• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

328 ALERT courses

PL-200T00 Microsoft Power Platform Functional Consultant

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR A MICROSOFT POWER PLATFORM FUNCTIONAL CONSULTANT IS RESPONSIBLE FOR CREATING AND CONFIGURING APPS, AUTOMATIONS, AND SOLUTIONS. THEY ACT AS THE LIAISON BETWEEN USERS AND THE IMPLEMENTATION TEAM. THE FUNCTIONAL CONSULTANT PROMOTES UTILIZATION OF SOLUTIONS WITHIN AN ORGANIZATION. THE FUNCTIONAL CONSULTANT MAY PERFORM DISCOVERY, ENGAGE SUBJECT MATTER EXPERTS AND STAKEHOLDERS, CAPTURE REQUIREMENTS, AND MAP REQUIREMENTS TO FEATURES. THEY IMPLEMENT COMPONENTS OF A SOLUTION INCLUDING APPLICATION ENHANCEMENTS, CUSTOM USER EXPERIENCES, SYSTEM INTEGRATIONS, DATA CONVERSIONS, CUSTOM PROCESS AUTOMATION, AND SIMPLE VISUALIZATIONS. DESCRIPTION THIS COURSE WILL TEACH YOU TO USE MICROSOFT POWER PLATFORM SOLUTIONS TO SIMPLIFY, AUTOMATE, AND EMPOWER BUSINESS PROCESSES FOR ORGANIZATIONS IN THE ROLE OF A FUNCTIONAL CONSULTANT. A MICROSOFT POWER PLATFORM FUNCTIONAL CONSULTANT IS RESPONSIBLE FOR CREATING AND CONFIGURING APPS, AUTOMATIONS, AND SOLUTIONS. THEY ACT AS THE LIAISON BETWEEN USERS AND THE IMPLEMENTATION TEAM. THE FUNCTIONAL CONSULTANT PROMOTES UTILIZATION OF SOLUTIONS WITHIN AN ORGANIZATION. THE FUNCTIONAL CONSULTANT MAY PERFORM DISCOVERY, ENGAGE SUBJECT MATTER EXPERTS AND STAKEHOLDERS, CAPTURE REQUIREMENTS, AND MAP REQUIREMENTS TO FEATURES. THEY IMPLEMENT COMPONENTS OF A SOLUTION INCLUDING APPLICATION ENHANCEMENTS, CUSTOM USER EXPERIENCES, SYSTEM INTEGRATIONS, DATA CONVERSIONS, CUSTOM PROCESS AUTOMATION, AND SIMPLE VISUALIZATIONS. THIS COURSE MAY CONTAIN A 1-DAY APPLIED WORKSHOP. THIS WORKSHOP WILL ALLOW YOU TO PRACTICE YOUR FUNCTIONAL CONSULTANT SKILLS BY CREATING AN END-TO-END SOLUTION TO SOLVE A PROBLEM FOR A FICTITIOUS COMPANY. THE SOLUTION WILL INCLUDE A MICROSOFT DATAVERSE DATABASE, POWER APPS CANVAS APP, AND POWER AUTOMATE FLOWS. PREREQUISITES * EXPERIENCE AS AN IT PROFESSIONAL OR STUDENT * WORKING KNOWLEDGE OF MICROSOFT POWER PLATFORM AND ITS KEY COMPONENTS * KNOWLEDGE OF MICROSOFT DATAVERSE (OR GENERAL DATA MODELING) AND SECURITY CONCEPTS 1 - DESCRIBE THE BUSINESS VALUE OF THE MICROSOFT POWER PLATFORM * Explore Microsoft Power Platform * Describe the business value of the Power Platform * Explore connectors and Microsoft Dataverse * Describe how Power Platform works with Microsoft 365 apps and services * Explore how Power Platform works with Microsoft Teams * Describe how Power Platform works with Microsoft Dynamics 365 apps * Describe how Power Platform solutions consume Microsoft Azure services * Explore how Microsoft Power Platform apps work together * Use Artificial Intelligence to increase productivity 2 - CORE COMPONENTS OF POWER PAGES * Get started with Power Pages * Core tools and components of Power Pages * Overview of Power Pages security * Overview of Power Pages extensibility 3 - EXPLORE POWER PAGES TEMPLATES * Site design templates * Scenario-based templates * Dynamics 365 Power Pages site templates 4 - EXPLORE POWER PAGES DESIGN STUDIO * Work with pages * Page components * Site styling and templates 5 - EXPLORE POWER PAGES DESIGN STUDIO DATA AND SECURITY FEATURES * Data workspace in Power Pages design studio * Power Pages security features 6 - INTRODUCTION TO POWER PAGES ADMINISTRATION * Power Pages administrative tools * Set up workspace in Power Pages design studio 7 - GET STARTED BUILDING WITH POWER BI * Use Power BI * Building blocks of Power BI * Tour and use the Power BI service 8 - GET DATA WITH POWER BI DESKTOP * Overview of Power BI Desktop * Explore Power BI Desktop * Connect to data sources * Get data from Excel * Transform data to include in a report * Combine data from multiple sources * Clean data to include in a report 9 - MODEL DATA IN POWER BI * How to manage your data relationships * Create calculated columns * Optimize data models * Create measures * Create calculated tables * Explore time-based data 10 - USE VISUALS IN POWER BI * Create and customize simple visualizations * Create slicers * Map visualizations * Matrices and tables * Create scatter, waterfall, and funnel charts * Modify colors in charts and visuals * Page layout and formatting 11 - EXPLORE DATA IN POWER BI * Quick insights in Power BI * Create and configure a dashboard * Ask questions of your data with natural language * Create custom Q&A suggestions * Share dashboards with your organization * Display visuals and tiles in full screen * Edit tile details and add widgets * Get more space on your dashboard 12 - PUBLISH AND SHARE IN POWER BI * Publish Power BI Desktop reports * Print and export dashboards and reports * Introducing Power BI Mobile * Create workspaces in Power BI * Build apps * Use apps * Integrate OneDrive for Business with Power BI * Publish to web 13 - CREATE AND MANAGE WORKSPACES IN POWER BI * Distribute a report or dashboard * Monitor usage and performance * Recommend a development life cycle strategy * Troubleshoot data by viewing its lineage * Configure data protection 14 - MANAGE SEMANTIC MODELS IN POWER BI * Use a Power BI gateway to connect to on-premises data sources * Configure a semantic model scheduled refresh * Configure incremental refresh settings * Manage and promote semantic models * Troubleshoot service connectivity * Boost performance with query caching (Premium) 15 - CREATE DASHBOARDS IN POWER BI * Configure data alerts * Explore data by asking questions * Review Quick insights * Add a dashboard theme * Pin a live report page to a dashboard * Configure a real-time dashboard * Set mobile view 16 - IMPLEMENT ROW-LEVEL SECURITY * Configure row-level security with the static method * Configure row-level security with the dynamic method 17 - CREATE TABLES IN DATAVERSE * Table characteristics * Table relationships * Dataverse logic and security * Dataverse auditing * Dual-write vs. virtual tables 18 - MANAGE TABLES IN DATAVERSE * Identify tables and table types in Dataverse * Create a custom table * Enable attachments within a table * Licensing requirements for each table type 19 - CREATE AND MANAGE COLUMNS WITHIN A TABLE IN DATAVERSE * Define columns in Microsoft Dataverse * Column types in Microsoft Dataverse * Add a column to a table * Create a primary name column * Restrictions that apply to columns in a table * Create an auto numbering column * Create an alternate key 20 - CREATE A RELATIONSHIP BETWEEN TABLES IN DATAVERSE * Relate one or more tables - Introduction * Relationship types that are available in Microsoft Dataverse * Create a one-to-many relationship between tables * Create a many-to-many relationship between tables * Edit or delete relationships 21 - WORKING WITH CHOICES IN DATAVERSE * Define choice column * Standard choices column 22 - GET STARTED WITH SECURITY ROLES IN DATAVERSE * Understand environment roles * Adding or disabling an environment user * Understand security concepts in Dataverse * Understand user security roles and security role defaults * Check the roles that a user belongs to * Configure Dataverse teams for security * Configure Dataverse group teams for security 23 - USE ADMINISTRATION OPTIONS FOR DATAVERSE * Use Microsoft Power Platform Admin Center portal * Tenant storage capacity * Advanced Customization options in Power Apps Portal * Enable and disable auditing 24 - MANAGE DYNAMICS 365 MODEL-DRIVEN APP SETTINGS AND SECURITY * Configure role-based security * Manage teams and business units * Explore settings and customizations 25 - INTRODUCTION TO MICROSOFT POWER PLATFORM SECURITY AND GOVERNANCE * Identify Microsoft Power Platform environments * Data Loss Prevention policies * Microsoft Power Platform Center of Excellence Starter Kit 26 - GET STARTED WITH MODEL-DRIVEN APPS IN POWER APPS * Introducing model-driven apps * Components of model-driven apps * Design model-driven apps * Incorporate business process flows 27 - CONFIGURE FORMS, CHARTS, AND DASHBOARDS IN MODEL-DRIVEN APPS * Forms overview * Form elements * Configure multiple forms * Use specialized form components * Configure views overview * Configure grids * Create and edit views * Configure charts overview * Dashboards overview * Use interactive streams and tiles 28 - GET STARTED WITH POWER APPS CANVAS APPS * Power Apps building blocks * Ways to build Power Apps * Power Apps related technologies * Additional Power Apps related technologies * Designing a Power Apps app 29 - CONNECT TO OTHER DATA IN A POWER APPS CANVAS APP * Overview of the different data sources * Work with action-based data sources * Power Automate is a companion to Power Apps 30 - HOW TO BUILD THE UI IN A CANVAS APP IN POWER APPS * Use themes to quickly change the appearance of your app * Branding a control * Icons * Images * Personalization * Using the tablet or phone form factors 31 - MANAGE APPS IN POWER APPS * Power Apps review 32 - BUILD YOUR FIRST APP WITH POWER APPS AND DATAVERSE FOR TEAMS * Create your first app with the hero template * Customize your app with Power Apps Studio * Publish your app * Install template apps 33 - ACCESS DATAVERSE IN POWER PAGES WEBSITES * Use lists to display multiple Dataverse records * Use forms to interact with Dataverse data 34 - AUTHENTICATION AND USER MANAGEMENT IN POWER PAGES * Power Pages authentication settings * User registration in Power Pages * Authentication management for Power Pages users * Power Pages authentication providers 35 - POWER PAGES MAINTENANCE AND TROUBLESHOOTING * Power Pages website maintenance * Power Pages website troubleshooting 36 - DEFINE AND CREATE BUSINESS RULES IN DATAVERSE * Define business rules - Introduction * Define the components of a business rule * Create a business rule 37 - GET STARTED WITH POWER AUTOMATE * Introducing Power Automate * Troubleshoot flows 38 - USE THE ADMIN CENTER TO MANAGE ENVIRONMENTS AND DATA POLICIES IN POWER AUTOMATE * Administer flows * Export and import flows * Learn how to distribute button flows 39 - USE DATAVERSE TRIGGERS AND ACTIONS IN POWER AUTOMATE * Dataverse triggers * Query data * Create, update, delete, and relate actions 40 - EXTEND DATAVERSE WITH POWER AUTOMATE * Set up a flow and configure its trigger * Email Dataverse record * Add to-do items * Test and run your flow 41 - INTRODUCTION TO EXPRESSIONS IN POWER AUTOMATE * Get started with expressions * Notes make things easier * Types of functions * Write complex expressions 42 - BUILD YOUR FIRST POWER AUTOMATE FOR DESKTOP FLOW * Set up the environment * Explore Power Automate for desktop * Create your first Power Automate for desktop flow * Record Power Automate for desktop actions * Edit and test recorded actions 43 - RUN A POWER AUTOMATE FOR DESKTOP FLOW IN UNATTENDED MODE * Set up an unattended desktop flow * Create a new cloud flow that calls an existing flow in unattended mode * Perform a test run * Best practices 44 - OPTIMIZE YOUR BUSINESS PROCESS WITH PROCESS ADVISOR * Get familiar with process advisor * Create your first recording * Edit recordings and group actions * Analyze recordings and interpret results * Automation recommendations 45 - GET STARTED WITH MICROSOFT COPILOT STUDIO BOTS * Get started working with environments * Create bots and work with the Microsoft Copilot Studio interface * Create topics * Test bots * Publish bots and analyze performance 46 - ENHANCE MICROSOFT COPILOT STUDIO BOTS * Use Power Automate to add actions * Transfer conversations to agents by using Omnichannel for Customer Service * Create topics for existing support content * Analyze bot performance 47 - MANAGE TOPICS IN MICROSOFT COPILOT STUDIO * Work with bot topics * Branch a topic * Create topics for existing support content * Work with system fallback topics * Manage topics 48 - MANAGE POWER VIRTUAL AGENTS * Environments in Microsoft Copilot Studio * Bot topics permissions * Bot entities and flow permissions * Monitor and diagnose * Administer and manage * Export and import bots * Authentication 49 - GET STARTED BUILDING WITH POWER BI * Use Power BI * Building blocks of Power BI * Tour and use the Power BI service 50 - GET DATA WITH POWER BI DESKTOP * Overview of Power BI Desktop * Explore Power BI Desktop * Connect to data sources * Get data from Excel * Transform data to include in a report * Combine data from multiple sources * Clean data to include in a report 51 - MODEL DATA IN POWER BI * How to manage your data relationships * Create calculated columns * Optimize data models * Create measures * Create calculated tables * Explore time-based data 52 - USE VISUALS IN POWER BI * Create and customize simple visualizations * Create slicers * Map visualizations * Matrices and tables * Create scatter, waterfall, and funnel charts * Modify colors in charts and visuals * Page layout and formatting 53 - EXPLORE DATA IN POWER BI * Quick insights in Power BI * Create and configure a dashboard * Ask questions of your data with natural language * Create custom Q&A suggestions * Share dashboards with your organization * Display visuals and tiles in full screen * Edit tile details and add widgets * Get more space on your dashboard 54 - PUBLISH AND SHARE IN POWER BI * Publish Power BI Desktop reports * Print and export dashboards and reports * Introducing Power BI Mobile * Create workspaces in Power BI * Build apps * Use apps * Integrate OneDrive for Business with Power BI * Publish to web 55 - MANAGE SOLUTIONS IN POWER APPS AND POWER AUTOMATE * Add and remove apps, flows, and entities in a solution * Edit a solution-aware app, flow, and table * Build and deploy a complex solution with flows, apps, and entities * Automate solution management 56 - LOAD/EXPORT DATA AND CREATE DATA VIEWS IN DATAVERSE * View data in a table * Create or edit views of data in a table * Load data into a table * Export data from a table * Add, update, or delete data in a table by using Excel * Import data using Power Query * Generate a new dataflow from an Excel Template * Dataflow and Azure integration 57 - GET STARTED WITH AI BUILDER * Choose an AI capability * Create your first model * Ways to use your models 58 - MANAGE MODELS IN AI BUILDER * Model lifecycle * Manage model versions * Share your models 59 - USE AI BUILDER IN POWER AUTOMATE * AI Builder in Power Automate saves time * Advanced usage of AI Builder in Power Automate 60 - FUNCTIONAL CONSULTANT SKILLS * Create entity relationship diagrams * Create and document mock-ups * Document functional requirements and artifacts * Complete fit-gap analysis * Discuss stakeholder management responsibilities * Understand industry accelerators * Define Application Lifecycle Management * Participate in testing * Evaluate options * Define connectors * Understand Power Apps component framework 61 - SOLUTION ARCHITECT SERIES: PLAN APPLICATION LIFECYCLE MANAGEMENT FOR POWER PLATFORM * Key considerations for ALM * Solutions * Configuration and reference data * Release process * ALM with Azure DevOps

