• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1491 Architecture courses

Certified Data Centre Professional (CDCP)

By Nexus Human

DURATION 2 DAYS 12 CPD HOURS THIS COURSE IS INTENDED FOR THE PRIMARY AUDIENCE FOR THIS COURSE IS ANY IT, FACILITIES OR DATA CENTRE PROFESSIONAL WHO WORKS IN AND AROUND THE DATA CENTRE AND WHO HAS THE RESPONSIBILITY TO ACHIEVE AND IMPROVE THE AVAILABILITY AND MANAGEABILITY OF THE DATA CENTRE. OVERVIEW AFTER COMPLETION OF THE COURSE THE PARTICIPANT WILL BE ABLE TO:? CHOOSE AN OPTIMUM SITE FOR MISSION-CRITICAL DATA CENTRE BASED ON CURRENT AND FUTURE NEEDS? DESCRIBE ALL COMPONENTS THAT ARE IMPORTANT FOR HIGH AVAILABILITY IN A DATA CENTRE AND HOW TO EFFECTIVELY SETUP THE DATA CENTRE? NAME AND APPLY THE VARIOUS INDUSTRY STANDARDS? DESCRIBE THE VARIOUS TECHNOLOGIES FOR UPS, FIRE SUPPRESSION, COOLING, MONITORING SYSTEMS, CABLING STANDARDS, ETC, AND TO SELECT AND APPLY THEM EFFECTIVELY TO COST-EFFICIENTLY ENHANCE THE HIGH-AVAILABILITY OF THE DATA CENTRE.? REVIEW THE ELECTRICAL DISTRIBUTION SYSTEM TO AVOID COSTLY DOWNTIME? ENHANCE COOLING CAPABILITIES AND EFFICIENCY IN THE DATA CENTRE BY USING EXISTING AND NEW TECHNIQUES AND TECHNOLOGIES FOR THE INCREASED COOLING REQUIREMENTS OF THE FUTURE? DESIGN A HIGHLY RELIABLE AND SCALABLE NETWORK ARCHITECTURE AND LEARN HOW TO ENSURE INSTALLERS APPLY PROPER TESTING TECHNIQUES? CREATE EFFECTIVE MAINTENANCE CONTRACTS WITH EQUIPMENT SUPPLIERS ENSURING THE BEST RETURN ON INVESTMENT? SETUP EFFECTIVE DATA CENTRE MONITORING ENSURING THE RIGHT PEOPLE GET THE RIGHT MESSAGE? ENSURE PROPER SECURITY MEASURES, BOTH PROCEDURAL AND TECHNICAL, ARE ESTABLISHED TO SAFEGUARD YOUR COMPANY'S VALUABLE INFORMATION IN THE DATA CENTRE DESCRIPTION THE COURSE WILL ADDRESS HOW TO SETUP AND IMPROVE KEY ASPECTS SUCH AS POWER, COOLING, SECURITY, CABLING, SAFETY, ETC., TO ENSURE A HIGH AVAILABLE DATA CENTRE. IT WILL ALSO ADDRESS KEY OPERATIONS AND MAINTENANCE ASPECTS. THE DATA CENTRE, IT?S IMPORTANCE AND CAUSES FOR DOWNTIME DATA CENTRE STANDARDS AND BEST PRACTICES DATA CENTRE LOCATION, BUILDING AND CONSTRUCTION * Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup RAISED FLOOR/SUSPENDED CEILING * Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements LIGHT * Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) POWER INFRASTRUCTURE * Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics ELECTRO MAGNETIC FIELDS * Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions EQUIPMENT RACKS * Rack standards, properties and selection criteria Security considerations Power rail/strip options COOLING INFRASTRUCTURE * Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment WATER SUPPLY * Importance of water supply and application areas Backup water supply techniques DESIGNING A SCALABLE NETWORK INFRASTRUCTURE * The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements FIRE SUPPRESSION * Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices DATA CENTRE MONITORING * Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations OPERATIONAL SECURITY AND SAFETY PRACTICES * Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage LABELLING * Choosing a labelling scheme Recommended labelling practices Network labelling DOCUMENTATION * How to setup proper documentation Document management policies and procedures CLEANING * Cleaning practices for the data centre MTBF/MTTR * Standards and definitions Calculation models The ?real? value MAINTENANCE CONTRACTS/SLA/OLA EXAM: CERTIFIED DATA CENTRE PROFESSIONAL ADDITIONAL COURSE DETAILS: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Professional (CDCP)
Delivered Online3 days, May 13th, 07:00 + 6 more
£1500

CompTIA Security+

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR PEOPLE WHO ARE SEEKING TO LAUNCH A CAREER IN CYBERSECURITY. OVERVIEW ASSESS THE SECURITY POSTURE OF AN ENTERPRISE ENVIRONMENT AND RECOMMEND AND IMPLEMENT APPROPRIATE SECURITY SOLUTIONS; MONITOR AND SECURE HYBRID ENVIRONMENTS, INCLUDING CLOUD, MOBILE, AND IOT; OPERATE WITH AN AWARENESS OF APPLICABLE LAWS AND POLICIES, INCLUDING PRINCIPLES OF GOVERNANCE, RISK, AND COMPLIANCE; IDENTIFY, ANALYZE, AND RESPOND TO SECURITY EVENTS AND INCIDENTS. DESCRIPTION COMPTIA SECURITY+ IS A GLOBAL CERTIFICATION THAT VALIDATES THE BASELINE SKILLS NECESSARY TO PERFORM CORE SECURITY FUNCTIONS AND IS THE FIRST SECURITY CERTIFICATION A CANDIDATE SHOULD EARN. COMPTIA SECURITY+ ESTABLISHES THE CORE KNOWLEDGE REQUIRED OF ANY CYBERSECURITY ROLE AND PROVIDES A SPRINGBOARD TO INTERMEDIATE-LEVEL CYBERSECURITY JOBS. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online6 days, May 13th, 13:00 + 27 more
£2475

