design decisions that determine the sizing for ESXi host Discuss the factors that determine the sizing for shared storage Identify the design decisions related to bandwidth utilization Discuss the implications of using load balancing and traffic management Identify factors and design decisions that determine the sizing of the Azure pods Design Integration and Delivery List the platform components that needs to be integrated along with their dependent services. Integrate Workspace ONE and Horizon platform components. Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware End User Computing: Design training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware End User Computing: Design course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware End User Computing: Design
Delivered OnlineFlexible Dates
Price on Enquiry

Managing Agile Projects Using TFS 2017

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for project managers, Scrum masters, business analysts, and team leaders looking to effectively manage their development projects using Team Foundation Server 2017. Overview The course also demonstrates how TFS facilitates the use of storyboards to prototype experiences, request stakeholder feedback, foster team collaboration, and generate reports. The final two modules of the course provide an overview of how testers and developers can work effectively using appropriate tools in the Visual Studio family. In this course, attendees will plan a new software development project and go through the steps to initiate the project using Visual Studio 2017. This includes recording requirements, creating a product backlog, and estimating effort for backlog items. Introducing the Microsoft Visual Studio 2017 Family What?s new in Visual Studio 2017 Overview of the Visual Studio 2017 family Overview of product features Project workflow across the Visual Studio 2017 suite of products Initiating a New Project Organizing projects in TFS Understanding process templates Creating a new team project Setting team project properties Switching between team projects Work Item Primer Overview of work items Traceability between work items Searching and creating custom queries Work item charting and pinning charts Work item tagging Configuring project notifications Creating our Product Backlog Examining requirement types Creating backlog items Creating requirement hierarchies using features The importance of acceptance criteria Agile Estimation Introduction to estimation Using story points Planning Poker and other popular estimation techniques Adding your estimates to TFS work items Working from the Product Backlog Introducing the Kanban board Entering and editing details on the Kanban board Customizing columns, including using split columns and limiting WIP Recording our Definition of Done (DoD) Understanding the Cumulative Flow Diagram Working in Sprints Specifying your sprint schedule and your team capacity Selecting items for the sprint backlog using forecasting Decomposing requirements into tasks Using burndown charts to track progress Monitoring work using the task board Working with unparented work items Retrospectives The importance of retrospectives Conducting an efficient sprint retrospective What you should avoid in your retrospective Working with TFS Teams Configuring teams in our team project Managing work from a master backlog Allocating work to our teams Configuring iterations for TFS teams Enhancing Requirements Using Storyboards Overview of storyboarding capabilities Creating a storyboard to illustrate a requirement Linking a storyboard to a work item Getting Stakeholder Feedback Introducing the Microsoft Feedback Client Using the Microsoft Feedback Client to provide rich feedback to the team Adding continuous feedback into your workflow Fostering Team Collaboration An overview of the various clients The use of email in sharing information Choosing the appropriate client tool Creating and Customizing Reports Overview of reporting architecture Reviewing the out of the box reports Adding new reports Creating ad hoc reports using Excel Overview of Agile Testing The role of the tester in a sprint planning meeting A lap around web-based test management Creating a test plan Creating manual test cases from requirements Overview of Agile Development Using My Work to select tasks from the sprint backlog Understanding the value of linking changesets to work items The importance of unit testing Creating a continuous integration build Additional course details: Nexus Humans Managing Agile Projects Using TFS 2017 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Agile Projects Using TFS 2017 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing Agile Projects Using TFS 2017
Delivered OnlineFlexible Dates
Price on Enquiry