PL-200T00 Microsoft Power Platform Functional Consultant
Delivered Online6 days, May 13th, 08:30 + 3 more
£2975

CompTIA Security+

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR PEOPLE WHO ARE SEEKING TO LAUNCH A CAREER IN CYBERSECURITY. OVERVIEW ASSESS THE SECURITY POSTURE OF AN ENTERPRISE ENVIRONMENT AND RECOMMEND AND IMPLEMENT APPROPRIATE SECURITY SOLUTIONS; MONITOR AND SECURE HYBRID ENVIRONMENTS, INCLUDING CLOUD, MOBILE, AND IOT; OPERATE WITH AN AWARENESS OF APPLICABLE LAWS AND POLICIES, INCLUDING PRINCIPLES OF GOVERNANCE, RISK, AND COMPLIANCE; IDENTIFY, ANALYZE, AND RESPOND TO SECURITY EVENTS AND INCIDENTS. DESCRIPTION COMPTIA SECURITY+ IS A GLOBAL CERTIFICATION THAT VALIDATES THE BASELINE SKILLS NECESSARY TO PERFORM CORE SECURITY FUNCTIONS AND IS THE FIRST SECURITY CERTIFICATION A CANDIDATE SHOULD EARN. COMPTIA SECURITY+ ESTABLISHES THE CORE KNOWLEDGE REQUIRED OF ANY CYBERSECURITY ROLE AND PROVIDES A SPRINGBOARD TO INTERMEDIATE-LEVEL CYBERSECURITY JOBS. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online6 days, May 13th, 13:00 + 27 more
£2475

