• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

133 Adoption courses

Agility in HR (ICP-AHR) Training & Certification Program | 3 days - 5 hrs/day | 9 am - 2 pm UK Time

By ValueX2

https://www.valuex2.com/agile-hr-certification/ https://www.linkedin.com/company/80563537/

Agility in HR (ICP-AHR) Training & Certification Program | 3 days - 5 hrs/day | 9 am - 2 pm UK Time
Delivered Online5 hours, May 13th, 03:30 + 23 more
£550

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR SUCCESSFUL STUDENTS HAVE EXPERIENCE AND KNOWLEDGE IN IT OPERATIONS, INCLUDING NETWORKING, VIRTUALIZATION, IDENTITY, SECURITY, BUSINESS CONTINUITY, DISASTER RECOVERY, DATA PLATFORMS, AND GOVERNANCE. STUDENTS ALSO HAVE EXPERIENCE DESIGNING AND ARCHITECTING SOLUTIONS. BEFORE ATTENDING THIS COURSE, STUDENTS MUST HAVE PREVIOUS EXPERIENCE DEPLOYING OR ADMINISTERING AZURE RESOURCES AND STRONG CONCEPTUAL KNOWLEDGE OF: * AZURE COMPUTE TECHNOLOGIES SUCH AS VMS, CONTAINERS AND SERVERLESS SOLUTIONS * AZURE VIRTUAL NETWORKING TO INCLUDE LOAD BALANCERS * AZURE STORAGE TECHNOLOGIES (UNSTRUCTURED AND DATABASES) * GENERAL APPLICATION DESIGN CONCEPTS SUCH AS MESSAGING AND HIGH AVAILABILITY DESCRIPTION THIS COURSE TEACHES AZURE SOLUTION ARCHITECTS HOW TO DESIGN INFRASTRUCTURE SOLUTIONS. COURSE TOPICS COVER GOVERNANCE, COMPUTE, APPLICATION ARCHITECTURE, STORAGE, DATA INTEGRATION, AUTHENTICATION, NETWORKS, BUSINESS CONTINUITY, AND MIGRATIONS. THE COURSE COMBINES LECTURE WITH CASE STUDIES TO DEMONSTRATE BASIC ARCHITECT DESIGN PRINCIPLES. PREREQUISITES BEFORE ATTENDING THIS COURSE, STUDENTS MUST HAVE PREVIOUS EXPERIENCE DEPLOYING OR ADMINISTERING AZURE RESOURCES AND CONCEPTUAL KNOWLEDGE OF: AZURE ACTIVE DIRECTORY AZURE COMPUTE TECHNOLOGIES SUCH AS VMS, CONTAINERS AND SERVERLESS SOLUTIONS AZURE VIRTUAL NETWORKING TO INCLUDE LOAD BALANCERS AZURE STORAGE TECHNOLOGIES (UNSTRUCTURED AND DATABASES) GENERAL APPLICATION DESIGN CONCEPTS SUCH AS MESSAGING AND HIGH AVAILABILITY AZ-104T00 - MICROSOFT AZURE ADMINISTRATOR 1 - DESIGN GOVERNANCE * Design for governance * Design for management groups * Design for subscriptions * Design for resource groups * Design for resource tags * Design for Azure Policy * Design for role-based access control (RBAC) * Design for Azure landing zones 2 - DESIGN AN AZURE COMPUTE SOLUTION * Choose an Azure compute service * Design for Azure Virtual Machines solutions * Design for Azure Batch solutions * Design for Azure App Service solutions * Design for Azure Container Instances solutions * Design for Azure Kubernetes Service solutions * Design for Azure Functions solutions * Design for Azure Logic Apps solutions 3 - DESIGN A DATA STORAGE SOLUTION FOR NON-RELATIONAL DATA * Design for data storage * Design for Azure storage accounts * Design for data redundancy * Design for Azure Blob Storage * Design for Azure Files * Design for Azure managed disks * Design for storage security 4 - DESIGN A DATA STORAGE SOLUTION FOR RELATIONAL DATA * Design for Azure SQL Database * Design for Azure SQL Managed Instance * Design for SQL Server on Azure Virtual Machines * Recommend a solution for database scalability * Recommend a solution for database availability * Design security for data at rest, data in motion, and data in use * Design for Azure SQL Edge * Design for Azure Cosmos DB and Table Storage 5 - DESIGN DATA INTEGRATION * Design a data integration solution with Azure Data Factory * Design a data integration solution with Azure Data Lake * Design a data integration and analytic solution with Azure Databricks * Design a data integration and analytic solution with Azure Synapse Analytics * Design strategies for hot, warm, and cold data paths * Design an Azure Stream Analytics solution for data analysis 6 - DESIGN AN APPLICATION ARCHITECTURE * Describe message and event scenarios * Design a messaging solution * Design an Azure Event Hubs messaging solution * Design an event-driven solution * Design a caching solution * Design API integration * Design an automated app deployment solution * Design an app configuration management solution 7 - DESIGN AUTHENTICATION AND AUTHORIZATION SOLUTIONS * Design for identity and access management (IAM) * Design for Microsoft Entra ID * Design for Microsoft Entra business-to-business (B2B) * Design for Azure Active Directory B2C (business-to-customer) * Design for conditional access * Design for identity protection * Design for access reviews * Design service principals for applications * Design managed identities * Design for Azure Key Vault 8 - DESIGN A SOLUTION TO LOG AND MONITOR AZURE RESOURCES * Design for Azure Monitor data sources * Design for Azure Monitor Logs (Log Analytics) workspaces * Design for Azure Workbooks and Azure insights * Design for Azure Data Explorer 9 - DESIGN NETWORK SOLUTIONS * Recommend a network architecture solution based on workload requirements * Design patterns for Azure network connectivity services * Design outbound connectivity and routing * Design for on-premises connectivity to Azure Virtual Network * Choose an application delivery service * Design for application delivery services * Design for application protection services 10 - DESIGN A SOLUTION FOR BACKUP AND DISASTER RECOVERY * Design for backup and recovery * Design for Azure Backup * Design for Azure blob backup and recovery * Design for Azure files backup and recovery * Design for Azure virtual machine backup and recovery * Design for Azure SQL backup and recovery * Design for Azure Site Recovery 11 - DESIGN MIGRATIONS * Evaluate migration with the Cloud Adoption Framework * Describe the Azure migration framework * Assess your on-premises workloads * Select a migration tool * Migrate your structured data in databases * Select an online storage migration tool for unstructured data * Migrate offline data 12 - INTRODUCTION TO THE MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK * Azure Well-Architected Framework pillars * Cost optimization * Operational excellence * Performance efficiency * Reliability * Security 13 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - COST OPTIMIZATION * Develop cost-management discipline * Design with a cost-efficiency mindset * Design for usage optimization * Design for rate optimization * Monitor and optimize over time 14 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - OPERATIONAL EXCELLENCE * Embrace DevOps culture * Establish development standards * Evolve operations with observability * Deploy with confidence * Automate for efficiency * Adopt safe deployment practices 15 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - PERFORMANCE EFFICIENCY * Negotiate realistic performance targets * Design to meet capacity requirements * Achieve and sustain performance * Improve efficiency through optimization 16 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - RELIABILITY * Design for business requirements * Design for resilience * Design for recovery * Design for operations * Keep it simple 17 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - SECURITY * Plan your security readiness * Design to protect confidentiality * Design to protect integrity * Design to protect availability * Sustain and evolve your security posture 18 - GETTING STARTED WITH THE MICROSOFT CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Common blockers 19 - PREPARE FOR SUCCESSFUL CLOUD ADOPTION WITH A WELL-DEFINED STRATEGY * Customer narrative * Capture strategic motivation * Define objectives and key results * Evaluate financial considerations * Understand technical considerations * Create a business case 20 - PREPARE FOR CLOUD ADOPTION WITH A DATA-DRIVEN PLAN * Customer narrative 21 - CHOOSE THE BEST AZURE LANDING ZONE TO SUPPORT YOUR REQUIREMENTS FOR CLOUD OPERATIONS * Customer narrative * Common operating models * Design areas for Azure landing zones * Design principles for Azure landing zones * Journey to the target architecture * Choose an Azure landing zone option * Deploy the Azure landing zone accelerator * Enhance your landing zone 22 - MIGRATE TO AZURE THROUGH REPEATABLE PROCESSES AND COMMON TOOLS * Customer narrative * Migration process * Migration tools * Common tech platforms 23 - ADDRESS TANGIBLE RISKS WITH THE GOVERN METHODOLOGY OF THE CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Govern methodology * Corporate policies * Governance disciplines * Deploy a cloud governance foundation * The Cost Management discipline 24 - ENSURE STABLE OPERATIONS AND OPTIMIZATION ACROSS ALL SUPPORTED WORKLOADS DEPLOYED TO THE CLOUD * Establish business commitments * Deploy an operations baseline * Protect and recover * Enhance an operations baseline * Manage platform and workload specialization 25 - INNOVATE APPLICATIONS BY USING AZURE CLOUD TECHNOLOGIES * Follow the innovation lifecycle * Azure technologies for the build process * Infuse your applications with AI * Azure technologies for measuring business impact * Azure technologies for the learn process 26 - PREPARE FOR CLOUD SECURITY BY USING THE MICROSOFT CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Methodology * Security roles and responsibilities * Simplify compliance and security * Simplify security implementation * Security tools and policies ADDITIONAL COURSE DETAILS: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered Online5 days, May 14th, 13:00 + 6 more
£2380

