• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

599 Automation courses

PL-200T00 Microsoft Power Platform Functional Consultant

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR A MICROSOFT POWER PLATFORM FUNCTIONAL CONSULTANT IS RESPONSIBLE FOR CREATING AND CONFIGURING APPS, AUTOMATIONS, AND SOLUTIONS. THEY ACT AS THE LIAISON BETWEEN USERS AND THE IMPLEMENTATION TEAM. THE FUNCTIONAL CONSULTANT PROMOTES UTILIZATION OF SOLUTIONS WITHIN AN ORGANIZATION. THE FUNCTIONAL CONSULTANT MAY PERFORM DISCOVERY, ENGAGE SUBJECT MATTER EXPERTS AND STAKEHOLDERS, CAPTURE REQUIREMENTS, AND MAP REQUIREMENTS TO FEATURES. THEY IMPLEMENT COMPONENTS OF A SOLUTION INCLUDING APPLICATION ENHANCEMENTS, CUSTOM USER EXPERIENCES, SYSTEM INTEGRATIONS, DATA CONVERSIONS, CUSTOM PROCESS AUTOMATION, AND SIMPLE VISUALIZATIONS. DESCRIPTION THIS COURSE WILL TEACH YOU TO USE MICROSOFT POWER PLATFORM SOLUTIONS TO SIMPLIFY, AUTOMATE, AND EMPOWER BUSINESS PROCESSES FOR ORGANIZATIONS IN THE ROLE OF A FUNCTIONAL CONSULTANT. A MICROSOFT POWER PLATFORM FUNCTIONAL CONSULTANT IS RESPONSIBLE FOR CREATING AND CONFIGURING APPS, AUTOMATIONS, AND SOLUTIONS. THEY ACT AS THE LIAISON BETWEEN USERS AND THE IMPLEMENTATION TEAM. THE FUNCTIONAL CONSULTANT PROMOTES UTILIZATION OF SOLUTIONS WITHIN AN ORGANIZATION. THE FUNCTIONAL CONSULTANT MAY PERFORM DISCOVERY, ENGAGE SUBJECT MATTER EXPERTS AND STAKEHOLDERS, CAPTURE REQUIREMENTS, AND MAP REQUIREMENTS TO FEATURES. THEY IMPLEMENT COMPONENTS OF A SOLUTION INCLUDING APPLICATION ENHANCEMENTS, CUSTOM USER EXPERIENCES, SYSTEM INTEGRATIONS, DATA CONVERSIONS, CUSTOM PROCESS AUTOMATION, AND SIMPLE VISUALIZATIONS. THIS COURSE MAY CONTAIN A 1-DAY APPLIED WORKSHOP. THIS WORKSHOP WILL ALLOW YOU TO PRACTICE YOUR FUNCTIONAL CONSULTANT SKILLS BY CREATING AN END-TO-END SOLUTION TO SOLVE A PROBLEM FOR A FICTITIOUS COMPANY. THE SOLUTION WILL INCLUDE A MICROSOFT DATAVERSE DATABASE, POWER APPS CANVAS APP, AND POWER AUTOMATE FLOWS. PREREQUISITES * EXPERIENCE AS AN IT PROFESSIONAL OR STUDENT * WORKING KNOWLEDGE OF MICROSOFT POWER PLATFORM AND ITS KEY COMPONENTS * KNOWLEDGE OF MICROSOFT DATAVERSE (OR GENERAL DATA MODELING) AND SECURITY CONCEPTS 1 - DESCRIBE THE BUSINESS VALUE OF THE MICROSOFT POWER PLATFORM * Explore Microsoft Power Platform * Describe the business value of the Power Platform * Explore connectors and Microsoft Dataverse * Describe how Power Platform works with Microsoft 365 apps and services * Explore how Power Platform works with Microsoft Teams * Describe how Power Platform works with Microsoft Dynamics 365 apps * Describe how Power Platform solutions consume Microsoft Azure services * Explore how Microsoft Power Platform apps work together * Use Artificial Intelligence to increase productivity 2 - CORE COMPONENTS OF POWER PAGES * Get started with Power Pages * Core tools and components of Power Pages * Overview of Power Pages security * Overview of Power Pages extensibility 3 - EXPLORE POWER PAGES TEMPLATES * Site design templates * Scenario-based templates * Dynamics 365 Power Pages site templates 4 - EXPLORE POWER PAGES DESIGN STUDIO * Work with pages * Page components * Site styling and templates 5 - EXPLORE POWER PAGES DESIGN STUDIO DATA AND SECURITY FEATURES * Data workspace in Power Pages design studio * Power Pages security features 6 - INTRODUCTION TO POWER PAGES ADMINISTRATION * Power Pages administrative tools * Set up workspace in Power Pages design studio 7 - GET STARTED BUILDING WITH POWER BI * Use Power BI * Building blocks of Power BI * Tour and use the Power BI service 8 - GET DATA WITH POWER BI DESKTOP * Overview of Power BI Desktop * Explore Power BI Desktop * Connect to data sources * Get data from Excel * Transform data to include in a report * Combine data from multiple sources * Clean data to include in a report 9 - MODEL DATA IN POWER BI * How to manage your data relationships * Create calculated columns * Optimize data models * Create measures * Create calculated tables * Explore time-based data 10 - USE VISUALS IN POWER BI * Create and customize simple visualizations * Create slicers * Map visualizations * Matrices and tables * Create scatter, waterfall, and funnel charts * Modify colors in charts and visuals * Page layout and formatting 11 - EXPLORE DATA IN POWER BI * Quick insights in Power BI * Create and configure a dashboard * Ask questions of your data with natural language * Create custom Q&A suggestions * Share dashboards with your organization * Display visuals and tiles in full screen * Edit tile details and add widgets * Get more space on your dashboard 12 - PUBLISH AND SHARE IN POWER BI * Publish Power BI Desktop reports * Print and export dashboards and reports * Introducing Power BI Mobile * Create workspaces in Power BI * Build apps * Use apps * Integrate OneDrive for Business with Power BI * Publish to web 13 - CREATE AND MANAGE WORKSPACES IN POWER BI * Distribute a report or dashboard * Monitor usage and performance * Recommend a development life cycle strategy * Troubleshoot data by viewing its lineage * Configure data protection 14 - MANAGE SEMANTIC MODELS IN POWER BI * Use a Power BI gateway to connect to on-premises data sources * Configure a semantic model scheduled refresh * Configure incremental refresh settings * Manage and promote semantic models * Troubleshoot service connectivity * Boost performance with query caching (Premium) 15 - CREATE DASHBOARDS IN POWER BI * Configure data alerts * Explore data by asking questions * Review Quick insights * Add a dashboard theme * Pin a live report page to a dashboard * Configure a real-time dashboard * Set mobile view 16 - IMPLEMENT ROW-LEVEL SECURITY * Configure row-level security with the static method * Configure row-level security with the dynamic method 17 - CREATE TABLES IN DATAVERSE * Table characteristics * Table relationships * Dataverse logic and security * Dataverse auditing * Dual-write vs. virtual tables 18 - MANAGE TABLES IN DATAVERSE * Identify tables and table types in Dataverse * Create a custom table * Enable attachments within a table * Licensing requirements for each table type 19 - CREATE AND MANAGE COLUMNS WITHIN A TABLE IN DATAVERSE * Define columns in Microsoft Dataverse * Column types in Microsoft Dataverse * Add a column to a table * Create a primary name column * Restrictions that apply to columns in a table * Create an auto numbering column * Create an alternate key 20 - CREATE A RELATIONSHIP BETWEEN TABLES IN DATAVERSE * Relate one or more tables - Introduction * Relationship types that are available in Microsoft Dataverse * Create a one-to-many relationship between tables * Create a many-to-many relationship between tables * Edit or delete relationships 21 - WORKING WITH CHOICES IN DATAVERSE * Define choice column * Standard choices column 22 - GET STARTED WITH SECURITY ROLES IN DATAVERSE * Understand environment roles * Adding or disabling an environment user * Understand security concepts in Dataverse * Understand user security roles and security role defaults * Check the roles that a user belongs to * Configure Dataverse teams for security * Configure Dataverse group teams for security 23 - USE ADMINISTRATION OPTIONS FOR DATAVERSE * Use Microsoft Power Platform Admin Center portal * Tenant storage capacity * Advanced Customization options in Power Apps Portal * Enable and disable auditing 24 - MANAGE DYNAMICS 365 MODEL-DRIVEN APP SETTINGS AND SECURITY * Configure role-based security * Manage teams and