• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3485 EDI courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

GRAPHIC DESIGN COURSE

5.0(1)

By Graphic Design Courses Birmingham

Be it a career change, an exciting new hobby, perfecting existing skills or simply enhancing professional employment prospects– we help you unlock creativity through our industry aligned all-encompassing Graphic Design Course. -------------------------------------------------------------------------------- " Having done my level 1 and level 2 in graphic design, I felt that I still had gaps in my knowledge and I wasn't comfortable with what I knew. I signed up with Blue Sky Graphics and I am really glad I did. I am definitely better now than when I started and this is all thanks to my tutor and Blue Sky Graphics 🙂 " -------------------------------------------------------------------------------- A Comprehensive Advanced Course The graphic design course is a structured academic and industry aligned advanced course suitable for complete beginners, intermediates or those wanting to improve their existing skill set. The graphic design course is comprehensive and through our teaching methodology is designed to train participants to become professional Graphic Designers. There is an emphasis on corporate illustration, composition, painting and logos as well as advertisement designs while focusing on vectors, lines, features, shapes, and spaces. All this will be integrated into how graphic elements are printed after they are processed in graphic design software for the purpose of visually illustrating emotions and messages. During the course you will be exposed to: advertisements, magazines, newspapers, corporate graphic designs particular to company cultures and brand identity, stationery, letterheads, business cards, logos, books, packaging and much more. The graphic design course teaches you to understand and learn how to operate a labyrinthine yet amazing world of Adobe software. With this software we explore the uses of words, shapes, textures, forms, sizes and colours to communicate by combining ideas and images to make a new concept. Graphic design through common misconception is not just about layout and typography, but much more about ideas behind visual meaning. Graphic design can make a company more successful in the world if it makes communication smart, attractive and able to captivate its audience. Graphic design can effectively be used by businesses to make (or break) their brand identity, increase sales, promote web traffic or promote services and products through advertising on their websites to convey complex data to its readers in a clear way. Elements of graphic design include: Colour, Size, Texture, Line, Shape, Space and, Form. It is important that each element is understood correctly, and this is one of the key principles we teach on our graphic design course. In other terms, graphic design communicates certain ideas or messages through visuals. These visuals can be as simple as a business logo, or as complex as pages of web design. This course goes beyond just the practical side of graphic design and includes the theory and substance behind modern graphic design. Your teacher will guide you on: What salary you can expect at the start of your career? How to get new clients for your business for freelance designers ? How to find work for the new graphic designer starting out in the big world? How to quickly integrate into the graphic design field? How to combine working from home versus working at a studio ? BEGIN ONE-TO-ONE ONLINE LEARNING WITH YOUR VERY OWN PRIVATE TUTOR -------------------------------------------------------------------------------- INTERESTED? Our course is 7 months long, consisting of 1 hour 30 minutes of online one-to-one sessions. When you enrol at Blue Sky Graphics expect at least 90 minutes of class sessions and 2 – 4 hours of homework per week. If we accommodate the course delivery into a shorter time frame, (for e.g. over 4 months instead of 7 months the Flexi 3 doubles from £265.00 to £450.00 over 4 months) the instalment is billed at the delivery rate.  The cost of traditional schooling is typically more expensive than online courses, but in the end it all comes down to how good the tutors are. With our online courses you can gain skills that are a necessity for graphic design remotely. That’s right! Learn the skills needed to use Photoshop, Illustrator, InDesign and portfolio! The online courses cost £1799.00 (VAT inclusive) with no extra hidden costs and there are affordable instalment options too. Pay via debit or credit card or use a payment plan. A deposit of £294.00 is required to secure your position.

GRAPHIC DESIGN COURSE
Delivered Online6 months, Jun 3rd, 08:00 + 6 more
£1799

18th Edition Course Aberdeen

By MJ Electrical Training

City & Guilds 18th edition online course with Aberdeen centre examination for only £234.00. Online course, tutor support, same day results, quick results & certification.

18th Edition Course Aberdeen
Delivered Online & In-Person in Edinburgh2 hours, Jun 3rd, 08:00 + 42 more
£234

Trauma Risk Management Practitioner

5.0(1)

By Strongmind Resiliency Training Ltd

Properly employed and supported, TRiM Practitioners can make a significant contribution to staff welfare by offering structured peer support and TRiM assessments to colleagues. TRiM practitioners are trained to identify the risk factors for the development of post traumatic stress and to know when to signpost colleagues to professional support.