BA28 - Requirements Analysis and Use Cases

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course has been expressly designed for the Business Analyst, Business System Analyst, System Analyst, and/or Requirements Engineer. The Designer, Developer and Tester who are actively involved in utilizing use cases may also benefit from this workshop. Overview Employ use cases to elicit requirements, at a business, system or subsystem levelEmploy use cases to document the scope of a projectWrite use cases in a clear and unambiguous way.Model use cases with workflow diagramsPlan and divide up the project work based on your use casesManage a use case as it evolves over time and goes through many changes This course provides a strong foundation in the mechanics of use case diagramming and writing textual descriptions of use cases. In this highly interactive workshop, you will learn how to enhance and refine your use case skills, how to involve your stakeholders in the use case process, and how to develop use cases that provide valuable information to the designers and testers. Use cases that meet the needs of designers can be too technical and too detailed for other stakeholders. Use cases that satisfy business users are usually not very helpful to designers and testers. How do you satisfy these two disparate interests? And how do you handle the details like business rules, data validations and user interface specifications? Introduction Course objectives Understanding of business analysis Knowledge areas of BABOK© Guide Overview of Use Cases Describe the purpose and value of a use case approach Use case terminology Introducing a use case approach Needs Assessment Purpose of Needs Assessment Needs Assessment and use cases Defining and understanding the strategic goals and objectives Understanding the business process Identifying actors Identifying business information Analyzing locations and operations Drawing the business use case diagram Building the business architecture Defining solution options Defining System Scope Product scope/project scope System actors versus business actors Analyzing the business process model Analyzing business use cases Identifying candidate use cases Identifying scenarios Diagramming use cases Draw a use case diagram Create a use case catalog Evaluating, Prioritizing, and Packaging Use Cases Iterative nature of this work Evaluating use cases Use case priority Use case risk Use case complexity Use case dependencies Evaluate and Prioritize use cases Dividing work up between releases Packaging A process for how to perform packaging Writing the Main Success Scenario Use case descriptions Primary and secondary goals Assumptions Pre-conditions Triggers Post-conditions Scenario example Main success scenario Conditional execution Use cases and requirements Best practices for writing a use case description Writing the Other Scenarios Scenarios and flows Alternate scenarios and flows Alternate vs. basic flow Guidelines for alternate flows Exception flows Failed post conditions Write alternate and exception flows Process Modeling to Describe Use Case Flows UML© Activity Diagram Notation Sequencing activities Developing an activity diagram Facilitated sessions Draw a UML© Activity Diagram Using Advanced Diagramming Techniques Commonality Dependency Relationships Identify relationships Comparing the different relationships Developing a Requirements Specification Requirements and use cases Detailed requirements Common approaches to specifications Non-functional requirements Write non-functional requirements User interface requirements UI data descriptions Business rules Decision tables and inference rules How to document simple calculations Reporting requirements Data requirements Data accessibility requirements Traceability Course Summary Wrap-up Finding more information Additional course details: Nexus Humans BA28 - Requirements Analysis and Use Cases training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA28 - Requirements Analysis and Use Cases course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA28 - Requirements Analysis and Use Cases
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Design and Build Integration Solutions (ARC101)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is designed for experienced administrators and platform developers as well as solution, enterprise, and technical architects responsible for designing or building integration solutions on the Salesforce Platform. It's also designed for project or program managers looking to understand the big picture of integration in order to better manage their projects and programs. Ideally, you hold the Salesforce Administrator, Salesforce App Builder, or Salesforce Platform Developer I credential and/or are knowledgeable about standard and custom objects; how to work with flows and Process Builder; how to navigate Salesforce, Lightning Components, and Schema Builder; and Apex basics such as creating a Class and Anonymous Blocks. This class is recommended for anyone looking to earn their Salesforce Certified Integration Designer credential. Overview When you complete this course, you will be able to: Identify integration requirements by asking relevant integration questions to business stakeholders. Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes, Data Virtualization) to design integration solutions. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, Outbound Messaging, Callouts, and Salesforce Connect) to build integration solutions. Explore architectural concepts and the big picture thinking of how to integrate on the Salesforce Platform. In this 3-day class, our Salesforce integration experts will demonstrate how to build solutions that provide a single view of your customers. You?ll learn about integration capabilities and the considerations that should be made when architecting an integration solution. Through a combination of demos, discussions, and hands-on exercises, you?ll design and build secure, scalable, and high-performing integration solutions that seamlessly surface the information that matters most Integration Overview Understand the Importance of Integration Explore Integration Architecture Explore the Meaning of Single View of the Customer Explore the Meaning of System Landscape Understand the Role of Enterprise Service Bus (ESB) and Extract Transform Load (ETL) in System Landscape Integration Capabilities Introduction to Salesforce APIs Create External Applications Using SOAP API Build Mobile Applications Using REST API Work with Large Data Volumes Using BULK API Build Event-Driven Applications Using Streaming API Build Event-Driven Applications Using Platform Events Build Event-Driven Applications Using Change Data Capture Send Data from Salesforce to External Applications Using Outbound Message Call External APIs Programmatically Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Call External APIs Declaratively Using External Services Integration Patterns Understand Use Cases for a Request and Reply Pattern Understand Use Cases for a Fire and Forget Pattern Understand Use Cases for a Batch Data Synchronization Pattern Understand Use Cases for a Remote Call-In Pattern Understand Use Cases for a UI Update Based on Data Changes Pattern Understand Use Cases for a Data Virtualization Pattern Integration Security Explore Two-Way Transport Layer Security (TLS) Understand When to Use Remote Site Settings Understand the Benefits of Using Named Credentials Understand Certificates Encrypt Your Data at Rest Using Salesforce Shield Platform Encryption Advanced Integration Discussions Design Solutions for Performance Design Solutions for Scale Review Integration Regulatory Requirements Review Integration Best Practices Case Study Draw a System Landscape Diagram Evaluate Business Needs Translate Needs to Integration Requirements Design an Integration Solution Build an Integration Solution Maintain an Integration Solution Additional course details: Nexus Humans Salesforce Design and Build Integration Solutions (ARC101) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Design and Build Integration Solutions (ARC101) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Design and Build Integration Solutions (ARC101)
Delivered OnlineFlexible Dates
Price on Enquiry