MS-700T00 Managing Microsoft Teams

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR STUDENTS IN THIS COURSE ARE INTERESTED IN MICROSOFT TEAMS OR IN PASSING THE MICROSOFT TEAMS ADMINISTRATOR ASSOCIATE CERTIFICATION EXAM. A MICROSOFT TEAMS ADMINISTRATOR PLANS, DEPLOYS, CONFIGURES, AND MANAGES MICROSOFT TEAMS TO FOCUS ON EFFICIENT AND EFFECTIVE COLLABORATION AND COMMUNICATION IN A MICROSOFT 365 ENVIRONMENT. A MICROSOFT TEAMS ADMINISTRATOR MUST BE ABLE TO PLAN, DEPLOY, AND MANAGE TEAMS, CHAT, APPS, CHANNELS, MEETINGS, AUDIO/VIDEO CONFERENCING, LIVE EVENTS, CALLING, AND TEAMS CERTIFIED DEVICES. A MICROSOFT TEAMS ADMINISTRATOR HAS EXPERIENCE INTEGRATING MICROSOFT TEAMS WITH SHAREPOINT, ONEDRIVE, EXCHANGE, MICROSOFT 365 GROUPS, AND OTHER MICROSOFT, THIRD-PARTY, AND CUSTOM APPS. A MICROSOFT TEAMS ADMINISTRATOR UNDERSTANDS AND COLLABORATES WITH OTHER WORKLOADS AND ROLES, SUCH AS NETWORK, VOICE, IDENTITY, ACCESS, DEVICES, LICENSING, SECURITY, COMPLIANCE, INFORMATION MANAGEMENT, AND USER ADOPTION. OVERVIEW WHAT IS MICROSOFT TEAMS AND HOW THE COMPONENTS WORK TOGETHER HOW TO IMPLEMENT GOVERNANCE, SECURITY AND COMPLIANCE FOR MICROSOFT TEAMS HOW TO PREPARE AN ORGANIZATIONS ENVIRONMENT FOR A MICROSOFT TEAMS DEPLOYMENT HOW TO DEPLOY AND MANAGE TEAMS HOW TO MANAGE COLLABORATION AND COMMUNICATION EXPERIENCES IN MICROSOFT TEAMS TECHNIQUES TO MANAGE AND TROUBLESHOOT COMMUNICATION IN MICROSOFT TEAMS DESCRIPTION THE MANAGING MICROSOFT TEAMS COURSE IS DESIGNED FOR PERSONS WHO ARE ASPIRING TO THE MICROSOFT 365 TEAMS ADMIN ROLE. A MICROSOFT TEAMS ADMINISTRATOR PLANS, DEPLOYS, CONFIGURES, AND MANAGES MICROSOFT TEAMS TO FOCUS ON EFFICIENT AND EFFECTIVE COLLABORATION AND COMMUNICATION IN A MICROSOFT 365 ENVIRONMENT. IN THIS COURSE, YOU WILL LEARN ABOUT VARIOUS TEAMS MANAGEMENT TOOLS, SECURITY AND COMPLIANCE FEATURE FOR TEAMS, NETWORK REQUIREMENT FOR TEAMS DEPLOYMENT AS WELL AS DIFFERENT TEAMS SETTINGS AND POLICIES FOR MANAGING COLLABORATION AND COMMUNICATION EXPERIENCE IN TEAMS. PREREQUISITES A PROFICIENT UNDERSTANDING OF BASIC FUNCTIONAL EXPERIENCE WITH MICROSOFT 365 SERVICES. A PROFICIENT UNDERSTANDING OF GENERAL IT PRACTICES, INCLUDING USING POWERSHELL. 1 - EXPLORE MICROSOFT TEAMS * Explore capabilities in Microsoft Teams * Explore Microsoft Teams integration with Microsoft 365 * Explore Microsoft Teams integration with Microsoft Power Platform * Illustrate Microsoft Teams architecture * Describe Microsoft Teams with Microsoft 365 Groups * Describe Microsoft Teams with SharePoint and OneDrive * Describe Microsoft Teams with Exchange * Understand Microsoft Teams certified solutions 2 - PLAN AND DEPLOY MICROSOFT TEAMS * Designate Teams admin roles * Understand Teams management tools * Plan for Teams rollout * Plan for Teams adoption * Plan for Teams licensing * Deploy Microsoft Teams clients 3 - IMPLEMENT LIFECYCLE MANAGEMENT AND GOVERNANCE FOR MICROSOFT TEAMS * Plan for lifecycle management * Plan for Teams governance * Manage Microsoft 365 Groups creation * Configure Microsoft 365 Groups expiration policy * Configure Microsoft 365 Groups naming policy * Plan policy assignment for users and groups * Create and manage policy packages * Manage Teams preview features using Teams update policies * Create and manage teams templates and template policies 4 - MONITOR YOUR MICROSOFT TEAMS ENVIRONMENT * Monitor Microsoft Teams usage reports * Monitor Microsoft 365 usage reports * Interpret Microsoft Adoption Score * Manage user access with Azure Active Directory access reviews * Monitor the Microsoft 365 network connectivity dashboard * Manage Teams notifications and alerts * Manage feedback policies 5 - MANAGE ACCESS FOR EXTERNAL USERS * Understand features in Azure Active Directory * Work with external users in Microsoft Teams * Manage access for external users * Manage external collaboration in Azure AD * Manage external collaboration in Microsoft 365 * Manage external access in Microsoft Teams * Manage guest access in Microsoft Teams * Manage file sharing in SharePoint and OneDrive 6 - IMPLEMENT SECURITY FOR MICROSOFT TEAMS * Configure conditional access and multifactor authentication for Microsoft Teams * Configure Safe Attachments for Microsoft Teams * Configure Safe Links for Microsoft Teams * Examine the Defender for Cloud Apps * Monitor security reports for Microsoft Teams * Plan and configure enhanced encryption policies 7 - IMPLEMENT COMPLIANCE FOR MICROSOFT TEAMS * Create and manage sensitivity labels * Create and manage retention policies * Create and manage Data Loss Prevention policies * Deploy communication compliance * Enable scoped directory search * Create information barrier policy * Create security and compliance