• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

191 Business Continuity courses delivered Online

Certified Cloud Security Professional (CCSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - ARCHITECTURAL CONCEPTS AND DESIGN REQUIREMENTS * Cloud Computing Concepts * Cloud Reference Architecture * Cloud Computing Security Concepts * Design Principles of Secure Cloud Computing * Trusted Cloud Services 2 - CLOUD DATA SECURITY * CSA (Cloud Security Alliance) Cloud Data Lifecycle * Cloud Data Storage Architectures * Data Security Strategies * Data Discovery and Classification Technologies * Protecting Privacy and PII (Personally Identifiable Information) * Data Rights Management * Data Retention, Deletion, and Archiving Policies * Auditability, Traceability, and Accountability of Data Events 3 - CLOUD PLATFORM AND INFRASTRUCTURE SECURITY * Cloud Infrastructure Components * Cloud Infrastructure Risks * Designing and Planning Security Controls * Disaster Recovery and Business Continuity Management 4 - CLOUD APPLICATION SECURITY * The Need for Security Awareness and Training in application Security * Cloud Software Assurance and Validation * Verified Secure Software * SDLC (Software Development Life Cycle) Process * Secure SDLC * Specifics of Cloud Application Architecture * Secure IAM (Identity and Access Management) Solutions 5 - OPERATIONS * Planning Process for the Data Center Design * Installation and Configuration of Physical Infrastructure for Cloud Environment * Running Physical Infrastructure for Cloud Environment * Managing Physical Infrastructure for Cloud Environment * Installation and Configuration of Logical Infrastructure for Cloud Environment * Running Logical Infrastructure for Cloud Environment * Managing Logical Infrastructure for Cloud Environment * Compliance with Regulations and Controls * Risk Assessment for Logical and Physical Infrastructure * Collection, Acquisition, and Preservation of Digital Evidence * Managing Communication with Stakeholders 6 - LEGAL AND COMPLIANCE * Legal Requirements and Unique Risks within the Cloud Environment * Relevant Privacy and PII Laws and Regulations * Audit Process, Methodologies, and Required Adaptions for a Cloud Environment * Implications of Cloud to Enterprise Risk Management * Outsourcing and Cloud Contract Design * Vendor Management

Certified Cloud Security Professional (CCSP)
Delivered Online6 days, Jul 15th, 13:00 + 1 more
£4549

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - THE PROCESS OF AUDITING INFORMATION SYSTEMS * ISACA Information Systems Auditing Standards and Guidelines * Fundamental Business Processes * Develop and Implement an Information Systems Audit Strategy * Plan an Audit * Conduct an Audit * The Evidence Life Cycle * Communicate Issues, Risks, and Audit Results * Support the Implementation of Risk Management and Control Practices 2 - IT GOVERNANCE AND MANAGEMENT * Evaluate the Effectiveness of IT Governance * Evaluate the IT Organizational Structure and HR Management * Evaluate the IT Strategy and Direction * Evaluate IT Policies, Standards, and Procedures * Evaluate the Effectiveness of Quality Management Systems * Evaluate IT Management and Monitoring of Controls * IT Resource Investment, Use, and Allocation Practices * Evaluate IT Contracting Strategies and Policies * Evaluate Risk Management Practices * Performance Monitoring and Assurance Practices * Evaluate the Organizations Business Continuity Plan 3 - INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION * Evaluate the Business Case for Change * Evaluate Project Management Frameworks and Governance Practices * Development Life Cycle Management * Perform Periodic Project Reviews * Evaluate Control Mechanisms for Systems * Evaluate Development and Testing Processes * Evaluate Implementation Readiness * Evaluate a System Migration * Perform a Post-Implementation System Review 4 - INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT * Perform Periodic System Reviews * Evaluate Service Level Management Practices * Evaluate Third-Party Management Practices * Evaluate Operations and End User Management Practices * Evaluate the Maintenance Process * Evaluate Data Administration Practices * Evaluate the Use of Capacity and Performance Monitoring Methods * Evaluate Change, Configuration, and Release Management Practices * Evaluate Problem and Incident Management Practices * Evaluate the Adequacy of Backup and Restore Provisions 5 - PROTECTION OF INFORMATION ASSETS * Information Security Design * Encryption Basics * Evaluate the Functionality of the IT Infrastructure * Evaluate Network Infrastructure Security * Evaluate the Design, Implementation, and Monitoring of Logical Access Controls * Risks and Controls of Virtualization * Evaluate the Design, Implementation, and Monitoring of Data Classification Process * Evaluate the Design, Implementation, and Monitoring of Physical Access Controls * Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered Online6 days, Aug 12th, 13:00 + 1 more
£3250