Consultative selling (In-House)

By The In House Training Company

'Selling' doesn't work. You've got to help customers buy. And that means engaging with the customer in a positive way, showing that you understand their requirement and giving them confidence that your product or service is the best possible way of meeting that requirement. This may sound painless but there's more to it than meets the eye and it's all too easy to get it wrong. You need to follow a process. This programme will help participants: Understand 'how buyers buy' and align their selling activities accordingly Recognise the difference between 'latent pain' and 'active vision' opportunities Conduct effective pre-call planning and research Stimulate interest and establish credibility with your prospects Get prospects to share / admit high priority pain Engage in consultative dialogue that promotes the differentiating strengths of your offerings Gain access to 'power' people within an opportunity Effectively qualify and disqualify opportunities based on objective decision criteria Better control and manage sell cycles Improve their chances of winning competitive opportunities Shorten sales cycles and avoid 'no decision' Negotiate the steps leading to a successful sale 1 An introduction to selling Understanding the key points that encourage a customer to purchase from us The difference between consultative selling and a transactional sale Understanding the roles that trust and empathy play in a sale Understanding how tricks and manipulation can sink a sale Vital pre-meeting research that must take place before a conversation Understanding how the customer sees us and why positioning is important 2 Structuring the sales conversation process Defining a set process for structuring a sales call with a chance to demonstrate understanding How the first minute of a conversation can destroy a sale Understanding BPO objectives for a sale How a step-by-step sales conversation process helps win more sales Understanding the mis-match between the customers buying process How our sales processes can lead to mistakes 3 How and why people buy An insight into the emotional factors behind how people arrive at purchasing decisions Using research from neuroscience that shows how sales people can really make mistakes Understanding how people make decisions about larger purchases Understanding the stakeholders in companies and their buying motives How to analyse the stakeholders and determine a win-plan 4 Understanding the funnel Studying the sales and buying process to understand the ratios of sales to prospects and better forecasting Understanding the role of forecasting in sales analysis Why many forecasts are nearly always wrong Understanding the stages of a sales process How 'verifiable outcomes' can really change forecasting 5 Questioning techniques Understanding the different questioning techniques and when they should be used Using the 'knowledge tree' as a framework for questioning Understanding the use of real empathy to help customers uncover their needs How effective research can really empower your questions How to ask 'high gain' questions How to ask difficult questions without feeling intrusive 6 Features and benefits How to practically apply them in a sales scenario How to align the benefits to customers' business goals Really understanding the difference and how to demonstrate true economic benefits to a customer How to discover business goals, and align value propositions to these How to craft an effective value proposition for a customer Using the SAR storytelling method to really engage customers to align their thinking patterns Using the latest neuroscience research that explains what customers are really thinking 7 Overcoming objections How 'confirmation bias' can hinder any sales conversation How the CLARA method of responding to customer concerns can dramatically improve the chances of customers responding to us in a positive way Practising the method to become comfortable and congruent with it 8 Closing the sale A deep dive into what closing is How different sales have different closes How too many closing methods can destroy a sale How to lead up to a close with a logical sequence of questions Using the ACSAT trust method of closing A clear methodology with a chance to practise the skills in a fun way

Consultative selling (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Creating effective specifications (In-House)