alerts for Microsoft Teams 8 - PLAN AND CONFIGURE NETWORK SETTINGS FOR MICROSOFT TEAMS * Examine network requirements for Microsoft Teams * Plan for network deployment using Network Planner * Configure network ports and protocols for Microsoft Teams * Implement Quality of Service * Configure reporting labels for location-enhanced Call Analytics reports * Configure tenant data for Call Quality Dashboard reports * Assess network readiness * Manage network topology 9 - CREATE AND MANAGE TEAMS * Create teams * Create a team from existing resources * Plan and create org-wide teams * Manage teams * Manage users in a team * Configure dynamic membership * Archive restore and delete a team 10 - MANAGE COLLABORATION EXPERIENCES FOR CHAT AND CHANNELS * Create and manage channels in a team * Create and manage Teams policies for channels * Configure teams settings * Create and manage messaging policies * Manage channel moderation * Manage access to channels 11 - MANAGE APPS FOR MICROSOFT TEAMS * Explore apps in Microsoft Teams * Describe admin settings for Teams apps * Manage access to Teams apps at the organization level * Create and manage app permission policies * Create and manage app setup policies * Manage permissions and consent for Teams apps * Plan and configure connectors * Manage custom apps uploads * Publish custom apps to Microsoft Teams * Manage purchasing of apps in the Microsoft Teams app store * Customize the organization's app store * Customize the branded experience of an app 12 - INTRODUCTION TO TEAMS MEETINGS AND CALLING * Overview of Teams meetings and events * Overview of Teams Phone * Overview of auto attendants and call queues * Overview of Teams devices 13 - MANAGE MEETINGS AND EVENTS EXPERIENCES * Explore meetings and events in Microsoft Teams * Configure meeting settings * Create and manage meeting policies * Configure audio conferencing * Create and manage meeting templates and template policies * Create and manage meetings customization policies * Configure live events settings * Create and manage live events policies * Examine live events across Microsoft 365 14 - PLAN FOR MICROSOFT TEAMS ROOMS AND SURFACE HUB * Determine license requirements for Microsoft Teams Rooms and shared devices * Understand differences between Microsoft Teams Rooms on Android and Windows * Understand Microsoft Teams Rooms on Surface Hub 2S * Understand and plan Teams Room accessories, components, and peripherals * Understand Teams Rooms management options 15 - CONFIGURE, DEPLOY, AND MANAGE TEAMS DEVICES * Manage Microsoft Teams Phones * Manage Microsoft Teams Room Systems * Microsoft Teams Rooms management options * Manage Surface Hub 2S devices * Configure Microsoft Teams SIP gateway * Manage Microsoft Teams displays * Remote provisioning and sign in for Teams Phones * Update Microsoft Teams devices remotely * Manage Microsoft Teams device tags 16 - PLAN FOR TEAMS PHONE * Plan to deploy Teams Phone * Plan for Teams Phone PSTN connectivity * Determine license requirements * Plan for Teams Phone devices * Plan and design Teams Phone features * Plan for voicemail 17 - CONFIGURE AND DEPLOY TEAMS PHONE * Configure emergency calling for Teams Calling Plans * Manage and configure Microsoft PSTN numbers * Configure Operator Connect and Teams Phone Mobile * Configure Teams Phone policies * Create and manage Teams policies * Configure Audio Conferencing 18 - CONFIGURE AND MANAGE VOICE USERS * Enable users for Teams Phone * Enable users for Direct Routing with Teams Phone * Enable additional calling features for Teams Phone * Enable users for Teams Phone Mobile 19 - CONFIGURE AUTO ATTENDANTS AND CALL QUEUES * Design call flows for auto attendants and call queues * Configure auto attendants and call queues * Deploy a channel-based call queue * Configure resource accounts * Configure Microsoft 365 groups for voicemail * Interpret call queue conference modes * Interpret call queue routing methods * Configure holidays for auto attendants and call queues * Configure custom music on hold 20 - TROUBLESHOOT AUDIO, VIDEO, AND CLIENT ISSUES * Troubleshoot Teams * Collect and identify logs * Clear Microsoft Teams client cache * Identify issues with call analytics * Identify issues with Call Quality Dashboard * Use Power BI to analyze Call Quality Dashboard data * Identify issues with the Direct Routing Health Dashboard ADDITIONAL COURSE DETAILS: Nexus Humans MS-700T00 Managing Microsoft Teams training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-700T00 Managing Microsoft Teams course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-700T00 Managing Microsoft Teams
Delivered Online5 days, May 21st, 13:00 + 4 more
£2380