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. COURSE OUTLINE * Information Security Threats and Vulnerabilities * Information Security Attacks * Network Security Fundamentals * Identification, Authentication, and Authorization * Network Security Controls: Administrative Controls * Network Security Controls: Physical Controls * Network Security Controls: Technical Controls * Network Security Assessment Techniques and Tools * Application Security * Virtualization and Cloud Computing * Wireless Network Security * Mobile Device Security * Internet of Things (IoT) and Operational Technology (OT) Security * Cryptography * Data Security * Network Troubleshooting * Network Traffic Monitoring * Network Log Monitoring and Analysis * Incident Response * Computer Forensics * Business Continuity and Disaster Recovery * Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered Online6 days, Oct 21st, 13:00
£3495

Crisis Management and Business Continuity

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- This will include lectures, a detailed simulation exercise, and group discussions. Delegates will recognize the elements where their organizations may have the skills and resources to manage a crisis, but the course will help identify where specialist external support may also be required. The course is designed to provide a balanced view of how best to manage specific crisis issues while simultaneously minimizing any negative impact on ongoing business operations. Delegates will develop a list of subjects to address upon returning to their sponsoring organization

Crisis Management and Business Continuity
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

CompTIA Cloud+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who wish to develop cloud computing skills to enable them to move IT workloads to the cloud and integrate products and services from different providers and industries. Their focus is to ensure that cloud deployments are secure, that automation and orchestration are used effectively to bring business value from the cloud, and that costs are controlled through effective management of cloud vendors. This course is also designed for students who are preparing to take the CompTIA Cloud+ certification exam CV0-003, or who plan to use Cloud+ as the foundation for more advanced cloud certifications or career roles. Overview In this course, you will deploy, test, secure, manage, optimize, and troubleshoot a cloud solution. You will: - Prepare to deploy cloud solutions - Deploy a pilot project - Test a pilot project deployment - Design a secure network for cloud deployment - Determine CPU and memory sizing for cloud deployments - Determine storage requirements for cloud deployments - Plan Identity and Access Management for cloud deployments - Analyze workload characteristics to ensure successful migration to the cloud - Secure systems to meet access requirements - Maintain cloud systems - Implement backup, restore, and business continuity measures - Analyze cloud systems for required performance - Analyze cloud systems for anomalies and growth forecasting - Troubleshoot deployment, capacity, automation, and orchestration issues - Troubleshoot connectivity issues - Troubleshoot security issues In this course, you will learn how to implement, maintain, and deliver cloud technologies including network, storage, and virtualization technologies to create cloud solutions. 