55340 Developing ASP.NET Core Web Applications

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR PROFESSIONAL WEB DEVELOPERS WHO USE MICROSOFT VISUAL STUDIO IN AN INDIVIDUAL-BASED OR TEAM-BASED, SMALL-SIZED TO LARGE DEVELOPMENT ENVIRONMENT. CANDIDATES FOR THIS COURSE ARE INTERESTED IN DEVELOPING ADVANCED WEB APPLICATIONS AND WANT TO MANAGE THE RENDERED HTML COMPREHENSIVELY. THEY WANT TO CREATE WEBSITES THAT SEPARATE THE USER INTERFACE, DATA ACCESS, AND APPLICATION LOGIC. OVERVIEW DESCRIBE THE MICROSOFT WEB TECHNOLOGIES STACK AND SELECT AN APPROPRIATE TECHNOLOGY TO USE TO DEVELOP ANY GIVEN APPLICATION. DESIGN THE ARCHITECTURE AND IMPLEMENTATION OF A WEB APPLICATION THAT WILL MEET A SET OF FUNCTIONAL REQUIREMENTS, USER INTERFACE REQUIREMENTS, AND ADDRESS BUSINESS MODELS. CONFIGURE THE PIPELINE OF ASP.NET CORE WEB APPLICATIONS USING MIDDLEWARE, AND LEVERAGE DEPENDENCY INJECTION ACROSS APPLICATIONS. DEVELOP A WEB APPLICATION THAT USES THE ASP.NET CORE ROUTING ENGINE TO PRESENT FRIENDLY URLS AND A LOGICAL NAVIGATION HIERARCHY TO USERS. CREATE VIEWS IN AN APPLICATION THAT DISPLAY AND EDIT DATA AND INTERACT WITH MODELS AND CONTROLLERS. CONNECT AN ASP.NET CORE APPLICATION TO A DATABASE USING ENTITY FRAMEWORK CORE. IMPLEMENT A CONSISTENT LOOK AND FEEL ACROSS AN ENTIRE WEB APPLICATION. WRITE JAVASCRIPT CODE THAT RUNS ON THE CLIENT-SIDE AND UTILIZES THE JQUERY SCRIPT LIBRARY TO OPTIMIZE THE RESPONSIVENESS OF AN WEB APPLICATION. ADD CLIENT SIDE PACKAGES AND CONFIGURE TASK RUNNERS. RUN UNIT TESTS AND DEBUGGING TOOLS AGAINST A WEB APPLICATION IN VISUAL STUDIO 2022. WRITE AN APPLICATION THAT AUTHENTICATES AND AUTHORIZES USERS TO ACCESS CONTENT SECURELY USING IDENTITY. BUILD AN APPLICATION THAT RESISTS MALICIOUS ATTACKS. USE CACHING TO ACCELERATE RESPONSES TO USER REQUESTS. USE SIGNALR TO ENABLE TWO-WAY COMMUNICATION BETWEEN CLIENT AND SERVER. DESCRIBE WHAT A WEB API IS AND WHY DEVELOPERS MIGHT ADD A WEB API TO AN APPLICATION. DESCRIBE HOW TO PACKAGE AND DEPLOY AN ASP.NET CORE WEB APPLICATION FROM A DEVELOPMENT COMPUTER TO A WEB SERVER. DESCRIPTION IN THIS 5-DAY COURSE, PROFESSIONAL WEB DEVELOPERS WILL LEARN TO DEVELOP ADVANCED ASP.NET CORE APPLICATIONS USING .NET TOOLS AND TECHNOLOGIES. THE FOCUS WILL BE ON CODING ACTIVITIES THAT ENHANCE THE PERFORMANCE AND SCALABILITY OF THE WEB SITE APPLICATION. MODULE 1: EXPLORING ASP.NET CORE * Introducing of Microsoft Web Technologies * Getting Started with Razor Pages in ASP.NET Core * Introducing ASP.NET Core MVC MODULE 2: DESIGNING ASP.NET CORE MVC WEB APPLICATIONS * Planning in the Project Design Phase * Designing Models, Controllers and Views MODULE 3: CONFIGURE MIDDLEWARE AND SERVICES IN ASP.NET CORE * Configuring Middlewares * Configuring Services MODULE 4: DEVELOPING CONTROLLERS * Writing Controllers and Actions * Configuring Routes * Writing Action Filters MODULE 5: DEVELOPING VIEWS * Creating Views with Razor Syntax * Using HTML Helpers and Tag Helpers * Reusing Code in Views MODULE 6: DEVELOPING MODELS * Creating MVC Models * Working with Forms * Validating User Input MODULE 7: USING ENTITY FRAMEWORK CORE IN ASP.NET CORE * Introduction to Entity Framework Core * Working with Entity Framework Core * Use Entity Framework Core to connect to Microsoft SQL Server MODULE 8: USING LAYOUTS, CSS AND JAVASCRIPT IN ASP.NET CORE * Using Layouts * Using CSS and JavaScript * Using JavaScript Libraries MODULE 9: CLIENT-SIDE DEVELOPMENT * Applying Styles and Responsive Design * Using Task Runners * Looking at ASP.NET Core Blazor MODULE 10: TESTING AND TROUBLESHOOTING * Testing ASP.NET Core Applications * Implementing an Exception Handling Strategy * Logging ASP.NET Core Applications MODULE 11: MANAGING SECURITY * Authentication in ASP.NET Core * Authorization in ASP.NET Core * Defending from Common Attack MODULE 12: PERFORMANCE AND COMMUNICATION IMPLEMENTING A CACHING STRATEGY * Managing State * Supporting Two-way Communication MODULE 13: IMPLEMENTING WEB APIS * Introducing Web APIs * Developing a Web API * Calling a Web API MODULE 14: HOSTING AND DEPLOYMENT * Hosting and Deploying On-premises * Deploying to Microsoft Azure * Looking at Microsoft Azure Fundamentals

55340 Developing ASP.NET Core Web Applications
Delivered Online6 days, May 13th, 13:00 + 2 more
£2975

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED PRIMARILY FOR CYBERSECURITY PRACTITIONERS PREPARING FOR OR WHO CURRENTLY PERFORM JOB FUNCTIONS RELATED TO PROTECTING INFORMATION SYSTEMS BY ENSURING THEIR AVAILABILITY, INTEGRITY, AUTHENTICATION, CONFIDENTIALITY, AND NON-REPUDIATION. IT IS IDEAL FOR THOSE ROLES WITHIN FEDERAL CONTRACTING COMPANIES AND PRIVATE SECTOR FIRMS WHOSE MISSION OR STRATEGIC OBJECTIVES REQUIRE THE EXECUTION OF DEFENSIVE CYBER OPERATIONS (DCO) OR DOD INFORMATION NETWORK (DODIN) OPERATION AND INCIDENT HANDLING. THIS COURSE FOCUSES ON THE KNOWLEDGE, ABILITY, AND SKILLS NECESSARY TO PROVIDE FOR THE DEFENSE OF THOSE INFORMATION SYSTEMS IN A CYBERSECURITY CONTEXT, INCLUDING PROTECTION, DETECTION, ANALYSIS, INVESTIGATION, AND RESPONSE PROCESSES. OVERVIEW IN THIS COURSE, YOU WILL IDENTIFY, ASSESS, RESPOND TO, AND PROTECT AGAINST SECURITY THREATS AND OPERATE A SYSTEM AND NETWORK SECURITY ANALYSIS PLATFORM. YOU WILL: ASSESS CYBERSECURITY RISKS TO THE ORGANIZATION. ANALYZE THE THREAT LANDSCAPE. ANALYZE VARIOUS RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS. ANALYZE VARIOUS ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS. ANALYZE VARIOUS POST-ATTACK TECHNIQUES. ASSESS THE ORGANIZATION'S SECURITY POSTURE THROUGH AUDITING, VULNERABILITY MANAGEMENT, AND PENETRATION TESTING. COLLECT CYBERSECURITY INTELLIGENCE FROM VARIOUS NETWORK-BASED AND HOST-BASED SOURCES. ANALYZE LOG DATA TO REVEAL EVIDENCE OF THREATS AND INCIDENTS. PERFORM ACTIVE ASSET AND NETWORK ANALYSIS TO DETECT INCIDENTS. RESPOND TO CYBERSECURITY INCIDENTS USING CONTAINMENT, MITIGATION, AND RECOVERY TACTICS. INVESTIGATE CYBERSECURITY INCIDENTS USING FORENSIC ANALYSIS TECHNIQUES. DESCRIPTION THIS COURSE COVERS NETWORK DEFENSE AND INCIDENT RESPONSE METHODS, TACTICS, AND PROCEDURES THAT ARE IN ALIGNMENT WITH INDUSTRY FRAMEWORKS SUCH AS NIST 800-61R2 (COMPUTER SECURITY INCIDENT HANDLING GUIDE), US-CERT'S NATIONAL CYBER INCIDENT RESPONSE PLAN (NCIRP), AND PRESIDENTIAL POLICY DIRECTIVE (PPD)-41 ON CYBER INCIDENT COORDINATION. IT IS IDEAL FOR CANDIDATES WHO HAVE BEEN TASKED WITH THE RESPONSIBILITY OF MONITORING AND DETECTING SECURITY INCIDENTS IN INFORMATION SYSTEMS AND NETWORKS, AND FOR EXECUTING STANDARDIZED RESPONSES TO SUCH INCIDENTS. THE COURSE INTRODUCES TOOLS, TACTICS, AND PROCEDURES TO MANAGE CYBERSECURITY RISKS, DEFEND CYBERSECURITY ASSETS, IDENTIFY VARIOUS TYPES OF COMMON THREATS, EVALUATE THE ORGANIZATION'S SECURITY, COLLECT AND ANALYZE CYBERSECURITY INTELLIGENCE, AND REMEDIATE AND REPORT INCIDENTS AS THEY OCCUR. THIS COURSE PROVIDES A COMPREHENSIVE METHODOLOGY FOR INDIVIDUALS RESPONSIBLE FOR DEFENDING THE CYBERSECURITY OF THEIR ORGANIZATION. THIS COURSE IS DESIGNED TO ASSIST STUDENTS IN PREPARING FOR THE CERTNEXUS CYBERSEC FIRST RESPONDER (EXAM CFR-410) CERTIFICATION EXAMINATION. WHAT YOU LEARN AND PRACTICE IN THIS COURSE CAN BE A SIGNIFICANT PART OF YOUR PREPARATION. IN ADDITION, THIS COURSE AND SUBSEQUENT CERTIFICATION (CFR-410) MEET ALL REQUIREMENTS FOR PERSONNEL REQUIRING DOD DIRECTIVE 8570.01-M POSITION CERTIFICATION BASELINES: CSSP ANALYST CSSP INFRASTRUCTURE SUPPORT CSSP INCIDENT RESPONDER CSSP AUDITOR THE COURSE AND CERTIFICATION ALSO MEET ALL CRITERIA FOR THE FOLLOWING CYBERSECURITY MATURITY MODEL CERTIFICATION (CMMC) DOMAINS: INCIDENT RESPONSE (IR) AUDIT AND ACCOUNTABILITY (AU) RISK MANAGEMENT (RM) LESSON 1: ASSESSING CYBERSECURITY RISK * Topic A: Identify the Importance of Risk Management * Topic B: Assess Risk * Topic C: Mitigate Risk * Topic D: Integrate Documentation into Risk Management LESSON 2: ANALYZING THE THREAT LANDSCAPE * Topic A: Classify Threats * Topic B: Analyze Trends Affecting Security Posture LESSON 3: ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS * Topic A: Implement Threat Modeling * Topic B: Assess the Impact of Reconnaissance * Topic C: Assess the Impact of Social Engineering LESSON 4: ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS * Topic A: Assess the Impact of System Hacking Attacks * Topic B: Assess the Impact of Web-Based Attacks * Topic C: Assess the Impact of Malware * Topic D: Assess the Impact of Hijacking and Impersonation Attacks * Topic E: Assess the Impact of DoS Incidents * Topic F: Assess the Impact of Threats to Mobile Security * Topic G: Assess the Impact of Threats to Cloud Security LESSON 5: ANALYZING POST-ATTACK TECHNIQUES * Topic A: Assess Command and Control Techniques * Topic B: Assess Persistence Techniques * Topic C: Assess Lateral Movement and Pivoting Techniques * Topic D: Assess Data Exfiltration Techniques * Topic E: Assess Anti-Forensics Techniques LESSON 6: ASSESSING THE ORGANIZATION'S SECURITY POSTURE * Topic A: Implement Cybersecurity Auditing * Topic B: Implement a Vulnerability Management Plan * Topic C: Assess Vulnerabilities * Topic D: Conduct Penetration Testing LESSON 7: COLLECTING CYBERSECURITY INTELLIGENCE * Topic A: Deploy a Security Intelligence Collection and Analysis Platform * Topic B: Collect Data from Network-Based Intelligence Sources * Topic C: Collect Data from Host-Based Intelligence Sources LESSON 8: ANALYZING LOG DATA * Topic A: Use Common Tools to Analyze Logs * Topic B: Use SIEM Tools for Analysis LESSON 9: PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS * Topic A: Analyze Incidents with Windows-Based Tools * Topic B: Analyze Incidents with Linux-Based Tools * Topic C: Analyze Indicators of Compromise LESSON 10: RESPONDING TO CYBERSECURITY INCIDENTS * Topic A: Deploy an Incident Handling and Response Architecture * Topic B: Mitigate Incidents * Topic C: Hand Over Incident Information to a Forensic Investigation LESSON 11: INVESTIGATING CYBERSECURITY INCIDENTS * Topic A: Apply a Forensic Investigation Plan * Topic B: Securely Collect and Analyze Electronic Evidence * Topic C: Follow Up on the Results of an Investigation ADDITIONAL COURSE DETAILS: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered Online6 days, May 13th, 13:00 + 2 more
£3495