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR PERSONS ASPIRING TO THE MICROSOFT 365 ADMINISTRATOR ROLE AND HAVE COMPLETED AT LEAST ONE OF THE MICROSOFT 365 ROLE-BASED ADMINISTRATOR CERTIFICATION PATHS. DESCRIPTION THIS COURSE COVERS THE FOLLOWING KEY ELEMENTS OF MICROSOFT 365 ADMINISTRATION: MICROSOFT 365 TENANT MANAGEMENT, MICROSOFT 365 IDENTITY SYNCHRONIZATION, AND MICROSOFT 365 SECURITY AND COMPLIANCE. IN MICROSOFT 365 TENANT MANAGEMENT, YOU LEARN HOW TO CONFIGURE YOUR MICROSOFT 365 TENANT, INCLUDING YOUR ORGANIZATIONAL PROFILE, TENANT SUBSCRIPTION OPTIONS, COMPONENT SERVICES, USER ACCOUNTS AND LICENSES, SECURITY GROUPS, AND ADMINISTRATIVE ROLES. YOU THEN TRANSITION TO CONFIGURING MICROSOFT 365, WITH A PRIMARY FOCUS ON CONFIGURING OFFICE CLIENT CONNECTIVITY. FINALLY, YOU EXPLORE HOW TO MANAGE USER-DRIVEN CLIENT INSTALLATIONS OF MICROSOFT 365 APPS FOR ENTERPRISE DEPLOYMENTS. THE COURSE THEN TRANSITIONS TO AN IN-DEPTH EXAMINATION OF MICROSOFT 365 IDENTITY SYNCHRONIZATION, WITH A FOCUS ON MICROSOFT ENTRA CONNECT AND CONNECT CLOUD SYNC. YOU LEARN HOW TO PLAN FOR AND IMPLEMENT EACH OF THESE DIRECTORY SYNCHRONIZATION OPTIONS, HOW TO MANAGE SYNCHRONIZED IDENTITIES, AND HOW TO IMPLEMENT PASSWORD MANAGEMENT IN MICROSOFT 365 USING MULTIFACTOR AUTHENTICATION AND SELF-SERVICE PASSWORD MANAGEMENT. IN MICROSOFT 365 SECURITY MANAGEMENT, YOU BEGIN EXAMINING THE COMMON TYPES OF THREAT VECTORS AND DATA BREACHES FACING ORGANIZATIONS TODAY. YOU THEN LEARN HOW MICROSOFT 365?S SECURITY SOLUTIONS ADDRESS EACH OF THESE THREATS. YOU ARE INTRODUCED TO THE MICROSOFT SECURE SCORE, AS WELL AS TO MICROSOFT ENTRA ID PROTECTION. YOU THEN LEARN HOW TO MANAGE THE MICROSOFT 365 SECURITY SERVICES, INCLUDING EXCHANGE ONLINE PROTECTION, SAFE ATTACHMENTS, AND SAFE LINKS. FINALLY, YOU ARE INTRODUCED TO THE VARIOUS REPORTS THAT MONITOR AN ORGANIZATION?S SECURITY HEALTH. YOU THEN TRANSITION FROM SECURITY SERVICES TO THREAT INTELLIGENCE; SPECIFICALLY, USING MICROSOFT 365 DEFENDER, MICROSOFT DEFENDER FOR CLOUD APPS, AND MICROSOFT DEFENDER FOR ENDPOINT. ONCE YOU HAVE THIS UNDERSTANDING OF MICROSOFT 365?S SECURITY SUITE, YOU THEN EXAMINE THE KEY COMPONENTS OF MICROSOFT 365 COMPLIANCE MANAGEMENT. THIS BEGINS WITH AN OVERVIEW OF ALL KEY ASPECTS OF DATA GOVERNANCE, INCLUDING DATA ARCHIVING AND RETENTION, MICROSOFT PURVIEW MESSAGE ENCRYPTION, AND DATA LOSS PREVENTION (DLP). YOU THEN DELVE DEEPER INTO ARCHIVING AND RETENTION, PAYING PARTICULAR ATTENTION TO MICROSOFT PURVIEW INSIDER RISK MANAGEMENT, INFORMATION BARRIERS, AND DLP POLICIES. YOU THEN EXAMINE HOW TO IMPLEMENT THESE COMPLIANCE FEATURES BY USING DATA CLASSIFICATION AND SENSITIVITY LABELS. PREREQUISITES * COMPLETED A ROLE-BASED ADMINISTRATOR COURSE SUCH AS MESSAGING, TEAMWORK, SECURITY, COMPLIANCE, OR COLLABORATION. * A PROFICIENT UNDERSTANDING OF DNS AND BASIC FUNCTIONAL EXPERIENCE WITH MICROSOFT 365 SERVICES. * A PROFICIENT UNDERSTANDING OF GENERAL IT PRACTICES. * A WORKING KNOWLEDGE OF POWERSHELL. 1 - CONFIGURE YOUR MICROSOFT 365 EXPERIENCE * Explore your Microsoft 365 cloud environment * Configure your Microsoft 365 organizational profile * Manage your tenant subscriptions in Microsoft 365 * Integrate Microsoft 365 with customer engagement apps * Complete your tenant configuration in Microsoft 365 2 - MANAGE USERS, LICENSES, AND MAIL CONTACTS IN MICROSOFT 365 * Determine the user identity model for your organization * Create user accounts in Microsoft 365 * Manage user account settings in Microsoft 365 * Manage user licenses in Microsoft 365 * Recover deleted user accounts in Microsoft 365 * Perform bulk user maintenance in Microsoft Entra ID * Create and manage guest users * Create and manage mail contacts 3 - MANAGE GROUPS IN MICROSOFT 365 * Examine groups in Microsoft 365 * Create and manage groups in Microsoft 365 * Create dynamic groups using Azure rule builder * Create a Microsoft 365 group naming policy * Create groups in Exchange Online and SharePoint Online 4 - ADD A CUSTOM DOMAIN IN MICROSOFT 365 * Plan a custom domain for your Microsoft 365 deployment * Plan the DNS zones for a custom domain * Plan the DNS record requirements for a custom domain * Create a custom domain in Microsoft 365 5 - CONFIGURE CLIENT CONNECTIVITY TO MICROSOFT 365 * Examine how automatic client configuration works * Explore the DNS records required for client configuration * Configure Outlook clients * Troubleshoot client connectivity 6 - CONFIGURE ADMINISTRATIVE ROLES IN MICROSOFT 365 * Explore the Microsoft 365 permission model * Explore the Microsoft 365 admin roles * Assign admin roles to users in Microsoft 365 * Delegate admin roles to partners * Manage permissions using administrative units in Microsoft Entra ID * Elevate privileges using Microsoft Entra Privileged Identity Management * Examine best practices when configuring administrative roles 7 - MANAGE TENANT HEALTH AND SERVICES IN MICROSOFT 365 * Monitor the health of your Microsoft 365 services * Monitor tenant health using Microsoft 365 Adoption Score * Monitor tenant health using Microsoft 365 usage analytics * Develop an incident response plan * Request assistance from Microsoft 8 - DEPLOY MICROSOFT 365 APPS FOR ENTERPRISE * Explore Microsoft 365 Apps for enterprise functionality * Explore your app compatibility by using the Readiness Toolkit * Complete a self-service installation of Microsoft 365 Apps for enterprise * Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager * Deploy Microsoft 365 Apps for enterprise from the cloud * Deploy Microsoft 365 Apps for enterprise from a local source * Manage updates to Microsoft 365 Apps for enterprise * Explore the update channels for Microsoft 365 Apps for enterprise * Manage your cloud apps using the Microsoft 365 Apps admin center 9 - ANALYZE YOUR MICROSOFT 365 WORKPLACE DATA USING MICROSOFT VIVA INSIGHTS * Examine the analytical features of Microsoft Viva Insights * Explore Personal insights * Explore Team insights * Explore Organization insights * Explore Advanced insights 10 - EXPLORE IDENTITY SYNCHRONIZATION * Examine identity models for Microsoft 365 * Examine authentication options for the hybrid identity model * Explore directory synchronization 11 - PREPARE FOR IDENTITY SYNCHRONIZATION TO MICROSOFT 365 * Plan your Microsoft Entra deployment * Prepare for directory synchronization * Choose your directory synchronization tool * Plan for directory synchronization using Microsoft Entra Connect * Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - IMPLEMENT DIRECTORY SYNCHRONIZATION TOOLS * Configure Microsoft Entra Connect prerequisites * Configure Microsoft Entra Connect * Monitor synchronization services using Microsoft Entra Connect Health * Configure Microsoft Entra Connect cloud sync prerequisites * Configure Microsoft Entra Connect cloud sync 13 - MANAGE SYNCHRONIZED IDENTITIES * Manage users with directory synchronization * Manage groups with directory synchronization * Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization * Configure object filters for directory synchronization * Explore Microsoft Identity Manager * Troubleshoot directory synchronization 14 - MANAGE SECURE USER ACCESS IN MICROSOFT 365 * Manage user passwords * Enable pass-through authentication * Enable multifactor authentication * Enable passwordless sign-in with Microsoft Authenticator * Explore self-service password management * Explore Windows Hello for Business * Implement Microsoft Entra Smart Lockout * Implement conditional access policies * Explore Security Defaults in Microsoft Entra ID * Investigate authentication issues using sign-in logs 15 - EXAMINE THREAT VECTORS AND DATA BREACHES * Explore today's work and threat landscape * Examine how phishing retrieves sensitive information * Examine how spoofing deceives users and compromises data security * Compare spam and malware * Examine account breaches * Examine elevation of privilege attacks * Examine how data exfiltration moves data out of your tenant * Examine how attackers delete data from your tenant * Examine how data spillage exposes data outside your tenant * Examine