business units * Explore settings and customizations 25 - INTRODUCTION TO MICROSOFT POWER PLATFORM SECURITY AND GOVERNANCE * Identify Microsoft Power Platform environments * Data Loss Prevention policies * Microsoft Power Platform Center of Excellence Starter Kit 26 - GET STARTED WITH MODEL-DRIVEN APPS IN POWER APPS * Introducing model-driven apps * Components of model-driven apps * Design model-driven apps * Incorporate business process flows 27 - CONFIGURE FORMS, CHARTS, AND DASHBOARDS IN MODEL-DRIVEN APPS * Forms overview * Form elements * Configure multiple forms * Use specialized form components * Configure views overview * Configure grids * Create and edit views * Configure charts overview * Dashboards overview * Use interactive streams and tiles 28 - GET STARTED WITH POWER APPS CANVAS APPS * Power Apps building blocks * Ways to build Power Apps * Power Apps related technologies * Additional Power Apps related technologies * Designing a Power Apps app 29 - CONNECT TO OTHER DATA IN A POWER APPS CANVAS APP * Overview of the different data sources * Work with action-based data sources * Power Automate is a companion to Power Apps 30 - HOW TO BUILD THE UI IN A CANVAS APP IN POWER APPS * Use themes to quickly change the appearance of your app * Branding a control * Icons * Images * Personalization * Using the tablet or phone form factors 31 - MANAGE APPS IN POWER APPS * Power Apps review 32 - BUILD YOUR FIRST APP WITH POWER APPS AND DATAVERSE FOR TEAMS * Create your first app with the hero template * Customize your app with Power Apps Studio * Publish your app * Install template apps 33 - ACCESS DATAVERSE IN POWER PAGES WEBSITES * Use lists to display multiple Dataverse records * Use forms to interact with Dataverse data 34 - AUTHENTICATION AND USER MANAGEMENT IN POWER PAGES * Power Pages authentication settings * User registration in Power Pages * Authentication management for Power Pages users * Power Pages authentication providers 35 - POWER PAGES MAINTENANCE AND TROUBLESHOOTING * Power Pages website maintenance * Power Pages website troubleshooting 36 - DEFINE AND CREATE BUSINESS RULES IN DATAVERSE * Define business rules - Introduction * Define the components of a business rule * Create a business rule 37 - GET STARTED WITH POWER AUTOMATE * Introducing Power Automate * Troubleshoot flows 38 - USE THE ADMIN CENTER TO MANAGE ENVIRONMENTS AND DATA POLICIES IN POWER AUTOMATE * Administer flows * Export and import flows * Learn how to distribute button flows 39 - USE DATAVERSE TRIGGERS AND ACTIONS IN POWER AUTOMATE * Dataverse triggers * Query data * Create, update, delete, and relate actions 40 - EXTEND DATAVERSE WITH POWER AUTOMATE * Set up a flow and configure its trigger * Email Dataverse record * Add to-do items * Test and run your flow 41 - INTRODUCTION TO EXPRESSIONS IN POWER AUTOMATE * Get started with expressions * Notes make things easier * Types of functions * Write complex expressions 42 - BUILD YOUR FIRST POWER AUTOMATE FOR DESKTOP FLOW * Set up the environment * Explore Power Automate for desktop * Create your first Power Automate for desktop flow * Record Power Automate for desktop actions * Edit and test recorded actions 43 - RUN A POWER AUTOMATE FOR DESKTOP FLOW IN UNATTENDED MODE * Set up an unattended desktop flow * Create a new cloud flow that calls an existing flow in unattended mode * Perform a test run * Best practices 44 - OPTIMIZE YOUR BUSINESS PROCESS WITH PROCESS ADVISOR * Get familiar with process advisor * Create your first recording * Edit recordings and group actions * Analyze recordings and interpret results * Automation recommendations 45 - GET STARTED WITH MICROSOFT COPILOT STUDIO BOTS * Get started working with environments * Create bots and work with the Microsoft Copilot Studio interface * Create topics * Test bots * Publish bots and analyze performance 46 - ENHANCE MICROSOFT COPILOT STUDIO BOTS * Use Power Automate to add actions * Transfer conversations to agents by using Omnichannel for Customer Service * Create topics for existing support content * Analyze bot performance 47 - MANAGE TOPICS IN MICROSOFT COPILOT STUDIO * Work with bot topics * Branch a topic * Create topics for existing support content * Work with system fallback topics * Manage topics 48 - MANAGE POWER VIRTUAL AGENTS * Environments in Microsoft Copilot Studio * Bot topics permissions * Bot entities and flow permissions * Monitor and diagnose * Administer and manage * Export and import bots * Authentication 49 - GET STARTED BUILDING WITH POWER BI * Use Power BI * Building blocks of Power BI * Tour and use the Power BI service 50 - GET DATA WITH POWER BI DESKTOP * Overview of Power BI Desktop * Explore Power BI Desktop * Connect to data sources * Get data from Excel * Transform data to include in a report * Combine data from multiple sources * Clean data to include in a report 51 - MODEL DATA IN POWER BI * How to manage your data relationships * Create calculated columns * Optimize data models * Create measures * Create calculated tables * Explore time-based data 52 - USE VISUALS IN POWER BI * Create and customize simple visualizations * Create slicers * Map visualizations * Matrices and tables * Create scatter, waterfall, and funnel charts * Modify colors in charts and visuals * Page layout and formatting 53 - EXPLORE DATA IN POWER BI * Quick insights in Power BI * Create and configure a dashboard * Ask questions of your data with natural language * Create custom Q&A suggestions * Share dashboards with your organization * Display visuals and tiles in full screen * Edit tile details and add widgets * Get more space on your dashboard 54 - PUBLISH AND SHARE IN POWER BI * Publish Power BI Desktop reports * Print and export dashboards and reports * Introducing Power BI Mobile * Create workspaces in Power BI * Build apps * Use apps * Integrate OneDrive for Business with Power BI * Publish to web 55 - MANAGE SOLUTIONS IN POWER APPS AND POWER AUTOMATE * Add and remove apps, flows, and entities in a solution * Edit a solution-aware app, flow, and table * Build and deploy a complex solution with flows, apps, and entities * Automate solution management 56 - LOAD/EXPORT DATA AND CREATE DATA VIEWS IN DATAVERSE * View data in a table * Create or edit views of data in a table * Load data into a table * Export data from a table * Add, update, or delete data in a table by using Excel * Import data using Power Query * Generate a new dataflow from an Excel Template * Dataflow and Azure integration 57 - GET STARTED WITH AI BUILDER * Choose an AI capability * Create your first model * Ways to use your models 58 - MANAGE MODELS IN AI BUILDER * Model lifecycle * Manage model versions * Share your models 59 - USE AI BUILDER IN POWER AUTOMATE * AI Builder in Power Automate saves time * Advanced usage of AI Builder in Power Automate 60 - FUNCTIONAL CONSULTANT SKILLS * Create entity relationship diagrams * Create and document mock-ups * Document functional requirements and artifacts * Complete fit-gap analysis * Discuss stakeholder management responsibilities * Understand industry accelerators * Define Application Lifecycle Management * Participate in testing * Evaluate options * Define connectors * Understand Power Apps component framework 61 - SOLUTION ARCHITECT SERIES: PLAN APPLICATION LIFECYCLE MANAGEMENT FOR POWER PLATFORM * Key considerations for ALM * Solutions * Configuration and reference data * Release process * ALM with Azure DevOps