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR THIS FOUR-DAY COURSE IS INTENDED FOR WINDOWS SERVER HYBRID ADMINISTRATORS WHO HAVE EXPERIENCE WORKING WITH WINDOWS SERVER AND WANT TO EXTEND THE CAPABILITIES OF THEIR ON-PREMISES ENVIRONMENTS BY COMBINING ON-PREMISES AND HYBRID TECHNOLOGIES. WINDOWS SERVER HYBRID ADMINISTRATORS WHO ALREADY IMPLEMENT AND MANAGE ON-PREMISES CORE TECHNOLOGIES WANT TO SECURE AND PROTECT THEIR ENVIRONMENTS, MIGRATE VIRTUAL AND PHYSICAL WORKLOADS TO AZURE IAAS, ENABLE A HIGHLY AVAILABLE, FULLY REDUNDANT ENVIRONMENT, AND PERFORM MONITORING AND TROUBLESHOOTING. DESCRIPTION THIS COURSE TEACHES IT PROFESSIONALS TO CONFIGURE ADVANCED WINDOWS SERVER SERVICES USING ON-PREMISES, HYBRID, AND CLOUD TECHNOLOGIES. THE COURSE TEACHES IT PROFESSIONALS HOW TO LEVERAGE THE HYBRID CAPABILITIES OF AZURE, HOW TO MIGRATE VIRTUAL AND PHYSICAL SERVER WORKLOADS TO AZURE IAAS, AND HOW TO SECURE AZURE VMS RUNNING WINDOWS SERVER. THE COURSE ALSO TEACHES IT PROFESSIONALS HOW TO PERFORM TASKS RELATED TO HIGH AVAILABILITY, TROUBLESHOOTING, AND DISASTER RECOVERY. THE COURSE HIGHLIGHTS ADMINISTRATIVE TOOLS AND TECHNOLOGIES INCLUDING WINDOWS ADMIN CENTER, POWERSHELL, AZURE ARC, AZURE AUTOMATION UPDATE MANAGEMENT, MICROSOFT DEFENDER FOR IDENTITY, AZURE SECURITY CENTER, AZURE MIGRATE, AND AZURE MONITOR. PREREQUISITES AN UNDERSTANDING OF THE FOLLOWING CONCEPTS AS RELATED TO WINDOWS SERVER TECHNOLOGIES: HIGH AVAILABILITY AND DISASTER RECOVERY AUTOMATION MONITORING TROUBLESHOOTING 1 - SECURE WINDOWS SERVER USER ACCOUNTS * Configure user account rights * Protect user accounts with the Protected Users group * Describe Windows Defender Credential Guard * Block NTLM authentication * Locate problematic accounts 2 - HARDENING WINDOWS SERVER * Describe Local Password Administrator Solution * Configure Privileged Access Workstations * Secure domain controllers * Analyze security configuration with Security Compliance Toolkit * Secure SMB traffic 3 - WINDOWS SERVER UPDATE MANAGEMENT * Explore Windows Update * Outline Windows Server Update Services server deployment options * Define Windows Server Update Services update management process * Describe the process of Update Management 4 - SECURE WINDOWS SERVER DNS * Implement split-horizon DNS * Create DNS policies * Implement DNS policies * Secure Windows Server DNS * Implement DNSSEC 5 - IMPLEMENT WINDOWS SERVER IAAS VM NETWORK SECURITY * Implement network security groups and Windows IaaS VMs * Implement adaptive network hardening * Implement Azure Firewall and Windows IaaS VMs * Implement Windows firewall with Windows Server IaaS VMs * Choose the appropriate filtering solution * Deploy and configure Azure firewall using the Azure portal * Capture network traffic with network watcher * Log network traffic to and from a VM using the Azure portal 6 - AUDIT THE SECURITY OF WINDOWS SERVER IAAS VIRTUAL MACHINES * Describe Azure Security Center * Enable Azure Security Center in hybrid environments * Implement and assess security policies * Protect your resources with Azure Security Center * Implement Azure Sentinel 7 - MANAGE AZURE UPDATES * Describe update management * Enable update management * Deploy updates * View update assessments * Manage updates for your Azure Virtual Machines 8 - CREATE AND IMPLEMENT APPLICATION ALLOWLISTS WITH ADAPTIVE APPLICATION CONTROL * Describe adaptive application control * Implement adaptive application control policies 9 - CONFIGURE BITLOCKER DISK ENCRYPTION FOR WINDOWS IAAS VIRTUAL MACHINES * Describe Azure Disk Encryption and server-side encryption * Configure Key Vault for Azure Disk Encryption * Encrypt Azure IaaS Virtual Machine hard disks * Back up and recover data from encrypted disks * Create and encrypt a Windows Virtual Machine 10 - IMPLEMENT CHANGE TRACKING AND FILE INTEGRITY MONITORING FOR WINDOWS IAAS VMS * Implement Change Tracking and Inventory * Manage Change Tracking and Inventory * Manage tracked files * Implement File Integrity Monitoring * Select and monitor entities * Use File Integrity Monitoring 11 - INTRODUCTION TO CLUSTER SHARED VOLUMES * Determine the functionality of Cluster Shared Volumes * Explore the architecture and components of Cluster Shared Volumes * Implement Cluster Shared Volumes 12 - IMPLEMENT WINDOWS SERVER FAILOVER CLUSTERING * Define Windows Server failover clustering * Plan Windows Server failover clustering * Implement Windows Server failover clustering * Manage Windows Server failover clustering * Implement stretch clusters * Define cluster sets 13 - IMPLEMENT HIGH AVAILABILITY OF WINDOWS SERVER VMS * Select high-availability options for Hyper-V * Consider network load balancing for Hyper-V VMs * Implement Hyper-V VM live migration * Implement Hyper-V VMs storage migration 14 - IMPLEMENT WINDOWS SERVER FILE SERVER HIGH AVAILABILITY * Explore the Windows Server File Server high-availability options * Define Cluster Shared Volumes * Implement Scale-Out File Server * Implement Storage Replica 15 - IMPLEMENT SCALE AND HIGH AVAILABILITY WITH WINDOWS SERVER VM * Describe virtual machine scale sets * Implement scaling * Implement load-balancing VMs * Create a virtual machine scale set in the Azure portal * Describe Azure Site Recovery * Implement Azure Site Recovery 16 - IMPLEMENT HYPER-V REPLICA * Define Hyper-V Replica * Plan for Hyper-V Replica * Configure and implement Hyper-V Replica * Define extended replication * Define Azure Site Recovery * Implement Site Recovery from on-premises site to Azure * Implement Site Recovery from on-premises site to on-premises site 17 - PROTECT YOUR ON-PREMISES INFRASTRUCTURE FROM DISASTERS WITH AZURE SITE RECOVERY * Azure Site Recovery overview * Workloads supported for protection with Azure Site Recovery * Run a disaster recovery drill * Failover and failback 18 - IMPLEMENT HYBRID BACKUP AND RECOVERY WITH WINDOWS SERVER IAAS * Describe Azure Backup * Implement recovery vaults * Implement Azure Backup policies * Recover Windows IaaS Virtual Machines * Perform file and folder recovery * Perform backup and restore of on-premises workloads * Manage Azure Virtual Machine backups with Azure Backup service 19 - PROTECT YOUR AZURE INFRASTRUCTURE WITH AZURE SITE RECOVERY * What is Azure Site Recovery * Prepare for disaster recovery with Azure Site Recovery * Run a disaster recovery drill * Failover and failback using Azure Site Recovery 20 - PROTECT YOUR VIRTUAL MACHINES BY USING AZURE BACKUP * Azure Backup features and scenarios * Back up an Azure virtual machine by using Azure Backup * Restore virtual machine data 21 - ACTIVE DIRECTORY DOMAIN SERVICES MIGRATION * Examine upgrade vs. migration * Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 * Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version * Explore the Active Directory Migration Tool 22 - MIGRATE FILE SERVER WORKLOADS USING STORAGE MIGRATION SERVICE * Storage Migration Service overview and usage scenarios * Storage migration requirements * Migrate a server with Storage migration * Evaluate storage migration considerations 23 - MIGRATE WINDOWS SERVER ROLES * Describe the Windows Server Migration Tools * Install the Migration Tools * Migrate roles using the Migration Tools 24 - MIGRATE ON-PREMISES WINDOWS SERVER INSTANCES TO AZURE IAAS VIRTUAL MACHINES * Plan your migration * Describe Azure Migrate * Perform server assessment * Assess physical servers with Azure Migrate * Migrate Windows Server workloads by using Azure Migrate 25 - UPGRADE AND MIGRATE WINDOWS SERVER IAAS VIRTUAL MACHINES * Describe Azure Migrate * Migrate Windows Server workloads by using Azure Migrate * Describe storage migration * Migrate file servers by using Storage Migration Service 26 - CONTAINERIZE AND MIGRATE ASP.NET APPLICATIONS TO AZURE APP SERVICE * Azure Migrate App Containerization overview 27 - MONITOR WINDOWS SERVER PERFORMANCE * Use Performance Monitor to identify performance problems * Use Resource Monitor to review current resource usage * Review reliability with Reliability Monitor * Implement a performance monitoring methodology * Use Data Collector Sets to analyze server performance * Monitor network infrastructure services * Monitor virtual machines running Windows Server * Monitor performance with Windows Admin Center * Use System Insights to help predict future capacity issues * Optimize the performance of Windows Server 28 - MANAGE AND MONITOR WINDOWS SERVER EVENT LOGS * Describe Windows Server event logs * Use Windows Admin Center to review logs * Use Server Manager to review logs * Use custom views * Implement event log subscriptions 29 - IMPLEMENT WINDOWS SERVER AUDITING AND DIAGNOSTICS * Describe basic auditing categories * Describe advanced categories * Log user access * Enable setup and boot event collection 30 - TROUBLESHOOT ACTIVE DIRECTORY * Recover objects from the AD recycle bin * Recover the AD DS database * Recover SYSVOL * Troubleshoot AD DS replication * Troubleshoot hybrid authentication issues 31 - MONITOR WINDOWS SERVER IAAS VIRTUAL MACHINES AND HYBRID INSTANCES * Enable Azure Monitor for Virtual Machines * Monitor an Azure Virtual Machine with Azure Monitor * Enable Azure Monitor in hybrid scenarios * Collect data from a Windows computer in a hybrid environment * Integrate Azure Monitor with Microsoft Operations Manager 32 - MONITOR YOUR AZURE VIRTUAL MACHINES WITH AZURE MONITOR * Monitoring for Azure VMs * Monitor VM host data * Use Metrics Explorer to view detailed host metrics * Collect client performance counters by using VM insights * Collect VM client event logs 33 - TROUBLESHOOT ON-PREMISES AND HYBRID NETWORKING * Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered Online5 days, May 13th, 13:00 + 3 more
£2380

