• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

669 API courses

The Bee Experience Workshop

By Pulvertoft Flowers

This is a great introduction to bees for nature lovers and the amateur apiarist. You will learn about honey bees, the fundamentals of beekeeping, the lifecycle of the bee and how to encourage more bees and pollinating insects into your garden. After a talk and demonstration in the flower barn we will spend time out in the flower field visiting the hives, looking at the bees and tasting honeys, it will be a relaxed chance to immerse yourself in nature The workshop will be led by Jodie and Lee who are third generation beekeepers. They established Lincolnshire Honey in 2018. Their ethos has a strong focus on sustainability, from sourcing hives locally in Lincolnshire. They are passionate about educating others on protecting our pollinators and local biodiversity. Fiona who owns Pulvertoft flowers and is a working hard to promote local flowers, protecting the natural environment and reducing carbon footprints.  Please read carefully the rules regarding this workshop. Safety is very important around bees and these rules must be adhered to ensure your safety and of all those attending. All materials will be provided. Light refreshments will be included. Every attendee gets a goody bag to take home that contains an information card about flowers to grow for bees and a bee identification chart and a jar of Lincolnshire Honey. We also have a small shop of products produced by our collaborative partners that will be available to buy after the workshop. Who can attend? * Hosted in our Flower barn come along solo or with a friend, all are welcome. A perfect gift for a friend or relative who loves flowers and practical workshops or as corporate entertainment. * All attendees must be 18 years+ * Provided PPE must be worn at all times - this will be in the form of gloves and a bee suit. * If you have a latex or any other allergy please inform us at least 10 days before the start of the workshop so we can source suitable gloves and refreshments * You must bring your own wellington boots to wear/change into when visiting the bees to protect your feet.  * Under no circumstance will persons with open toed footwear be permitted into the apiary * On the morning of the workshop please refrain from the following: washing hair, spraying body spray, perfume, cologne, aftershave or any floral fragrances ESPECIALLY lemon grass as these disrupt the hive * This workshop is not suitable for anyone with an allergy to bee or wasp stings * This workshop is not suitable for anyone who is pregnant * We do not have suitable wheelchair access for this workshop and all attendees must be capable of walking and standing * No pets are permitted on site * All attendees must have a ticket * Parking is available * Toilets are available Please contact fiona@fionapaxton.co.uk [fiona@fionapaxton.co.uk] if you need more details

The Bee Experience Workshop
Delivered In-Person in Spalding2 hours, May 12th, 12:30 + 2 more
£60

55340 Developing ASP.NET Core Web Applications

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR PROFESSIONAL WEB DEVELOPERS WHO USE MICROSOFT VISUAL STUDIO IN AN INDIVIDUAL-BASED OR TEAM-BASED, SMALL-SIZED TO LARGE DEVELOPMENT ENVIRONMENT. CANDIDATES FOR THIS COURSE ARE INTERESTED IN DEVELOPING ADVANCED WEB APPLICATIONS AND WANT TO MANAGE THE RENDERED HTML COMPREHENSIVELY. THEY WANT TO CREATE WEBSITES THAT SEPARATE THE USER INTERFACE, DATA ACCESS, AND APPLICATION LOGIC. OVERVIEW DESCRIBE THE MICROSOFT WEB TECHNOLOGIES STACK AND SELECT AN APPROPRIATE TECHNOLOGY TO USE TO DEVELOP ANY GIVEN APPLICATION. DESIGN THE ARCHITECTURE AND IMPLEMENTATION OF A WEB APPLICATION THAT WILL MEET A SET OF FUNCTIONAL REQUIREMENTS, USER INTERFACE REQUIREMENTS, AND ADDRESS BUSINESS MODELS. CONFIGURE THE PIPELINE OF ASP.NET CORE WEB APPLICATIONS USING MIDDLEWARE, AND LEVERAGE DEPENDENCY INJECTION ACROSS APPLICATIONS. DEVELOP A WEB APPLICATION THAT USES THE ASP.NET CORE ROUTING ENGINE TO PRESENT FRIENDLY URLS AND A LOGICAL NAVIGATION HIERARCHY TO USERS. CREATE VIEWS IN AN APPLICATION THAT DISPLAY AND EDIT DATA AND INTERACT WITH MODELS AND CONTROLLERS. CONNECT AN ASP.NET CORE APPLICATION TO A DATABASE USING ENTITY FRAMEWORK CORE. IMPLEMENT A CONSISTENT LOOK AND FEEL ACROSS AN ENTIRE WEB APPLICATION. WRITE JAVASCRIPT CODE THAT RUNS ON THE CLIENT-SIDE AND UTILIZES THE JQUERY SCRIPT LIBRARY TO OPTIMIZE THE RESPONSIVENESS OF AN WEB APPLICATION. ADD CLIENT SIDE PACKAGES AND CONFIGURE TASK RUNNERS. RUN UNIT TESTS AND DEBUGGING TOOLS AGAINST A WEB APPLICATION IN VISUAL STUDIO 2022. WRITE AN APPLICATION THAT AUTHENTICATES AND AUTHORIZES USERS TO ACCESS CONTENT SECURELY USING IDENTITY. BUILD AN APPLICATION THAT RESISTS MALICIOUS ATTACKS. USE CACHING TO ACCELERATE RESPONSES TO USER REQUESTS. USE SIGNALR TO ENABLE TWO-WAY COMMUNICATION BETWEEN CLIENT AND SERVER. DESCRIBE WHAT A WEB API IS AND WHY DEVELOPERS MIGHT ADD A WEB API TO AN APPLICATION. DESCRIBE HOW TO PACKAGE AND DEPLOY AN ASP.NET CORE WEB APPLICATION FROM A DEVELOPMENT COMPUTER TO A WEB SERVER. DESCRIPTION IN THIS 5-DAY COURSE, PROFESSIONAL WEB DEVELOPERS WILL LEARN TO DEVELOP ADVANCED ASP.NET CORE APPLICATIONS USING .NET TOOLS AND TECHNOLOGIES. THE FOCUS WILL BE ON CODING ACTIVITIES THAT ENHANCE THE PERFORMANCE AND SCALABILITY OF THE WEB SITE APPLICATION. MODULE 1: EXPLORING ASP.NET CORE * Introducing of Microsoft Web Technologies * Getting Started with Razor Pages in ASP.NET Core * Introducing ASP.NET Core MVC MODULE 2: DESIGNING ASP.NET CORE MVC WEB APPLICATIONS * Planning in the Project Design Phase * Designing Models, Controllers and Views MODULE 3: CONFIGURE MIDDLEWARE AND SERVICES IN ASP.NET CORE * Configuring Middlewares * Configuring Services MODULE 4: DEVELOPING CONTROLLERS * Writing Controllers and Actions * Configuring Routes * Writing Action Filters MODULE 5: DEVELOPING VIEWS * Creating Views with Razor Syntax * Using HTML Helpers and Tag Helpers * Reusing Code in Views MODULE 6: DEVELOPING MODELS * Creating MVC Models * Working with Forms * Validating User Input MODULE 7: USING ENTITY FRAMEWORK CORE IN ASP.NET CORE * Introduction to Entity Framework Core * Working with Entity Framework Core * Use Entity Framework Core to connect to Microsoft SQL Server MODULE 8: USING LAYOUTS, CSS AND JAVASCRIPT IN ASP.NET CORE * Using Layouts * Using CSS and JavaScript * Using JavaScript Libraries MODULE 9: CLIENT-SIDE DEVELOPMENT * Applying Styles and Responsive Design * Using Task Runners * Looking at ASP.NET Core Blazor MODULE 10: TESTING AND TROUBLESHOOTING * Testing ASP.NET Core Applications * Implementing an Exception Handling Strategy * Logging ASP.NET Core Applications MODULE 11: MANAGING SECURITY * Authentication in ASP.NET Core * Authorization in ASP.NET Core * Defending from Common Attack MODULE 12: PERFORMANCE AND COMMUNICATION IMPLEMENTING A CACHING STRATEGY * Managing State * Supporting Two-way Communication MODULE 13: IMPLEMENTING WEB APIS * Introducing Web APIs * Developing a Web API * Calling a Web API MODULE 14: HOSTING AND DEPLOYMENT * Hosting and Deploying On-premises * Deploying to Microsoft Azure * Looking at Microsoft Azure Fundamentals