PL-200T00 Microsoft Power Platform Functional Consultant
Delivered Online6 days, May 13th, 08:30 + 3 more
£2975

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR ANYONE SEEKING CCNA CERTIFICATION. THE COURSE ALSO PROVIDES FOUNDATIONAL KNOWLEDGE FOR ALL SUPPORT TECHNICIANS INVOLVED IN THE BASIC INSTALLATION, OPERATION, AND VERIFICATION OF CISCO NETWORKS. THE JOB ROLES BEST SUITED TO THE MATERIAL IN THIS COURSE ARE: ENTRY-LEVEL NETWORK ENGINEER NETWORK ADMINISTRATOR NETWORK SUPPORT TECHNICIAN HELP DESK TECHNICIAN OVERVIEW THIS COURSE WILL HELP YOU: LEARN THE KNOWLEDGE AND SKILLS TO INSTALL, CONFIGURE, AND OPERATE A SMALL- TO MEDIUM-SIZED NETWORK GAIN A FOUNDATION IN THE ESSENTIALS OF NETWORKING, SECURITY, AND AUTOMATION EARN 30 CE CREDITS TOWARD RECERTIFICATION DESCRIPTION THE IMPLEMENTING AND ADMINISTERING CISCO SOLUTIONS (CCNA) V2.0 COURSE GIVES YOU A BROAD RANGE OF FUNDAMENTAL KNOWLEDGE FOR ALL IT CAREERS. THROUGH A COMBINATION OF LECTURE, HANDS-ON LABS, AND SELF-STUDY, YOU WILL LEARN HOW TO INSTALL, OPERATE, CONFIGURE, AND VERIFY BASIC IPV4 AND IPV6 NETWORKS. THE COURSE COVERS CONFIGURING NETWORK COMPONENTS SUCH AS SWITCHES, ROUTERS, AND WIRELESS LAN CONTROLLERS; MANAGING NETWORK DEVICES; AND IDENTIFYING BASIC SECURITY THREATS. THE COURSE ALSO GIVES YOU A FOUNDATION IN NETWORK PROGRAMMABILITY, AUTOMATION, AND SOFTWARE-DEFINED NETWORKING. THIS COURSE HELPS YOU PREPARE TO TAKE THE 200-301 CISCO© CERTIFIED NETWORK ASSOCIATE (CCNA©) EXAM. BY PASSING THIS ONE EXAM, YOU EARN THE CCNA CERTIFICATION. THIS COURSE ALSO EARNS YOU 30 CONTINUING EDUCATION (CE) CREDITS TOWARDS RECERTIFICATION. COURSE OUTLINE * Exploring the Functions of Networking ? Lecture * Introducing the Host-to-Host Communications Model ? Lecture * Operating Cisco IOS Software ? Lecture * Introducing LANs ? Lecture * Exploring the TCP/IP Link Layer ? Lecture * Starting a Switch ? Lecture * Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets ? Lecture * Explaining the TCP/IP Transport Layer and Application Layer ? Lecture * Exploring the Functions of Routing ? Lecture * Configuring a Cisco Router ? Lecture * Exploring the Packet Delivery Process ? Lecture * Troubleshooting a Simple Network ? Lecture * Introducing Basic IPv6 ? Lecture * Configuring Static Routing ? Lecture * Implementing VLANs and Trunks ? Lecture * Routing Between VLANs ? Lecture * Introducing OSPF ? Lecture * Building Redundant Switched Topologies ? Self-study * Improving Redundant Switched Topologies with EtherChannel ? Lecture * Exploring Layer 3 Redundancy ? Self-study * Introducing WAN Technologies ? Self-study * Explaining Basics of ACL ? Lecture * Enabling Internet Connectivity ? Lecture * Introducing QoS ? Self-study * Explaining Wireless Fundamentals ? Self-study * Introducing Architectures and Virtualization ? Self-study * Explaining the Evolution of Intelligent Networks ? Lecture * Introducing System Monitoring ? Lecture * Managing Cisco Devices ? Lecture * Examining the Security Threat Landscape ? Self-study ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)
Delivered Online6 days, May 13th, 13:00 + 17 more
£4195