other types of attacks 16 - EXPLORE THE ZERO TRUST SECURITY MODEL * Examine the principles and components of the Zero Trust model * Plan for a Zero Trust security model in your organization * Examine Microsoft's strategy for Zero Trust networking * Adopt a Zero Trust approach 17 - EXPLORE SECURITY SOLUTIONS IN MICROSOFT 365 DEFENDER * Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 * Protect your organization's identities using Microsoft Defender for Identity * Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint * Protect against cyber attacks using Microsoft 365 Threat Intelligence * Provide insight into suspicious activity using Microsoft Cloud App Security * Review the security reports in Microsoft 365 Defender 18 - EXAMINE MICROSOFT SECURE SCORE * Explore Microsoft Secure Score * Assess your security posture with Microsoft Secure Score * Improve your secure score * Track your Microsoft Secure Score history and meet your goals 19 - EXAMINE PRIVILEGED IDENTITY MANAGEMENT * Explore Privileged Identity Management in Microsoft Entra ID * Configure Privileged Identity Management * Audit Privileged Identity Management * Control privileged admin tasks using Privileged Access Management 20 - EXAMINE AZURE IDENTITY PROTECTION * Explore Azure Identity Protection * Enable the default protection policies in Azure Identity Protection * Explore the vulnerabilities and risk events detected by Azure Identity Protection * Plan your identity investigation 21 - EXAMINE EXCHANGE ONLINE PROTECTION * Examine the anti-malware pipeline * Detect messages with spam or malware using Zero-hour auto purge * Explore anti-spoofing protection provided by Exchange Online Protection * Explore other anti-spoofing protection * Examine outbound spam filtering 22 - EXAMINE MICROSOFT DEFENDER FOR OFFICE 365 * Climb the security ladder from EOP to Microsoft Defender for Office 365 * Expand EOP protections by using Safe Attachments and Safe Links * Manage spoofed intelligence * Configure outbound spam filtering policies * Unblock users from sending email 23 - MANAGE SAFE ATTACHMENTS * Protect users from malicious attachments by using Safe Attachments * Create Safe Attachment policies using Microsoft Defender for Office 365 * Create Safe Attachments policies using PowerShell * Modify an existing Safe Attachments policy * Create a transport rule to bypass a Safe Attachments policy * Examine the end-user experience with Safe Attachments 24 - MANAGE SAFE LINKS * Protect users from malicious URLs by using Safe Links * Create Safe Links policies using Microsoft 365 Defender * Create Safe Links policies using PowerShell * Modify an existing Safe Links policy * Create a transport rule to bypass a Safe Links policy * Examine the end-user experience with Safe Links 25 - EXPLORE THREAT INTELLIGENCE IN MICROSOFT 365 DEFENDER * Explore Microsoft Intelligent Security Graph * Explore alert policies in Microsoft 365 * Run automated investigations and responses * Explore threat hunting with Microsoft Threat Protection * Explore advanced threat hunting in Microsoft 365 Defender * Explore threat analytics in Microsoft 365 * Identify threat issues using Microsoft Defender reports 26 - IMPLEMENT APP PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender Cloud Apps * Deploy Microsoft Defender for Cloud Apps * Configure file policies in Microsoft Defender for Cloud Apps * Manage and respond to alerts in Microsoft Defender for Cloud Apps * Configure Cloud Discovery in Microsoft Defender for Cloud Apps * Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - IMPLEMENT ENDPOINT PROTECTION BY USING MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Configure Microsoft Defender for Endpoint in Microsoft Intune * Onboard devices in Microsoft Defender for Endpoint * Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management * Manage device discovery and vulnerability assessment * Reduce your threat and vulnerability exposure 28 - IMPLEMENT THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR OFFICE 365 * Explore the Microsoft Defender for Office 365 protection stack * Investigate security attacks by using Threat Explorer * Identify cybersecurity issues by using Threat Trackers * Prepare for attacks with Attack simulation training 29 - EXAMINE DATA GOVERNANCE SOLUTIONS IN MICROSOFT PURVIEW * Explore data governance and compliance in Microsoft Purview * Protect sensitive data with Microsoft Purview Information Protection * Govern organizational data using Microsoft Purview Data Lifecycle Management * Minimize internal risks with Microsoft Purview Insider Risk Management * Explore Microsoft Purview eDiscovery solutions 30 - EXPLORE ARCHIVING AND RECORDS MANAGEMENT IN MICROSOFT 365 * Explore archive mailboxes in Microsoft 365 * Enable archive mailboxes in Microsoft 365 * Explore Microsoft Purview Records Management * Implement Microsoft Purview Records Management * Restore deleted data in Exchange Online * Restore deleted data in SharePoint Online 31 - EXPLORE RETENTION IN MICROSOFT 365 * Explore retention by using retention policies and retention labels * Compare capabilities in retention policies and retention labels * Define the scope of a retention policy * Examine the principles of retention * Implement retention using retention policies, retention labels, and eDiscovery holds * Restrict retention changes by using Preservation Lock 32 - EXPLORE MICROSOFT PURVIEW MESSAGE ENCRYPTION * Examine Microsoft Purview Message Encryption * Configure Microsoft Purview Message Encryption * Define mail flow rules to encrypt email messages * Add organizational branding to encrypted email messages * Explore Microsoft Purview Advanced Message Encryption 33 - EXPLORE COMPLIANCE IN MICROSOFT 365 * Plan for security and compliance in Microsoft 365 * Plan your beginning compliance tasks in Microsoft Purview * Manage your compliance requirements with Compliance Manager * Examine the Compliance Manager dashboard * Analyze the Microsoft Compliance score 34 - IMPLEMENT MICROSOFT PURVIEW INSIDER RISK MANAGEMENT * Explore insider risk management * Plan for insider risk management * Explore insider risk management policies * Create insider risk management policies * Investigate insider risk management activities and alerts * Explore insider risk management cases 35 - IMPLEMENT MICROSOFT PURVIEW INFORMATION BARRIERS * Explore Microsoft Purview Information Barriers * Configure information barriers in Microsoft Purview * Examine information barriers in Microsoft Teams * Examine information barriers in OneDrive * Examine information barriers in SharePoint 36 - EXPLORE MICROSOFT PURVIEW DATA LOSS PREVENTION * Examine Data Loss Prevention * Explore Endpoint data loss prevention * Examine DLP policies * View DLP policy results * Explore DLP reports 37 - IMPLEMENT MICROSOFT PURVIEW DATA LOSS PREVENTION * Plan to implement Microsoft Purview Data Loss Protection * Implement Microsoft Purview's default DLP policies * Design a custom DLP policy * Create a custom DLP policy from a template * Configure email notifications for DLP policies * Configure policy tips for DLP policies 38 - IMPLEMENT DATA CLASSIFICATION OF SENSITIVE INFORMATION * Explore data classification * Implement data classification in Microsoft 365 * Explore trainable classifiers * Create and retrain a trainable classifier * View sensitive data using Content explorer and Activity explorer * Detect sensitive information documents using Document Fingerprinting 39 - EXPLORE SENSITIVITY LABELS * Manage data protection using sensitivity labels * Explore what sensitivity labels can do * Determine a sensitivity label's scope * Apply sensitivity labels automatically * Explore sensitivity label policies 40 - IMPLEMENT SENSITIVITY LABELS * Plan your deployment strategy for sensitivity labels * Examine the requirements to create a sensitivity label * Create sensitivity labels * Publish sensitivity labels * Remove and delete sensitivity labels ADDITIONAL COURSE DETAILS: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online6 days, May 20th, 13:00 + 9 more
£2975