55340 Developing ASP.NET Core Web Applications
Delivered Online6 days, May 13th, 13:00 + 2 more
£2975

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS FOR AZURE SECURITY ENGINEERS WHO ARE PLANNING TO TAKE THE ASSOCIATED CERTIFICATION EXAM, OR WHO ARE PERFORMING SECURITY TASKS IN THEIR DAY-TO-DAY JOB. THIS COURSE WOULD ALSO BE HELPFUL TO AN ENGINEER THAT WANTS TO SPECIALIZE IN PROVIDING SECURITY FOR AZURE-BASED DIGITAL PLATFORMS AND PLAY AN INTEGRAL ROLE IN PROTECTING AN ORGANIZATION'S DATA. DESCRIPTION THIS COURSE PROVIDES IT SECURITY PROFESSIONALS WITH THE KNOWLEDGE AND SKILLS NEEDED TO IMPLEMENT SECURITY CONTROLS, MAINTAIN AN ORGANIZATION?S SECURITY POSTURE, AND IDENTIFY AND REMEDIATE SECURITY VULNERABILITIES. THIS COURSE INCLUDES SECURITY FOR IDENTITY AND ACCESS, PLATFORM PROTECTION, DATA AND APPLICATIONS, AND SECURITY OPERATIONS. PREREQUISITES AZ-104T00 - MICROSOFT AZURE ADMINISTRATOR SECURITY BEST PRACTICES AND INDUSTRY SECURITY REQUIREMENTS SUCH AS DEFENSE IN DEPTH, LEAST PRIVILEGED ACCESS, ROLE-BASED ACCESS CONTROL, MULTI-FACTOR AUTHENTICATION, SHARED RESPONSIBILITY, AND ZERO TRUST MODEL. BE FAMILIAR WITH SECURITY PROTOCOLS SUCH AS VIRTUAL PRIVATE NETWORKS (VPN), INTERNET SECURITY PROTOCOL (IPSEC), SECURE SOCKET LAYER (SSL), DISK AND DATA ENCRYPTION METHODS. HAVE SOME EXPERIENCE DEPLOYING AZURE WORKLOADS. THIS COURSE DOES NOT COVER THE BASICS OF AZURE ADMINISTRATION, INSTEAD THE COURSE CONTENT BUILDS ON THAT KNOWLEDGE BY ADDING SECURITY SPECIFIC INFORMATION. HAVE EXPERIENCE WITH WINDOWS AND LINUX OPERATING SYSTEMS AND SCRIPTING LANGUAGES. COURSE LABS MAY USE POWERSHELL AND THE CLI. 1 - MANAGE IDENTITIES IN MICROSOFT ENTRA ID * Secure users in Microsoft Entra ID * Secure groups in Microsoft Entra ID * Recommend when to use external identities * Secure external identities * Implement Microsoft Entra Identity protection 2 - MANAGE AUTHENTICATION BY USING MICROSOFT ENTRA ID * Configure Microsoft Entra Verified ID * Implement multifactor authentication (MFA) * Implement passwordless authentication * Implement password protection * Implement single sign-on (SSO) * Integrate single sign-on (SSO) and identity providers * Recommend and enforce modern authentication protocols 3 - MANAGE AUTHORIZATION BY USING MICROSOFT ENTRA ID * Configure Azure role permissions for management groups, subscriptions, resource groups, and resources * Assign built-in roles in Microsoft Entra ID * Assign built-in roles in Azure * Create and assign a custom role in Microsoft Entra ID * Implement and manage Microsoft Entra Permissions Management * Configure Microsoft Entra Privileged Identity Management * Configure role management and access reviews by using Microsoft Entra Identity Governance * Implement Conditional Access policies 4 - MANAGE APPLICATION ACCESS IN MICROSOFT ENTRA ID * Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants * Manage app registrations in Microsoft Entra ID * Configure app registration permission scopes * Manage app registration permission consent * Manage and use service principals * Manage managed identities for Azure resources * Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - PLAN AND IMPLEMENT SECURITY FOR VIRTUAL NETWORKS * Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) * Plan and implement User-Defined Routes (UDRs) * Plan and implement Virtual Network peering or gateway * Plan and implement Virtual Wide Area Network, including secured virtual hub * Secure VPN connectivity, including point-to-site and site-to-site * Implement encryption over ExpressRoute * Configure firewall settings on PaaS resources * Monitor network security by using Network Watcher, including NSG flow logging 6 - PLAN AND IMPLEMENT SECURITY FOR PRIVATE ACCESS TO AZURE RESOURCES * Plan and implement virtual network Service Endpoints * Plan and implement Private Endpoints * Plan and implement Private Link services * Plan and implement network integration for Azure App Service and Azure Functions * Plan and implement network security configurations for an App Service Environment (ASE) * Plan and implement network security configurations for an Azure SQL Managed Instance 7 - PLAN AND IMPLEMENT SECURITY FOR PUBLIC ACCESS TO AZURE RESOURCES * Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management * Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies * Plan and implement an Azure Application Gateway * Plan and implement an Azure Front Door, including Content Delivery Network (CDN) * Plan and implement a Web Application Firewall (WAF) * Recommend when to use Azure DDoS Protection Standard 8 - PLAN AND IMPLEMENT ADVANCED SECURITY FOR COMPUTE * Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access * Configure network isolation for Azure Kubernetes Service (AKS) * Secure and monitor AKS * Configure authentication for AKS * Configure security for Azure Container Instances (ACIs) * Configure security for Azure Container Apps (ACAs) * Manage access to Azure Container Registry (ACR) * Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption * Recommend security configurations for Azure API Management 9 - PLAN AND IMPLEMENT SECURITY FOR STORAGE * Configure access control for storage accounts * Manage life cycle for storage account access keys * Select and configure an appropriate method for access to Azure Files * Select and configure an appropriate method for access to Azure Blob Storage * Select and configure an appropriate method for access to Azure Tables * Select and configure an appropriate method for access to Azure Queues * Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage * Configure Bring your own key (BYOK) * Enable double encryption at the Azure Storage infrastructure level 10 - PLAN AND IMPLEMENT SECURITY FOR AZURE SQL DATABASE AND AZURE SQL MANAGED INSTANCE * Enable database authentication by using Microsoft Entra ID * Enable and monitor database audit * Identify use cases for the Microsoft Purview governance portal * Implement data classification of sensitive information by using the Microsoft Purview governance portal * Plan and implement dynamic mask * Implement transparent data encryption? * Recommend when to use Azure SQL Database Always Encrypted 11 - PLAN, IMPLEMENT, AND MANAGE GOVERNANCE FOR SECURITY * Create, assign, and interpret security policies and initiatives in Azure Policy * Configure security settings by using Azure Blueprint * Deploy secure infrastructures by using a landing zone * Create and configure an Azure Key Vault * Recommend when to use a dedicated Hardware Security Module (HSM) * Configure access to Key Vault, including vault access policies and Azure Role Based Access Control * Manage certificates, secrets, and keys * Configure key rotation * Configure backup and recovery of certificates, secrets, and keys 12 - MANAGE SECURITY POSTURE BY USING MICROSOFT DEFENDER FOR CLOUD * Implement Microsoft Defender for Cloud * Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory * Assess compliance against security frameworks and Microsoft Defender for Cloud * Add industry and regulatory standards to Microsoft Defender for Cloud * Add custom initiatives to Microsoft Defender for Cloud * Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud * Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - CONFIGURE AND MANAGE THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD * Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS * Configure Microsoft Defender for Servers * Configure Microsoft Defender for Azure SQL Database * Manage and respond to security alerts in Microsoft Defender for Cloud * Configure workflow automation by using Microsoft Defender for Cloud * Evaluate vulnerability scans from Microsoft Defender for Server 14 - CONFIGURE AND MANAGE SECURITY MONITORING AND AUTOMATION SOLUTIONS * Monitor security events by using Azure Monitor * Configure data connectors in Microsoft Sentinel * Create and customize analytics rules in Microsoft Sentinel * Configure automation in Microsoft Sentinel ADDITIONAL COURSE DETAILS: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered Online5 days, May 14th, 08:30 + 5 more
£2380