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR THIS FOUR-DAY COURSE IS INTENDED FOR WINDOWS SERVER HYBRID ADMINISTRATORS WHO HAVE EXPERIENCE WORKING WITH WINDOWS SERVER AND WANT TO EXTEND THE CAPABILITIES OF THEIR ON-PREMISES ENVIRONMENTS BY COMBINING ON-PREMISES AND HYBRID TECHNOLOGIES. WINDOWS SERVER HYBRID ADMINISTRATORS WHO ALREADY IMPLEMENT AND MANAGE ON-PREMISES CORE TECHNOLOGIES WANT TO SECURE AND PROTECT THEIR ENVIRONMENTS, MIGRATE VIRTUAL AND PHYSICAL WORKLOADS TO AZURE IAAS, ENABLE A HIGHLY AVAILABLE, FULLY REDUNDANT ENVIRONMENT, AND PERFORM MONITORING AND TROUBLESHOOTING. DESCRIPTION THIS COURSE TEACHES IT PROFESSIONALS TO CONFIGURE ADVANCED WINDOWS SERVER SERVICES USING ON-PREMISES, HYBRID, AND CLOUD TECHNOLOGIES. THE COURSE TEACHES IT PROFESSIONALS HOW TO LEVERAGE THE HYBRID CAPABILITIES OF AZURE, HOW TO MIGRATE VIRTUAL AND PHYSICAL SERVER WORKLOADS TO AZURE IAAS, AND HOW TO SECURE AZURE VMS RUNNING WINDOWS SERVER. THE COURSE ALSO TEACHES IT PROFESSIONALS HOW TO PERFORM TASKS RELATED TO HIGH AVAILABILITY, TROUBLESHOOTING, AND DISASTER RECOVERY. THE COURSE HIGHLIGHTS ADMINISTRATIVE TOOLS AND TECHNOLOGIES INCLUDING WINDOWS ADMIN CENTER, POWERSHELL, AZURE ARC, AZURE AUTOMATION UPDATE MANAGEMENT, MICROSOFT DEFENDER FOR IDENTITY, AZURE SECURITY CENTER, AZURE MIGRATE, AND AZURE MONITOR. PREREQUISITES AN UNDERSTANDING OF THE FOLLOWING CONCEPTS AS RELATED TO WINDOWS SERVER TECHNOLOGIES: HIGH AVAILABILITY AND DISASTER RECOVERY AUTOMATION MONITORING TROUBLESHOOTING 1 - SECURE WINDOWS SERVER USER ACCOUNTS * Configure user account rights * Protect user accounts with the Protected Users group * Describe Windows Defender Credential Guard * Block NTLM authentication * Locate problematic accounts 2 - HARDENING WINDOWS SERVER * Describe Local Password Administrator Solution * Configure Privileged Access Workstations * Secure domain controllers * Analyze security configuration with Security Compliance Toolkit * Secure SMB traffic 3 - WINDOWS SERVER UPDATE MANAGEMENT * Explore Windows Update * Outline Windows Server Update Services server deployment options * Define Windows Server Update Services update management process * Describe the process of Update Management 4 - SECURE WINDOWS SERVER DNS * Implement split-horizon DNS * Create DNS policies * Implement DNS policies * Secure Windows Server DNS * Implement DNSSEC 5 - IMPLEMENT WINDOWS SERVER IAAS VM NETWORK SECURITY * Implement network security groups and Windows IaaS VMs * Implement adaptive network hardening * Implement Azure Firewall and Windows IaaS VMs * Implement Windows firewall with Windows Server IaaS VMs * Choose the appropriate filtering solution * Deploy and configure Azure firewall using the Azure portal * Capture network traffic with network watcher * Log network traffic to and from a VM using the Azure portal 6 - AUDIT THE SECURITY OF WINDOWS SERVER IAAS VIRTUAL MACHINES * Describe Azure Security Center * Enable Azure Security Center in hybrid environments * Implement and assess security policies * Protect your resources with Azure Security Center * Implement Azure Sentinel 7 - MANAGE AZURE UPDATES * Describe update management * Enable update management * Deploy updates * View update assessments * Manage updates for your Azure Virtual Machines 8 - CREATE AND IMPLEMENT APPLICATION ALLOWLISTS WITH ADAPTIVE APPLICATION CONTROL * Describe adaptive application control * Implement adaptive application control policies 9 - CONFIGURE BITLOCKER DISK ENCRYPTION FOR WINDOWS IAAS VIRTUAL MACHINES * Describe Azure Disk Encryption and server-side encryption * Configure Key Vault for Azure Disk Encryption * Encrypt Azure IaaS Virtual Machine hard disks * Back up and recover data from encrypted disks * Create and encrypt a Windows Virtual Machine 10 - IMPLEMENT CHANGE TRACKING AND FILE INTEGRITY MONITORING FOR WINDOWS IAAS VMS * Implement Change Tracking and Inventory * Manage Change Tracking and Inventory * Manage tracked files * Implement File Integrity Monitoring * Select and monitor entities * Use File Integrity Monitoring 11 - INTRODUCTION TO CLUSTER SHARED VOLUMES * Determine the functionality of Cluster Shared Volumes * Explore the architecture and components of Cluster Shared Volumes * Implement Cluster Shared Volumes 12 - IMPLEMENT WINDOWS SERVER FAILOVER CLUSTERING * Define Windows Server failover clustering * Plan Windows Server failover clustering * Implement Windows Server failover clustering * Manage Windows Server failover clustering * Implement stretch clusters * Define cluster sets 13 - IMPLEMENT HIGH AVAILABILITY OF WINDOWS SERVER VMS * Select high-availability options for Hyper-V * Consider network load balancing for Hyper-V VMs * Implement Hyper-V VM live migration * Implement Hyper-V VMs storage migration 14 - IMPLEMENT WINDOWS SERVER FILE SERVER HIGH AVAILABILITY * Explore the Windows Server File Server high-availability options * Define Cluster Shared Volumes * Implement Scale-Out File Server * Implement Storage Replica 15 - IMPLEMENT SCALE AND HIGH AVAILABILITY WITH WINDOWS SERVER VM * Describe virtual machine scale sets * Implement scaling * Implement load-balancing VMs * Create a virtual machine scale set in the Azure portal * Describe Azure Site Recovery * Implement Azure Site Recovery 16 - IMPLEMENT HYPER-V REPLICA * Define Hyper-V Replica * Plan for Hyper-V Replica * Configure and implement Hyper-V Replica * Define extended replication * Define Azure Site Recovery * Implement Site Recovery from on-premises site to Azure * Implement Site Recovery from on-premises site to on-premises site 17 - PROTECT YOUR ON-PREMISES INFRASTRUCTURE FROM DISASTERS WITH AZURE SITE RECOVERY * Azure Site Recovery overview * Workloads supported for protection with Azure Site Recovery * Run a disaster recovery drill * Failover and failback 18 - IMPLEMENT HYBRID BACKUP AND RECOVERY WITH WINDOWS SERVER IAAS * Describe Azure Backup * Implement recovery vaults * Implement Azure Backup policies * Recover Windows IaaS Virtual Machines * Perform file and folder recovery * Perform backup and restore of on-premises workloads * Manage Azure Virtual Machine backups with Azure Backup service 19 - PROTECT YOUR AZURE INFRASTRUCTURE WITH AZURE SITE RECOVERY * What is Azure Site Recovery * Prepare for disaster recovery with Azure Site Recovery * Run a disaster recovery drill * Failover and failback using Azure Site Recovery 20 - PROTECT YOUR VIRTUAL MACHINES BY USING AZURE BACKUP * Azure Backup features and scenarios * Back up an Azure virtual machine by using Azure Backup * Restore virtual machine data 21 - ACTIVE DIRECTORY DOMAIN SERVICES MIGRATION * Examine upgrade vs. migration * Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 * Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version * Explore the Active Directory Migration Tool 22 - MIGRATE FILE SERVER WORKLOADS USING STORAGE MIGRATION SERVICE * Storage Migration Service overview and usage scenarios * Storage migration requirements * Migrate a server with Storage migration * Evaluate storage migration considerations 23 - MIGRATE WINDOWS SERVER ROLES * Describe the Windows Server Migration Tools * Install the Migration Tools * Migrate roles using the Migration Tools 24 - MIGRATE ON-PREMISES WINDOWS SERVER INSTANCES TO AZURE IAAS VIRTUAL MACHINES * Plan your migration * Describe Azure Migrate * Perform server assessment * Assess physical servers with Azure Migrate * Migrate Windows Server workloads by using Azure Migrate 25 - UPGRADE AND MIGRATE WINDOWS SERVER IAAS VIRTUAL MACHINES * Describe Azure Migrate * Migrate Windows Server workloads by using Azure Migrate * Describe storage migration * Migrate file servers by using Storage Migration Service 26 - CONTAINERIZE AND MIGRATE ASP.NET APPLICATIONS TO AZURE APP SERVICE * Azure Migrate App Containerization overview 27 - MONITOR WINDOWS SERVER PERFORMANCE * Use Performance Monitor to identify performance problems * Use Resource Monitor to review current resource usage * Review reliability with Reliability Monitor * Implement a performance monitoring methodology * Use Data Collector Sets to analyze server performance * Monitor network infrastructure services * Monitor virtual machines running Windows Server * Monitor performance with Windows Admin Center * Use System Insights to help predict future capacity issues * Optimize the performance of Windows Server 28 - MANAGE AND MONITOR WINDOWS SERVER EVENT LOGS * Describe Windows Server event logs * Use Windows Admin Center to review logs * Use Server Manager to review logs * Use custom views * Implement event log subscriptions 29 - IMPLEMENT WINDOWS SERVER AUDITING AND DIAGNOSTICS * Describe basic auditing categories * Describe advanced categories * Log user access * Enable setup and boot event collection 30 - TROUBLESHOOT ACTIVE DIRECTORY * Recover objects from the AD recycle bin * Recover the AD DS database * Recover SYSVOL * Troubleshoot AD DS replication * Troubleshoot hybrid authentication issues 31 - MONITOR WINDOWS SERVER IAAS VIRTUAL MACHINES AND HYBRID INSTANCES * Enable Azure Monitor for Virtual Machines * Monitor an Azure Virtual Machine with Azure Monitor * Enable Azure Monitor in hybrid scenarios * Collect data from a Windows computer in a hybrid environment * Integrate Azure Monitor with Microsoft Operations Manager 32 - MONITOR YOUR AZURE VIRTUAL MACHINES WITH AZURE MONITOR * Monitoring for Azure VMs * Monitor VM host data * Use Metrics Explorer to view detailed host metrics * Collect client performance counters by using VM insights * Collect VM client event logs 33 - TROUBLESHOOT ON-PREMISES AND HYBRID NETWORKING * Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered Online5 days, May 13th, 13:00 + 3 more
£2380

CompTIA Security+

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR PEOPLE WHO ARE SEEKING TO LAUNCH A CAREER IN CYBERSECURITY. OVERVIEW ASSESS THE SECURITY POSTURE OF AN ENTERPRISE ENVIRONMENT AND RECOMMEND AND IMPLEMENT APPROPRIATE SECURITY SOLUTIONS; MONITOR AND SECURE HYBRID ENVIRONMENTS, INCLUDING CLOUD, MOBILE, AND IOT; OPERATE WITH AN AWARENESS OF APPLICABLE LAWS AND POLICIES, INCLUDING PRINCIPLES OF GOVERNANCE, RISK, AND COMPLIANCE; IDENTIFY, ANALYZE, AND RESPOND TO SECURITY EVENTS AND INCIDENTS. DESCRIPTION COMPTIA SECURITY+ IS A GLOBAL CERTIFICATION THAT VALIDATES THE BASELINE SKILLS NECESSARY TO PERFORM CORE SECURITY FUNCTIONS AND IS THE FIRST SECURITY CERTIFICATION A CANDIDATE SHOULD EARN. COMPTIA SECURITY+ ESTABLISHES THE CORE KNOWLEDGE REQUIRED OF ANY CYBERSECURITY ROLE AND PROVIDES A SPRINGBOARD TO INTERMEDIATE-LEVEL CYBERSECURITY JOBS. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online6 days, May 13th, 13:00 + 27 more
£2475