AWS Cloud Practitioner Essentials

By Nexus Human

DURATION 1 DAYS 6 CPD HOURS THIS COURSE IS INTENDED FOR SALES LEGAL MARKETING BUSINESS ANALYSTS PROJECT MANAGERS AWS ACADEMY STUDENTS OTHER IT-RELATED PROFESSIONALS OVERVIEW SUMMARIZE THE WORKING DEFINITION OF AWS DIFFERENTIATE BETWEEN ON-PREMISES, HYBRID-CLOUD, AND ALL-IN CLOUD DESCRIBE THE BASIC GLOBAL INFRASTRUCTURE OF THE AWS CLOUD EXPLAIN THE SIX BENEFITS OF THE AWS CLOUD DESCRIBE AND PROVIDE AN EXAMPLE OF THE CORE AWS SERVICES, INCLUDING COMPUTE, NETWORK, DATABASES, AND STORAGE IDENTIFY AN APPROPRIATE SOLUTION USING AWS CLOUD SERVICES WITH VARIOUS USE CASES DESCRIBE THE AWS WELL-ARCHITECTED FRAMEWORK EXPLAIN THE SHARED RESPONSIBILITY MODEL DESCRIBE THE CORE SECURITY SERVICES WITHIN THE AWS CLOUD DESCRIBE THE BASICS OF AWS CLOUD MIGRATION ARTICULATE THE FINANCIAL BENEFITS OF THE AWS CLOUD FOR AN ORGANIZATION?S COST MANAGEMENT DEFINE THE CORE BILLING, ACCOUNT MANAGEMENT, AND PRICING MODELS EXPLAIN HOW TO USE PRICING TOOLS TO MAKE COST-EFFECTIVE CHOICES FOR AWS SERVICES DESCRIPTION THIS COURSE IS FOR INDIVIDUALS WHO SEEK AN OVERALL UNDERSTANDING OF THE AMAZON WEB SERVICES (AWS) CLOUD, INDEPENDENT OF SPECIFIC TECHNICAL ROLES. YOU WILL LEARN ABOUT AWS CLOUD CONCEPTS, AWS SERVICES, SECURITY, ARCHITECTURE, PRICING, AND SUPPORT TO BUILD YOUR AWS CLOUD KNOWLEDGE. THIS COURSE ALSO HELPS YOU PREPARE FOR THE AWS CERTIFIED CLOUD PRACTITIONER EXAM. PREREQUISITES GENERAL IT TECHNICAL KNOWLEDGE, GENERAL IT BUSINESS KNOWLEDGE 1 - INTRODUCTION TO AMAZON WEB SERVICES * Summarize the benefits of AWS * Describe differences between on-demand delivery and cloud deployments * Summarize the pay-as-you-go pricing model 2 - COMPUTE IN THE CLOUD * Describe the benefits of Amazon Elastic Compute Cloud (Amazon EC2) at a basic level * Identify the different Amazon EC2 instance types * Differentiate between the various billing options for Amazon EC2 * Describe the benefits of Amazon EC2 Auto Scaling * Summarize the benefits of Elastic Load Balancing * Give an example of the uses for Elastic Load Balancing * Summarize the differences between Amazon Simple Notification Service (Amazon SNS) and Amazon Simple Queue Services (Amazon SQS) * Summarize additional AWS compute options 3 - GLOBAL INFRASTRUCTURE AND RELIABILITY * Summarize the benefits of the AWS Global Infrastructure * Describe the basic concept of Availability Zones * Describe the benefits of Amazon CloudFront and Edge locations * Compare different methods for provisioning AWS services 4 - NETWORKING * Describe the basic concepts of networking * Describe the difference between public and private networking resources * Explain a virtual private gateway using a real life scenario * Explain a virtual private network (VPN) using a real life scenario * Describe the benefit of AWS Direct Connect * Describe the benefit of hybrid deployments * Describe the layers of security used in an IT strategy * Describe which services are used to interact with the AWS global network 5 - STORAGE AND DATABASES * Summarize the basic concept of storage and databases * Describe benefits of Amazon Elastic Block Store (Amazon EBS) * Describe benefits of Amazon Simple Storage Service (Amazon S3) * Describe the benefits of Amazon Elastic File System (Amazon EFS) * Summarize various storage solutions * Describe the benefits of Amazon Relational Database Service (Amazon RDS) * Describe the benefits of Amazon DynamoDB * Summarize various database services 6 - SECURITY * Explain the benefits of the shared responsibility model * Describe multi-factor authentication (MFA) * Differentiate between the AWS Identity and Access Management (IAM) security levels * Describe security policies at a basic level * Explain the benefits of AWS Organizations * Summarize the benefits of compliance with AWS * Explain primary AWS security services at a basic level 7 - MONITORING AND ANALYTICS * Summarize approaches to monitoring your AWS environment * Describe the benefits of Amazon CloudWatch * Describe the benefits of AWS CloudTrail * Describe the benefits of AWS Trusted Advisor 8 - PRICING AND SUPPORT * Understand AWS pricing and support models * Describe the AWS Free Tier * Describe key benefits of AWS Organizations and consolidated billing * Explain the benefits of AWS Budgets * Explain the benefits of AWS Cost Explorer * Explain the primary benefits of the AWS Pricing Calculator * Distinguish between the various AWS Support Plans * Describe the benefits of AWS Marketplace 9 - MIGRATION AND INNOVATION * Understand migration and innovation in the AWS Cloud * Summarize the AWS Cloud Adoption Framework (AWS CAF) * Summarize six key factors of a cloud migration strategy * Describe the benefits of various AWS data migration solutions, such as AWS Snowcone, AWS Snowball, and AWS Snowmobile * Summarize the broad scope of innovative solutions that AWS offers * Summarize the five pillars of the AWS Well-Architected Framewor 10 - AWS CERTIFIED CLOUD PRACTITIONER BASICS * Determine resources for preparing for the AWS Certified Cloud Practitioner examination * Describe benefits of becoming AWS Certified

AWS Cloud Practitioner Essentials
Delivered OnlineTwo days, May 23rd, 08:30 + 5 more
£675

BRCGS HACCP (4 Half-Day Sessions)

5.0(13)

By Ask Sonia Limited

Official BRCGS Product Safety Management course: HACCP Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS HACCP (4 Half-Day Sessions)
Delivered Online4 days, Jun 3rd, 14:00 + 2 more
£570

Agility in HR (ICP-AHR) Training & Certification Program | 2 days - 8 hrs/day | 9 am - 5 pm UK Time

By ValueX2

https://www.valuex2.com/agile-hr-certification/ https://www.linkedin.com/company/80563537/

Agility in HR (ICP-AHR) Training & Certification Program | 2 days - 8 hrs/day | 9 am - 5 pm UK Time
Delivered OnlineTwo days, Jun 3rd, 03:30 + 5 more
£550