55354 Administering Office 365

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR IT PROFESSIONALS WHO ARE RESPONSIBLE FOR PLANNING, CONFIGURING, AND MANAGING AN OFFICE 365 ENVIRONMENT. STUDENTS WHO ATTEND THIS COURSE ARE EXPECTED TO HAVE A FAIRLY BROAD UNDERSTANDING OF SEVERAL ON-PREMISES TECHNOLOGIES SUCH AS DOMAIN NAME SYSTEM (DNS) AND ACTIVE DIRECTORY DOMAIN SERVICES (AD DS). IN ADDITION, THEY SHOULD HAVE A GENERAL UNDERSTANDING OF MICROSOFT EXCHANGE SERVER, MICROSOFT TEAMS, AND MICROSOFT SHAREPOINT. OVERVIEW PLAN AND PROVISION OFFICE 365 MANAGE USERS AND GROUPS IN OFFICE 365 DEPLOY AND CONFIGURE TOOLS AND APPLICATIONS FOR OFFICE 365 PLAN AND MANAGE EXCHANGE ONLINE PLAN AND MANAGE SHAREPOINT ONLINE PLAN AND MANAGE MICROSOFT TEAMS PLAN AND MANAGE OTHER OFFICE 365 SERVICES IMPLEMENT SECURITY AND COMPLIANCE IN OFFICE 365 REPORT, MONITOR AND TROUBLESHOOT OFFICE 365 DESCRIPTION THIS FIVE-DAY COURSE DESCRIBES HOW TO SET UP, CONFIGURE AND MANAGE AN OFFICE 365 TENANT INCLUDING IDENTITIES, AND THE CORE SERVICES OF MICROSOFT 365. IN THIS FIVE-DAY COURSE, YOU WILL LEARN HOW TO PLAN THE CONFIGURATION OF AN OFFICE 365 TENANT INCLUDING INTEGRATION WITH EXISTING USER IDENTITIES; PLAN, CONFIGURE AND MANAGE CORE SERVICES; AND REPORT ON KEY METRICS. ALTHOUGH THIS COURSE AND THE ASSOCIATED LABS ARE WRITTEN FOR OFFICE 365 WITH WINDOWS 11, THE SKILLS TAUGHT WILL ALSO BE BACKWARDS COMPATIBLE WITH WINDOWS 10. THIS COURSE IS BASED ON THE FEATURES AVAILABLE IN THE OFFICE 365 E3 LICENSE AS THESE ARE THE CORE FEATURES IN OFFICE 365 AND MICROSOFT 365 PLANS. 1 - PLANNING AND PROVISIONING OFFICE 365 * Overview of Office 365 * Core Services of Office 365 * Requirements for an Office 365 Tenant * Planning a Pilot and Deployment * Creating an Office 365 Tenant * Adding Custom Domains and Managing DNS Settings * Lab: Provisioning Office 365 2 - MANAGING USERS AND GROUPS IN OFFICE 365 * Managing User Accounts and Licences * Managing Passwords and Authentication * Create and Managing the Different Types of Groups in Office 365 * Managing Users and Groups with PowerShell * Managing Users and Groups in the Azure AD Admin Center * Role Based Access and Administrative Roles * Planning and Configuring Directory Synchronization * Lab: Managing Users and Groups in Office 365 * Lab: Planning and Configuring Directory Synchronisation 3 - DEPLOYING AND CONFIGURING TOOLS AND APPLICATIONS FOR OFFICE 365 * Planning Network Configuration for Office 365 Tools and Applications * Using the Office Configuration Tool * Click to Run Installation Use and Control * Managing Centralized Deployment of Tools, Applications and Add-ins * Reporting * Lab: Deploying and Configuring Tools and Applications for Office 365 4 - PLANNING AND MANAGING EXCHANGE ONLINE * What is Exchange Online * Managing Exchange Online Mailboxes * Managing Office 365 Groups in Exchange Online * Configuring Exchange Online Permissions * Managing Exchange Online using PowerShell * Plan and Configure Mail Flow * Plan and Configure Email Protection * Lab: Planning and Managing Exchange Online 5 - PLANNING AND MANAGING SHAREPOINT ONLINE * What is SharePoint Online * Understanding the relationship between SharePoint, OneDrive, Teams, and Office 365 Groups * SharePoint Online Architecture * Configure SharePoint Online * Configure and Control External Sharing * Managing SharePoint Online Site Collections * Managing SharePoint Online using PowerShell * Lab: Planning and Managing SharePoint Online 6 - PLANNING AND MANAGING MICROSOFT TEAMS * What is Microsoft Teams * How Microsoft Teams integrates with other Office 365 Services * Create and Manage Organization Wide Settings * Create, Manage and Assign Microsoft Teams Policies * Plan and Configure External and Guest Access * Managing Microsoft Teams using PowerShell * Lab: Planning and Managing Microsoft Teams 7 - PLANNING AND MANAGING OTHER OFFICE 365 SERVICES * Yammer * Planner * Visio * Bookings * Delve * Forms * Power Platform * Stream * Sway * Viva * Scheduler * Add-ins, including Find Time and Junk Reporter * Lab: Planning and Managing Office 365 Services 8 - SECURITY AND COMPLIANCE IN OFFICE 365 * Overview of Security and Compliance Features in Office 365 * Extending Security and compliance Features with Additional Licences * Using the Microsoft Defender Portal and Secure Score * Using the Office 365 Compliance Portal and Compliance Score * Plan and Configure Retention Labels and Policies * Plan and Configure Data Loss Prevention Policies * Create and Assign Sensitivity Labels * Configure Safe Attachments and Safe Links Policies * Plan and Configure Multi Factor Authentication * Lab: Configure Security and Compliance in Office 365 9 - REPORTING, MONITORING AND TROUBLESHOOTING OFFICE 365 * Monitoring Office 365 Service Health * Troubleshooting Administrative Access in Office 365 * Troubleshoot Directory Synchronization * Troubleshooting Exchange Online * Troubleshooting SharePoint Online * Troubleshooting Microsoft Teams * Troubleshooting Office 365 Security and Compliance * Lab: Reporting, Monitoring and Troubleshooting in Office 365