CompTIA Linux+

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR IT PROFESSIONALS WHOSE PRIMARY JOB RESPONSIBILITY IS THE MANAGEMENT OF SERVERS AND OTHER DEVICES RUNNING THE LINUX OPERATING SYSTEM. A TYPICAL STUDENT IN THIS COURSE SHOULD HAVE AT LEAST NINE MONTHS OF HANDS-ON LINUX EXPERIENCE AND AT LEAST ONE AND A HALF YEARS OF IT EXPERIENCE IN OTHER COMPUTING ENVIRONMENTS. THE TARGET STUDENT SHOULD WISH TO EXPAND THEIR SKILLSET TO SUPPORT THEIR CAREER IN LINUX SYSTEM ADMINISTRATION AND OPERATION. THIS COURSE IS ALSO DESIGNED FOR STUDENTS WHO ARE SEEKING THE COMPTIA LINUX+ CERTIFICATION AND WHO WANT TO PREPARE FOR EXAM XK0-005. THE LINUX+ CERTIFICATION CAN VALIDATE THE STUDENT'S UNDERSTANDING AND SKILL IN CONFIGURING, MONITORING, AND SUPPORTING LINUX SYSTEMS. OVERVIEW IN THIS COURSE, YOU WILL CONFIGURE, OPERATE, AND TROUBLESHOOT LINUX SYSTEMS. YOU WILL: - PERFORM BASIC LINUX TASKS. - MANAGE USERS AND GROUPS. - MANAGE PERMISSIONS AND OWNERSHIP. - MANAGE STORAGE. - MANAGE FILES AND DIRECTORIES. - MANAGE KERNEL MODULES. - MANAGE THE LINUX BOOT PROCESS. - MANAGE SYSTEM COMPONENTS. - MANAGE DEVICES. - MANAGE NETWORKING. - MANAGE PACKAGES AND SOFTWARE. - SECURE LINUX SYSTEMS. - WRITE AND EXECUTE BASH SHELL SCRIPTS. - AUTOMATE TASKS. - PLAN AND PERFORM A LINUX INSTALLATION. DESCRIPTION THE OFFICIAL COMPTIA© LINUX+© COURSEWARE BUILDS ON YOUR EXISTING EXPERIENCE WITH SYSTEMS OPERATIONS AND ADMINISTRATION TO PROVIDE YOU WITH THE KNOWLEDGE AND SKILLS REQUIRED TO CONFIGURE, MANAGE, OPERATE, AND TROUBLESHOOT A LINUX ENVIRONMENT BY USING SECURITY BEST PRACTICES, SCRIPTING, AND AUTOMATION. THIS COURSE WILL ALSO PREPARE YOU FOR THE EXAM XKO-005. 1 - PERFORMING BASIC LINUX TASKS * Identify the History and Development of Linux * Enter Shell Commands * Get Help Using Linux 2 - MANAGING USERS AND GROUPS * Assume Superuser Privileges * Create, Modify, and Delete Users * Create, Modify, and Delete Groups * Query Users and Groups * Configure Account Profiles 3 - MANAGING PERMISSIONS AND OWNERSHIP * Modify File and Directory Permissions * Modify File and Directory Ownership * Configure Special Permissions and Attributes * Troubleshoot Permissions Issues 4 - MANAGING STORAGE * Create Partitions * Manage Logical Volumes * Mount File Systems * Manage File Systems * Navigate the Linux Directory Structure * Troubleshoot Storage Issues 5 - MANAGING FILES AND DIRECTORIES * Create and Edit Text Files * Search for Files * Perform Operations on Files and Directories * Process Text Files * Manipulate File Output 6 - MANAGING KERNEL MODULES * Explore the Linux Kernel * Install and Configure Kernel Modules * Monitor Kernel Modules 7 - MANAGING THE LINUX BOOT PROCESS * Configure Linux Boot Components * Configure GRUB 2 8 - MANAGING SYSTEM COMPONENTS * Configure Localization Options * Configure GUIs * Manage Services * Troubleshoot Process Issues * Troubleshoot CPU and Memory Issues 9 - MANAGING DEVICES * Identify the Types of Linux Devices * Configure Devices * Monitor Devices * Troubleshoot Hardware Issues 10 - MANAGING NETWORKING * Identify TCP/IP Fundamentals * Identify Linux Server Roles * Connect to a Network * Configure DHCP and DNS Client Services * Configure Cloud and Virtualization Technologies * Troubleshoot Networking Issues 11 - MANAGING PACKAGES AND SOFTWARE * Identify Package Managers * Manage RPM Packages with YUM * Manage Debian Packages with APT * Configure Repositories * Acquire Software * Build Software from Source Code * Troubleshoot Software Dependency Issues 12 - SECURING LINUX SYSTEMS * Implement Cybersecurity Best Practices * Implement Identity and Access Management Methods * Configure SELinux or AppArmor * Configure Firewalls * Implement Logging Services * Back Up, Restore, and Verify Data 13 - WORKING WITH BASH SCRIPTS * Customize the Bash Shell Environment * Identify Scripting and Programming Fundamentals * Write and Execute a Simple Bash Script * Incorporate Control Statements in Bash Scripts 14 - AUTOMATING TASKS * Schedule Jobs * Implement Version Control Using Git * Identify Orchestration Concepts 15 - INSTALLING LINUX * Prepare for Linux Installation * Perform the Installation ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Linux Plus Certification (Exam XK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Linux Plus Certification (Exam XK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Linux+
Delivered Online6 days, May 13th, 13:00 + 4 more
£2475