Trauma Risk Management Practitioner
Delivered OnlineTwo days, Jun 3rd, 08:00
£780

The Art of Cinematic Performance

By Actors Studio

With Carolyn Pickles & Sue Dunderdale -------------------------------------------------------------------------------- INTRODUCTION Over 5 full days, train with two industry heavyweights leading from the perspective of an Actor and then Director, as you unlock the skills required to develop real and convincing characters that enable engaging and cinematic performances. Through improvisation you will develop a scene to support your work over the week as you progress through a journey of taking a performance from theatre to screen, supported by a range of immersive techniques and critical direction from the tutors. This unique course is designed for drama school graduates, those in training, and professional actors seeking to enhance their skills. Please note that this course is not suitable for beginners. MEET YOUR TUTORS CAROLYN PICKLES Actress Carolyn Pickles is an English actress of stage and screen with a career spanning over 40 years where she has led on award-winning British Drama including Broadchurch, Vera in addition to films such as Harry Potter. Working with Carolyn will give you the opportunity to tap into her experience and help maximise your chances of securing that next acting role. SUE DUNDERDALE Director Sue Dunderdale has an impressive background in the world of Theatre, Film and TV Directing. Her commitment to fostering both new talent and working with BAFTA award-winning actors underscores her versatility and dedication to the craft. Having coached and directed acclaimed actors such as Helena Bonham Carter and Clarke Peters,  Sue has worked with BAFTA-winning performers, contributing to their success on screen. -------------------------------------------------------------------------------- The Art of Cinematic Performance As the two tutors come together mid-week, Carolyn and Sue will allocate scenes from screenplays for you to work on and film to self-critically view in the pursuit of understanding the process as an actor. In the final two days, whilst rehearsing the scenes, Sue will focus on the life within the character that creates the tension/conflict in the scene. Discovering with you that it is important to know the lines of the scene so well that they can become the least part of the work. It is what lies beneath the lines that creates the quality of the performance and makes for interest on camera. Over the 5 Days you will learn the importance of sub-text, and how it supports the written text. Through intricate analysis and breakdowns, life experience, knowledge and exterior impacts will be explored to inject life into scenes and enable real thoughts and emotions in a character. These techniques can be applied in any role, big or small and enhance your capabilities in an actor when asked to self-tape or audition, giving you a more dynamic skillset often looked for by Casting Directors. With a focus on screen, all footage filmed during the week will be available after completion for your future development.  -------------------------------------------------------------------------------- ADDITIONAL INFORMATION FEATURES 5 Day Intensive Practical courseSuitable if you are (17 yrs+) and a training actor, drama school graduate or professional actorNot suitable for Beginners – see our Crash Course Beginners and 1 Day Screen Acting WorkshopAttracts a varied age range from 17 yrs+. International Students WelcomeThe course is taught in English, so it is important that you have proficient English language skillsSmall Class SizeHeld at Pinewood Studios LEARNING OUTCOMES Learn the Differences from Stage to ScreenScript Analysis from an Actor and Director PerspectiveStand Out on Screen and in AuditionsBring life to your performance on Stage and ScreenLearn the ingredients of building a successful acting career COURSE LOCATION Actors Studio, Pinewood Studios, Pinewood Road, Iver Heath, SL0 0NHFree parking available on siteFree shuttle bus service from Uxbridge Tube Station, Slough and Gerrards CrossCanteen and Coffee shops on SiteExcellent transport links from London

The Art of Cinematic Performance
Delivered In-Person in LondonFull day, Jun 3rd, 09:00 + 4 more
£620

55348 Administering Microsoft Endpoint Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site 2 - ANALYZING DATA USING QUERIES, REPORTS, AND CMPIVOT * Introduction to queries * Configuring SQL Server Reporting Services * Analyzing the real-time state of a device by using CMPivot 3 - PREPARING THE CONFIGURATION MANAGER MANAGEMENT INFRASTRUCTURE * Configuring site boundaries and boundary groups * Configuring resource discovery * Organizing resources using device and user collections 4 - DEPLOYING AND MANAGING THE CONFIGURATION MANAGER CLIENT * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings and performing management operations 5 - MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence 6 - DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points 7 - DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying and managing Windows apps 8 - MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Enabling third-party updates 9 - IMPLEMENTING DEFENDER PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Configuring and deploying advanced threat policies 10 - MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance settings * Viewing compliance results * Managing resource and data access 11 - MANAGING OPERATING SYSTEM DEPLOYMENT * An overview of operating system deployment * Preparing a site for operating system deployment * Deploying an operating system * Managing Windows as a service 12 - MANAGING AND MAINTAINING A CONFIGURATION MANAGER SITE * Configuring role-based administration * Configuring Remote Tools * Overview of Configuration Manager site maintenance and Management Insights * Backing up and recovering a Configuration Manager site * Updating the Configuration Manager infrastructure 13 - WHAT?S NEW IN MICROSOFT ENDPOINT CONFIGURATION MANAGER * Whats new in Microsoft Endpoint Manager covering each semi annual release ADDITIONAL COURSE DETAILS: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55348 Administering Microsoft Endpoint Configuration Manager
Delivered Online6 days, Jun 3rd, 13:00 + 5 more
£2975