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS FOR AZURE SECURITY ENGINEERS WHO ARE PLANNING TO TAKE THE ASSOCIATED CERTIFICATION EXAM, OR WHO ARE PERFORMING SECURITY TASKS IN THEIR DAY-TO-DAY JOB. THIS COURSE WOULD ALSO BE HELPFUL TO AN ENGINEER THAT WANTS TO SPECIALIZE IN PROVIDING SECURITY FOR AZURE-BASED DIGITAL PLATFORMS AND PLAY AN INTEGRAL ROLE IN PROTECTING AN ORGANIZATION'S DATA. DESCRIPTION THIS COURSE PROVIDES IT SECURITY PROFESSIONALS WITH THE KNOWLEDGE AND SKILLS NEEDED TO IMPLEMENT SECURITY CONTROLS, MAINTAIN AN ORGANIZATION?S SECURITY POSTURE, AND IDENTIFY AND REMEDIATE SECURITY VULNERABILITIES. THIS COURSE INCLUDES SECURITY FOR IDENTITY AND ACCESS, PLATFORM PROTECTION, DATA AND APPLICATIONS, AND SECURITY OPERATIONS. PREREQUISITES AZ-104T00 - MICROSOFT AZURE ADMINISTRATOR SECURITY BEST PRACTICES AND INDUSTRY SECURITY REQUIREMENTS SUCH AS DEFENSE IN DEPTH, LEAST PRIVILEGED ACCESS, ROLE-BASED ACCESS CONTROL, MULTI-FACTOR AUTHENTICATION, SHARED RESPONSIBILITY, AND ZERO TRUST MODEL. BE FAMILIAR WITH SECURITY PROTOCOLS SUCH AS VIRTUAL PRIVATE NETWORKS (VPN), INTERNET SECURITY PROTOCOL (IPSEC), SECURE SOCKET LAYER (SSL), DISK AND DATA ENCRYPTION METHODS. HAVE SOME EXPERIENCE DEPLOYING AZURE WORKLOADS. THIS COURSE DOES NOT COVER THE BASICS OF AZURE ADMINISTRATION, INSTEAD THE COURSE CONTENT BUILDS ON THAT KNOWLEDGE BY ADDING SECURITY SPECIFIC INFORMATION. HAVE EXPERIENCE WITH WINDOWS AND LINUX OPERATING SYSTEMS AND SCRIPTING LANGUAGES. COURSE LABS MAY USE POWERSHELL AND THE CLI. 1 - MANAGE IDENTITIES IN MICROSOFT ENTRA ID * Secure users in Microsoft Entra ID * Secure groups in Microsoft Entra ID * Recommend when to use external identities * Secure external identities * Implement Microsoft Entra Identity protection 2 - MANAGE AUTHENTICATION BY USING MICROSOFT ENTRA ID * Configure Microsoft Entra Verified ID * Implement multifactor authentication (MFA) * Implement passwordless authentication * Implement password protection * Implement single sign-on (SSO) * Integrate single sign-on (SSO) and identity providers * Recommend and enforce modern authentication protocols 3 - MANAGE AUTHORIZATION BY USING MICROSOFT ENTRA ID * Configure Azure role permissions for management groups, subscriptions, resource groups, and resources * Assign built-in roles in Microsoft Entra ID * Assign built-in roles in Azure * Create and assign a custom role in Microsoft Entra ID * Implement and manage Microsoft Entra Permissions Management * Configure Microsoft Entra Privileged Identity Management * Configure role management and access reviews by using Microsoft Entra Identity Governance * Implement Conditional Access policies 4 - MANAGE APPLICATION ACCESS IN MICROSOFT ENTRA ID * Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants * Manage app registrations in Microsoft Entra ID * Configure app registration permission scopes * Manage app registration permission consent * Manage and use service principals * Manage managed identities for Azure resources * Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - PLAN AND IMPLEMENT SECURITY FOR VIRTUAL NETWORKS * Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) * Plan and implement User-Defined Routes (UDRs) * Plan and implement Virtual Network peering or gateway * Plan and implement Virtual Wide Area Network, including secured virtual hub * Secure VPN connectivity, including point-to-site and site-to-site * Implement encryption over ExpressRoute * Configure firewall settings on PaaS resources * Monitor network security by using Network Watcher, including NSG flow logging 6 - PLAN AND IMPLEMENT SECURITY FOR PRIVATE ACCESS TO AZURE RESOURCES * Plan and implement virtual network Service Endpoints * Plan and implement Private Endpoints * Plan and implement Private Link services * Plan and implement network integration for Azure App Service and Azure Functions * Plan and implement network security configurations for an App Service Environment (ASE) * Plan and implement network security configurations for an Azure SQL Managed Instance 7 - PLAN AND IMPLEMENT SECURITY FOR PUBLIC ACCESS TO AZURE RESOURCES * Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management * Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies * Plan and implement an Azure Application Gateway * Plan and implement an Azure Front Door, including Content Delivery Network (CDN) * Plan and implement a Web Application Firewall (WAF) * Recommend when to use Azure DDoS Protection Standard 8 - PLAN AND IMPLEMENT ADVANCED SECURITY FOR COMPUTE * Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access * Configure network isolation for Azure Kubernetes Service (AKS) * Secure and monitor AKS * Configure authentication for AKS * Configure security for Azure Container Instances (ACIs) * Configure security for Azure Container Apps (ACAs) * Manage access to Azure Container Registry (ACR) * Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption * Recommend security configurations for Azure API Management 9 - PLAN AND IMPLEMENT SECURITY FOR STORAGE * Configure access control for storage accounts * Manage life cycle for storage account access keys * Select and configure an appropriate method for access to Azure Files * Select and configure an appropriate method for access to Azure Blob Storage * Select and configure an appropriate method for access to Azure Tables * Select and configure an appropriate method for access to Azure Queues * Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage * Configure Bring your own key (BYOK) * Enable double encryption at the Azure Storage infrastructure level 10 - PLAN AND IMPLEMENT SECURITY FOR AZURE SQL DATABASE AND AZURE SQL MANAGED INSTANCE * Enable database authentication by using Microsoft Entra ID * Enable and monitor database audit * Identify use cases for the Microsoft Purview governance portal * Implement data classification of sensitive information by using the Microsoft Purview governance portal * Plan and implement dynamic mask * Implement transparent data encryption? * Recommend when to use Azure SQL Database Always Encrypted 11 - PLAN, IMPLEMENT, AND MANAGE GOVERNANCE FOR SECURITY * Create, assign, and interpret security policies and initiatives in Azure Policy * Configure security settings by using Azure Blueprint * Deploy secure infrastructures by using a landing zone * Create and configure an Azure Key Vault * Recommend when to use a dedicated Hardware Security Module (HSM) * Configure access to Key Vault, including vault access policies and Azure Role Based Access Control * Manage certificates, secrets, and keys * Configure key rotation * Configure backup and recovery of certificates, secrets, and keys 12 - MANAGE SECURITY POSTURE BY USING MICROSOFT DEFENDER FOR CLOUD * Implement Microsoft Defender for Cloud * Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory * Assess compliance against security frameworks and Microsoft Defender for Cloud * Add industry and regulatory standards to Microsoft Defender for Cloud * Add custom initiatives to Microsoft Defender for Cloud * Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud * Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - CONFIGURE AND MANAGE THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD * Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS * Configure Microsoft Defender for Servers * Configure Microsoft Defender for Azure SQL Database * Manage and respond to security alerts in Microsoft Defender for Cloud * Configure workflow automation by using Microsoft Defender for Cloud * Evaluate vulnerability scans from Microsoft Defender for Server 14 - CONFIGURE AND MANAGE SECURITY MONITORING AND AUTOMATION SOLUTIONS * Monitor security events by using Azure Monitor * Configure data connectors in Microsoft Sentinel * Create and customize analytics rules in Microsoft Sentinel * Configure automation in Microsoft Sentinel ADDITIONAL COURSE DETAILS: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered Online5 days, May 14th, 08:30 + 5 more
£2380