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS FOR AZURE SECURITY ENGINEERS WHO ARE PLANNING TO TAKE THE ASSOCIATED CERTIFICATION EXAM, OR WHO ARE PERFORMING SECURITY TASKS IN THEIR DAY-TO-DAY JOB. THIS COURSE WOULD ALSO BE HELPFUL TO AN ENGINEER THAT WANTS TO SPECIALIZE IN PROVIDING SECURITY FOR AZURE-BASED DIGITAL PLATFORMS AND PLAY AN INTEGRAL ROLE IN PROTECTING AN ORGANIZATION'S DATA. DESCRIPTION THIS COURSE PROVIDES IT SECURITY PROFESSIONALS WITH THE KNOWLEDGE AND SKILLS NEEDED TO IMPLEMENT SECURITY CONTROLS, MAINTAIN AN ORGANIZATION?S SECURITY POSTURE, AND IDENTIFY AND REMEDIATE SECURITY VULNERABILITIES. THIS COURSE INCLUDES SECURITY FOR IDENTITY AND ACCESS, PLATFORM PROTECTION, DATA AND APPLICATIONS, AND SECURITY OPERATIONS. PREREQUISITES AZ-104T00 - MICROSOFT AZURE ADMINISTRATOR SECURITY BEST PRACTICES AND INDUSTRY SECURITY REQUIREMENTS SUCH AS DEFENSE IN DEPTH, LEAST PRIVILEGED ACCESS, ROLE-BASED ACCESS CONTROL, MULTI-FACTOR AUTHENTICATION, SHARED RESPONSIBILITY, AND ZERO TRUST MODEL. BE FAMILIAR WITH SECURITY PROTOCOLS SUCH AS VIRTUAL PRIVATE NETWORKS (VPN), INTERNET SECURITY PROTOCOL (IPSEC), SECURE SOCKET LAYER (SSL), DISK AND DATA ENCRYPTION METHODS. HAVE SOME EXPERIENCE DEPLOYING AZURE WORKLOADS. THIS COURSE DOES NOT COVER THE BASICS OF AZURE ADMINISTRATION, INSTEAD THE COURSE CONTENT BUILDS ON THAT KNOWLEDGE BY ADDING SECURITY SPECIFIC INFORMATION. HAVE EXPERIENCE WITH WINDOWS AND LINUX OPERATING SYSTEMS AND SCRIPTING LANGUAGES. COURSE LABS MAY USE POWERSHELL AND THE CLI. 1 - MANAGE IDENTITIES IN MICROSOFT ENTRA ID * Secure users in Microsoft Entra ID * Secure groups in Microsoft Entra ID * Recommend when to use external identities * Secure external identities * Implement Microsoft Entra Identity protection 2 - MANAGE AUTHENTICATION BY USING MICROSOFT ENTRA ID * Configure Microsoft Entra Verified ID * Implement multifactor authentication (MFA) * Implement passwordless authentication * Implement password protection * Implement single sign-on (SSO) * Integrate single sign-on (SSO) and identity providers * Recommend and enforce modern authentication protocols 3 - MANAGE AUTHORIZATION BY USING MICROSOFT ENTRA ID * Configure Azure role permissions for management groups, subscriptions, resource groups, and resources * Assign built-in roles in Microsoft Entra ID * Assign built-in roles in Azure * Create and assign a custom role in Microsoft Entra ID * Implement and manage Microsoft Entra Permissions Management * Configure Microsoft Entra Privileged Identity Management * Configure role management and access reviews by using Microsoft Entra Identity Governance * Implement Conditional Access policies 4 - MANAGE APPLICATION ACCESS IN MICROSOFT ENTRA ID * Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants * Manage app registrations in Microsoft Entra ID * Configure app registration permission scopes * Manage app registration permission consent * Manage and use service principals * Manage managed identities for Azure resources * Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - PLAN AND IMPLEMENT SECURITY FOR VIRTUAL NETWORKS * Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) * Plan and implement User-Defined Routes (UDRs) * Plan and implement Virtual Network peering or gateway * Plan and implement Virtual Wide Area Network, including secured virtual hub * Secure VPN connectivity, including point-to-site and site-to-site * Implement encryption over ExpressRoute * Configure firewall settings on PaaS resources * Monitor network security by using Network Watcher, including NSG flow logging 6 - PLAN AND IMPLEMENT SECURITY FOR PRIVATE ACCESS TO AZURE RESOURCES * Plan and implement virtual network Service Endpoints * Plan and implement Private Endpoints * Plan and implement Private Link services * Plan and implement network integration for Azure App Service and Azure Functions * Plan and implement network security configurations for an App Service Environment (ASE) * Plan and implement network security configurations for an Azure SQL Managed Instance 7 - PLAN AND IMPLEMENT SECURITY FOR PUBLIC ACCESS TO AZURE RESOURCES * Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management * Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies * Plan and implement an Azure Application Gateway * Plan and implement an Azure Front Door, including Content Delivery Network (CDN) * Plan and implement a Web Application Firewall (WAF) * Recommend when to use Azure DDoS Protection Standard 8 - PLAN AND IMPLEMENT ADVANCED SECURITY FOR COMPUTE * Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access * Configure network isolation for Azure Kubernetes Service (AKS) * Secure and monitor AKS * Configure authentication for AKS * Configure security for Azure Container Instances (ACIs) * Configure security for Azure Container Apps (ACAs) * Manage access to Azure Container Registry (ACR) * Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption * Recommend security configurations for Azure API Management 9 - PLAN AND IMPLEMENT SECURITY FOR STORAGE * Configure access control for storage accounts * Manage life cycle for storage account access keys * Select and configure an appropriate method for access to Azure Files * Select and configure an appropriate method for access to Azure Blob Storage * Select and configure an appropriate method for access to Azure Tables * Select and configure an appropriate method for access to Azure Queues * Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage * Configure Bring your own key (BYOK) * Enable double encryption at the Azure Storage infrastructure level 10 - PLAN AND IMPLEMENT SECURITY FOR AZURE SQL DATABASE AND AZURE SQL MANAGED INSTANCE * Enable database authentication by using Microsoft Entra ID * Enable and monitor database audit * Identify use cases for the Microsoft Purview governance portal * Implement data classification of sensitive information by using the Microsoft Purview governance portal * Plan and implement dynamic mask * Implement transparent data encryption? * Recommend when to use Azure SQL Database Always Encrypted 11 - PLAN, IMPLEMENT, AND MANAGE GOVERNANCE FOR SECURITY * Create, assign, and interpret security policies and initiatives in Azure Policy * Configure security settings by using Azure Blueprint * Deploy secure infrastructures by using a landing zone * Create and configure an Azure Key Vault * Recommend when to use a dedicated Hardware Security Module (HSM) * Configure access to Key Vault, including vault access policies and Azure Role Based Access Control * Manage certificates, secrets, and keys * Configure key rotation * Configure backup and recovery of certificates, secrets, and keys 12 - MANAGE SECURITY POSTURE BY USING MICROSOFT DEFENDER FOR CLOUD * Implement Microsoft Defender for Cloud * Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory * Assess compliance against security frameworks and Microsoft Defender for Cloud * Add industry and regulatory standards to Microsoft Defender for Cloud * Add custom initiatives to Microsoft Defender for Cloud * Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud * Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - CONFIGURE AND MANAGE THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD * Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS * Configure Microsoft Defender for Servers * Configure Microsoft Defender for Azure SQL Database * Manage and respond to security alerts in Microsoft Defender for Cloud * Configure workflow automation by using Microsoft Defender for Cloud * Evaluate vulnerability scans from Microsoft Defender for Server 14 - CONFIGURE AND MANAGE SECURITY MONITORING AND AUTOMATION SOLUTIONS * Monitor security events by using Azure Monitor * Configure data connectors in Microsoft Sentinel * Create and customize analytics rules in Microsoft Sentinel * Configure automation in Microsoft Sentinel ADDITIONAL COURSE DETAILS: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered Online5 days, May 14th, 08:30 + 5 more
£2380