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR SUCCESSFUL STUDENTS HAVE EXPERIENCE AND KNOWLEDGE IN IT OPERATIONS, INCLUDING NETWORKING, VIRTUALIZATION, IDENTITY, SECURITY, BUSINESS CONTINUITY, DISASTER RECOVERY, DATA PLATFORMS, AND GOVERNANCE. STUDENTS ALSO HAVE EXPERIENCE DESIGNING AND ARCHITECTING SOLUTIONS. BEFORE ATTENDING THIS COURSE, STUDENTS MUST HAVE PREVIOUS EXPERIENCE DEPLOYING OR ADMINISTERING AZURE RESOURCES AND STRONG CONCEPTUAL KNOWLEDGE OF: * AZURE COMPUTE TECHNOLOGIES SUCH AS VMS, CONTAINERS AND SERVERLESS SOLUTIONS * AZURE VIRTUAL NETWORKING TO INCLUDE LOAD BALANCERS * AZURE STORAGE TECHNOLOGIES (UNSTRUCTURED AND DATABASES) * GENERAL APPLICATION DESIGN CONCEPTS SUCH AS MESSAGING AND HIGH AVAILABILITY DESCRIPTION THIS COURSE TEACHES AZURE SOLUTION ARCHITECTS HOW TO DESIGN INFRASTRUCTURE SOLUTIONS. COURSE TOPICS COVER GOVERNANCE, COMPUTE, APPLICATION ARCHITECTURE, STORAGE, DATA INTEGRATION, AUTHENTICATION, NETWORKS, BUSINESS CONTINUITY, AND MIGRATIONS. THE COURSE COMBINES LECTURE WITH CASE STUDIES TO DEMONSTRATE BASIC ARCHITECT DESIGN PRINCIPLES. PREREQUISITES BEFORE ATTENDING THIS COURSE, STUDENTS MUST HAVE PREVIOUS EXPERIENCE DEPLOYING OR ADMINISTERING AZURE RESOURCES AND CONCEPTUAL KNOWLEDGE OF: AZURE ACTIVE DIRECTORY AZURE COMPUTE TECHNOLOGIES SUCH AS VMS, CONTAINERS AND SERVERLESS SOLUTIONS AZURE VIRTUAL NETWORKING TO INCLUDE LOAD BALANCERS AZURE STORAGE TECHNOLOGIES (UNSTRUCTURED AND DATABASES) GENERAL APPLICATION DESIGN CONCEPTS SUCH AS MESSAGING AND HIGH AVAILABILITY AZ-104T00 - MICROSOFT AZURE ADMINISTRATOR 1 - DESIGN GOVERNANCE * Design for governance * Design for management groups * Design for subscriptions * Design for resource groups * Design for resource tags * Design for Azure Policy * Design for role-based access control (RBAC) * Design for Azure landing zones 2 - DESIGN AN AZURE COMPUTE SOLUTION * Choose an Azure compute service * Design for Azure Virtual Machines solutions * Design for Azure Batch solutions * Design for Azure App Service solutions * Design for Azure Container Instances solutions * Design for Azure Kubernetes Service solutions * Design for Azure Functions solutions * Design for Azure Logic Apps solutions 3 - DESIGN A DATA STORAGE SOLUTION FOR NON-RELATIONAL DATA * Design for data storage * Design for Azure storage accounts * Design for data redundancy * Design for Azure Blob Storage * Design for Azure Files * Design for Azure managed disks * Design for storage security 4 - DESIGN A DATA STORAGE SOLUTION FOR RELATIONAL DATA * Design for Azure SQL Database * Design for Azure SQL Managed Instance * Design for SQL Server on Azure Virtual Machines * Recommend a solution for database scalability * Recommend a solution for database availability * Design security for data at rest, data in motion, and data in use * Design for Azure SQL Edge * Design for Azure Cosmos DB and Table Storage 5 - DESIGN DATA INTEGRATION * Design a data integration solution with Azure Data Factory * Design a data integration solution with Azure Data Lake * Design a data integration and analytic solution with Azure Databricks * Design a data integration and analytic solution with Azure Synapse Analytics * Design strategies for hot, warm, and cold data paths * Design an Azure Stream Analytics solution for data analysis 6 - DESIGN AN APPLICATION ARCHITECTURE * Describe message and event scenarios * Design a messaging solution * Design an Azure Event Hubs messaging solution * Design an event-driven solution * Design a caching solution * Design API integration * Design an automated app deployment solution * Design an app configuration management solution 7 - DESIGN AUTHENTICATION AND AUTHORIZATION SOLUTIONS * Design for identity and access management (IAM) * Design for Microsoft Entra ID * Design for Microsoft Entra business-to-business (B2B) * Design for Azure Active Directory B2C (business-to-customer) * Design for conditional access * Design for identity protection * Design for access reviews * Design service principals for applications * Design managed identities * Design for Azure Key Vault 8 - DESIGN A SOLUTION TO LOG AND MONITOR AZURE RESOURCES * Design for Azure Monitor data sources * Design for Azure Monitor Logs (Log Analytics) workspaces * Design for Azure Workbooks and Azure insights * Design for Azure Data Explorer 9 - DESIGN NETWORK SOLUTIONS * Recommend a network architecture solution based on workload requirements * Design patterns for