AZ-104T00 Microsoft Azure Administrator

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS FOR AZURE ADMINISTRATORS. THE AZURE ADMINISTRATOR IMPLEMENTS, MANAGES, AND MONITORS IDENTITY, GOVERNANCE, STORAGE, COMPUTE, AND VIRTUAL NETWORKS IN A CLOUD ENVIRONMENT. THE AZURE ADMINISTRATOR WILL PROVISION, SIZE, MONITOR, AND ADJUST RESOURCES AS APPROPRIATE. DESCRIPTION THIS COURSE TEACHES IT PROFESSIONALS HOW TO MANAGE THEIR AZURE SUBSCRIPTIONS, SECURE IDENTITIES, ADMINISTER THE INFRASTRUCTURE, CONFIGURE VIRTUAL NETWORKING, CONNECT AZURE AND ON-PREMISES SITES, MANAGE NETWORK TRAFFIC, IMPLEMENT STORAGE SOLUTIONS, CREATE AND SCALE VIRTUAL MACHINES, IMPLEMENT WEB APPS AND CONTAINERS, BACK UP AND SHARE DATA, AND MONITOR YOUR SOLUTION. PREREQUISITES SUCCESSFUL AZURE ADMINISTRATORS START THIS ROLE WITH EXPERIENCE IN VIRTUALIZATION, NETWORKING, IDENTITY, AND STORAGE. UNDERSTANDING OF ON-PREMISES VIRTUALIZATION TECHNOLOGIES, INCLUDING: VMS, VIRTUAL NETWORKING, AND VIRTUAL HARD DISKS. UNDERSTANDING OF NETWORK CONFIGURATIONS, INCLUDING TCP/IP, DOMAIN NAME SYSTEM (DNS), VIRTUAL PRIVATE NETWORKS (VPNS), FIREWALLS, AND ENCRYPTION TECHNOLOGIES. UNDERSTANDING OF ACTIVE DIRECTORY CONCEPTS, INCLUDING USERS, GROUPS, AND ROLE-BASED ACCESS CONTROL. UNDERSTANDING OF RESILIENCE AND DISASTER RECOVERY, INCLUDING BACKUP AND RESTORE OPERATIONS. 1 - CONFIGURE MICROSOFT ENTRA ID * Describe Microsoft Entra ID benefits and features * Describe Microsoft Entra concepts * Compare Active Directory Domain Services to Microsoft Entra ID * Select Microsoft Entra editions * Implement Microsoft Entra join * Implement Microsoft Entra self-service password reset 2 - CONFIGURE USER AND GROUP ACCOUNTS * Create user accounts * Manage user accounts * Create bulk user accounts * Create group accounts * Create administrative units 3 - CONFIGURE SUBSCRIPTIONS * Identify Azure regions * Implement Azure subscriptions * Obtain an Azure subscription * Identify Azure subscription usage * Implement Microsoft Cost Management * Apply resource tagging * Apply cost savings 4 - CONFIGURE AZURE POLICY * Create management groups * Implement Azure policies * Create Azure policies * Create policy definitions * Create an initiative definition * Scope the initiative definition * Determine compliance 5 - CONFIGURE ROLE-BASED ACCESS CONTROL * Implement role-based access control * Create a role definition * Create a role assignment * Compare Azure roles to Microsoft Entra roles * Apply role-based access control * Review fundamental Azure RBAC roles 6 - CONFIGURE AZURE RESOURCES WITH TOOLS * Use the Azure portal * Use Azure Cloud Shell * Use Azure PowerShell * Use Azure CLI 7 - USE AZURE RESOURCE MANAGER * Review Azure Resource Manager benefits * Review Azure resource terminology * Create resource groups * Create Azure Resource Manager locks * Reorganize Azure resources * Remove resources and resource groups * Determine resource limits 8 - CONFIGURE RESOURCES WITH AZURE RESOURCE MANAGER TEMPLATES * Review Azure Resource Manager template advantages * Explore the Azure Resource Manager template schema * Explore the Azure Resource Manager template parameters * Consider Bicep templates * Review QuickStart templates 9 - CONFIGURE VIRTUAL NETWORKS * Plan virtual networks * Create subnets * Create virtual networks * Plan IP addressing * Create public IP addressing * Associate public IP addresses * Allocate or assign private IP addresses 10 - CONFIGURE NETWORK SECURITY GROUPS * Implement network security groups * Determine network security group rules * Determine network security group effective rules * Create network security group rules * Implement application security groups 11 - CONFIGURE AZURE DNS * Identify domains and custom domains * Verify custom domain names * Create Azure DNS zones * Delegate DNS domains * Add DNS record sets * Plan for Azure Private DNS zones * Review Azure Private DNS zone scenarios 12 - CONFIGURE AZURE VIRTUAL NETWORK PEERING * Determine Azure Virtual Network peering uses * Determine gateway transit and connectivity * Create virtual network peering * Extend peering with user-defined routes and service chaining 13 - CONFIGURE NETWORK ROUTING AND ENDPOINTS * Review system routes * Identify user-defined routes * Determine service endpoint uses * Determine service endpoint services * Identify private link uses 14 - CONFIGURE AZURE LOAD BALANCER * Determine Azure Load Balancer uses * Implement a public load balancer * Implement an internal load balancer * Determine load balancer SKUs * Create back-end pools * Create health probes * Create load balancer rules 15 - CONFIGURE AZURE APPLICATION GATEWAY * Implement Azure Application Gateway * Determine Azure Application Gateway routing * Configure Azure Application Gateway components 16 - CONFIGURE STORAGE ACCOUNTS * Implement Azure Storage * Explore Azure Storage services * Determine storage account types * Determine replication strategies * Access storage * Secure storage endpoints 17 - CONFIGURE AZURE BLOB STORAGE * Implement Azure Blob Storage * Create blob containers * Assign blob access tiers * Add blob lifecycle management rules * Determine blob object replication * Upload blobs * Determine Blob Storage pricing 18 - CONFIGURE AZURE STORAGE SECURITY * Review Azure Storage security strategies * Create shared access signatures * Identify URI and SAS parameters * Determine Azure Storage encryption * Create customer-managed keys * Apply Azure Storage security best practices 19 - CONFIGURE AZURE FILES AND AZURE FILE SYNC * Compare storage for file shares and blob data * Manage Azure file shares * Create file share snapshots * Implement Azure File Sync * Identify Azure File Sync components * Deploy Azure File Sync 20 - CONFIGURE AZURE STORAGE WITH TOOLS * Use Azure Storage Explorer * Use the Azure Import/Export service * Use the WAImportExport tool * Use the AzCopy tool 21 - CONFIGURE VIRTUAL MACHINES * Review cloud services responsibilities * Plan virtual machines * Determine virtual machine sizing * Determine virtual machine storage * Create virtual machines in the Azure portal * Connect to virtual machines 22 - CONFIGURE VIRTUAL MACHINE AVAILABILITY * Plan for maintenance and downtime * Create availability sets * Review update domains and fault domains * Review availability zones * Compare vertical and horizontal scaling * Implement Azure Virtual Machine Scale Sets * Create Virtual Machine Scale Sets * Implement autoscale * Configure autoscale 23 - CONFIGURE AZURE APP SERVICE PLANS * Implement Azure App Service plans * Determine Azure App Service plan pricing * Scale up and scale out Azure App Service * Configure Azure App Service autoscale 24 - CONFIGURE AZURE APP SERVICE * Implement Azure App Service * Create an app with App Service * Explore continuous integration and deployment * Create deployment slots * Add deployment slots * Secure your App Service app * Create custom domain names * Back up and restore your App Service app * Use Azure Application Insights 25 - CONFIGURE AZURE CONTAINER INSTANCES * Compare containers to virtual machines * Review Azure Container Instances * Implement container groups * Review the Docker platform 26 - CONFIGURE FILE AND FOLDER BACKUPS * Describe Azure Backup benefits * Implement Backup Center for Azure Backup * Configure Azure Recovery Services vault backup options * Use the Microsoft Azure Recovery Services (MARS) agent * Configure on-premises file and folder backups 27 - CONFIGURE VIRTUAL MACHINE BACKUPS * Explore options to protect virtual machine data * Create virtual machine snapshots in Azure Backup * Set up Azure Recovery Services vault backup options * Back up your virtual machines * Restore your virtual machines * Implement System Center DPM and Azure Backup Server * Compare the MARS agent and Azure Backup Server * Implement soft delete for your virtual machines * Implement Azure Site Recovery 28 - CONFIGURE AZURE MONITOR * Describe Azure Monitor key capabilities * Describe Azure Monitor components * Define metrics and logs * Identify monitoring data and tiers * Describe activity log events * Query the activity log 29 - CONFIGURE AZURE ALERTS * Describe Azure Monitor alerts * Manage Azure Monitor alerts * Create alert rules * Create action groups 30 - CONFIGURE LOG ANALYTICS * Determine Log Analytics uses * Create a Log Analytics workspace * Create Kusto (KQL) queries * Structure Log Analytics queries 31 - CONFIGURE NETWORK WATCHER * Describe Azure Network Watcher features * Review IP flow verify diagnostics * Review next hop diagnostics * Visualize the network topology

AZ-104T00 Microsoft Azure Administrator
Delivered Online5 days, May 20th, 13:00 + 25 more
£2380

C30M01 - Evacuation Alert systems - BS 8629 (classroom)

By Ember Compliance

Learners will be introduced to EAS as part of the fire safety solution for tall residential properties. This CPD course provides learners with an understanding of the requirements of BS 5839-1 in relation to, design, installation, commissioning, and maintenance of EAS.

C30M01 - Evacuation Alert systems - BS 8629 (classroom)
Delivered In-Person in BroxburnFull day, Jun 19th, 08:00
£185