1 - PREPARING TO DEPLOY CLOUD SOLUTIONS * Describe Interaction of Cloud Components and Services * Describe Interaction of Non-cloud Components and Services * Evaluate Existing Components and Services for Cloud Deployment * Evaluate Automation and Orchestration Options * Prepare for Cloud Deployment 2 - DEPLOYING A PILOT PROJECT * Manage Change in a Pilot Project * Execute Cloud Deployment Workflow * Complete Post-Deployment Configuration 3 - TESTING PILOT PROJECT DEPLOYMENTS * Identify Cloud Service Components for Testing * Test for High Availability and Accessibility * Perform Deployment Load Testing * Analyze Test Results 4 - DESIGNING A SECURE AND COMPLIANT CLOUD INFRASTRUCTURE * Design Cloud Infrastructure for Security * Determine Organizational Compliance Needs 5 - DESIGNING AND IMPLEMENTING A SECURE CLOUD ENVIRONMENT * Design Virtual Network for Cloud Deployment * Determine Network Access Requirements * Secure Networks for Cloud Interaction * Manage Cloud Component Security * Implement Security Technologies 6 - PLANNING IDENTITY AND ACCESS MANAGEMENT FOR CLOUD DEPLOYMENTS * Determine Identity Management and Authentication Technologies * Plan Account Management Policies for the Network and Systems * Control Access to Cloud Objects * Provision Accounts 7 - DETERMINING CPU AND MEMORY SIZING FOR CLOUD DEPLOYMENTS * Determine CPU Size for Cloud Deployment * Determine Memory Size for Cloud Deployment 8 - DETERMINING STORAGE REQUIREMENTS FOR CLOUD DEPLOYMENTS * Determine Storage Technology Requirements * Select Storage Options for Deployment * Determine Storage Access and Provisioning Requirements * Determine Storage Security Options 9 - ANALYZING WORKLOAD CHARACTERISTICS TO ENSURE SUCCESSFUL MIGRATION * Determine the Type of Cloud Deployment to Perform * Manage Virtual Machine and Container Migration * Manage Network, Storage, and Data Migration 10 - MAINTAINING CLOUD SYSTEMS * Patch Cloud Systems * Design and Implement Automation and Orchestration for Maintenance 11 - IMPLEMENTING BACKUP, RESTORE, DISASTER RECOVERY, AND BUSINESS CONTINUITY MEASURES * Back Up and Restore Cloud Data * Implement Disaster Recovery Plans * Implement Business Continuity Plans 12 - ANALYZING CLOUD SYSTEMS FOR PERFORMANCE * Monitor Cloud Systems to Measure Performance * Optimize Cloud Systems to Meet Performance Criteria 13 - ANALYZING CLOUD SYSTEMS FOR ANOMALIES AND GROWTH FORECASTING * Monitor for Anomalies and Resource Needs * Plan for Capacity * Create Reports on Cloud System Metrics 14 - TROUBLESHOOTING DEPLOYMENT, CAPACITY, AUTOMATION, AND ORCHESTRATION ISSUES * Troubleshoot Deployment Issues * Troubleshoot Capacity Issues * Troubleshoot Automation and Orchestration Issues 15 - TROUBLESHOOTING CONNECTIVITY ISSUES * Identify Connectivity Issues * Troubleshoot Connectivity Issues 16 - TROUBLESHOOTING SECURITY ISSUES * Troubleshoot Identity and Access Issues * Troubleshoot Attacks * Troubleshoot Other Security Issues ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Cloud Plus Certification (Exam CV0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cloud Plus Certification (Exam CV0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cloud+
Delivered Online6 days, Sept 23rd, 13:00 + 1 more
£2475

