Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows:Anyone interested in knowing about DNA Center and SD-AccessPersonnel involved in SD-Access Design and ImplementationNetwork Operations team with SD-Access solutionNetwork admin staff that deal with User AccessChannel Partner SEs and other sales supportNetwork Access Control administrationNetwork AdministratorsNetwork ArchitectsNetwork Engineers Overview Upon completing this course, the learner will be able to meet these overall objectives:Know and understand Cisco?s SD-Access concepts, features, benefits, terminology and the way this approach innovates common administrative tasks on today?s networks.Differentiate and explain each of the building blocks of SD-Access SolutionExplain the concept of ?Fabric? and the different node types that conform it (Fabric Edge Nodes, Control Plane Nodes, Border Nodes)Describe the role of LISP in Control Plane and VXLAN in Data Plane for SD-Access SolutionUnderstand the role of DNA Center as solution orchestrator and Intelligent GUIBe familiar with workflow approach in DNA Center and its 4 Steps: Design, Policy, Provision and Assurance DNA Center and SD-Access offer Cisco?s next-generation programmable digital network to help automate common network access security features and streamline the redundant, complex configuration required to allow different groups of users access to the network infrastructure. This network security training course allows network administrators to quickly allow differentiated access for end users on the network while allowing the network to react automatically to day zero and other types of attacks. Introduction to Cisco?s Software Defined Access (SD-Access) SD-Access Overview SD-Access Benefits SD-Access Key Concepts SD-Access Main Components SD-Access Campus Fabric The concept of Fabric Node types Fabric Edge Nodes Control Plane Nodes Border Nodes LISP as protocol for Control Plane VXLAN as protocol for Data Plane Concept of Virtual Network Fabric-enabled WLAN DNA Center and Workflow for SD-Access Introduction to DNA Center Workflow for SD-Access in DNA Center Integration with Cisco ISE for Policy Enforcement Integration with Cisco NDP for Analytics and Assurance Relationship with APIC-EM controller DNA Center Workflow First Step - Design Creating Enterprise and Sites Hierarchy Discuss and Demonstrate General Network Settings Loading maps into the GUI IP Address Administration Administering Software Images Network Device Profiles DNA Center Workflow Second Step - Policy 2-level Hierarchy Policy Types ISE Integration with DNA Center Cross Domain Policies DNA Center Workflow Third Step - Provision Devices Onboarding Fabric Domains Adding Nodes DNA Center Workflow Fourth Step ? Assurance Introduction to Analytics NDP Fundamentals Overview of DNA Assurance Components of DNA Assurance DNA Center Assurance Dashboard Implementing WLAN in SD-Access Solution WLAN Integration Strategies in SD-Access Fabric SD-Access Wireless Architecture Sample Design for SD-Access Wireless Campus Fabric External Connectivity for SD-Access Enterprise Sample Topology for SD-Access Role of Border Nodes Types of Border Nodes Single Border vs. Multiple Border Designs Collocated Border and Control Plane Nodes Distributed (separated) Border and Control Plane Nodes
Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators and consultants, application owners, and system architects Overview By the end of the course, you should be able to meet the following objectives: Use the applications to group objects Create the logical groups of objects in the vRealize Operations environment Create and design advanced dashboards Discuss about widget and its settings Define a vRealize Operations policy Outline the components of a vRealize Operations policy Create the custom alerts Describe the troubleshooting workbench Review the advanced capacity concepts Discuss the what-if analysis scenarios Describe how to integrate vRealize Operations with VMware vRealize© Suite products Import the VMware vRealize© Network Insight? applications Describe the super metrics use cases Outline the vRealize Operations REST API architecture Discuss the vRealize Operations traversal spec Create and query objects using the REST API This two-day hands-on training course provides advanced knowledge, skills, and tools to achieve competency in operating VMware vRealize© Operations? 