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR PERSONS ASPIRING TO THE MICROSOFT 365 ADMINISTRATOR ROLE AND HAVE COMPLETED AT LEAST ONE OF THE MICROSOFT 365 ROLE-BASED ADMINISTRATOR CERTIFICATION PATHS. DESCRIPTION THIS COURSE COVERS THE FOLLOWING KEY ELEMENTS OF MICROSOFT 365 ADMINISTRATION: MICROSOFT 365 TENANT MANAGEMENT, MICROSOFT 365 IDENTITY SYNCHRONIZATION, AND MICROSOFT 365 SECURITY AND COMPLIANCE. IN MICROSOFT 365 TENANT MANAGEMENT, YOU LEARN HOW TO CONFIGURE YOUR MICROSOFT 365 TENANT, INCLUDING YOUR ORGANIZATIONAL PROFILE, TENANT SUBSCRIPTION OPTIONS, COMPONENT SERVICES, USER ACCOUNTS AND LICENSES, SECURITY GROUPS, AND ADMINISTRATIVE ROLES. YOU THEN TRANSITION TO CONFIGURING MICROSOFT 365, WITH A PRIMARY FOCUS ON CONFIGURING OFFICE CLIENT CONNECTIVITY. FINALLY, YOU EXPLORE HOW TO MANAGE USER-DRIVEN CLIENT INSTALLATIONS OF MICROSOFT 365 APPS FOR ENTERPRISE DEPLOYMENTS. THE COURSE THEN TRANSITIONS TO AN IN-DEPTH EXAMINATION OF MICROSOFT 365 IDENTITY SYNCHRONIZATION, WITH A FOCUS ON MICROSOFT ENTRA CONNECT AND CONNECT CLOUD SYNC. YOU LEARN HOW TO PLAN FOR AND IMPLEMENT EACH OF THESE DIRECTORY SYNCHRONIZATION OPTIONS, HOW TO MANAGE SYNCHRONIZED IDENTITIES, AND HOW TO IMPLEMENT PASSWORD MANAGEMENT IN MICROSOFT 365 USING MULTIFACTOR AUTHENTICATION AND SELF-SERVICE PASSWORD MANAGEMENT. IN MICROSOFT 365 SECURITY MANAGEMENT, YOU BEGIN EXAMINING THE COMMON TYPES OF THREAT VECTORS AND DATA BREACHES FACING ORGANIZATIONS TODAY. YOU THEN LEARN HOW MICROSOFT 365?S SECURITY SOLUTIONS ADDRESS EACH OF THESE THREATS. YOU ARE INTRODUCED TO THE MICROSOFT SECURE SCORE, AS WELL AS TO MICROSOFT ENTRA ID PROTECTION. YOU THEN LEARN HOW TO MANAGE THE MICROSOFT 365 SECURITY SERVICES, INCLUDING EXCHANGE ONLINE PROTECTION, SAFE ATTACHMENTS, AND SAFE LINKS. FINALLY, YOU ARE INTRODUCED TO THE VARIOUS REPORTS THAT MONITOR AN ORGANIZATION?S SECURITY HEALTH. YOU THEN TRANSITION FROM SECURITY SERVICES TO THREAT INTELLIGENCE; SPECIFICALLY, USING MICROSOFT 365 DEFENDER, MICROSOFT DEFENDER FOR CLOUD APPS, AND MICROSOFT DEFENDER FOR ENDPOINT. ONCE YOU HAVE THIS UNDERSTANDING OF MICROSOFT 365?S SECURITY SUITE, YOU THEN EXAMINE THE KEY COMPONENTS OF MICROSOFT 365 COMPLIANCE MANAGEMENT. THIS BEGINS WITH AN OVERVIEW OF ALL KEY ASPECTS OF DATA GOVERNANCE, INCLUDING DATA ARCHIVING AND RETENTION, MICROSOFT PURVIEW MESSAGE ENCRYPTION, AND DATA LOSS PREVENTION (DLP). YOU THEN DELVE DEEPER INTO ARCHIVING AND RETENTION, PAYING PARTICULAR ATTENTION TO MICROSOFT PURVIEW INSIDER RISK MANAGEMENT, INFORMATION BARRIERS, AND DLP POLICIES. YOU THEN EXAMINE HOW TO IMPLEMENT THESE COMPLIANCE FEATURES BY USING DATA CLASSIFICATION AND SENSITIVITY LABELS. PREREQUISITES * COMPLETED A ROLE-BASED ADMINISTRATOR COURSE SUCH AS MESSAGING, TEAMWORK, SECURITY, COMPLIANCE, OR COLLABORATION. * A PROFICIENT UNDERSTANDING OF DNS AND BASIC FUNCTIONAL EXPERIENCE WITH MICROSOFT 365 SERVICES. * A PROFICIENT UNDERSTANDING OF GENERAL IT PRACTICES. * A WORKING KNOWLEDGE OF POWERSHELL. 1 - CONFIGURE YOUR MICROSOFT 365 EXPERIENCE * Explore your Microsoft 365 cloud environment * Configure your Microsoft 365 organizational profile * Manage your tenant subscriptions in Microsoft 365 * Integrate Microsoft 365 with customer engagement apps * Complete your tenant configuration in Microsoft 365 2 - MANAGE USERS, LICENSES, AND MAIL CONTACTS IN MICROSOFT 365 * Determine the user identity model for your organization * Create user accounts in Microsoft 365 * Manage user account settings in Microsoft 365 * Manage user licenses in Microsoft 365 * Recover deleted user accounts in Microsoft 365 * Perform bulk user maintenance in Microsoft Entra ID * Create and manage guest users * Create and manage mail contacts 3 - MANAGE GROUPS IN MICROSOFT 365 * Examine groups in Microsoft 365 * Create and manage groups in Microsoft 365 * Create dynamic groups using Azure rule builder * Create a Microsoft 365 group naming policy * Create groups in Exchange Online and SharePoint Online 4 - ADD A CUSTOM DOMAIN IN MICROSOFT 365 * Plan a custom domain for your Microsoft 365 deployment * Plan the DNS zones for a custom domain * Plan the DNS record requirements for a custom domain * Create a custom domain in Microsoft 365 5 - CONFIGURE CLIENT CONNECTIVITY TO MICROSOFT 365 * Examine how automatic client configuration works * Explore the DNS records required for client configuration * Configure Outlook clients * Troubleshoot client connectivity 6 - CONFIGURE ADMINISTRATIVE ROLES IN MICROSOFT 365 * Explore the Microsoft 365 permission model * Explore the Microsoft 365 admin roles * Assign admin roles to users in Microsoft 365 * Delegate admin roles to partners * Manage permissions using administrative units in Microsoft Entra ID * Elevate privileges using Microsoft Entra Privileged Identity Management * Examine best practices when configuring administrative roles 7 - MANAGE TENANT HEALTH AND SERVICES IN MICROSOFT 365 * Monitor the health of your Microsoft 365 services * Monitor tenant health using Microsoft 365 Adoption Score * Monitor tenant health using Microsoft 365 usage analytics * Develop an incident response plan * Request assistance from Microsoft 8 - DEPLOY MICROSOFT 365 APPS FOR ENTERPRISE * Explore Microsoft 365 Apps for enterprise functionality * Explore your app compatibility by using the Readiness Toolkit * Complete a self-service installation of Microsoft 365 Apps for enterprise * Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager * Deploy Microsoft 365 Apps for enterprise from the cloud * Deploy Microsoft 365 Apps for enterprise from a local source * Manage updates to Microsoft 365 Apps for enterprise * Explore the update channels for Microsoft 365 Apps for enterprise * Manage your cloud apps using the Microsoft 365 Apps admin center 9 - ANALYZE YOUR MICROSOFT 365 WORKPLACE DATA USING MICROSOFT VIVA INSIGHTS * Examine the analytical features of Microsoft Viva Insights * Explore Personal insights * Explore Team insights * Explore Organization insights * Explore Advanced insights 10 - EXPLORE IDENTITY SYNCHRONIZATION * Examine identity models for Microsoft 365 * Examine authentication options for the hybrid identity model * Explore directory synchronization 11 - PREPARE FOR IDENTITY SYNCHRONIZATION TO MICROSOFT 365 * Plan your Microsoft Entra deployment * Prepare for directory synchronization * Choose your directory synchronization tool * Plan for directory synchronization using Microsoft Entra Connect * Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - IMPLEMENT DIRECTORY SYNCHRONIZATION TOOLS * Configure Microsoft Entra Connect prerequisites * Configure Microsoft Entra Connect * Monitor synchronization services using Microsoft Entra Connect Health * Configure Microsoft Entra Connect cloud sync prerequisites * Configure Microsoft Entra Connect cloud sync 13 - MANAGE SYNCHRONIZED IDENTITIES * Manage users with directory synchronization * Manage groups with directory synchronization * Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization * Configure object filters for directory synchronization * Explore Microsoft Identity Manager * Troubleshoot directory synchronization 14 - MANAGE SECURE USER ACCESS IN MICROSOFT 365 * Manage user passwords * Enable pass-through authentication * Enable multifactor authentication * Enable passwordless sign-in with Microsoft Authenticator * Explore self-service password management * Explore Windows Hello for Business * Implement Microsoft Entra Smart Lockout * Implement conditional access policies * Explore Security Defaults in Microsoft Entra ID * Investigate authentication issues using sign-in logs 15 - EXAMINE THREAT VECTORS AND DATA BREACHES * Explore today's work and threat landscape * Examine how phishing retrieves sensitive information * Examine how spoofing deceives users and compromises data security * Compare spam and malware * Examine account breaches * Examine elevation of privilege attacks * Examine how data exfiltration moves data out of your tenant * Examine how attackers delete data from your tenant * Examine how data spillage exposes data outside your tenant * Examine