55354 Administering Office 365
Delivered Online5 days, May 13th, 15:00 + 4 more
£2975

AZ-040T00 Automating Administration with Powershell

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR IT PROFESSIONALS WHO ARE ALREADY EXPERIENCED IN GENERAL WINDOWS SERVER, WINDOWS CLIENT, AZURE, AND MICROSOFT 365 ADMINISTRATION, AND WHO WANT TO LEARN MORE ABOUT USING WINDOWS POWERSHELL FOR ADMINISTRATION. NO PRIOR EXPERIENCE WITH ANY VERSION OF POWERSHELL OR ANY SCRIPTING LANGUAGE IS ASSUMED. THIS COURSE IS ALSO SUITABLE FOR IT PROFESSIONALS ALREADY EXPERIENCED IN SERVER ADMINISTRATION, INCLUDING MICROSOFT EXCHANGE SERVER, MICROSOFT SHAREPOINT SERVER, AND MICROSOFT SQL SERVER. DESCRIPTION THIS COURSE PROVIDES STUDENTS WITH THE FUNDAMENTAL KNOWLEDGE AND SKILLS TO USE POWERSHELL FOR ADMINISTERING AND AUTOMATING ADMINISTRATION OF WINDOWS SERVERS. THIS COURSE PROVIDES STUDENTS THE SKILLS TO IDENTIFY AND BUILD THE COMMAND THEY REQUIRE TO PERFORM A SPECIFIC TASK. IN ADDITION, STUDENTS LEARN HOW TO BUILD SCRIPTS TO ACCOMPLISH ADVANCED TASKS SUCH AS AUTOMATING REPETITIVE TASKS AND GENERATING REPORTS. THIS COURSE PROVIDES PREREQUISITE SKILLS SUPPORTING A BROAD RANGE OF MICROSOFT PRODUCTS, INCLUDING WINDOWS SERVER, WINDOWS CLIENT, MICROSOFT AZURE, AND MICROSOFT 365. IN KEEPING WITH THAT GOAL, THIS COURSE WILL NOT FOCUS ON ANY ONE OF THOSE PRODUCTS, ALTHOUGH WINDOWS SERVER, WHICH IS THE COMMON PLATFORM FOR ALL OF THOSE PRODUCTS, WILL SERVE AS THE EXAMPLE FOR THE TECHNIQUES THIS COURSE TEACHES. PREREQUISITES BEFORE ATTENDING THIS COURSE, STUDENTS MUST HAVE: * -EXPERIENCE WITH WINDOWS NETWORKING TECHNOLOGIES AND IMPLEMENTATION. * - EXPERIENCE WITH WINDOWS SERVER ADMINISTRATION, MAINTENANCE, AND TROUBLESHOOTING. 1 - REVIEW WINDOWS POWERSHELL * Learn about Windows PowerShell * Get familiar with Windows PowerShell applications * Identify factors to install and use Windows PowerShell * Configure the Windows PowerShell console * Configure the Windows PowerShell Integrated Scripting Environment (ISE) * Use Visual Studio Code with PowerShell 2 - UNDERSTAND THE COMMAND SYNTAX IN WINDOWS POWERSHELL * Discover the structure of PowerShell cmdlets * Discover the parameters for using PowerShell cmdlets * Review the tab completion feature in PowerShell * Display the About files content in PowerShell 3 - FIND COMMANDS AND GET-HELP IN WINDOWS POWERSHELL * Define modules in PowerShell * Find cmdlets in PowerShell * Use command aliases in PowerShell * Use Show-Command and Get-Help in PowerShell * Interpret the help file contents and update the local help content in PowerShell 4 - MANAGE ACTIVE DIRECTORY DOMAIN SERVICES USING POWERSHELL CMDLETS * Manage user accounts in PowerShell * Manage groups and group memberships in PowerShell * Manage computer accounts in PowerShell * Manage organizational units and Active Directory objects in PowerShell 5 - MANAGE NETWORK SERVICE SETTINGS FOR WINDOWS DEVICES USING POWERSHELL CMDLETS * Manage IP addresses in PowerShell * Manage IP routing in PowerShell * Manage DNS clients in PowerShell * Manage Windows Firewall settings in PowerShell 6 - MANAGE WINDOWS SERVER SETTINGS USING POWERSHELL CMDLETS * Automate management tasks using the Group Policy management cmdlets * Manage server roles and services using PowerShell cmdlets * Manage Hyper-V Virtual Machines using PowerShell cmdlets * Manage Internet Information Services using PowerShell cmdlets 7 - MANAGE SETTINGS FOR A LOCAL WINDOWS MACHINE USING POWERSHELL CMDLETS * Manage Windows 10 using PowerShell * Manage permissions with PowerShell 8 - UNDERSTAND THE WINDOWS POWERSHELL PIPELINE * Review Windows PowerShell pipeline and its output * Discover object members in PowerShell * Control the formatting of pipeline output 9 - SELECT, SORT, AND MEASURE OBJECTS USING THE PIPELINE * Sort and group objects by property in the pipeline * Measure objects in the pipeline * Select a set of objects in the pipeline * Select object properties in the pipeline * Create and format calculated properties in the pipeline 10 - FILTER OBJECTS OUT OF THE PIPELINE * Learn about the comparison operators in PowerShell * Review basic filter syntax in the pipeline * Review advanced filter syntax in the pipeline * Optimize the filter performance in the pipeline 11 - ENUMERATE OBJECTS IN THE PIPELINE * Learn about enumerations in the pipeline * Review basic syntax to enumerate objects in the pipeline * Review advanced syntax to enumerate objects in the pipeline 12 - SEND AND PASS DATA AS OUTPUT FROM THE PIPELINE * Write pipeline data to a file * Convert pipeline objects to other forms of data representation in PowerShell * Control additional output options in PowerShell 13 - PASS PIPELINE OBJECTS * Pipeline parameter binding * Identify ByValue parameters * Pass data by using ByValue * Pass data by using ByPropertyName * Identify ByPropertyName parameters * Use manual parameters to override the pipeline * Use parenthetical commands * Expand property values 14 - CONNECT WITH DATA STORES USING POWERSHELL PROVIDERS * Define Windows PowerShell providers * Review the built-in providers in PowerShell * Access provider help in PowerShell 15 - USE POWERSHELL DRIVES IN POWERSHELL * Explain PowerShell drives in PowerShell * Use PowerShell drive cmdlets in PowerShell * Manage the file system in PowerShell * Manage the registry in PowerShell * Work with certificates in PowerShell * Work with other PowerShell drives in PowerShell 16 - REVIEW CIM AND WMI * Review architecture of CIM and WMI * Review repositories in CIM and WMI * Locate online class documentation by using CIM and WMI cmdlets 17 - QUERY CONFIGURATION INFORMATION BY USING CIM AND WMI * List local repository namespaces and classes by using CIM and WMI * Query instances by using commands and WMI Query Language * Connect to remote computers by using CIM and WMI cmdlets * Query repository classes from remote computers by using CIMSession objects 18 - QUERY AND MANIPULATE REPOSITORY OBJECTS BY USING CIM AND WMI METHODS * Discover methods of repository objects by using CIM and WMI * Locate class methods and documentation by using CIM and WMI * Invoke methods of repository objects by using CIM and WMI 19 - MANAGE VARIABLES IN WINDOWS POWERSHELL SCRIPTS * Define variables in Windows PowerShell scripts * Create variable names in Windows PowerShell scripts * Assign values and types to variables in Windows