ISO 22301 Lead Auditor

By Training Centre

  ISO 22301 Lead Auditor training enables you to develop the necessary expertise to perform a Business Continuity Management System (BCMS) audit by applying widely recognized audit principles, procedures and techniques. ABOUT THIS COURSE   During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.    After attending this 4 day course, candidates can sit for the exam with the aim of gaining the "ISO22301 Lead Auditor' credential. You will then be in a position to demonstrate that you have the capabilities and competencies to audit organizations based on best practices.      LEARNING OBJECTIVES   * Understand the operations of a Business Continuity Management System based on ISO 22301 * Acknowledge the correlation between ISO 22301 and other standards and regulatory frameworks * Understand an auditor's role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011 * Learn how to lead an audit and audit team * Learn how to interpret the requirements of ISO 22301 in the context of a BCMS audit * Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011   EDUCATIONAL APPROACH   * This training is based on both theory and best practices used in BCMS audits * Lecture sessions are illustrated with examples based on case studies  * Practical exercises are based on a case study which includes role playing and discussions * Practice tests are similar to the Certification Exam PREREQUISITES   A foundational understanding of ISO 22301 and knowledge of audit principles. WHAT'S INCLUDED?   Refreshments & Lunch (Classroom courses only)                   Course Slide Deck              Official Study Materials  CPD Certificate          The Exam fees WHO SHOULD ATTEND?   * Auditors seeking to perform and lead Business Continuity Management System (BCMS) certification audits * Managers or consultants seeking to master a Business Continuity Management System audit process * Individuals responsible for maintaining conformance with Business Continuity Management System requirements * Technical experts seeking to prepare for a Business Continuity Management System audit * Expert advisors in Business Continuity Management OUR GUARANTEE   * We are an approved IECB Training Partner. * You can learn wherever and whenever you want with our robust classroom and interactive online training courses. * Our courses are taught by qualified practitioners with commercial experience. * We strive to give our delegates the hands-on experience. * Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. * Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. * Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam. ASSESSMENT   The exam is a 12 question essay type exam completed in the afternoon of Day 4. The pass mark for the exam is 70%. Exam results are provided within 24 hours. PROVIDED BY   This course is Accredited by NACS [http://www.nacs.ee]and administered by the IECB [https://www.iecb.org]. ACCREDITATION

ISO 22301 Lead Auditor
Delivered Online
Dates arranged on request
£1450

ISO 22301 Lead Implementer Online Course

By Cognicert Limited

The “ISO 22301:2019 Lead Implementer ” course provides comprehensive training in the ISO 22301:2019 standard and all its requirements from the Implementer ’s point of view, as well as basic skills necessary to execute the requirements. It’s a practical-oriented training that should be considered “a must” for every ISO 22301:2019 Implementer. This intensive course is specifically designed to participants to serve as ISO 22301:2019 Lead Implementers.

ISO 22301 Lead Implementer Online Course
Delivered Online On Demand
£475

ISO 22301 Lead Implementer

By Training Centre

  Delivered in either our Live Online (4 days) or in a Classroom environment (5 days), the ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301. ABOUT THIS COURSE   During this training course, you will gain a thorough understanding of the best practices of Business Continuity Management Systems and be able to provide a framework that allows the organization to continue operating efficiently during disruptive events. After mastering all the necessary concepts of Business Continuity Management Systems, you can sit for the exam and gain the "ISO 22301 Lead Implementer' credential. By holding this Certificate, you will demonstrate that you have the practical knowledge and professional capabilities to implement ISO 22301 in an organization.   LEARNING OBJECTIVES   * Acknowledge the correlation between ISO 22301 and other standards and regulatory frameworks * Master the concepts, approaches, methods and techniques used for the implementation and effective management of a BCMS * Learn how to interpret the ISO 22301 requirements in the specific context of an organization * Learn how to support an organization to effectively plan, implement, manage and maintain a BCMS * Acquire the expertise to advise an organization in implementing Business Continuity Management System best practices   EDUCATIONAL APPROACH   * This training is based on both theory and best practices used in the implementation of a BCMS * Lecture sessions are illustrated with examples based on case studies * Practical exercises are based on a case study which includes role playing and discussions * Practice tests are similar to the Certification Exam PREREQUISITES   A foundational understanding of ISO 22301 and knowledge of implementation principles. WHAT'S INCLUDED?   Refreshments & Lunch (Classroom based only)                   Course Slide Deck              Official Study Materials CPD Certificate              The Exam fees WHO SHOULD ATTEND?   * Managers or consultants involved in Business Continuity Management * Expert advisors seeking to master the implementation of a Business Continuity Management System * Individuals responsible for maintaining conformance with BCMS requirements * BCMS team members ACCREDITATION OUR GUARANTEE   * We are an approved IECB Training Partner. * You can learn wherever and whenever you want with our robust classroom and interactive online training courses. * Our courses are taught by qualified practitioners with commercial experience. * We strive to give our delegates the hands-on experience. * Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. * Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. * Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam. ASSESSMENT   The exam is a 12 question essay type. The pass mark for the exam is 70% and should be completed within the 150 minutes allocated. Results are provided within 24 hours of completion. PROVIDED BY   This course is Accredited by NACS [http://www.nacs.ee] and Administered by the IECB [https://www.iecb.org]