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS FOR EXPERIENCED CLOUD SECURITY ENGINEERS WHO HAVE TAKEN A PREVIOUS CERTIFICATION IN THE SECURITY, COMPLIANCE AND IDENTITY PORTFOLIO. SPECIFICALLY, STUDENTS SHOULD HAVE ADVANCED EXPERIENCE AND KNOWLEDGE IN A WIDE RANGE OF SECURITY ENGINEERING AREAS, INCLUDING IDENTITY AND ACCESS, PLATFORM PROTECTION, SECURITY OPERATIONS, SECURING DATA, AND SECURING APPLICATIONS. THEY SHOULD ALSO HAVE EXPERIENCE WITH HYBRID AND CLOUD IMPLEMENTATIONS. BEGINNING STUDENTS SHOULD INSTEAD TAKE THE COURSE SC-900: MICROSOFT SECURITY, COMPLIANCE, AND IDENTITY FUNDAMENTALS. DESCRIPTION THIS IS AN ADVANCED, EXPERT-LEVEL COURSE. ALTHOUGH NOT REQUIRED TO ATTEND, STUDENTS ARE STRONGLY ENCOURAGED TO HAVE TAKEN AND PASSED ANOTHER ASSOCIATE LEVEL CERTIFICATION IN THE SECURITY, COMPLIANCE AND IDENTITY PORTFOLIO (SUCH AS AZ-500, SC-200 OR SC-300) BEFORE ATTENDING THIS CLASS. THIS COURSE PREPARES STUDENTS WITH THE EXPERTISE TO DESIGN AND EVALUATE CYBERSECURITY STRATEGIES IN THE FOLLOWING AREAS: ZERO TRUST, GOVERNANCE RISK COMPLIANCE (GRC), SECURITY OPERATIONS (SECOPS), AND DATA AND APPLICATIONS. STUDENTS WILL ALSO LEARN HOW TO DESIGN AND ARCHITECT SOLUTIONS USING ZERO TRUST PRINCIPLES AND SPECIFY SECURITY REQUIREMENTS FOR CLOUD INFRASTRUCTURE IN DIFFERENT SERVICE MODELS (SAAS, PAAS, IAAS). PREREQUISITES HIGHLY RECOMMENDED TO HAVE ATTENDED AND PASSED ONE OF THE ASSOCIATE LEVEL CERTIFICATIONS IN THE SECURITY, COMPLIANCE AND IDENTITY PORTFOLIO (SUCH AS AZ-500T00 MICROSOFT AZURE SECURITY TECHNOLOGIES, SC-200T00: MICROSOFT SECURITY OPERATIONS ANALYST, OR SC-300T00: MICROSOFT IDENTITY AND ACCESS ADMINISTRATOR.) ADVANCED EXPERIENCE AND KNOWLEDGE IN IDENTITY AND ACCESS, PLATFORM PROTECTION, SECURITY OPERATIONS, SECURING DATA AND SECURING APPLICATIONS. EXPERIENCE WITH HYBRID AND CLOUD IMPLEMENTATIONS. 1 - INTRODUCTION TO ZERO TRUST AND BEST PRACTICE FRAMEWORKS * Zero Trust initiatives * Zero Trust technology pillars part 1 * Zero Trust technology pillars part 2 2 - DESIGN SOLUTIONS THAT ALIGN WITH THE CLOUD ADOPTION FRAMEWORK (CAF) AND WELL-ARCHITECTED FRAMEWORK (WAF) * Define a security strategy * Cloud Adoption Framework secure methodology * Design security with Azure Landing Zones * The Well-Architected Framework security pillar 3 - DESIGN SOLUTIONS THAT ALIGN WITH THE MICROSOFT CYBERSECURITY REFERENCE ARCHITECTURE (MCRA) AND MICROSOFT CLOUD SECURITY BENCHMARK (MCSB) * Design solutions with best practices for capabilities and controls * Design solutions with best practices for attack protection 4 - DESIGN A RESILIENCY STRATEGY FOR COMMON CYBERTHREATS LIKE RANSOMWARE * Common cyberthreats and attack patterns * Support business resiliency * Ransomware protection * Configurations for secure backup and restore * Security updates 5 - CASE STUDY: DESIGN SOLUTIONS THAT ALIGN WITH SECURITY BEST PRACTICES AND PRIORITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 6 - DESIGN SOLUTIONS FOR REGULATORY COMPLIANCE * Translate compliance requirements into a security solution * Address compliance requirements with Microsoft Purview * Address privacy requirements with Microsoft Priva * Address security and compliance requirements with Azure policy * Evaluate infrastructure compliance with Defender for Cloud 7 - DESIGN SOLUTIONS FOR IDENTITY AND ACCESS MANAGEMENT * Design cloud, hybrid and multicloud access strategies (including Azure AD) * Design a solution for external identities * Design modern authentication and authorization strategies * Align conditional access and Zero Trust * Specify requirements to secure Active Directory Domain Services (AD DS) * Design a solution to manage secrets, keys, and certificates 8 - DESIGN SOLUTIONS FOR SECURING PRIVILEGED ACCESS * The enterprise access model * Design identity governance solutions * Design a solution to secure tenant administration * Design a solution for cloud infrastructure entitlement management (CIEM) * Design a solution for privileged access workstations and bastion services 9 - DESIGN SOLUTIONS FOR SECURITY OPERATIONS * Design security operations capabilities in hybrid and multicloud environments * Design centralized logging and auditing * Design security information and event management (SIEM) solutions * Design solutions for detection and response * Design a solution for security orchestration, automation, and response (SOAR) * Design security workflows * Design threat detection coverage 10 - CASE STUDY: DESIGN SECURITY OPERATIONS, IDENTITY AND COMPLIANCE CAPABILITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 11 - DESIGN SOLUTIONS FOR SECURING MICROSOFT 365 * Evaluate security posture for collaboration and productivity workloads * Design a Microsoft 365 Defender solution * Design configurations and operational practices for Microsoft 365 12 - DESIGN SOLUTIONS FOR SECURING APPLICATIONS * Design and implement standards to secure application development * Evaluate security posture of existing application portfolios * Evaluate application threats with threat modeling * Design security lifecycle strategy for applications * Secure access for workload identities * Design a solution for API management and security * Design a solution for secure access to applications 13 - DESIGN SOLUTIONS FOR SECURING AN ORGANIZATION'S DATA * Design a solution for data discovery and classification using Microsoft Purview * Design a solution for data protection * Design data security for Azure workloads * Design security for Azure Storage * Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR APPLICATIONS AND DATA * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 15 - SPECIFY REQUIREMENTS FOR SECURING SAAS, PAAS, AND IAAS SERVICES * Specify security baselines for SaaS, PaaS, and IaaS services * Specify security requirements for web workloads * Specify security requirements for containers and container orchestration 16 - DESIGN SOLUTIONS FOR SECURITY POSTURE MANAGEMENT IN HYBRID AND MULTICLOUD ENVIRONMENTS * Evaluate security posture by using Microsoft Cloud Security Benchmark * Design integrated posture management and workload protection * Evaluate security posture by using Microsoft Defender for Cloud * Posture evaluation with Microsoft Defender for Cloud secure score * Design cloud workload protection with Microsoft Defender for Cloud * Integrate hybrid and multicloud environments with Azure Arc * Design a solution for external attack surface management 17 - DESIGN SOLUTIONS FOR SECURING SERVER AND CLIENT ENDPOINTS * Specify server security requirements * Specify requirements for mobile devices and clients * Specify internet of things (IoT) and embedded device security requirements * Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT * Specify security baselines for server and client endpoints * Design a solution for secure remote access 18 - DESIGN SOLUTIONS FOR NETWORK SECURITY * Design solutions for network segmentation * Design solutions for traffic filtering with network security groups * Design solutions for network posture management * Design solutions for network monitoring 19 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR INFRASTRUCTURE * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough ADDITIONAL COURSE DETAILS: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered Online5 days, Jul 29th, 13:00 + 1 more
£2380