PowerShell scripts * Identify the methods and properties of variables in Windows PowerShell scripts * Use string variables and methods in Windows PowerShell scripts * Use date variables and methods in Windows PowerShell scripts 20 - WORK WITH ARRAYS AND HASH TABLES IN WINDOWS POWERSHELL SCRIPTS * Define an array in Windows PowerShell scripts * Work with array lists in Windows PowerShell scripts * Define hash tables in Windows PowerShell Scripts * Work with hash tables in Windows PowerShell scripts 21 - CREATE AND RUN SCRIPTS BY USING WINDOWS POWERSHELL * Review Windows PowerShell scripts * Modify scripts in the PowerShell Gallery * Create scripts using Windows PowerShell * Review the PowerShellGet module in Windows PowerShell * Run scripts and set the execution policy in Windows PowerShell * Review Windows PowerShell and AppLocker * Sign the scripts digitally in Windows PowerShell 22 - WORK WITH SCRIPTING CONSTRUCTS IN WINDOWS POWERSHELL * Review and use the ForEach loop in Windows PowerShell scripts * Review and use the If construct in Windows PowerShell scripts * Review and use the Switch construct in Windows PowerShell scripts * Review the For construct in Windows PowerShell scripts * Review other loop constructs in Windows PowerShell scripts * Review Break and Continue in Windows PowerShell scripts 23 - IMPORT DATA IN DIFFERENT FORMATS FOR USE IN SCRIPTS BY USING WINDOWS POWERSHELL CMDLETS * Use the Get-Content command in Windows PowerShell scripts * Use the Import-Csv cmdlet in Windows PowerShell scripts * Use the Import-Clixml cmdlet in Windows PowerShell scripts * Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - USE METHODS TO ACCEPT USER INPUTS IN WINDOWS POWERSHELL SCRIPTS * Identify values that might change in Windows PowerShell scripts * Use the Read-Host cmdlet in Windows PowerShell scripts * Use the Get-Credential cmdlet in Windows PowerShell scripts * Use the Out-GridView cmdlet in Windows PowerShell scripts * Pass parameters to a Windows PowerShell script 25 - TROUBLESHOOT SCRIPTS AND HANDLE ERRORS IN WINDOWS POWERSHELL * Interpret error messages generated for Windows PowerShell commands * Add output to Windows PowerShell scripts * Use breakpoints in Windows PowerShell scripts * Interpret error actions for Windows PowerShell commands 26 - USE FUNCTIONS AND MODULES IN WINDOWS POWERSHELL SCRIPTS * Review functions in Windows PowerShell scripts * Use variable scope in Windows PowerShell scripts * Create modules in Windows PowerShell scripts * Use the dot sourcing feature in Windows PowerShell 27 - MANAGE SINGLE AND MULTIPLE COMPUTERS BY USING WINDOWS POWERSHELL REMOTING * Review the remoting feature of Windows PowerShell * Compare remoting with remote connectivity * Review the remoting security feature of Windows PowerShell * Enable remoting by using Windows PowerShell * Use one-to-one remoting by using Windows PowerShell * Use one-to-many remoting by using Windows PowerShell * Compare remoting output with local output 28 - USE ADVANCED WINDOWS POWERSHELL REMOTING TECHNIQUES * Review common remoting techniques of Windows PowerShell * Send parameters to remote computers in Windows PowerShell * Set access protection to variables, aliases, and functions by using the scope modifier * Enable multi-hop remoting in Windows PowerShell 29 - MANAGE PERSISTENT CONNECTIONS TO REMOTE COMPUTERS BY USING WINDOWS POWERSHELL SESSIONS * Review persistent connections in Windows PowerShell * Create and manage persistent PSSessions by using Windows PowerShell * Disconnect PSSessions by using Windows PowerShell * Review the feature of implicit remoting in Windows PowerShell 30 - REVIEW AZURE POWERSHELL MODULE * Review Azure PowerShell * Review the benefits of the Azure PowerShell module * Install the Azure PowerShell module * Migrate Azure PowerShell from AzureRM to Azure * Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - REVIEW THE FEATURES AND TOOLS FOR AZURE CLOUD SHELL * Review the characteristics of Azure Cloud Shell * Review the features and tools of Azure Cloud Shell * Configure and experiment with Azure Cloud Shell 32 - MANAGE AZURE RESOURCES WITH WINDOWS POWERSHELL * Create a new Azure virtual machine by using Windows PowerShell commands * Manage Azure virtual machines by using Windows PowerShell commands * Manage Azure related storage by using Azure PowerShell * Manage Azure subscriptions by using Azure PowerShell 33 - MANAGE USERS, GROUPS, AND LICENSES IN MICROSOFT ENTRA ID BY USING WINDOWS POWERSHELL * Review benefits to manage Microsoft 365 services by using Windows PowerShell * Connect to the Microsoft 365 tenant by using Windows PowerShell * Manage users in Microsoft 365 by using Windows PowerShell * Manage groups in Microsoft 365 by using Windows PowerShell * Manage roles in Microsoft 365 by using Windows PowerShell * Manage licenses in Microsoft 365 by using Windows PowerShell 34 - MANAGE EXCHANGE ONLINE BY USING WINDOWS POWERSHELL * Connect to Exchange Online by using Windows PowerShell * Manage mailboxes in Exchange Online by using Windows PowerShell * Manage resources in Exchange Online by using Windows PowerShell * Manage admin roles in Exchange Online by using Windows PowerShell 35 - MANAGE SHAREPOINT ONLINE BY USING WINDOWS POWERSHELL * Install and connect to SharePoint Online Management Shell by using Windows PowerShell * Manage SharePoint Online users and groups by using Windows PowerShell * Manage SharePoint sites by using Windows PowerShell * Manage SharePoint Online external user sharing by using Windows PowerShell 36 - MANAGE MICROSOFT TEAMS BY USING WINDOWS POWERSHELL * Review Microsoft Teams PowerShell module * Install the Microsoft Teams PowerShell module * Manage teams with Microsoft Teams PowerShell module 37 - CREATE AND MANAGE BACKGROUND JOBS USING WINDOWS POWERSHELL * Define the types of background jobs in Windows PowerShell * Start remote jobs and CIM/WMI jobs in Windows PowerShell * Monitor jobs in Windows PowerShell * Retrieve results for running jobs in Windows PowerShell 38 - CREATE AND MANAGE SCHEDULED JOBS USING WINDOWS POWERSHELL * Create and run Windows PowerShell scripts as scheduled tasks * Define scheduled jobs in Windows PowerShell * Create job option and job trigger objects in Windows PowerShell * Create and register a scheduled job in Windows PowerShell * Retrieve the results from a scheduled job in Windows PowerShell