8.X. This course explains the design and creation of advanced dashboards, capacity concepts, and the REST API with real-world use cases. Course Introduction Introduction and course logistics Course objectives Custom Groups and Applications Outline the use cases for custom groups Create the custom groups Assign the objects to custom groups Identify the use cases for applications Create the custom applications Identify the vRealize Network Insight applications Custom Dashboard Design Design the dashboards Discuss the types of widgets and widget?s settings Select the widgets based on the scenario Explain the advanced dashboards Discuss the use cases of dashboards Custom Policies Outline the components of a vRealize Operations policy Review the policies applied to the objects in vRealize Operations Outline how the policy hierarchy is implemented Design a vRealize Operations Policy Understand how a policy supports the business objectives Alerts, Symptoms and Troubleshooting workbench Identify the use case for custom alerts and symptoms Create the custom alerts and symptoms Access the troubleshooting workbench feature Use the troubleshooting workbench feature to identify problems Outline the metric correlation options in vRealize Operations Capacity Models and What-if Scenarios Review the capacity planning concepts Describe the demand based and allocation-based model Discuss the use cases of capacity models Discuss the use cases of what-if analysis scenarios vRealize Operations integration Integrate vRealize Operations with products in vRealize Suite Identify the advantages of integrating vRealize Operations with vRealize Log Insight Import the vRealize Network Insight applications Configure the integration with vRealize Automation Super Metrics Create super metrics Explain the depth value Discuss the use cases of super metrics vRealize Operations REST API Outline the REST API architecture Navigate the REST API landing page Discuss the Swagger response codes Explain the vRealize Operations traversal specification Create and query objects using the REST API Discuss some of the examples of the REST API
This course is aimed at those who analyse and identify asbestos from within samples collected on site
Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions
Get help with you BTEC assignments at affordable prices and live a stress free life.
Bad news - people don't buy your product. Better news - they don't buy anyone else's product either. Best news - they do buy what a product gives them, whether it be removing 'pain' or giving 'pleasure'. So what a challenge it is that every single person buys your product for a slightly different reason! What's the secret to selling in that sort of sales environment? This programme provides a great roadmap. This course will help participants: Build rapport with authenticity Use open questions, listening and summary to properly understand the prospect Use 'impact' questions to 'stack the pain' of remaining with the status quo Convert features into personalised benefits that reflect stated needs Handle objections with calm confidence Identify buying signals Close effectively Convey credible urgency centred on the prospect's - not the salesperson's - interests 1 What makes a customer buy any product? Moving towards 'pleasure' Moving away from 'pain' Robert Cialdini's Psychology of Influence - buying motives Understanding what your product does for customers Why there is never a 'one size fits all' approach What are the real 'unique selling points' and why the salesperson is the real 'USP' At what point does the customer emotionally buy your product? 2 Getting past gatekeepers What gatekeepers' motivations are How to make them your friend rather than your enemy How to make your call harder to block than to put through How to control the gatekeeper with questions, not answers Using Cialdini's 'reciprocity' law to get put through more often Practical exercise in which the trainer poses as gatekeeper 3 Questioning and listening skills How to use open questions to get the customer talking What questions to avoid and why How to 'stack the pain' of the status quo with 'impact questions' Practical 'pain stacking' exercise in pairs What listening is and what it isn't Question funnelling - how to earn deeper disclosure through probing Practical funnelling exercise in pairs The power of summary 4 How to create tailored benefits and not 'dive into solution' What is 'diving into solution'? Examples and analogies Why it is to be avoided Practical exercise in pairs - how it feels to have solutions offered up too early How to avoid 'feature-dumping' What is 'value selling'? How to create tailored benefits How to convert product features into benefits How to deal with the prospect's competitor allegiance 5 Handling objections and testing the water How to overcome the price objection by selling value Common objections the participants encounter and answers that work The objections salespeople carry in their own heads The 'A-C-E' objection-handling model How to uncover objections When - and when not - to trial close 6 Closing skills Why salespeople often close too early How to identify buying signals How to use urgency with skill and effectiveness Four killer closing techniques that work How to avoid buying the product back by careless post-sale talk How to ask for referrals for your product How to 'farm' the account for future opportunities 7 Wrap-up Key learnings from each participant Individual action planning - steps that can and will be implemented in the workplace