Azure network connectivity services * Design outbound connectivity and routing * Design for on-premises connectivity to Azure Virtual Network * Choose an application delivery service * Design for application delivery services * Design for application protection services 10 - DESIGN A SOLUTION FOR BACKUP AND DISASTER RECOVERY * Design for backup and recovery * Design for Azure Backup * Design for Azure blob backup and recovery * Design for Azure files backup and recovery * Design for Azure virtual machine backup and recovery * Design for Azure SQL backup and recovery * Design for Azure Site Recovery 11 - DESIGN MIGRATIONS * Evaluate migration with the Cloud Adoption Framework * Describe the Azure migration framework * Assess your on-premises workloads * Select a migration tool * Migrate your structured data in databases * Select an online storage migration tool for unstructured data * Migrate offline data 12 - INTRODUCTION TO THE MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK * Azure Well-Architected Framework pillars * Cost optimization * Operational excellence * Performance efficiency * Reliability * Security 13 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - COST OPTIMIZATION * Develop cost-management discipline * Design with a cost-efficiency mindset * Design for usage optimization * Design for rate optimization * Monitor and optimize over time 14 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - OPERATIONAL EXCELLENCE * Embrace DevOps culture * Establish development standards * Evolve operations with observability * Deploy with confidence * Automate for efficiency * Adopt safe deployment practices 15 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - PERFORMANCE EFFICIENCY * Negotiate realistic performance targets * Design to meet capacity requirements * Achieve and sustain performance * Improve efficiency through optimization 16 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - RELIABILITY * Design for business requirements * Design for resilience * Design for recovery * Design for operations * Keep it simple 17 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - SECURITY * Plan your security readiness * Design to protect confidentiality * Design to protect integrity * Design to protect availability * Sustain and evolve your security posture 18 - GETTING STARTED WITH THE MICROSOFT CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Common blockers 19 - PREPARE FOR SUCCESSFUL CLOUD ADOPTION WITH A WELL-DEFINED STRATEGY * Customer narrative * Capture strategic motivation * Define objectives and key results * Evaluate financial considerations * Understand technical considerations * Create a business case 20 - PREPARE FOR CLOUD ADOPTION WITH A DATA-DRIVEN PLAN * Customer narrative 21 - CHOOSE THE BEST AZURE LANDING ZONE TO SUPPORT YOUR REQUIREMENTS FOR CLOUD OPERATIONS * Customer narrative * Common operating models * Design areas for Azure landing zones * Design principles for Azure landing zones * Journey to the target architecture * Choose an Azure landing zone option * Deploy the Azure landing zone accelerator * Enhance your landing zone 22 - MIGRATE TO AZURE THROUGH REPEATABLE PROCESSES AND COMMON TOOLS * Customer narrative * Migration process * Migration tools * Common tech platforms 23 - ADDRESS TANGIBLE RISKS WITH THE GOVERN METHODOLOGY OF THE CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Govern methodology * Corporate policies * Governance disciplines * Deploy a cloud governance foundation * The Cost Management discipline 24 - ENSURE STABLE OPERATIONS AND OPTIMIZATION ACROSS ALL SUPPORTED WORKLOADS DEPLOYED TO THE CLOUD * Establish business commitments * Deploy an operations baseline * Protect and recover * Enhance an operations baseline * Manage platform and workload specialization 25 - INNOVATE APPLICATIONS BY USING AZURE CLOUD TECHNOLOGIES * Follow the innovation lifecycle * Azure technologies for the build process * Infuse your applications with AI * Azure technologies for measuring business impact * Azure technologies for the learn process 26 - PREPARE FOR CLOUD SECURITY BY USING THE MICROSOFT CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Methodology * Security roles and responsibilities * Simplify compliance and security * Simplify security implementation * Security tools and policies ADDITIONAL COURSE DETAILS: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered Online5 days, May 14th, 13:00 + 6 more
£2380