Architecting on AWS

By Nexus Human

DURATION 3 DAYS 18 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR SOLUTIONS ARCHITECTS, SOLUTION-DESIGN ENGINEERS, DEVELOPERS SEEKING AN UNDERSTANDING OF AWS ARCHITECTING AND INDIVIDUALS SEEKING THE AWS SOLUTIONS ARCHITECT-ASSOCIATE CERTIFICATION. OVERVIEW IDENTIFY AWS ARCHITECTING BASIC PRACTICES. EXPLORE USING THE AWS MANAGEMENT TOOLS: THE AWS CONSOLE, COMMAND LINE INTERFACE (CLI), AND CLOUDFORMATION IN A LAB ENVIRONMENT. EXAMINE THE ENFORCEMENT OF ACCOUNTS SECURITY USING POLICIES. IDENTIFY THE ELEMENTS THAT BUILD AN ELASTIC, SECURE, VIRTUAL NETWORK THAT INCLUDES PRIVATE AND PUBLIC SUBNETS. PRACTICE BUILDING AN AWS CORE NETWORKING INFRASTRUCTURE. DETERMINE STRATEGIES FOR A LAYERED SECURITY APPROACH TO VIRTUAL PRIVATE CLOUD (VPC) SUBNETS. IDENTIFY STRATEGIES TO SELECT THE APPROPRIATE COMPUTE RESOURCES BASED ON BUSINESS USE-CASES. PRACTICE BUILDING A VPC AND ADDING AN ELASTIC CLOUD COMPUTE (EC2) INSTANCE IN A LAB ENVIRONMENT. PRACTICE INSTALLING AN AMAZON RELATIONAL DATABASE SERVICE (RDS) INSTANCE AND AN APPLICATION LOAD BALANCER (ALB) IN THE VPC YOU CREATED. COMPARE AND CONTRAST AWS STORAGE PRODUCTS AND SERVICES, BASED ON BUSINESS SCENARIOS. COMPARE AND CONTRAST THE DIFFERENT TYPES OF AWS DATABASE SERVICES BASED ON BUSINESS NEEDS. PRACTICE BUILDING A HIGHLY AVAILABLE, AUTO-SCALING DATABASE LAYER IN A LAB. EXPLORE THE BUSINESS VALUE OF AWS MONITORING SOLUTIONS. IDENTIFY THE ROLE OF MONITORING, EVENT DRIVEN LOAD BALANCING, AND AUTO SCALING RESPONSES, BASED ON USAGE AND NEEDS. IDENTIFY AND DISCUSS AWS AUTOMATION TOOLS THAT WILL HELP YOU BUILD, MAINTAIN AND EVOLVE YOUR INFRASTRUCTURE. DISCUSS NETWORK PEERING, VPC ENDPOINTS, GATEWAY AND ROUTING SOLUTIONS BASED ON USE-CASES. DISCUSS HYBRID NETWORKING CONFIGURATIONS TO EXTEND AND SECURE YOUR INFRASTRUCTURE. DISCUSS THE BENEFITS OF MICROSERVICES AS AN EFFECTIVE DECOUPLING STRATEGY TO POWER HIGHLY AVAILABLE APPLICATIONS AT SCALE. EXPLORE AWS CONTAINER SERVICES FOR THE RAPID IMPLEMENTATION OF AN INFRASTRUCTURE-AGNOSTIC, PORTABLE APPLICATION ENVIRONMENT. IDENTIFY THE BUSINESS AND SECURITY BENEFITS OF AWS SERVERLESS SERVICES BASED ON BUSINESS EXAMPLES. PRACTICE BUILDING A SERVERLESS INFRASTRUCTURE IN A LAB ENVIRONMENT. DISCUSS THE WAYS IN WHICH AWS EDGE SERVICES ADDRESS LATENCY AND SECURITY. PRACTICE BUILDING A CLOUDFRONT DEPLOYMENT WITH AN S3 BACKEND IN A LAB ENVIRONMENT. EXPLORE AWS BACKUP, RECOVERY SOLUTIONS, AND BEST PRACTICES TO ENSURE RESILIENCY AND BUSINESS CONTINUITY. BUILD A HIGHLY AVAILABLE AND SECURE CLOUD ARCHITECTURE BASED ON A BUSINESS PROBLEM, IN A PROJECT-BASED FACILITATOR-GUIDED LAB. DESCRIPTION ARCHITECTING ON AWS IS FOR SOLUTIONS ARCHITECTS, SOLUTION-DESIGN ENGINEERS, AND DEVELOPERS SEEKING AN UNDERSTANDING OF AWS ARCHITECTING. IN THIS COURSE, YOU WILL LEARN TO IDENTIFY SERVICES AND FEATURES TO BUILD RESILIENT, SECURE AND HIGHLY AVAILABLE IT SOLUTIONS ON THE AWS CLOUD. ARCHITECTURAL SOLUTIONS DIFFER DEPENDING ON INDUSTRY, TYPES OF APPLICATIONS, AND BUSINESS SIZE. AWS AUTHORIZED INSTRUCTORS EMPHASIZE BEST PRACTICES USING THE AWS WELL-ARCHITECTED FRAMEWORK, AND GUIDE YOU THROUGH THE PROCESS OF DESIGNING OPTIMAL IT SOLUTIONS, BASED ON REAL-LIFE SCENARIOS. THE MODULES FOCUS ON ACCOUNT SECURITY, NETWORKING, COMPUTE, STORAGE, DATABASES, MONITORING, AUTOMATION, CONTAINERS, SERVERLESS ARCHITECTURE, EDGE SERVICES, AND BACKUP AND RECOVERY. AT THE END OF THE COURSE, YOU WILL PRACTICE BUILDING A SOLUTION AND APPLY WHAT YOU HAVE LEARNED WITH CONFIDENCE. PREREQUISITES * AWS CLOUD PRACTITIONER ESSENTIALS CLASSROOM OR DIGITAL TRAINING, OR * WORKING KNOWLEDGE OF DISTRIBUTED SYSTEMS * FAMILIARITY WITH GENERAL NETWORKING CONCEPTS * FAMILIARITY WITH IP ADDRESSING * WORKING KNOWLEDGE OF MULTI-TIER ARCHITECTURES * FAMILIARITY WITH CLOUD COMPUTING CONCEPTS 0 - INTRODUCTIONS & COURSE MAP REVIEW * Welcome and course outcomes 1 - ARCHITECTING FUNDAMENTALS REVIEW * AWS Services and Infrastructure * Infrastructure Models * AWS API Tools * Securing your infrastructure * The Well-Architected Framework * Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - ACCOUNT SECURITY * Security Principals * Identity and Resource-Based Policies * Account Federation * Introduction to Managing Multiple Accounts 3 - NETWORKING, PART 1 * IP Addressing * Amazon Virtual Private Cloud (VPC), Patterns and Quotas * Routing * Internet Access * Network Access Control Lists (NACLs) * Security Groups 4 - COMPUTE * Amazon Elastic Cloud Compute (EC2) * EC2 Instances and Instance Selection * High Performance Computing on AWS * Lambda and EC2, When to Use Which * Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - STORAGE * Amazon S3, Security, Versioning and Storage Classes * Shared File Systems * Data Migration Tools 6 - DATABASE SERVICES * AWS Database Solutions * Amazon Relational Database Services (RDS) * DynamoDB, Features and Use Cases * Redshift, Features, Use Cases and Comparison with RDS * Caching and Migrating Data * Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - MONITORING AND SCALING * Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs * Invoking Events 8 - AUTOMATION * CloudFormation * AWS Systems Manager 9 - CONTAINERS * Microservices * Monitoring Microservices with X-Ray * Containers 10 - NETWORKING PART 2 * VPC Peering & Endpoints * Transit Gateway * Hybrid Networking * Route 53 11 - SERVERLESS ARCHITECTURE * Amazon API Gateway * Amazon SQS, Amazon SNS * Amazon Kinesis Data Streams & Kinesis Firehose * Step Functions * Hands-on Lab: Build a Serverless Architecture 12 - EDGE SERVICES * Edge Fundamentals * Amazon CloudFront * AWS Global Accelerator * AWS Web Application Firewall (WAF), DDoS and Firewall Manager * AWS Outposts * Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - BACKUP AND RECOVERY * Planning for Disaster Recovery * AWS Backup * Recovery Strategie ADDITIONAL COURSE DETAILS: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS
Delivered Online4 days, May 20th, 08:30 + 6 more
£2025