other types of attacks 16 - EXPLORE THE ZERO TRUST SECURITY MODEL * Examine the principles and components of the Zero Trust model * Plan for a Zero Trust security model in your organization * Examine Microsoft's strategy for Zero Trust networking * Adopt a Zero Trust approach 17 - EXPLORE SECURITY SOLUTIONS IN MICROSOFT 365 DEFENDER * Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 * Protect your organization's identities using Microsoft Defender for Identity * Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint * Protect against cyber attacks using Microsoft 365 Threat Intelligence * Provide insight into suspicious activity using Microsoft Cloud App Security * Review the security reports in Microsoft 365 Defender 18 - EXAMINE MICROSOFT SECURE SCORE * Explore Microsoft Secure Score * Assess your security posture with Microsoft Secure Score * Improve your secure score * Track your Microsoft Secure Score history and meet your goals 19 - EXAMINE PRIVILEGED IDENTITY MANAGEMENT * Explore Privileged Identity Management in Microsoft Entra ID * Configure Privileged Identity Management * Audit Privileged Identity Management * Control privileged admin tasks using Privileged Access Management 20 - EXAMINE AZURE IDENTITY PROTECTION * Explore Azure Identity Protection * Enable the default protection policies in Azure Identity Protection * Explore the vulnerabilities and risk events detected by Azure Identity Protection * Plan your identity investigation 21 - EXAMINE EXCHANGE ONLINE PROTECTION * Examine the anti-malware pipeline * Detect messages with spam or malware using Zero-hour auto purge * Explore anti-spoofing protection provided by Exchange Online Protection * Explore other anti-spoofing protection * Examine outbound spam filtering 22 - EXAMINE MICROSOFT DEFENDER FOR OFFICE 365 * Climb the security ladder from EOP to Microsoft Defender for Office 365 * Expand EOP protections by using Safe Attachments and Safe Links * Manage spoofed intelligence * Configure outbound spam filtering policies * Unblock users from sending email 23 - MANAGE SAFE ATTACHMENTS * Protect users from malicious attachments by using Safe Attachments * Create Safe Attachment policies using Microsoft Defender for Office 365 * Create Safe Attachments policies using PowerShell * Modify an existing Safe Attachments policy * Create a transport rule to bypass a Safe Attachments policy * Examine the end-user experience with Safe Attachments 24 - MANAGE SAFE LINKS * Protect users from malicious URLs by using Safe Links * Create Safe Links policies using Microsoft 365 Defender * Create Safe Links policies using PowerShell * Modify an existing Safe Links policy * Create a transport rule to bypass a Safe Links policy * Examine the end-user experience with Safe Links 25 - EXPLORE THREAT INTELLIGENCE IN MICROSOFT 365 DEFENDER * Explore Microsoft Intelligent Security Graph * Explore alert policies in Microsoft 365 * Run automated investigations and responses * Explore threat hunting with Microsoft Threat Protection * Explore advanced threat hunting in Microsoft 365 Defender * Explore threat analytics in Microsoft 365 * Identify threat issues using Microsoft Defender reports 26 - IMPLEMENT APP PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender Cloud Apps * Deploy Microsoft Defender for Cloud Apps * Configure file policies in Microsoft Defender for Cloud Apps * Manage and respond to alerts in Microsoft Defender for Cloud Apps * Configure Cloud Discovery in Microsoft Defender for Cloud Apps * Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - IMPLEMENT ENDPOINT PROTECTION BY USING MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Configure Microsoft Defender for Endpoint in Microsoft Intune * Onboard devices in Microsoft Defender for Endpoint * Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management * Manage device discovery and vulnerability assessment * Reduce your threat and vulnerability exposure 28 - IMPLEMENT THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR OFFICE 365 * Explore the Microsoft Defender for Office 365 protection stack * Investigate security attacks by using Threat Explorer * Identify cybersecurity issues by using Threat Trackers * Prepare for attacks with Attack simulation training 29 - EXAMINE DATA GOVERNANCE SOLUTIONS IN MICROSOFT PURVIEW * Explore data governance and compliance in Microsoft Purview * Protect sensitive data with Microsoft Purview Information Protection * Govern organizational data using Microsoft Purview Data Lifecycle Management * Minimize internal risks with Microsoft Purview Insider Risk Management * Explore Microsoft Purview eDiscovery solutions 30 - EXPLORE ARCHIVING AND RECORDS MANAGEMENT IN MICROSOFT 365 * Explore archive mailboxes in Microsoft 365 * Enable archive mailboxes in Microsoft 365 * Explore Microsoft Purview Records Management * Implement Microsoft Purview Records Management * Restore deleted data in Exchange Online * Restore deleted data in SharePoint Online 31 - EXPLORE RETENTION IN MICROSOFT 365 * Explore retention by using retention policies and retention labels * Compare capabilities in retention policies and retention labels * Define the scope of a retention policy * Examine the principles of retention * Implement retention using retention policies, retention labels, and eDiscovery holds * Restrict retention changes by using Preservation Lock 32 - EXPLORE MICROSOFT PURVIEW MESSAGE ENCRYPTION * Examine Microsoft Purview Message Encryption * Configure Microsoft Purview Message Encryption * Define mail flow rules to encrypt email messages * Add organizational branding to encrypted email messages * Explore Microsoft Purview Advanced Message Encryption 33 - EXPLORE COMPLIANCE IN MICROSOFT 365 * Plan for security and compliance in Microsoft 365 * Plan your beginning compliance tasks in Microsoft Purview * Manage your compliance requirements with Compliance Manager * Examine the Compliance Manager dashboard * Analyze the Microsoft Compliance score 34 - IMPLEMENT MICROSOFT PURVIEW INSIDER RISK MANAGEMENT * Explore insider risk management * Plan for insider risk management * Explore insider risk management policies * Create insider risk management policies * Investigate insider risk management activities and alerts * Explore insider risk management cases 35 - IMPLEMENT MICROSOFT PURVIEW INFORMATION BARRIERS * Explore Microsoft Purview Information Barriers * Configure information barriers in Microsoft Purview * Examine information barriers in Microsoft Teams * Examine information barriers in OneDrive * Examine information barriers in SharePoint 36 - EXPLORE MICROSOFT PURVIEW DATA LOSS PREVENTION * Examine Data Loss Prevention * Explore Endpoint data loss prevention * Examine DLP policies * View DLP policy results * Explore DLP reports 37 - IMPLEMENT MICROSOFT PURVIEW DATA LOSS PREVENTION * Plan to implement Microsoft Purview Data Loss Protection * Implement Microsoft Purview's default DLP policies * Design a custom DLP policy * Create a custom DLP policy from a template * Configure email notifications for DLP policies * Configure policy tips for DLP policies 38 - IMPLEMENT DATA CLASSIFICATION OF SENSITIVE INFORMATION * Explore data classification * Implement data classification in Microsoft 365 * Explore trainable classifiers * Create and retrain a trainable classifier * View sensitive data using Content explorer and Activity explorer * Detect sensitive information documents using Document Fingerprinting 39 - EXPLORE SENSITIVITY LABELS * Manage data protection using sensitivity labels * Explore what sensitivity labels can do * Determine a sensitivity label's scope * Apply sensitivity labels automatically * Explore sensitivity label policies 40 - IMPLEMENT SENSITIVITY LABELS * Plan your deployment strategy for sensitivity labels * Examine the requirements to create a sensitivity label * Create sensitivity labels * Publish sensitivity labels * Remove and delete sensitivity labels ADDITIONAL COURSE DETAILS: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online6 days, May 20th, 13:00 + 9 more
£2975