By The In House Training Company

High quality specifications are of paramount importance in achieving the right technical performance and value for money. This long-established training programme has been developed to help those involved in producing specifications to create high quality documents in an organised and effective way. It provides a sound foundation for those new to the topic whilst at the same time offering new insights to those with more experience. The programme emphasises the need for a clear definition of requirements combined with the ability to communicate those requirements effectively to third parties. A structured method of preparing specifications is provided, and a range of practical techniques is presented, to enable participants to put the principles into practice. The commercial and contractual role of specifications is also addressed. The objectives of the workshop are to: Provide a clear understanding of the role and purpose of specifications Present a framework for organising and producing specifications Define the key steps involved in creating effective specifications Demonstrate methods for assisting in defining requirements Provide tools and techniques for scoping and structuring specifications Show the role of specifications in managing variations and changes to scope Present methods to assist the writing and editing of specifications Review how specifications should be issued and controlled DAY ONE 1 Introduction Review of course objectives Review of participants' needs and objectives 2 Creating effective specifications The role of specifications in communicating requirements The costs, benefits and qualities of effective specifications Understanding the differences between verbal and written communication The five key steps of 'POWER' writing: prepare-organise-write-edit-release Exercise: qualities of an effective specification 3 Step 1: Preparing to write - defining readership and purpose; the specification and the contract Designing the specifications required; applying BS 7373 Defining the purpose, readership and title of each document Effective procedures for writing, issuing and controlling specifications The roles and responsibilities of the key players Understanding contracts; the contractual role of the specification Integrating and balancing the technical and commercial requirements Writing specifications to achieve the appropriate contract risk strategy Deciding how to specify: when to use functional and technical specifications The role of specifications in managing variations and changes to scope 4 Case study 1 Teams review a typical project scenario and identify the implications for the specification Feedback and discussion 5 Step 2: Organising the specification content Defining the need and establishing user requirements Deciding what issues the specification should cover Scoping techniques: scope maps, check lists, structured brainstorming Clarifying priorities: separating needs and desires Dealing with requirements that are difficult to quantify Useful techniques: cost benefit analysis, QFD, Pareto analysis 6 Case study 2 Teams apply the scoping techniques to develop the outline contents for a specification Feedback and discussion DAY TWO 7 Step 2: Organising the specification content (cont) Deciding what goes where; typical contents and layout for a specification The three main segments: introductory, key and supporting Creating and using model forms: the sections and sub-sections Detailed contents of each sub-section Tools and techniques for outlining and structuring specifications 8 Case study 3 Teams develop the detailed specification contents using a model form Feedback and discussion 9 Step 3: Writing the specification The challenges of written communication Identifying and understanding the readers needs Choosing and using the right words; dealing with jargon Problem words; will, shall, must, etc; building a glossary Using sentence structure and punctuation to best effect Understanding the impact of style, format and appearance Avoiding common causes of ambiguity Being concise and ensuring clarity Choosing and using graphics to best effect Exercises and examples 10 Step 4: Editing the specification Why editing is difficult; how to develop a personal editing strategy Key areas to review: structure, content, accuracy, clarity, style and grammar Editing tools and techniques 11 Step 5: Releasing and controlling the specification Key requirements for document issue and control Final formatting and publication issues; document approval Requirements management: managing revisions and changes 12 Course review and action planning What actions should be implemented to improve specifications? Conclusion

Creating effective specifications (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Network Automation with Python and Ansible