Python Programming Beginners Course, 1 Day, Online Instructor-Led

By Pcw Courses Ltd

PYTHON BASICS: COURSE DESCRIPTION Excellent for beginners, practical, in small groups of max 4 people, 1 Day Online Instructor-led. You could contact us for your prefereed date. Session 1: Python Data Types and Variables: * Primitive types; Characters & Strings; Boolean; Working with variables and its scope; Conversion and casting types in Python. * Operators and Expressions: * Introduction of operators; Arithmetic operators; Relational operators; Assignment operator; Logical operators; Increment and decrement operators.. * Exercise: Calculate Movie Tickets for a Party, Are there enough seats in the cinema? Decision Making & Loops * If statement; If - else statement; If- elif - else statement; Nested if - else; * Exercise: Calculate the travel fee to deliver goods * The while, For loop * Jump statements: break, continue; * Nesting loops. * Exercise: Enter a password, if incorrect 3 times, you are blocked. Session 2: Data Structures * Lists. * Tuples. * Exercise: Hangman Game * Exercise: Get a word for the game from a Json File, store the high score in a Dictionary file Session 3: Files and exceptions * Exception Handling, Exception types; Using try and Except. * Files, streams: Open, Traverse, Read and Create Files: Csv, txt and Json Files. * API: Connecting to API’s. Session 4: OOP * Creating and using custom Functions. * Using parameters and return values. * Creating a Class; Creating an Object; Using an Object; Adding Instance variables; * Class Constructors; Parameterized Constructors. * Inheritance. Override. Session 5: Pandas Dataframe Basics * Getting data into a dataframe: Dict to Dataframe, Dataframe to Dict. Excel To Dict, Dict to Excel , working with Excel data, multiple Excel sheets. * Getting information about the dataframe, * Filter, sort and query a Dataframes, Slicing Dataframes, * Duplicate values,Working with null-values, Sampling. * Exercise: Query the top 1000 grossing movies of the last century Session 6: Built in Functions: String, Math, Random * Python built-in functions: * Strings functions. Maths functions. Random Functions. * Exercise: Find information in prose, to get the sentiment of the prose. * Exercise: Get a word for the game from a txt File * Exercise: Win the lottery INCLUDED: * PCWorkshops's Python Programming Basics Certification * Course notes, exercises and code examples * Revision session after the course -------------------------------------------------------------------------------- REFUND POLICY No Refunds

Python Programming Beginners Course, 1 Day, Online Instructor-Led
Delivered Online & In-Person in London5 hours, May 15th, 09:00 + 17 more
£185 to £285

Python Programming Beginners Evenings Course, Webinar, Virtual Classroom.

By Pcw Courses Ltd

Python coding, interactive, instructor-led, hands-on, practical. From basics to working with professionals. Python Part Time. Python Coding. -------------------------------------------------------------------------------- Python Beginners Evenings Course COURSE SUMMARY This Python Programming course has become essential to all professional who would like to do code using Python. Learn evenings, work while studying. Work and study Python Part Time. It is a Python beginners course and teaches Python coding from scratch to intermediate. Hands-on, practical. We code some real life examples in this course. Duration: 3 Evenings, once per week for 3 weeks 6pm-8pm, of which the first date only shows on the booking. Virtual Classroom: You could attend in our classroom, or attend online via virtual classroom, by select the appropriate ticket. Who Should Attend? This course is intended for beginner programmers who need to code in Python. Fast-paced, Quite intensive. Course Outline: Session 1: Basics * Python Data Types, Variables, * Operators and Expressions: Arithmetic operators; Relational operators; Assignment operator; Logical operators. * Decision Making: If statement; If - else statement; If- elif - else statement; Nested if - else; * Using Loops: The while, while-else; do-while and the for loop; Enhanced for loop; Jump statements: break, continue; Nesting loops. Session 2: Lists. Dictionaries, Json * Python Data Structures: Lists. Data Structures: 2-d Lists, Tuples. Dictionary, Nested Disctionary. Session 3: Built-in functions: * Python Date Functions. Random. Math Functions. String Functions. Python Regex. Session 4: Database: * Connect to a database, create Database, create a table, insert, delete, update records, query a database and display results. Drop database, drop table. Session 5: Files * Exception Handling in Python: Fundamentals of exception handling; Exception types; Using try and except. * Files, streams: Create, Open, Traverse and Read Files: Csv, txt and Json Files. * API: Connecting to API’s Session 6: M ethods, Classes and Objects * Creating and using Function, Working with parameters, Calling functions. * Object-Oriented Programming (OOP) principles. Modules and Classes, Creating an Object; Using an Object; Adding Instance variables; Controlling accessibility; Naming conventions for class member.s FAQ Do I need Python on my Laptop? Ideally spoken yes, but if not possible, you could use our online platform. Can I pay by BACS? Yes, simply email us, a Python course consultant will contact you. training@pcworkshopslondon.co.uk or pcworkshopslondon@gmail.com Can I pay with PayPal? Yes, simply email us, a course consultant will contact you. training@pcworkshopslondon.co.uk or pcworkshopslondon@gmail.com Do I get an invoice? Yes, on request. Can I pay with a PO (Purchase Order Number)? Yes, simply email us, a Python course consultant will contact you. training@pcworkshopslondon.co.uk or pcworkshopslondon@gmail.com Do I get a certificate? Yes, a PCWorkshops Certificate Can I attend in classroom? Yes, on request, and it would incur an additional charge, depending on your location. We have offices in London, Manchester, Birmingham, Portmouth, Southend-on-Sea, Milton Keynes. Can beginners follow this course? Yes, this is a Python beginner friendly course. We offer Python courses with max 4 people, so we make sure each delegates fully understand the material covered Can I customise the course? Yes, all our Python courses are customisable. We can customise the dates, times, location. course outline. -------------------------------------------------------------------------------- REFUND POLICY No Refunds

Python Programming Beginners Evenings Course, Webinar, Virtual Classroom.
Delivered Online & In-Person in London1 hour 30 minutes, May 15th, 17:00 + 20 more
£120 to £210

African drumming!