C30M01 - Evacuation Alert systems - BS 8629 (online)

By Ember Compliance

Learners will be introduced to EAS as part of the fire safety solution for tall residential properties. This CPD course provides learners with an understanding of the requirements of BS 5839-1 in relation to, design, installation, commissioning, and maintenance of EAS.

C30M01 - Evacuation Alert systems - BS 8629 (online)
Delivered OnlineFull day, Jul 11th, 08:00
£185

PL-300T00 Microsoft Power BI Data Analyst

By Nexus Human

DURATION 3 DAYS 18 CPD HOURS THIS COURSE IS INTENDED FOR THE AUDIENCE FOR THIS COURSE ARE DATA PROFESSIONALS AND BUSINESS INTELLIGENCE PROFESSIONALS WHO WANT TO LEARN HOW TO ACCURATELY PERFORM DATA ANALYSIS USING POWER BI. THIS COURSE IS ALSO TARGETED TOWARD THOSE INDIVIDUALS WHO DEVELOP REPORTS THAT VISUALIZE DATA FROM THE DATA PLATFORM TECHNOLOGIES THAT EXIST ON BOTH IN THE CLOUD AND ON-PREMISES. DESCRIPTION THIS COURSE COVERS THE VARIOUS METHODS AND BEST PRACTICES THAT ARE IN LINE WITH BUSINESS AND TECHNICAL REQUIREMENTS FOR MODELING, VISUALIZING, AND ANALYZING DATA WITH POWER BI. THE COURSE WILL SHOW HOW TO ACCESS AND PROCESS DATA FROM A RANGE OF DATA SOURCES INCLUDING BOTH RELATIONAL AND NON-RELATIONAL SOURCES. FINALLY, THIS COURSE WILL ALSO DISCUSS HOW TO MANAGE AND DEPLOY REPORTS AND DASHBOARDS FOR SHARING AND CONTENT DISTRIBUTION. PREREQUISITES UNDERSTANDING CORE DATA CONCEPTS. KNOWLEDGE OF WORKING WITH RELATIONAL DATA IN THE CLOUD. KNOWLEDGE OF WORKING WITH NON-RELATIONAL DATA IN THE CLOUD. KNOWLEDGE OF DATA ANALYSIS AND VISUALIZATION CONCEPTS. DP-900T00 MICROSOFT AZURE DATA FUNDAMENTALS IS RECOMMENDED 1 - DISCOVER DATA ANALYSIS * Overview of data analysis * Roles in data * Tasks of a data analyst 2 - GET STARTED BUILDING WITH POWER BI * Use Power BI * Building blocks of Power BI * Tour and use the Power BI service 3 - GET DATA IN POWER BI * Get data from files * Get data from relational data sources * Create dynamic reports with parameters * Get data from a NoSQL database * Get data from online services * Select a storage mode * Get data from Azure Analysis Services * Fix performance issues * Resolve data import errors 4 - CLEAN, TRANSFORM, AND LOAD DATA IN POWER BI * Shape the initial data * Simplify the data structure * Evaluate and change column data types * Combine multiple tables into a single table * Profile data in Power BI * Use Advanced Editor to modify M code 5 - DESIGN A SEMANTIC MODEL IN POWER BI * Work with tables * Create a date table * Work with dimensions * Define data granularity * Work with relationships and cardinality * Resolve modeling challenges 6 - ADD MEASURES TO POWER BI DESKTOP MODELS * Create simple measures * Create compound measures * Create quick measures * Compare calculated columns with measures 7 - ADD CALCULATED TABLES AND COLUMNS TO POWER BI DESKTOP MODELS * Create calculated columns * Learn about row context * Choose a technique to add a column 8 - USE DAX TIME INTELLIGENCE FUNCTIONS IN POWER BI DESKTOP MODELS * Use DAX time intelligence functions * Additional time intelligence calculations 9 - OPTIMIZE A MODEL FOR PERFORMANCE IN POWER BI * Review performance of measures, relationships, and visuals * Use variables to improve performance and troubleshooting * Reduce cardinality * Optimize DirectQuery models with table level storage * Create and manage aggregations 10 - DESIGN POWER BI REPORTS * Design the analytical report layout * Design visually appealing reports * Report objects * Select report visuals * Select report visuals to suit the report layout * Format and configure visualizations * Work with key performance indicators 11 - CONFIGURE POWER BI REPORT FILTERS * Apply filters to the report structure * Apply filters with slicers * Design reports with advanced filtering techniques * Consumption-time filtering * Select report filter techniques * Case study - Configure report filters based on feedback 12 - ENHANCE POWER BI REPORT DESIGNS FOR THE USER EXPERIENCE * Design reports to show details * Design reports to highlight values * Design reports that behave like apps * Work with bookmarks * Design reports for navigation * Work with visual headers * Design reports with built-in assistance * Tune report performance * Optimize reports for mobile use 13 - PERFORM ANALYTICS IN POWER BI * Explore statistical summary * Identify outliers with Power BI visuals * Group and bin data for analysis * Apply clustering techniques * Conduct time series analysis * Use the Analyze feature * Create what-if parameters * Use specialized visuals 14 - CREATE AND MANAGE WORKSPACES IN POWER BI * Distribute a report or dashboard * Monitor usage and performance * Recommend a development life cycle strategy * Troubleshoot data by viewing its lineage * Configure data protection 15 - MANAGE SEMANTIC MODELS IN POWER BI * Use a Power BI gateway to connect to on-premises data sources * Configure a semantic model scheduled refresh * Configure incremental refresh settings * Manage and promote semantic models * Troubleshoot service connectivity * Boost performance with query caching (Premium) 16 - CREATE DASHBOARDS IN POWER BI * Configure data alerts * Explore data by asking questions * Review Quick insights * Add a dashboard theme * Pin a live report page to a dashboard * Configure a real-time dashboard * Set mobile view 17 - IMPLEMENT ROW-LEVEL SECURITY * Configure row-level security with the static method * Configure row-level security with the dynamic method ADDITIONAL COURSE DETAILS: Nexus Humans PL-300T00: Microsoft Power BI Data Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-300T00: Microsoft Power BI Data Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-300T00 Microsoft Power BI Data Analyst
Delivered Online4 days, May 20th, 08:30 + 19 more
£1785