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Network Administrators Administrators interested in Automation Individuals interested in devops, specifically for networking Overview This course teaches students to blend Python skillsets with Ansible through the lens of automating networks. Automation techniques for the most popular vendor (incl. Cisco, Juniper, Arista) will be subjects of study, however, students may request examples from vendors within their own environments. Topics begin with a focus on automating networks with Python; this skill set is then folded into a broadening understanding of automating with Ansible. Students will have programmatic experience automating enterprise class networks by the conclusion of this course (includes writing custom Ansible modules with Python). Class is a combination of lecture, demonstration, and hands-on labs. Students are invited to share their own relevant Python and Ansible scripts with the instructor to ensure class subjects are as relevant as possible. All notes and scripts will be made available to students by the end of each day via a cloud-share or email. Lab time will be given reinforce that day's topics and demonstrations. No two networks are the same! Learn to automate your network with a Python and Ansible skillset. Course can be taught across all major (and most minor) network vendors. Course demonstrations can be adapted to best-fit the customer?s network to ensure all lessons have maximum relevance. Day 1 ? Critical Python Catchup & Review Overview of Python and Ansible Python white space rules & best practices Printing and more Printing Date types and Variables Packing and Unpacking Variables f Strings Conditional expressions Relational and Boolean operators Lists, Tuples, Dictionaries Indexing and slicing Built-in functions Iterating with Loops (for and while) Working with files Software Control Management (SCM) (Git, Github, Bitbucket, Cloudshare, etc.) Using Python to access REST interfaces Working with JSON Python, Ansible and Paramiko Using Paramiko to SSH with keys and passwords RESTful API review API keys Paramiko Review Using Paramiko to SFTP with keys and passwords Day 02 ? Python and Network Automation Introduction to Netmiko (automating routers and switches) Using Netmiko to send commands to / from network devices Working with YAML Converting JSON to YAML with Python Ansible keywords YAML and JSON for data exchange Ansible and YAML Ansible Playbook components Tying together Python and Ansible ? Using Python within Ansible Ansible Network Modules What is new in Ansible (most current updates / release notes) Network Agnostic modules Writing network playbooks Reviewing the construction of network playbooks Writing Ansible playbooks that respond to network failures Day 03 ? Blending Python and Ansible Skillsets Review how to use Python within Ansible Calling Python scripts with Ansible Jinja2 Templating Engine for Python (and Ansible) Using Templates in Ansible playbooks Jinja2 filters, looping, and other useful tricks for automating with Ansible Playbook tagging for selective runs When to use Python and when to use Ansible ?Big Picture? options for using Python & Ansible within your Network Ansible Roles Day 04 ? Customizing Ansible with Python Review ? Running Scripts with Ansible Prompting for Ansible user input Ansible Galaxy & Getting at Roles Writing a custom Ansible Module with Python Ansible ?Engine? vs Ansible ?Tower? ? marketing hype, capabilities, costs, etc. Case Study: Automate your Enterprise Network When to use Python and when to use Ansible Writing your own Ansible modules in Python ?Big Picture? options for using Python & Ansible within your Network Overview ? NETCONF / YANG and what they mean for Python and Ansible Molecule ? Testing your roles Additional course details: Nexus Humans Network Automation with Python and Ansible training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network Automation with Python and Ansible course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Network Automation with Python and Ansible
Delivered OnlineFlexible Dates
Price on Enquiry

SS84 IBM DFSMS Implementation

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques. Overview Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage. Course introduction and DFSMS overview Specify the storage administration functions that can be automatically performed by the system Identify the types of data set services that need to be established by negotiating service level agreements Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines Activating SMS Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS Create SMS control data sets Code SYS1.PARMLIB operands necessary to bring up SMS Create a minimal configuration Activate a configuration Writing ACS routines Identify the purpose of the ACS routines Develop an understanding of the statements Differentiate between literals and masks Describe the read variables available in the ACS routines Managing temporary data sets Create/alter storage classes and storage groups Identify steps to install and use the starter set Write ACS routines to handle temporary data sets Activate a system to manage temporary data sets Code commands to change volume/group SMS status Issue operator commands to display current status Exploiting DFSMS Describe the purpose of the data class Identify the features that the data class can exploit Create data sets using the space parameter Define Virtual Storage Access Method (VSAM) and volume attributes for data class Identify special data sets and their exploitation through the data class Managing permanent data sets Create/alter data classes, storage classes, management classes, and storage groups Translate current (DFSMShsm) service level agreements to management class parameters Identify alternatives and concerns for standard naming conventions Establish the controls for automatic backup of data sets Establish the controls for automatic volume dump Write ACS routines to manage permanent data Create a configuration that manages permanent data sets Create a new managed data set Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records Using Naviquest Create test cases using Naviquest Perform storage administration tasks in batch Create online DFSMS reports Create model commands using Naviquest Use the COPYFILT macro Device preparation and data movement Initialize volumes as system-managed Move data into/out from system-managed control Convert volumes to/from system-managed Move data to utilize new hardware capabilities Controlling DFSMS Code commands to change SMS volume/group status Issue commands to save configurations and use alternate Active Control Data Set (ACDS) Issue command to use alternate Communication Data Set (COMMDS) Issue VARY SMS commands Communicate with the security administrator about storage management requirements Additional considerations Establish a plan for implementing SMS Locate sources of implementation planning checklists Identify the tools available to document the current system Identify multiple site considerations for recovery and exploitation Additional course details: Nexus Humans SS84 IBM DFSMS Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SS84 IBM DFSMS Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SS84 IBM DFSMS Implementation
Delivered OnlineFlexible Dates
Price on Enquiry