4.9(9)

By Jahdiafolila

Love the sound of djembe? and want to learn in a friendly environment? We offer regular group and one-to-one classes. Adult class every Wednesdays (all levels), 7.00 – 8.30pm, at Blackfriars Settlement,  [https://www.google.com/maps/search/?api=1&query=51.501915%2C%20-0.1029]1 Rushworth Street · London, SE1 0RB

African drumming!
Delivered In-Person in London1 hour 30 minutes, May 15th, 18:00 + 22 more
£15

Architecting on AWS

By Nexus Human

DURATION 3 DAYS 18 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR SOLUTIONS ARCHITECTS, SOLUTION-DESIGN ENGINEERS, DEVELOPERS SEEKING AN UNDERSTANDING OF AWS ARCHITECTING AND INDIVIDUALS SEEKING THE AWS SOLUTIONS ARCHITECT-ASSOCIATE CERTIFICATION. OVERVIEW IDENTIFY AWS ARCHITECTING BASIC PRACTICES. EXPLORE USING THE AWS MANAGEMENT TOOLS: THE AWS CONSOLE, COMMAND LINE INTERFACE (CLI), AND CLOUDFORMATION IN A LAB ENVIRONMENT. EXAMINE THE ENFORCEMENT OF ACCOUNTS SECURITY USING POLICIES. IDENTIFY THE ELEMENTS THAT BUILD AN ELASTIC, SECURE, VIRTUAL NETWORK THAT INCLUDES PRIVATE AND PUBLIC SUBNETS. PRACTICE BUILDING AN AWS CORE NETWORKING INFRASTRUCTURE. DETERMINE STRATEGIES FOR A LAYERED SECURITY APPROACH TO VIRTUAL PRIVATE CLOUD (VPC) SUBNETS. IDENTIFY STRATEGIES TO SELECT THE APPROPRIATE COMPUTE RESOURCES BASED ON BUSINESS USE-CASES. PRACTICE BUILDING A VPC AND ADDING AN ELASTIC CLOUD COMPUTE (EC2) INSTANCE IN A LAB ENVIRONMENT. PRACTICE INSTALLING AN AMAZON RELATIONAL DATABASE SERVICE (RDS) INSTANCE AND AN APPLICATION LOAD BALANCER (ALB) IN THE VPC YOU CREATED. COMPARE AND CONTRAST AWS STORAGE PRODUCTS AND SERVICES, BASED ON BUSINESS SCENARIOS. COMPARE AND CONTRAST THE DIFFERENT TYPES OF AWS DATABASE SERVICES BASED ON BUSINESS NEEDS. PRACTICE BUILDING A HIGHLY AVAILABLE, AUTO-SCALING DATABASE LAYER IN A LAB. EXPLORE THE BUSINESS VALUE OF AWS MONITORING SOLUTIONS. IDENTIFY THE ROLE OF MONITORING, EVENT DRIVEN LOAD BALANCING, AND AUTO SCALING RESPONSES, BASED ON USAGE AND NEEDS. IDENTIFY AND DISCUSS AWS AUTOMATION TOOLS THAT WILL HELP YOU BUILD, MAINTAIN AND EVOLVE YOUR INFRASTRUCTURE. DISCUSS NETWORK PEERING, VPC ENDPOINTS, GATEWAY AND ROUTING SOLUTIONS BASED ON USE-CASES. DISCUSS HYBRID NETWORKING CONFIGURATIONS TO EXTEND AND SECURE YOUR INFRASTRUCTURE. DISCUSS THE BENEFITS OF MICROSERVICES AS AN EFFECTIVE DECOUPLING STRATEGY TO POWER HIGHLY AVAILABLE APPLICATIONS AT SCALE. EXPLORE AWS CONTAINER SERVICES FOR THE RAPID IMPLEMENTATION OF AN INFRASTRUCTURE-AGNOSTIC, PORTABLE APPLICATION ENVIRONMENT. IDENTIFY THE BUSINESS AND SECURITY BENEFITS OF AWS SERVERLESS SERVICES BASED ON BUSINESS EXAMPLES. PRACTICE BUILDING A SERVERLESS INFRASTRUCTURE IN A LAB ENVIRONMENT. DISCUSS THE WAYS IN WHICH AWS EDGE SERVICES ADDRESS LATENCY AND SECURITY. PRACTICE BUILDING A CLOUDFRONT DEPLOYMENT WITH AN S3 BACKEND IN A LAB ENVIRONMENT. EXPLORE AWS BACKUP, RECOVERY SOLUTIONS, AND BEST PRACTICES TO ENSURE RESILIENCY AND BUSINESS CONTINUITY. BUILD A HIGHLY AVAILABLE AND SECURE CLOUD ARCHITECTURE BASED ON A BUSINESS PROBLEM, IN A PROJECT-BASED FACILITATOR-GUIDED LAB. DESCRIPTION ARCHITECTING ON AWS IS FOR SOLUTIONS ARCHITECTS, SOLUTION-DESIGN ENGINEERS, AND DEVELOPERS SEEKING AN UNDERSTANDING OF AWS ARCHITECTING. IN THIS COURSE, YOU WILL LEARN TO IDENTIFY SERVICES AND FEATURES TO BUILD RESILIENT, SECURE AND HIGHLY AVAILABLE IT SOLUTIONS ON THE AWS CLOUD. ARCHITECTURAL SOLUTIONS DIFFER DEPENDING ON INDUSTRY, TYPES OF APPLICATIONS, AND BUSINESS SIZE. AWS AUTHORIZED INSTRUCTORS EMPHASIZE BEST PRACTICES USING THE AWS WELL-ARCHITECTED FRAMEWORK, AND GUIDE YOU THROUGH THE PROCESS OF DESIGNING OPTIMAL IT SOLUTIONS, BASED ON REAL-LIFE SCENARIOS. THE MODULES FOCUS ON ACCOUNT SECURITY, NETWORKING, COMPUTE, STORAGE, DATABASES, MONITORING, AUTOMATION, CONTAINERS, SERVERLESS ARCHITECTURE, EDGE SERVICES, AND BACKUP AND RECOVERY. AT THE END OF THE COURSE, YOU WILL PRACTICE BUILDING A SOLUTION AND APPLY WHAT YOU HAVE LEARNED WITH CONFIDENCE. PREREQUISITES * AWS CLOUD PRACTITIONER ESSENTIALS CLASSROOM OR DIGITAL TRAINING, OR * WORKING KNOWLEDGE OF DISTRIBUTED SYSTEMS * FAMILIARITY WITH GENERAL NETWORKING CONCEPTS * FAMILIARITY WITH IP ADDRESSING * WORKING KNOWLEDGE OF MULTI-TIER ARCHITECTURES * FAMILIARITY WITH CLOUD COMPUTING CONCEPTS 0 - INTRODUCTIONS & COURSE MAP REVIEW * Welcome and course outcomes 1 - ARCHITECTING FUNDAMENTALS REVIEW * AWS Services and Infrastructure * Infrastructure Models * AWS API Tools * Securing your infrastructure * The Well-Architected Framework * Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - ACCOUNT SECURITY * Security Principals * Identity and Resource-Based Policies * Account Federation * Introduction to Managing Multiple Accounts 3 - NETWORKING, PART 1 * IP Addressing * Amazon Virtual Private Cloud (VPC), Patterns and Quotas * Routing * Internet Access * Network Access Control Lists (NACLs) * Security Groups 4 - COMPUTE * Amazon Elastic Cloud Compute (EC2) * EC2 Instances and Instance Selection * High Performance Computing on AWS * Lambda and EC2, When to Use Which * Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - STORAGE * Amazon S3, Security, Versioning and Storage Classes * Shared File Systems * Data Migration Tools 6 - DATABASE SERVICES * AWS Database Solutions * Amazon Relational Database Services (RDS) * DynamoDB, Features and Use Cases * Redshift, Features, Use Cases and Comparison with RDS * Caching and Migrating Data * Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - MONITORING AND SCALING * Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs * Invoking Events 8 - AUTOMATION * CloudFormation * AWS Systems Manager 9 - CONTAINERS * Microservices * Monitoring Microservices with X-Ray * Containers 10 - NETWORKING PART 2 * VPC Peering & Endpoints * Transit Gateway * Hybrid Networking * Route 53 11 - SERVERLESS ARCHITECTURE * Amazon API Gateway * Amazon SQS, Amazon SNS * Amazon Kinesis Data Streams & Kinesis Firehose * Step Functions * Hands-on Lab: Build a Serverless Architecture 12 - EDGE SERVICES * Edge Fundamentals * Amazon CloudFront * AWS Global Accelerator * AWS Web Application Firewall (WAF), DDoS and Firewall Manager * AWS Outposts * Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - BACKUP AND RECOVERY * Planning for Disaster Recovery * AWS Backup * Recovery Strategie ADDITIONAL COURSE DETAILS: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS
Delivered Online4 days, May 20th, 08:30 + 6 more
£2025