ISO 22301 Lead Implementer
Delivered Online
Dates arranged on request
£1450

ISO 22301:2019 Internal Auditor Course

3.8(4)

By Traibcert Ltd- Iso 9001 Certification In Middlesex, Uk

Traibcert Online training provide the knowledge and skills required to perform an internal audit of part of a Business Continuity management system based on ISO 22301 and report on the effective implementation and maintenance of the management system in accordance with ISO 19011.

ISO 22301:2019 Internal Auditor Course
Delivered Online On Demand
£489

55344 Identity with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server. This would typically include: ?AD DS administrators who are looking to train in identity and access technologies with Windows Server 2016, Windows Server 2019 or Windows Server 2022. ?System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2016, Windows Server 2019 or Windows Server 2022. Overview Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement and administer Active Directory Rights Management Services (AD RMS). Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement synchronization between AD DS and Azure AD. Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. Monitor, troubleshoot, and establish business continuity for AD DS services. This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory - related issues with Windows Server. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS). Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites * Some exposure to and experience with Active Directory concepts and technologies in Windows Server. * Experience working with and configuring Windows Server. * Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) * Experience working with and an understanding basic server virtualization concepts. 1 - Installing and configuring domain controllers * Overview of AD DS * Overview of AD DS domain controllers * Deploying a domain controller 2 - Managing objects in AD DS * Managing user accounts * Managing groups in AD DS * Managing computer objects in AD DS * Using Windows PowerShell for AD DS administration * Implementing and managing OUs 3 - Advanced AD DS infrastructure management * Overview of advanced AD DS deployments * Deploying a distributed AD DS environment * Configuring AD DS trusts 4 - Implementing and administering AD DS sites and replication * Overview of AD DS replication * Configuring AD DS sites * Configuring and monitoring AD DS replication 5 - Implementing Group Policy * Introducing Group Policy * Implementing and administering GPOs * Group Policy scope and Group Policy processing * Troubleshooting the application of GPOs 6 - Managing user settings with Group Policy * Implementing administrative templates * Configuring Folder Redirection, software installation, and scripts * Configuring Group Policy preferences 7 - Securing Active Directory Domain Services * Securing domain controllers * Implementing account security * Implementing audit authentication * Configuring managed service accounts 8 - Deploying and managing AD CS * Deploying CAs * Administering CAs * Troubleshooting and maintaining CAs 9 - Deploying and managing certificates * Deploying and managing certificate templates * Managing certificate deployment, revocation, and recovery * Using certificates in a business environment * Implementing and managing smart cards 10 - Implementing and administering AD FS * Overview of AD FS * AD FS requirements and planning * Deploying and configuring AD FS * Web Application Proxy Overview 11 - Implementing and administering AD RMS * Overview of AD RMS * Deploying and managing an AD RMS infrastructure * Configuring AD RMS content protection 12 - Implementing AD DS synchronization with Microsoft Azure AD * Planning and preparing for directory synchronization * Implementing directory synchronization by using Azure AD Connect * Managing identities with directory synchronization 13 - Monitoring, managing, and recovering AD DS * Monitoring AD DS * Managing the Active Directory database * Active Directory backup and recovery options for AD DS and other identity and access solutions

55344 Identity with Windows Server
Delivered Online6 days, Aug 12th, 13:00 + 1 more
£2975