Join actor & acting coach, Warren Rusher and improve your performance skills at London's best free acting class, Speak The Speech. Speak The Speech is a regular monologue workshop that has been running at Theatre Deli since September 2017, created by Warren as a response to London's lack of affordable acting training. A typical session consists of performers presenting a monologue which is then workshopped to improve the performers' approach to content and character. The aim is not to produce the perfect monologue but to use the monologue format to enhance each performer’s skill set and develop their acting process. We generally manage to work on 5-8 pieces per session. Stretch your skills in the warmest and most welcoming space to try things out: Refresh an audition monologue from your repertoire Try something new with a speech Read a monologue for the first time Perhaps you just want to see how others approach a text. Or maybe you have a casting coming up… There is no pressure to perform, you can just soak up the atmosphere and be part of the experience. Better your skills, learn from watching others, actively help others improve, and make new friends. Open to performers of all experience levels. *Bring a copy of any monologue you wish to present/work on. Speak The Speech is made possible only by the generosity of Theatre Deli offering the space for free as part of the Deli Meets program.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions architects and cloud architects seeking their AWS Certified Solutions Architect - Associate certification Customers and APN Partners who have 6 to 12 months of experience with AWS including a strong architecture background and experience Individuals who prefer an instructor led course for training and exam readiness Individuals who have not taken the Architecting on AWS course in the last ~6 months Overview In this course, you will learn to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly available Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well-Architected Framework to improve architectures with AWS solutions Navigate the logistics of the examination process, exam structure, and question types Identify how questions relate to AWS architectural concepts Interpret the concepts being tested by an exam question This five-day, instructor-led course helps busy architects get away from the day-to-day to get focused and ready for their AWS Certified Solutions Architect ? Associate exam. Attendees learn the fundamentals of building IT infrastructure on AWS, so they can build scalable and resilient solutions in the cloud, by spending the first 3 days on the Architecting on AWS course. They?ll start getting in the exam readiness mindset with bonus end of module quizzes. Next, they?ll learn strategies to answer exam questions and avoid common mistakes with the Exam Readiness: AWS Certified Solutions Architect ? Associate half-day course. The course broadens attendees? knowledge of AWS services with deep dives into Amazon Redshift, Amazon Kinesis, and AWS Key Management Service, and then concludes with two quizzes and an instructor guided review of the AWS Certified Solutions Architect ? Associate practice exam. Architecting on AWS Module 1: Introduction Module 2: The Simplest Architectures Hands-On Lab 1: Hosting a Static Website Module 3: Adding a Compute Layer Module 4: Adding a Database Layer Hands-On Lab 2: Deploying a Web Application on AWS Module 5: Networking in AWS Part 1 Hands-On Lab 3: Creating a Virtual Private Cloud Architecting on AWS (continued) Module 6: Networking in AWS Part 2 Module 7: AWS Identity and Access Management (IAM) Module 8: Elasticity, High Availability, and Monitoring Hands-On Lab 4: Creating a Highly Available Environment Module 9: Automation Hands-On Lab 5: Automating Infrastructure Deployment with AWS CloudFormation Module 10: Caching Architecting on AWS (continued) Module 11: Building Decoupled Architectures Module 12: Microservices and Serverless Architectures Hands-On Lab 6: Implementing a Serverless Architecture with AWS Managed Services Module 13: RTP/RPO and Backup Recovery Setup Module 14: Optimizations and Review Exam Readiness: AWS Certified Solutions Architect -- Associate Module 0: The Exam Module 1: Design Resilient Architectures Module 2: Design Performant Architectures Module 3: Specify Secure Applications and Architectures Module 4: Design Cost-Optimized Architectures Module 5: Define Operationally Excellent Architectures Exam Readiness Additional deep dive of AWS services Quiz #1 Practice exam: AWS Certified Solutions Architect ? Associate Quiz #2 Wrap-up