Hands-On .NET Minimal API for Web Developers

By Packt

Web API use has increased exponentially in the programming world. This course will provide significant knowledge of implementing Minimal API for your next RESTful API-related project. You will be certain to use the building concepts with ease by following a step-by-step approach. Gain the confidence to instantly create a new Minimal API project with ease.

Hands-On .NET Minimal API for Web Developers
Delivered Online On Demand
£41.99

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THE MICROSOFT 365 ENDPOINT ADMINISTRATOR IS RESPONSIBLE FOR DEPLOYING, CONFIGURING, SECURING, MANAGING, AND MONITORING DEVICES AND CLIENT APPLICATIONS IN A CORPORATE SETTING. THEIR DUTIES INCLUDE MANAGING IDENTITY, ACCESS, POLICIES, UPDATES, AND APPS. THEY WORK ALONGSIDE THE M365 ENTERPRISE ADMINISTRATOR TO DEVELOP AND EXECUTE A DEVICE STRATEGY THAT ALIGNS WITH THE REQUIREMENTS OF A MODERN ORGANIZATION. MICROSOFT 365 ENDPOINT ADMINISTRATORS SHOULD BE WELL-VERSED IN M365 WORKLOADS AND POSSESS EXTENSIVE SKILLS AND EXPERIENCE IN DEPLOYING, CONFIGURING, AND MAINTAINING WINDOWS 11 AND LATER, AS WELL AS NON-WINDOWS DEVICES. THEIR ROLE EMPHASIZES CLOUD SERVICES OVER ON-PREMISES MANAGEMENT TECHNOLOGIES. DESCRIPTION IN THIS COURSE, STUDENTS WILL LEARN TO PLAN AND EXECUTE AN ENDPOINT DEPLOYMENT STRATEGY USING CONTEMPORARY DEPLOYMENT TECHNIQUES AND IMPLEMENTING UPDATE STRATEGIES. THE COURSE INTRODUCES ESSENTIAL ELEMENTS OF MODERN MANAGEMENT, CO-MANAGEMENT APPROACHES, AND MICROSOFT INTUNE INTEGRATION. IT COVERS APP DEPLOYMENT, MANAGEMENT OF BROWSER-BASED APPLICATIONS, AND KEY SECURITY CONCEPTS SUCH AS AUTHENTICATION, IDENTITIES, ACCESS, AND COMPLIANCE POLICIES. TECHNOLOGIES LIKE MICROSOFT ENTRA ID, AZURE INFORMATION PROTECTION, AND MICROSOFT DEFENDER FOR ENDPOINT ARE EXPLORED TO PROTECT DEVICES AND DATA. PREREQUISITES THE MODERN DESKTOP ADMINISTRATOR MUST BE FAMILIAR WITH M365 WORKLOADS AND MUST HAVE STRONG SKILLS AND EXPERIENCE OF DEPLOYING, CONFIGURING, AND MAINTAINING WINDOWS 11 AND LATER, AND NON-WINDOWS DEVICES. 1 - EXPLORE THE ENTERPRISE DESKTOP * Examine benefits of modern management * Examine the enterprise desktop life-cycle model * Examine planning and purchasing * Examine desktop deployment * Plan an application deployment * Plan for upgrades and retirement 2 - EXPLORE WINDOWS EDITIONS * Examine Windows client editions and capabilities * Select client edition * Examine hardware requirements 3 - UNDERSTAND MICROSOFT ENTRA ID * Examine Microsoft Entra ID * Compare Microsoft Entra ID and Active Directory Domain Services * Examine Microsoft Entra ID as a directory service for cloud apps * Compare Microsoft Entra ID P1 and P2 plans * Examine Microsoft Entra Domain Services 4 - MANAGE MICROSOFT ENTRA IDENTITIES * Examine RBAC and user roles in Microsoft Entra ID * Create and manage users in Microsoft Entra ID * Create and manage groups in Microsoft Entra ID * Manage Microsoft Entra objects with PowerShell * Synchronize objects from AD DS to Microsoft Entra ID 5 - MANAGE DEVICE AUTHENTICATION * Describe Microsoft Entra join * Examine Microsoft Entra join prerequisites limitations and benefits * Join devices to Microsoft Entra ID * Manage devices joined to Microsoft Entra ID 6 - ENROLL DEVICES USING MICROSOFT CONFIGURATION MANAGER * Deploy the Microsoft Configuration Manager client * Monitor the Microsoft Configuration Manager client * Manage the Microsoft Configuration Manager client 7 - ENROLL DEVICES USING MICROSOFT INTUNE * Manage mobile devices with Intune * Enable mobile device management * Explain considerations for device enrollment * Manage corporate enrollment policy * Enroll Windows devices in Intune * Enroll Android devices in Intune * Enroll iOS devices in Intune * Explore device enrollment manager * Monitor device enrollment * Manage devices remotely 8 - EXECUTE DEVICE PROFILES * Explore Intune device profiles * Create device profiles * Create a custom device profile 9 - OVERSEE DEVICE PROFILES * Monitor device profiles in Intune * Manage device sync in Intune * Manage devices in Intune using scripts 10 - MAINTAIN USER PROFILES * Examine user profile * Explore user profile types * Examine options for minimizing user profile size * Deploy and configure folder redirection * Sync user state with Enterprise State Roaming * Configure Enterprise State Roaming in Azure 11 - EXECUTE MOBILE APPLICATION MANAGEMENT * Examine mobile application management * Examine considerations for mobile application management * Prepare line-of-business apps for app protection policies * Implement mobile application management policies in Intune * Manage mobile application management policies in Intune 12 - DEPLOY AND UPDATE APPLICATIONS * Deploy applications with Intune * Add apps to Intune * Manage Win32 apps with Intune * Deploy applications with Configuration Manager * Deploying applications with Group Policy * Assign and publish software * Explore Microsoft Store for Business * Implement Microsoft Store Apps * Update Microsoft Store Apps with Intune * Assign apps to company employees 13 - ADMINISTER ENDPOINT APPLICATIONS * Manage apps with Intune * Manage Apps on non-enrolled devices * Deploy Microsoft 365 Apps with Intune * Additional Microsoft 365 Apps Deployment Tools * Configure Microsoft Edge Internet Explorer mode * App Inventory Review 14 - PROTECT IDENTITIES IN MICROSOFT ENTRA ID * Explore Windows Hello for Business * Deploy Windows Hello * Manage Windows Hello for Business * Explore Microsoft Entra ID Protection * Manage self-service password reset in Microsoft Entra