AZ-040T00 Automating Administration with Powershell
Delivered Online6 days, May 13th, 13:00 + 10 more
£2975

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR ANYONE SEEKING CCNA CERTIFICATION. THE COURSE ALSO PROVIDES FOUNDATIONAL KNOWLEDGE FOR ALL SUPPORT TECHNICIANS INVOLVED IN THE BASIC INSTALLATION, OPERATION, AND VERIFICATION OF CISCO NETWORKS. THE JOB ROLES BEST SUITED TO THE MATERIAL IN THIS COURSE ARE: ENTRY-LEVEL NETWORK ENGINEER NETWORK ADMINISTRATOR NETWORK SUPPORT TECHNICIAN HELP DESK TECHNICIAN OVERVIEW THIS COURSE WILL HELP YOU: LEARN THE KNOWLEDGE AND SKILLS TO INSTALL, CONFIGURE, AND OPERATE A SMALL- TO MEDIUM-SIZED NETWORK GAIN A FOUNDATION IN THE ESSENTIALS OF NETWORKING, SECURITY, AND AUTOMATION EARN 30 CE CREDITS TOWARD RECERTIFICATION DESCRIPTION THE IMPLEMENTING AND ADMINISTERING CISCO SOLUTIONS (CCNA) V2.0 COURSE GIVES YOU A BROAD RANGE OF FUNDAMENTAL KNOWLEDGE FOR ALL IT CAREERS. THROUGH A COMBINATION OF LECTURE, HANDS-ON LABS, AND SELF-STUDY, YOU WILL LEARN HOW TO INSTALL, OPERATE, CONFIGURE, AND VERIFY BASIC IPV4 AND IPV6 NETWORKS. THE COURSE COVERS CONFIGURING NETWORK COMPONENTS SUCH AS SWITCHES, ROUTERS, AND WIRELESS LAN CONTROLLERS; MANAGING NETWORK DEVICES; AND IDENTIFYING BASIC SECURITY THREATS. THE COURSE ALSO GIVES YOU A FOUNDATION IN NETWORK PROGRAMMABILITY, AUTOMATION, AND SOFTWARE-DEFINED NETWORKING. THIS COURSE HELPS YOU PREPARE TO TAKE THE 200-301 CISCO© CERTIFIED NETWORK ASSOCIATE (CCNA©) EXAM. BY PASSING THIS ONE EXAM, YOU EARN THE CCNA CERTIFICATION. THIS COURSE ALSO EARNS YOU 30 CONTINUING EDUCATION (CE) CREDITS TOWARDS RECERTIFICATION. COURSE OUTLINE * Exploring the Functions of Networking ? Lecture * Introducing the Host-to-Host Communications Model ? Lecture * Operating Cisco IOS Software ? Lecture * Introducing LANs ? Lecture * Exploring the TCP/IP Link Layer ? Lecture * Starting a Switch ? Lecture * Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets ? Lecture * Explaining the TCP/IP Transport Layer and Application Layer ? Lecture * Exploring the Functions of Routing ? Lecture * Configuring a Cisco Router ? Lecture * Exploring the Packet Delivery Process ? Lecture * Troubleshooting a Simple Network ? Lecture * Introducing Basic IPv6 ? Lecture * Configuring Static Routing ? Lecture * Implementing VLANs and Trunks ? Lecture * Routing Between VLANs ? Lecture * Introducing OSPF ? Lecture * Building Redundant Switched Topologies ? Self-study * Improving Redundant Switched Topologies with EtherChannel ? Lecture * Exploring Layer 3 Redundancy ? Self-study * Introducing WAN Technologies ? Self-study * Explaining Basics of ACL ? Lecture * Enabling Internet Connectivity ? Lecture * Introducing QoS ? Self-study * Explaining Wireless Fundamentals ? Self-study * Introducing Architectures and Virtualization ? Self-study * Explaining the Evolution of Intelligent Networks ? Lecture * Introducing System Monitoring ? Lecture * Managing Cisco Devices ? Lecture * Examining the Security Threat Landscape ? Self-study ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)
Delivered Online6 days, May 13th, 13:00 + 17 more
£4195