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop

By Nexus Human

DURATION 4 DAYS 24 CPD HOURS THIS COURSE IS INTENDED FOR STUDENTS FOR AZ-140: CONFIGURING AND OPERATING MICROSOFT AZURE VIRTUAL DESKTOP ARE INTERESTED IN DELIVERING APPLICATIONS ON AZURE VIRTUAL DESKTOP AND OPTIMIZING THEM TO RUN IN MULTI-SESSION VIRTUAL ENVIRONMENTS. AS AN AZURE VIRTUAL DESKTOP ADMINISTRATOR, YOU WILL CLOSELY WITH THE AZURE ADMINISTRATORS AND ARCHITECTS, ALONG WITH MICROSOFT 365 ADMINISTRATORS. AZURE VIRTUAL DESKTOP ADMINISTRATOR RESPONSIBILITIES INCLUDE PLANNING, DEPLOYING, PACKAGING, UPDATING, AND MAINTAINING THE AZURE VIRTUAL DESKTOP INFRASTRUCTURE. THEY ALSO CREATE SESSION HOST IMAGES, IMPLEMENT AND MANAGE FSLOGIX, MONITOR AZURE VIRTUAL DESKTOP PERFORMANCE, AND AUTOMATE AZURE VIRTUAL DESKTOP MANAGEMENT TASKS. DESCRIPTION THIS COURSE TEACHES AZURE ADMINISTRATORS HOW TO PLAN, DELIVER, AND MANAGE VIRTUAL DESKTOP EXPERIENCES AND REMOTE APPS, FOR ANY DEVICE, ON AZURE. LESSONS INCLUDE IMPLEMENTING AND MANAGING NETWORKING FOR AZURE VIRTUAL DESKTOP, CONFIGURING HOST POOLS AND SESSION HOSTS, CREATING SESSION HOST IMAGES, IMPLEMENTING, AND MANAGING FSLOGIX, MONITORING AZURE VIRTUAL DESKTOP PERFORMANCE AND HEALTH, AND AUTOMATING AZURE VIRTUAL DESKTOP MANAGEMENT TASKS. STUDENTS WILL LEARN THROUGH A MIX OF DEMONSTRATIONS AND HANDS-ON LAB EXPERIENCES DEPLOYING VIRTUAL DESKTOP EXPERIENCES AND APPS ON AZURE VIRTUAL DESKTOP AND OPTIMIZING THEM TO RUN IN MULTI-SESSION VIRTUAL ENVIRONMENTS. CANDIDATES OF THIS COURSE MUST HAVE SOLID AZURE ADMINISTRATION SKILLS. THIS COURSE ASSUMES PRIOR EXPERIENCE, INCLUDING VIRTUALIZATION, NETWORKING, IDENTITY, STORAGE, BACKUP AND RESTORE, AND DISASTER RECOVERY. STUDENTS SHOULD HAVE KNOWLEDGE OF ON-PREMISES VIRTUAL DESKTOP INFRASTRUCTURE TECHNOLOGIES AS THEY RELATE TO MIGRATING TO AZURE VIRTUAL DESKTOP. STUDENTS ARE EXPECTED TO HAVE USED THE TOOLS COMMON TO THE AZURE ENVIRONMENT, SUCH AS THE AZURE POWERSHELL AND CLOUD SHELL. 1 - AZURE VIRTUAL DESKTOP ARCHITECTURE * Azure Virtual Desktop for the enterprise * Azure Virtual Desktop components * Personal and pooled desktops * Service updates for Azure Virtual Desktop desktops * Azure limitations for Azure Virtual Desktop * Virtual machine sizing for Azure Virtual Desktop * Azure Virtual Desktop pricing 2 - DESIGN THE AZURE VIRTUAL DESKTOP ARCHITECTURE * Assess network capacity and speed requirements for Azure Virtual Desktop * Azure Virtual Desktop Experience Estimator * Recommend an operating system for an Azure Virtual Desktop implementation * Balancing host pools * Recommendations for using subscriptions and management groups * Configure a location for the Azure Virtual Desktop metadata * Recommend a configuration for performance requirements 3 - DESIGN FOR USER IDENTITIES AND PROFILES * Select an appropriate licensing model for Azure Virtual Desktop based on requirements * Personal and multi-session desktop scenarios * Recommend an appropriate storage solution * Plan for a desktop client deployment * Plan for Azure Virtual Desktop client deployment - Remote Desktop Protocol (RDP) * Windows Desktop client to multiple devices * Hybrid Identity with Azure Active Directory * Plan for Azure Active Directory (AD) Connect for user identities 4 - IMPLEMENT AND MANAGE NETWORKING FOR AZURE VIRTUAL DESKTOP * Implement Azure virtual network connectivity * Manage connectivity to the internet and on-premises networks * Understanding Azure Virtual Desktop network connectivity * Implement and manage network security for Azure Virtual Desktop * Configure Azure Virtual Desktop session hosts using Azure Bastion * Monitor and troubleshoot network connectivity for Azure Virtual Desktop * Plan and implement Remote Desktop Protocol Shortpath * Configure Remote Desktop Protocol Shortpath for managed networks * Configure Windows Defender Firewall with Advanced Security for RDP Shortpath * Plan and implement Quality of Service for Azure Virtual Desktop 5 - IMPLEMENT AND MANAGE STORAGE FOR AZURE VIRTUAL DESKTOP * Storage for FSLogix components * Configure storage for FSLogix components * Configure storage accounts * Create file shares * Configure disks 6 - CREATE AND CONFIGURE HOST POOLS AND SESSION HOSTS FOR AZURE VIRTUAL DESKTOP * Automate creation of an Azure Virtual Desktop host pool using PowerShell * Configure host pool assignment type * Customize Remote Desktop Protocol (RDP) properties for a host pool * Manage licensing for session hosts that run Windows client * Deploying Azure AD-joined virtual machines in Azure Virtual Desktop 7 - CREATE AND MANAGE SESSION HOST IMAGE FOR AZURE VIRTUAL DESKTOP * Create a managed virtual machine (VM) image * Modify a session host image * Plan for image update and management * Create and use an Azure Compute Gallery using the portal * Create an Azure Virtual Desktop image by using VM Image Builder * Install Microsoft 365 Apps on a master Virtual Hard Disk image * Install language packs in Azure Virtual Desktop 8 - MANAGE ACCESS FOR AZURE VIRTUAL DESKTOP * Role-based access control (RBAC) for Azure Virtual Desktop * Plan and implement Azure roles and role-based access control (RBAC) for Azure Virtual Desktop * Using Azure Virtual Desktop with Microsoft Intune * Configuring screen capture protection for Azure Virtual Desktop 9 - MANAGE SECURITY FOR AZURE VIRTUAL DESKTOP * Plan and implement Conditional Access policies for connections to Azure Virtual Desktop * Plan and implement multifactor authentication (MFA) in Azure Virtual Desktop * Understand Conditional Access policy components * Manage security by using Azure Security Center * Security posture management and threat protection 10 - IMPLEMENT AND MANAGE FSLOGIX * Plan for FSLogix * FSLogix profile containers and Azure files * Install FSLogix * Storage options for FSLogix profile containers * Profile Container vs Office Container * Configure Office Containers * Installing Microsoft Office using FSLogix application containers * Configure Cloud Cache * Configure Profile Containers * Create a profile container with Azure NetApp Files and capacity pool * Manage Rule Sets and application masking 11 - CONFIGURE USER EXPERIENCE SETTINGS * Virtual desktop optimization principles * Persistent virtual desktop environments * Configure user settings through group policies * Configure user settings through Endpoint Manager policies * Configure session timeout properties * Configure device redirections * Configure Universal Print * Implement the Start Virtual Machine on Connect feature * Troubleshoot user profile issues * Troubleshoot Azure Virtual Desktop clients 12 - INSTALL AND CONFIGURE APPS ON A SESSION HOST * MSIX app attach * How MSIX app attach works * Set up a file share for MSIX app attach * Upload MSIX images to Azure NetApp Files in Azure Virtual Desktop * How to configure apps for users * Using the OneDrive sync app on virtual desktops * Using Microsoft Teams on Azure Virtual desktop * Publish built-in apps in Azure Virtual Desktop * Troubleshoot application issues for Azure Virtual Desktop 13 - PLAN FOR DISASTER RECOVERY * Disaster recovery for Azure Virtual Desktop * Virtual machine replication * FSLogix configuration 14 - AUTOMATE AZURE VIRTUAL DESKTOP MANAGEMENT TASKS * Scale session hosts using Azure Automation * Create or update an Azure Automation account * Create an Azure Automation Run As account * Create the Azure Logic App and execution schedule 15 - MONITOR AND MANAGE PERFORMANCE AND HEALTH * Monitor Azure Virtual Desktop by using Azure Monitor * Log Analytics workspace for Azure Monitor * Monitor Azure Virtual Desktop by using Azure Advisor * How to resolve Azure Advisor recommendations * Diagnose graphics performance issues ADDITIONAL COURSE DETAILS: Nexus Humans AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop
Delivered Online5 days, May 20th, 13:00 + 2 more
£2380

Automation Testing

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- * Effective way of introducing automation to your project * Selecting the best and right automation tool * Analysing which test cases need to be automated * Effective way of planning, designing and development * Benefits of Automation Testing * Developing scripts effectively * Effectively executing and maintaining test scripts * Best practices required to follow for successful automation testing * Methods of using the tools to control the execution of the tests * Comparing the expected outcomes with the actual outcomes * Analysing regression test cases and Load testing scenarios * Automating difficult tasks and repetitive tasks * How to run scripts quickly and repeatedly

Automation Testing
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

Automation

By Course Cloud

COURSE OVERVIEW Learn how to increase your online business sales by leveraging automated workflows with this practical course on Automation. In generic terms, automation is the process whereby technology relieves the need for repetitive tasks to be undertaken by human participants. Applying that principle to marketing means that the appropriate technology or tools can not only accommodate that procedure but also adapt and evolve according to interactions.  This comprehensive tutorial on marketing Automation takes a deep dive into this exciting area of commerce. It will help you to streamline and improve your marketing structure with the latest apps and techniques. You will learn about the fundamental concepts of automation routines, the tools that are currently in use, the workflows which should prove the most effective, ways you can build campaigns from scratch, and much more. The objective is for you to leave the training with the creativity and knowledge to build automation workflows that will work for you and make marketing more productive and effective for your purposes. This best selling Automation has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Automation is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Automation is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Automation is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Automation, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Automation will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Automation to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email. 

Automation
Delivered Online On Demand
£25

Educators matching "Automation"

Show all 147
Slick Business - ActiveCampaign Academy with Kay Peacey

slick business - activecampaign academy with kay peacey

Kay Peacey is a world-leading ActiveCampaign training specialist with a seat on the Customer Advisory Board for ActiveCampaign, is the founder the ActiveCampaign Academy [https://slickbusiness.co/activecampaign-academy] at Slick Business [https://slickbusiness.co]. Kay’s unique combination of top-level strategy and technical skills plus a lifetime of teaching make her the perfect person to help your business unlock bigger return on investment from your email marketing automation whilst keeping the human touch. She’s also partial to using Lego mini-figs or paper aeroplanes to drive home the learning. The ActiveCampaign Academy will help you get maximum benefit from the features you’re paying for, so your business can thrive and grow, making sure people open your emails and buy from you, and that you can manage your own ActiveCampaign account with confidence, speed and mastery. Quick Links: The ActiveCampaign Academy This membership is the expert help, strategy, learning resources feedback you need to ace your emails and automation with ActiveCampaign. Time-saving, money-making, stress-reducing ActiveCampaign help is right here for you, wherever you’re at. https://slickbusiness.co/learn [https://slickbusiness.co/activecampaign-academy] Automate Your Business with ActiveCampaign  My free Facebook group for all the help, support and inspiration you need to automate your business with ActiveCampaign. Come on in! https://slickbusiness.co/group [https://slickbusiness.co/group] The FREE Accelerated ActiveCampaign Course Learn to do basic but brilliant things with campaigns, integrations and automation, and avoid common mistakes.  This mini-course is the very best place to get started with ActiveCampaign https://slickbusiness.co/fast [https://slickbusiness.co/accelerated-activecampaign]