ID * Implement multi-factor authentication 15 - ENABLE ORGANIZATIONAL ACCESS * Enable access to organization resources * Explore VPN types and configuration * Explore Always On VPN * Deploy Always On VPN 16 - IMPLEMENT DEVICE COMPLIANCE * Protect access to resources using Intune * Explore device compliance policy * Deploy a device compliance policy * Explore conditional access * Create conditional access policies 17 - GENERATE INVENTORY AND COMPLIANCE REPORTS * Report enrolled devices inventory in Intune * Monitor and report device compliance * Build custom Intune inventory reports * Access Intune using Microsoft Graph API 18 - DEPLOY DEVICE DATA PROTECTION * Explore Windows Information Protection * Plan Windows Information Protection * Implement and use Windows Information Protection * Explore Encrypting File System in Windows client * Explore BitLocker 19 - MANAGE MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Examine key capabilities of Microsoft Defender for Endpoint * Explore Windows Defender Application Control and Device Guard * Explore Microsoft Defender Application Guard * Examine Windows Defender Exploit Guard * Explore Windows Defender System Guard 20 - MANAGE MICROSOFT DEFENDER IN WINDOWS CLIENT * Explore Windows Security Center * Explore Windows Defender Credential Guard * Manage Microsoft Defender Antivirus * Manage Windows Defender Firewall * Explore Windows Defender Firewall with Advanced Security 21 - MANAGE MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender for Cloud Apps * Planning Microsoft Defender for Cloud Apps * Implement Microsoft Defender for Cloud Apps 22 - ASSESS DEPLOYMENT READINESS * Examine deployment guidelines * Explore readiness tools * Assess application compatibility * Explore tools for application compatibility mitigation * Prepare network and directory for deployment * Plan a pilot 23 - DEPLOY USING THE MICROSOFT DEPLOYMENT TOOLKIT * Evaluate traditional deployment methods * Set up the Microsoft Deployment Toolkit for client deployment * Manage and deploy images using the Microsoft Deployment Toolkit 24 - DEPLOY USING MICROSOFT CONFIGURATION MANAGER * Explore client deployment using Configuration Manager * Examine deployment components of Configuration Manager * Manage client deployment using Configuration Manager * Plan in-place upgrades using Configuration Manager 25 - DEPLOY DEVICES USING WINDOWS AUTOPILOT * Use Autopilot for modern deployment * Examine requirements for Windows Autopilot * Prepare device IDs for Autopilot * Implement device registration and out-of-the-box customization * Examine Autopilot scenarios * Troubleshoot Windows Autopilot 26 - IMPLEMENT DYNAMIC DEPLOYMENT METHODS * Examine subscription activation * Deploy using provisioning packages * Use Windows Configuration Designer * Use Microsoft Entra join with automatic MDM enrollment 27 - PLAN A TRANSITION TO MODERN ENDPOINT MANAGEMENT * Explore using co-management to transition to modern endpoint management * Examine prerequisites for co-management * Evaluate modern management considerations * Evaluate upgrades and migrations in modern transitioning * Migrate data when modern transitioning * Migrate workloads when modern transitioning 28 - MANAGE WINDOWS 365 * Explore Windows 365 * Configure Windows 365 * Administer Windows 365 29 - MANAGE AZURE VIRTUAL DESKTOP * Examine Azure Virtual Desktop * Explore Azure Virtual Desktop * Configure Azure Virtual Desktop * Administer Azure Virtual Desktop ADDITIONAL COURSE DETAILS: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online6 days, May 20th, 13:00 + 16 more
£2975

Educators matching "API"

Show all 589
Sublime Education

sublime education

Education Discounts Educational discounts are not presently offered. Upgrade Policy (Personal License) A license is valid for Sublime Text 3, and includes all point updates, as well as access to prior versions (e.g., Sublime Text 2). Future major versions, such as Sublime Text 4, will be a paid upgrade. If you have a license from 2012 or earlier, you can upgrade to a Sublime Text 3 license at a discounted rate. Upgrade Policy (Business Subscription) Subscription licenses are always valid for the current version of Sublime Text. If you have a business license purchased before subscriptions were introduced, that will remain valid for all versions of Sublime Text 3. Future major versions, such as Sublime Text 4, will require purchasing a subscription for business customers. Expiration Date Licenses purchased for Sublime Text 3 do not expire, however an upgrade fee will be required for Sublime Text 4. Multiple Operating Systems or Computers Licenses are per-user, so you're welcome to use the one license on all computers and operating systems where you are the primary user. For businesses, the number of users must equal the number of licenses. Using a Personal License at Work As licenses are per-user, you're welcome to use your license key on all computers where you are the primary user, including at work. Business vs Personal A personal license key will have your name on it, while a business license key will normally have the company name, in accordance with what is entered into the Buy page. Educational Institutions If you would like to purchase Sublime Text for use in a computer lab, it is not necessary to have the number of licenses equal to the number of students. You may purchase the lesser of either: 1) the number of computers that will have Sublime Text installed or 2) the number of students who will be using Sublime Text. Site Licenses Site licenses are not offered for Sublime Text.