COBIT 2019 Foundation

By Nexus Human

DURATION 2 DAYS 12 CPD HOURS THIS COURSE IS INTENDED FOR THE COBIT 2019 FOUNDATION COURSE WOULD SUIT CANDIDATES WORKING IN THE FOLLOWING IT PROFESSIONS OR AREAS: IT AUDITORS IT MANAGERS IT QUALITY PROFESSIONALS IT LEADERSHIP IT DEVELOPERS PROCESS PRACTITIONERS MANAGERS IN IT SERVICE PROVIDING FIRMS THE ABOVE LIST IS A SUGGESTION ONLY; INDIVIDUALS MAY WISH TO ATTEND BASED ON THEIR OWN CAREER ASPIRATIONS, PERSONAL GOALS OR OBJECTIVES. DELEGATES MAY TAKE AS FEW OR AS MANY INTERMEDIATE QUALIFICATIONS AS THEY REQUIRE, AND TO SUIT THEIR NEEDS. OVERVIEW THIS COBIT 2019 FOUNDATION COURSE IS DESIGNED AS AN INTRODUCTION TO COBIT 2019 AND ENABLES YOU TO UNDERSTAND HOW AN INTEGRATED BUSINESS FRAMEWORK FOR THE GOVERNANCE AND MANAGEMENT OF ENTERPRISE IT CAN BE UTILIZED TO ACHIEVE IT BUSINESS INTEGRATION, COST REDUCTIONS AND INCREASED PRODUCTIVITY. THE SYLLABUS AREAS THAT THIS COURSE IS DESIGNED TO COVER ARE: NEW FRAMEWORK INTRODUCTION KEY CONCEPTS AND TERMINOLOGY GOVERNANCE AND FRAMEWORK PRINCIPLES GOVERNANCE SYSTEM AND COMPONENTS GOVERNANCE AND MANAGEMENT OBJECTIVES PERFORMANCE MANAGEMENT DESIGNING A TAILORED GOVERNANCE SYSTEM DESCRIPTION COBIT 2019 BUILDS ON AND INTEGRATES MORE THAN 25 YEARS OF DEVELOPMENT IN THIS FIELD, NOT ONLY INCORPORATING NEW INSIGHTS FROM SCIENCE, BUT ALSO OPERATIONALIZING THESE INSIGHTS AS PRACTICE. THE HEART OF THE COBIT FRAMEWORK UPDATES COBIT PRINCIPLES WHILE LAYING OUT THE STRUCTURE OF THE OVERALL FRAMEWORK INCLUDING: NEW CONCEPTS ARE INTRODUCED AND TERMINOLOGY IS EXPLAINED?THE COBIT CORE MODEL AND ITS 40 GOVERNANCE AND MANAGEMENT OBJECTIVES PROVIDE THE PLATFORM FOR ESTABLISHING YOUR GOVERNANCE PROGRAM. THE PERFORMANCE MANAGEMENT SYSTEM IS UPDATED AND ALLOWS THE FLEXIBILITY TO USE MATURITY MEASUREMENTS AS WELL AS CAPABILITY MEASUREMENTS. INTRODUCTIONS TO DESIGN FACTORS AND FOCUS AREAS OFFER ADDITIONAL PRACTICAL GUIDANCE ON FLEXIBLE ADOPTION OF COBIT 2019, WHETHER FOR SPECIFIC PROJECTS OR FULL IMPLEMENTATION. FROM ITS FOUNDATION IN THE IT AUDIT COMMUNITY, COBIT HAS DEVELOPED INTO A BROADER AND MORE COMPREHENSIVE INFORMATION AND TECHNOLOGY (I&T) GOVERNANCE AND MANAGEMENT FRAMEWORK AND CONTINUES TO ESTABLISH ITSELF AS A GENERALLY ACCEPTED FRAMEWORK FOR I&T GOVERNANCE. 1 - COBIT 5 OVERVIEW AND INTRODUCTION * Course Administration * Course Objectives * Exam Overview * Certification Scheme * History of COBIT * COBIT 2019 Improvements * Major differences with 2019 * Misconceptions about COBIT * COBIT and Other Standards 2 - KEY CONCEPTS AND TERMINOLOGY * Introduction to Enterprise Governance of Information and Technology * Benefits of Information and Technology Governance * COBIT Information and Technology Governance Framework * Distinction of Governance and Management * Three Principles of a Governance Framework * Six Principles for a Governance System 3 - GOVERNANCE SYSTEMS AND COMPONENTS * Introduction to the Components of a Governance System * Processes and Capability Levels * Organizational Structures and Defined Roles * Information Flows and Items * People, Skills and Competencies * Principles, Policies and Frameworks * Culture, Ethics and Behavior * Services, Infrastructure and Applications 4 - GOVERNANCE MANAGEMENT OBJECTIVES * Governance and Management Objectives Publication * Governance and Management Objectives * Governance and Management Objectives Core Model * Evaluate, Direct and Monitor * Align, Plan and Organize * Build, Acquire and Implement * Deliver, Service and Support * Monitor, Evaluate and Assess 5 - GOALS CASCADE * Governance and Management Objective Relationships * Governance and Management Objective Descriptions * High-Level Information Example * Introduction to the Goals Cascade * Enterprise Goals * Alignment Goals * Mapping Tables ? Appendix A 6 - PERFORMANCE MANAGEMENT * Introduction to Performance Management * COBIT Performance Management Principles * COBIT Performance Management (CPM) Overview * Process Capability Levels * Rating Process Activities * Focus Area Maturity Levels * Performance Management of Organizational Structures * Performance Management of Information Items * Performance Management of Culture and Behavior 7 - DESIGNING A TAILORED GOVERNANCE SYSTEM * The Need for Tailoring * Design Factors * Enterprise Strategy * Enterprise Goals * Risk Profile * I&T Related Issues * Threat Landscape * Compliance Requirements * Role of IT * Sourcing Model for IT * IT Implementation Methods * Technology Adoption Strategy * Enterprise Size * Focus Areas * Designing a Tailored Governance System * Management Objective Priority and Target Capability Levels * Component Variations * Specific Focus Areas * Stages and Steps in the Design Process 8 - IMPLEMENTING ENTERPRISE GOVERNANCE OF IT * The Business Case * The COBIT Implementation Guide Purpose * COBIT Implementation Approach * Phase 1 ? What are the Drivers * Phase 2 ? Where are we Now * Phase 3 ? Where do we Want to be * Phase 4 ? What Needs to be Done * Phase 5 ? How do we get There * Phase 6 ? Did we get There * Phase 7 How do we Weep the Momentum Going? * EGIT Implementation Program Challenges

COBIT 2019 Foundation
Delivered Online3 days, Sept 9th, 13:00
£1330

Strategic Decision Making for Leaders

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Effective decision-making requires the adoption of decision approaches that fit the complexities of these situations and the efficient management of decision-making processes. It also requires the ability to think strategically in highly interactive markets and acute insights into the psychology behind people's behaviour. Objectives * Develop critical thinking skills, sharpening your intuition in the face of risk and uncertainty * Learn ways to discover, manage, mitigate and avoid decision-making traps * Learn to leverage the power of 'nudges' - a light-touch way to influence human behaviour and improve decision-making * Boost your ability to build high-performing teams by understanding what conditions enable teams to make better decisions than individuals * Become a more strategic leader and decision-maker by understanding the long-term impact your decisions can have on your organisation

Strategic Decision Making for Leaders
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

Educators matching "Adoption"

Show all 84