MS-700T00 Managing Microsoft Teams

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR STUDENTS IN THIS COURSE ARE INTERESTED IN MICROSOFT TEAMS OR IN PASSING THE MICROSOFT TEAMS ADMINISTRATOR ASSOCIATE CERTIFICATION EXAM. A MICROSOFT TEAMS ADMINISTRATOR PLANS, DEPLOYS, CONFIGURES, AND MANAGES MICROSOFT TEAMS TO FOCUS ON EFFICIENT AND EFFECTIVE COLLABORATION AND COMMUNICATION IN A MICROSOFT 365 ENVIRONMENT. A MICROSOFT TEAMS ADMINISTRATOR MUST BE ABLE TO PLAN, DEPLOY, AND MANAGE TEAMS, CHAT, APPS, CHANNELS, MEETINGS, AUDIO/VIDEO CONFERENCING, LIVE EVENTS, CALLING, AND TEAMS CERTIFIED DEVICES. A MICROSOFT TEAMS ADMINISTRATOR HAS EXPERIENCE INTEGRATING MICROSOFT TEAMS WITH SHAREPOINT, ONEDRIVE, EXCHANGE, MICROSOFT 365 GROUPS, AND OTHER MICROSOFT, THIRD-PARTY, AND CUSTOM APPS. A MICROSOFT TEAMS ADMINISTRATOR UNDERSTANDS AND COLLABORATES WITH OTHER WORKLOADS AND ROLES, SUCH AS NETWORK, VOICE, IDENTITY, ACCESS, DEVICES, LICENSING, SECURITY, COMPLIANCE, INFORMATION MANAGEMENT, AND USER ADOPTION. OVERVIEW WHAT IS MICROSOFT TEAMS AND HOW THE COMPONENTS WORK TOGETHER HOW TO IMPLEMENT GOVERNANCE, SECURITY AND COMPLIANCE FOR MICROSOFT TEAMS HOW TO PREPARE AN ORGANIZATIONS ENVIRONMENT FOR A MICROSOFT TEAMS DEPLOYMENT HOW TO DEPLOY AND MANAGE TEAMS HOW TO MANAGE COLLABORATION AND COMMUNICATION EXPERIENCES IN MICROSOFT TEAMS TECHNIQUES TO MANAGE AND TROUBLESHOOT COMMUNICATION IN MICROSOFT TEAMS DESCRIPTION THE MANAGING MICROSOFT TEAMS COURSE IS DESIGNED FOR PERSONS WHO ARE ASPIRING TO THE MICROSOFT 365 TEAMS ADMIN ROLE. A MICROSOFT TEAMS ADMINISTRATOR PLANS, DEPLOYS, CONFIGURES, AND MANAGES MICROSOFT TEAMS TO FOCUS ON EFFICIENT AND EFFECTIVE COLLABORATION AND COMMUNICATION IN A MICROSOFT 365 ENVIRONMENT. IN THIS COURSE, YOU WILL LEARN ABOUT VARIOUS TEAMS MANAGEMENT TOOLS, SECURITY AND COMPLIANCE FEATURE FOR TEAMS, NETWORK REQUIREMENT FOR TEAMS DEPLOYMENT AS WELL AS DIFFERENT TEAMS SETTINGS AND POLICIES FOR MANAGING COLLABORATION AND COMMUNICATION EXPERIENCE IN TEAMS. PREREQUISITES A PROFICIENT UNDERSTANDING OF BASIC FUNCTIONAL EXPERIENCE WITH MICROSOFT 365 SERVICES. A PROFICIENT UNDERSTANDING OF GENERAL IT PRACTICES, INCLUDING USING POWERSHELL. 1 - EXPLORE MICROSOFT TEAMS * Explore capabilities in Microsoft Teams * Explore Microsoft Teams integration with Microsoft 365 * Explore Microsoft Teams integration with Microsoft Power Platform * Illustrate Microsoft Teams architecture * Describe Microsoft Teams with Microsoft 365 Groups * Describe Microsoft Teams with SharePoint and OneDrive * Describe Microsoft Teams with Exchange * Understand Microsoft Teams certified solutions 2 - PLAN AND DEPLOY MICROSOFT TEAMS * Designate Teams admin roles * Understand Teams management tools * Plan for Teams rollout * Plan for Teams adoption * Plan for Teams licensing * Deploy Microsoft Teams clients 3 - IMPLEMENT LIFECYCLE MANAGEMENT AND GOVERNANCE FOR MICROSOFT TEAMS * Plan for lifecycle management * Plan for Teams governance * Manage Microsoft 365 Groups creation * Configure Microsoft 365 Groups expiration policy * Configure Microsoft 365 Groups naming policy * Plan policy assignment for users and groups * Create and manage policy packages * Manage Teams preview features using Teams update policies * Create and manage teams templates and template policies 4 - MONITOR YOUR MICROSOFT TEAMS ENVIRONMENT * Monitor Microsoft Teams usage reports * Monitor Microsoft 365 usage reports * Interpret Microsoft Adoption Score * Manage user access with Azure Active Directory access reviews * Monitor the Microsoft 365 network connectivity dashboard * Manage Teams notifications and alerts * Manage feedback policies 5 - MANAGE ACCESS FOR EXTERNAL USERS * Understand features in Azure Active Directory * Work with external users in Microsoft Teams * Manage access for external users * Manage external collaboration in Azure AD * Manage external collaboration in Microsoft 365 * Manage external access in Microsoft Teams * Manage guest access in Microsoft Teams * Manage file sharing in SharePoint and OneDrive 6 - IMPLEMENT SECURITY FOR MICROSOFT TEAMS * Configure conditional access and multifactor authentication for Microsoft Teams * Configure Safe Attachments for Microsoft Teams * Configure Safe Links for Microsoft Teams * Examine the Defender for Cloud Apps * Monitor security reports for Microsoft Teams * Plan and configure enhanced encryption policies 7 - IMPLEMENT COMPLIANCE FOR MICROSOFT TEAMS * Create and manage sensitivity labels * Create and manage retention policies * Create and manage Data Loss Prevention policies * Deploy communication compliance * Enable scoped directory search * Create information barrier policy * Create security and compliance alerts for Microsoft Teams 8 - PLAN AND CONFIGURE NETWORK SETTINGS FOR MICROSOFT TEAMS * Examine network requirements for Microsoft Teams * Plan for network deployment using Network Planner * Configure network ports and protocols for Microsoft Teams * Implement Quality of Service * Configure reporting labels for location-enhanced Call Analytics reports * Configure tenant data for Call Quality Dashboard reports * Assess network readiness * Manage network topology 9 - CREATE AND MANAGE TEAMS * Create teams * Create a team from existing resources * Plan and create org-wide teams * Manage teams * Manage users in a team * Configure dynamic membership * Archive restore and delete a team 10 - MANAGE COLLABORATION EXPERIENCES FOR CHAT AND CHANNELS * Create and manage channels in a team * Create and manage Teams policies for channels * Configure teams settings * Create and manage messaging policies * Manage channel moderation * Manage access to channels 11 - MANAGE APPS FOR MICROSOFT TEAMS * Explore apps in Microsoft Teams * Describe admin settings for Teams apps * Manage access to Teams apps at the organization level * Create and manage app permission policies * Create and manage app setup policies * Manage permissions and consent for Teams apps * Plan and configure connectors * Manage custom apps uploads * Publish custom apps to Microsoft Teams * Manage purchasing of apps in the Microsoft Teams app store * Customize the organization's app store * Customize the branded experience of an app 12 - INTRODUCTION TO TEAMS MEETINGS AND CALLING * Overview of Teams meetings and events * Overview of Teams Phone * Overview of auto attendants and call queues * Overview of Teams devices 13 - MANAGE MEETINGS AND EVENTS EXPERIENCES * Explore meetings and events in Microsoft Teams * Configure meeting settings * Create and manage meeting policies * Configure audio conferencing * Create and manage meeting templates and template policies * Create and manage meetings customization policies * Configure live events settings * Create and manage live events policies * Examine live events across Microsoft 365 14 - PLAN FOR MICROSOFT TEAMS ROOMS AND SURFACE HUB * Determine license requirements for Microsoft Teams Rooms and shared devices * Understand differences between Microsoft Teams Rooms on Android and Windows * Understand Microsoft Teams Rooms on Surface Hub 2S * Understand and plan Teams Room accessories, components, and peripherals * Understand Teams Rooms management options 15 - CONFIGURE, DEPLOY, AND MANAGE TEAMS DEVICES * Manage Microsoft Teams Phones * Manage Microsoft Teams Room Systems * Microsoft Teams Rooms management options * Manage Surface Hub 2S devices * Configure Microsoft Teams SIP gateway * Manage Microsoft Teams displays * Remote provisioning and sign in for Teams Phones * Update Microsoft Teams devices remotely * Manage Microsoft Teams device tags 16 - PLAN FOR TEAMS PHONE * Plan to deploy Teams Phone * Plan for Teams Phone PSTN connectivity * Determine license requirements * Plan for Teams Phone devices * Plan and design Teams Phone features * Plan for voicemail 17 - CONFIGURE AND DEPLOY TEAMS PHONE * Configure emergency calling for Teams Calling Plans * Manage and configure Microsoft PSTN numbers * Configure Operator Connect and Teams Phone Mobile * Configure Teams Phone policies * Create and manage Teams policies * Configure Audio Conferencing 18 - CONFIGURE AND MANAGE VOICE USERS * Enable users for Teams Phone * Enable users for Direct Routing with Teams Phone * Enable additional calling features for Teams Phone * Enable users for Teams Phone Mobile 19 - CONFIGURE AUTO ATTENDANTS AND CALL QUEUES * Design call flows for auto attendants and call queues * Configure auto attendants and call queues * Deploy a channel-based call queue * Configure resource accounts * Configure Microsoft 365 groups for voicemail * Interpret call queue conference modes * Interpret call queue routing methods * Configure holidays for auto attendants and call queues * Configure custom music on hold 20 - TROUBLESHOOT AUDIO, VIDEO, AND CLIENT ISSUES * Troubleshoot Teams * Collect and identify logs * Clear Microsoft Teams client cache * Identify issues with call analytics * Identify issues with Call Quality Dashboard * Use Power BI to analyze Call Quality Dashboard data * Identify issues with the Direct Routing Health Dashboard ADDITIONAL COURSE DETAILS: Nexus Humans MS-700T00 Managing Microsoft Teams training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-700T00 Managing Microsoft Teams course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-700T00 Managing Microsoft Teams
Delivered Online5 days, May 21st, 13:00 + 4 more
£2380

Crystal Reports 2016 - Part 2

By Nexus Human

DURATION 2 DAYS 12 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR PEOPLE WHO KNOW HOW TO CREATE BASIC LIST AND GROUP REPORTS AND NEED TO CREATE REPORTS THAT INCLUDE SUBREPORTS, CROSS-TABS, ADVANCED FORMULAS, AND CHARTS BASED ON MORE THAN ONE DATA SERIES. THEY MAY ALSO NEED TO BUILD TOOLS THAT MAKE IT EASIER FOR OTHER PEOPLE TO CREATE REPORTS. THEY MAY OR MAY NOT HAVE PROGRAMMING AND/OR SQL EXPERIENCE. OVERVIEW IN THIS COURSE, YOU WILL CREATE COMPLEX REPORTS USING TOOLS IN CRYSTAL REPORTS 2016. YOU WILL: CREATE AUTOMATIC AND MANUAL RUNNING TOTALS. WORK WITH CROSS-TAB REPORTS. ADD SUBREPORTS. CREATE DRILL-DOWNS IN A REPORT. USE SQL STATEMENTS IN REPORT PROCESSING. CREATE COMPLEX FORMULAS. ADD CHARTS TO REPORTS. ENHANCE REPORT FUNCTIONALITY. DESCRIPTION IN THIS COURSE, STUDENTS WILL CREATE COMPLEX REPORTS & DATA SOURCES USING THE TOOLS IN CRYSTAL REPORTS 2016. STUDENTS WILL NOT ONLY CREATE MORE COMPLEX REPORTS INCLUDING SUB-REPORTS AND CROSS-TABS, BUT WILL ALSO INCREASE THEIR SPEED AND EFFICIENCY. 1 - CREATING RUNNING TOTALS * Topic A: Create a Running Total Field * Topic B: Modify a Running Total Field * Topic C: Create a Manual Running Total 2 - WORKING WITH CROSS-TABS * Topic A: Create a Cross-Tab Report * Topic B: Format a Cross-Tab Report * Topic C: Create Groups in Cross-Tab Reports 3 - ADDING SUBREPORTS * Topic A: Insert a Subreport * Topic B: Edit a Subreport * Topic C: Share Variables 4 - CREATING DRILL-DOWNS IN A REPORT * Topic A: Create a Drill-Down * Topic B: Create Headings for Drill-Down Data 5 - USING SQL STATEMENTS IN REPORT PROCESSING * Topic A: Create a Report Using SQL Queries * Topic B: Summarize Report Data * Topic C: Create Joins Using SQL * Topic D: Create Subqueries * Topic E: Create an SQL Expression Field 6 - CREATING COMPLEX FORMULAS * Topic A: Work with Loops * Topic B: Work with Arrays 7 - ADDING CHARTS TO REPORTS * Topic A: Create Charts * Topic B: Create a Chart with Drill-Down * Topic C: Create a Top N Chart * Topic D: Create a Cross-Tab Chart * Topic E: Create Charts for Grouped Data * Topic F: Format a Chart * Topic G: Create a Chart Template 8 - ENHANCING REPORT FUNCTIONALITY * Topic A: Organize Data Based on a Hierarchy * Topic B: Create a Dynamic Image * Topic C: Create a Report Alert * Topic D: Create a Geographic Map 9 - APPENDIX * Appendix A: Managing Reports * Appendix B: Processing Data on the Server * Appendix C: Detecting and Fixing Problems

Crystal Reports 2016 - Part 2
Delivered Online3 days, May 29th, 13:00
£990

Educators matching "ALERT"

Show all 36