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR SUCCESSFUL STUDENTS HAVE EXPERIENCE AND KNOWLEDGE IN IT OPERATIONS, INCLUDING NETWORKING, VIRTUALIZATION, IDENTITY, SECURITY, BUSINESS CONTINUITY, DISASTER RECOVERY, DATA PLATFORMS, AND GOVERNANCE. STUDENTS ALSO HAVE EXPERIENCE DESIGNING AND ARCHITECTING SOLUTIONS. BEFORE ATTENDING THIS COURSE, STUDENTS MUST HAVE PREVIOUS EXPERIENCE DEPLOYING OR ADMINISTERING AZURE RESOURCES AND STRONG CONCEPTUAL KNOWLEDGE OF: * AZURE COMPUTE TECHNOLOGIES SUCH AS VMS, CONTAINERS AND SERVERLESS SOLUTIONS * AZURE VIRTUAL NETWORKING TO INCLUDE LOAD BALANCERS * AZURE STORAGE TECHNOLOGIES (UNSTRUCTURED AND DATABASES) * GENERAL APPLICATION DESIGN CONCEPTS SUCH AS MESSAGING AND HIGH AVAILABILITY DESCRIPTION THIS COURSE TEACHES AZURE SOLUTION ARCHITECTS HOW TO DESIGN INFRASTRUCTURE SOLUTIONS. COURSE TOPICS COVER GOVERNANCE, COMPUTE, APPLICATION ARCHITECTURE, STORAGE, DATA INTEGRATION, AUTHENTICATION, NETWORKS, BUSINESS CONTINUITY, AND MIGRATIONS. THE COURSE COMBINES LECTURE WITH CASE STUDIES TO DEMONSTRATE BASIC ARCHITECT DESIGN PRINCIPLES. PREREQUISITES BEFORE ATTENDING THIS COURSE, STUDENTS MUST HAVE PREVIOUS EXPERIENCE DEPLOYING OR ADMINISTERING AZURE RESOURCES AND CONCEPTUAL KNOWLEDGE OF: AZURE ACTIVE DIRECTORY AZURE COMPUTE TECHNOLOGIES SUCH AS VMS, CONTAINERS AND SERVERLESS SOLUTIONS AZURE VIRTUAL NETWORKING TO INCLUDE LOAD BALANCERS AZURE STORAGE TECHNOLOGIES (UNSTRUCTURED AND DATABASES) GENERAL APPLICATION DESIGN CONCEPTS SUCH AS MESSAGING AND HIGH AVAILABILITY AZ-104T00 - MICROSOFT AZURE ADMINISTRATOR 1 - DESIGN GOVERNANCE * Design for governance * Design for management groups * Design for subscriptions * Design for resource groups * Design for resource tags * Design for Azure Policy * Design for role-based access control (RBAC) * Design for Azure landing zones 2 - DESIGN AN AZURE COMPUTE SOLUTION * Choose an Azure compute service * Design for Azure Virtual Machines solutions * Design for Azure Batch solutions * Design for Azure App Service solutions * Design for Azure Container Instances solutions * Design for Azure Kubernetes Service solutions * Design for Azure Functions solutions * Design for Azure Logic Apps solutions 3 - DESIGN A DATA STORAGE SOLUTION FOR NON-RELATIONAL DATA * Design for data storage * Design for Azure storage accounts * Design for data redundancy * Design for Azure Blob Storage * Design for Azure Files * Design for Azure managed disks * Design for storage security 4 - DESIGN A DATA STORAGE SOLUTION FOR RELATIONAL DATA * Design for Azure SQL Database * Design for Azure SQL Managed Instance * Design for SQL Server on Azure Virtual Machines * Recommend a solution for database scalability * Recommend a solution for database availability * Design security for data at rest, data in motion, and data in use * Design for Azure SQL Edge * Design for Azure Cosmos DB and Table Storage 5 - DESIGN DATA INTEGRATION * Design a data integration solution with Azure Data Factory * Design a data integration solution with Azure Data Lake * Design a data integration and analytic solution with Azure Databricks * Design a data integration and analytic solution with Azure Synapse Analytics * Design strategies for hot, warm, and cold data paths * Design an Azure Stream Analytics solution for data analysis 6 - DESIGN AN APPLICATION ARCHITECTURE * Describe message and event scenarios * Design a messaging solution * Design an Azure Event Hubs messaging solution * Design an event-driven solution * Design a caching solution * Design API integration * Design an automated app deployment solution * Design an app configuration management solution 7 - DESIGN AUTHENTICATION AND AUTHORIZATION SOLUTIONS * Design for identity and access management (IAM) * Design for Microsoft Entra ID * Design for Microsoft Entra business-to-business (B2B) * Design for Azure Active Directory B2C (business-to-customer) * Design for conditional access * Design for identity protection * Design for access reviews * Design service principals for applications * Design managed identities * Design for Azure Key Vault 8 - DESIGN A SOLUTION TO LOG AND MONITOR AZURE RESOURCES * Design for Azure Monitor data sources * Design for Azure Monitor Logs (Log Analytics) workspaces * Design for Azure Workbooks and Azure insights * Design for Azure Data Explorer 9 - DESIGN NETWORK SOLUTIONS * Recommend a network architecture solution based on workload requirements * Design patterns for Azure network connectivity services * Design outbound connectivity and routing * Design for on-premises connectivity to Azure Virtual Network * Choose an application delivery service * Design for application delivery services * Design for application protection services 10 - DESIGN A SOLUTION FOR BACKUP AND DISASTER RECOVERY * Design for backup and recovery * Design for Azure Backup * Design for Azure blob backup and recovery * Design for Azure files backup and recovery * Design for Azure virtual machine backup and recovery * Design for Azure SQL backup and recovery * Design for Azure Site Recovery 11 - DESIGN MIGRATIONS * Evaluate migration with the Cloud Adoption Framework * Describe the Azure migration framework * Assess your on-premises workloads * Select a migration tool * Migrate your structured data in databases * Select an online storage migration tool for unstructured data * Migrate offline data 12 - INTRODUCTION TO THE MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK * Azure Well-Architected Framework pillars * Cost optimization * Operational excellence * Performance efficiency * Reliability * Security 13 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - COST OPTIMIZATION * Develop cost-management discipline * Design with a cost-efficiency mindset * Design for usage optimization * Design for rate optimization * Monitor and optimize over time 14 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - OPERATIONAL EXCELLENCE * Embrace DevOps culture * Establish development standards * Evolve operations with observability * Deploy with confidence * Automate for efficiency * Adopt safe deployment practices 15 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - PERFORMANCE EFFICIENCY * Negotiate realistic performance targets * Design to meet capacity requirements * Achieve and sustain performance * Improve efficiency through optimization 16 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - RELIABILITY * Design for business requirements * Design for resilience * Design for recovery * Design for operations * Keep it simple 17 - MICROSOFT AZURE WELL-ARCHITECTED FRAMEWORK - SECURITY * Plan your security readiness * Design to protect confidentiality * Design to protect integrity * Design to protect availability * Sustain and evolve your security posture 18 - GETTING STARTED WITH THE MICROSOFT CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Common blockers 19 - PREPARE FOR SUCCESSFUL CLOUD ADOPTION WITH A WELL-DEFINED STRATEGY * Customer narrative * Capture strategic motivation * Define objectives and key results * Evaluate financial considerations * Understand technical considerations * Create a business case 20 - PREPARE FOR CLOUD ADOPTION WITH A DATA-DRIVEN PLAN * Customer narrative 21 - CHOOSE THE BEST AZURE LANDING ZONE TO SUPPORT YOUR REQUIREMENTS FOR CLOUD OPERATIONS * Customer narrative * Common operating models * Design areas for Azure landing zones * Design principles for Azure landing zones * Journey to the target architecture * Choose an Azure landing zone option * Deploy the Azure landing zone accelerator * Enhance your landing zone 22 - MIGRATE TO AZURE THROUGH REPEATABLE PROCESSES AND COMMON TOOLS * Customer narrative * Migration process * Migration tools * Common tech platforms 23 - ADDRESS TANGIBLE RISKS WITH THE GOVERN METHODOLOGY OF THE CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Govern methodology * Corporate policies * Governance disciplines * Deploy a cloud governance foundation * The Cost Management discipline 24 - ENSURE STABLE OPERATIONS AND OPTIMIZATION ACROSS ALL SUPPORTED WORKLOADS DEPLOYED TO THE CLOUD * Establish business commitments * Deploy an operations baseline * Protect and recover * Enhance an operations baseline * Manage platform and workload specialization 25 - INNOVATE APPLICATIONS BY USING AZURE CLOUD TECHNOLOGIES * Follow the innovation lifecycle * Azure technologies for the build process * Infuse your applications with AI * Azure technologies for measuring business impact * Azure technologies for the learn process 26 - PREPARE FOR CLOUD SECURITY BY USING THE MICROSOFT CLOUD ADOPTION FRAMEWORK FOR AZURE * Customer narrative * Methodology * Security roles and responsibilities * Simplify compliance and security * Simplify security implementation * Security tools and policies ADDITIONAL COURSE DETAILS: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered Online5 days, May 14th, 13:00 + 6 more
£2380

City centre sketching tours with the Edinburgh Sketcher

5.0(5)

By The Arienas Collective

Edinburgh city centre sketching tours with ink and watercolour artist Mark Kirkham, known locally as The Edinburgh Sketcher

City centre sketching tours with the Edinburgh Sketcher
Delivered In-Person in Edinburgh2 hours 30 minutes, May 17th, 09:00 + 4 more
£20 to £30

Educators matching "Architecture"

Show all 488
Ate Enterprises Ltd

ate enterprises ltd

High Wycombe

Enterprise architects are to business systems as town planners are to cities. They plan and govern business systems to ensure that they are robust and meet the real needs of all enterprise stakeholders. According to the Federation of EA Professional Organisations, Enterprise Architecture is: “a well-defined practice for conducting enterprise analysis, design, planning, and implementation, using a holistic approach at all times, for the successful development and execution of strategy”. This role is delegated to the Enterprise Architect, who performs a review of the business’ structure and processes and aligns these to the goals of effectiveness, efficiency, agility and durability. The best framework for the governance of Enterprise Architecture is “The Open Group Architecture Framework” (TOGAF®) and ATE Enterprises is a world leader specialising in TOGAF® training and certification which is one of the World class Enterprise Architecture specifications developed by The Open Group. Enterprise Architecture Defined The description of an enterprise as a system in terms of its components, their inter-relationships, and the principles and guidelines governing the design and its evolution The description is usually done to identify gaps between the current state and a desired future state This design provides a roadmap for the organization to achieve its goals and deliver its objectives Enterprise Architecture Is often described at multiple levels of breadth and depth At its most effective, Enterprise Architecture enables effective execution of an organization’s strategy IT Architecture is a major enabling component of an Enterprise Architecture