PL-300T00 Microsoft Power BI Data Analyst

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The audience for this course are data professionals and business intelligence professionals who want to learn how to accurately perform data analysis using Power BI. This course is also targeted toward those individuals who develop reports that visualize data from the data platform technologies that exist on both in the cloud and on-premises. This course covers the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will show how to access and process data from a range of data sources including both relational and non-relational sources. Finally, this course will also discuss how to manage and deploy reports and dashboards for sharing and content distribution. Prerequisites Understanding core data concepts. Knowledge of working with relational data in the cloud. Knowledge of working with non-relational data in the cloud. Knowledge of data analysis and visualization concepts. DP-900T00 Microsoft Azure Data Fundamentals is recommended 1 - DISCOVER DATA ANALYSIS * Overview of data analysis * Roles in data * Tasks of a data analyst 2 - GET STARTED BUILDING WITH POWER BI * Use Power BI * Building blocks of Power BI * Tour and use the Power BI service 3 - GET DATA IN POWER BI * Get data from files * Get data from relational data sources * Create dynamic reports with parameters * Get data from a NoSQL database * Get data from online services * Select a storage mode * Get data from Azure Analysis Services * Fix performance issues * Resolve data import errors 4 - CLEAN, TRANSFORM, AND LOAD DATA IN POWER BI * Shape the initial data * Simplify the data structure * Evaluate and change column data types * Combine multiple tables into a single table * Profile data in Power BI * Use Advanced Editor to modify M code 5 - DESIGN A SEMANTIC MODEL IN POWER BI * Work with tables * Create a date table * Work with dimensions * Define data granularity * Work with relationships and cardinality * Resolve modeling challenges 6 - ADD MEASURES TO POWER BI DESKTOP MODELS * Create simple measures * Create compound measures * Create quick measures * Compare calculated columns with measures 7 - ADD CALCULATED TABLES AND COLUMNS TO POWER BI DESKTOP MODELS * Create calculated columns * Learn about row context * Choose a technique to add a column 8 - USE DAX TIME INTELLIGENCE FUNCTIONS IN POWER BI DESKTOP MODELS * Use DAX time intelligence functions * Additional time intelligence calculations 9 - OPTIMIZE A MODEL FOR PERFORMANCE IN POWER BI * Review performance of measures, relationships, and visuals * Use variables to improve performance and troubleshooting * Reduce cardinality * Optimize DirectQuery models with table level storage * Create and manage aggregations 10 - DESIGN POWER BI REPORTS * Design the analytical report layout * Design visually appealing reports * Report objects * Select report visuals * Select report visuals to suit the report layout * Format and configure visualizations * Work with key performance indicators 11 - CONFIGURE POWER BI REPORT FILTERS * Apply filters to the report structure * Apply filters with slicers * Design reports with advanced filtering techniques * Consumption-time filtering * Select report filter techniques * Case study - Configure report filters based on feedback 12 - ENHANCE POWER BI REPORT DESIGNS FOR THE USER EXPERIENCE * Design reports to show details * Design reports to highlight values * Design reports that behave like apps * Work with bookmarks * Design reports for navigation * Work with visual headers * Design reports with built-in assistance * Tune report performance * Optimize reports for mobile use 13 - PERFORM ANALYTICS IN POWER BI * Explore statistical summary * Identify outliers with Power BI visuals * Group and bin data for analysis * Apply clustering techniques * Conduct time series analysis * Use the Analyze feature * Create what-if parameters * Use specialized visuals 14 - CREATE AND MANAGE WORKSPACES IN POWER BI * Distribute a report or dashboard * Monitor usage and performance * Recommend a development life cycle strategy * Troubleshoot data by viewing its lineage * Configure data protection 15 - MANAGE SEMANTIC MODELS IN POWER BI * Use a Power BI gateway to connect to on-premises data sources * Configure a semantic model scheduled refresh * Configure incremental refresh settings * Manage and promote semantic models * Troubleshoot service connectivity * Boost performance with query caching (Premium) 16 - CREATE DASHBOARDS IN POWER BI * Configure data alerts * Explore data by asking questions * Review Quick insights * Add a dashboard theme * Pin a live report page to a dashboard * Configure a real-time dashboard * Set mobile view 17 - IMPLEMENT ROW-LEVEL SECURITY * Configure row-level security with the static method * Configure row-level security with the dynamic method ADDITIONAL COURSE DETAILS: Nexus Humans PL-300T00: Microsoft Power BI Data Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-300T00: Microsoft Power BI Data Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-300T00 Microsoft Power BI Data Analyst
Delivered Online4 days, Jun 3rd, 13:00 + 17 more
£1785

January to June 2024 - 3 Hour Hand Building Pottery Workshops

5.0(4)

By Ravn Clay

A three hour slab-building pottery workshop, using stoneware clays to make mess and memories. And Pots! Come play with Clay!

January to June 2024 - 3 Hour Hand Building Pottery Workshops
Delivered In-Person in Berwick-upon-Tweed3 hours, Jun 4th, 08:30 + 3 more
£50

ONE SPACE LEFT! 4th June Louise Buckley #Agent121. Looking for: ADULT FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION Louise Buckley has worked in publishing for well over a decade. She was inspired to enter the publishing industry after completing an MA in Creative Writing and then spent a hugely enjoyable year working as a bookseller for Waterstones, wishing that she could have a hand in publishing books. After a year working at Dorling Kindersley, she then spent almost five years working in the commercial fiction division at Pan Macmillan, where she published a mix of commercial bestsellers and award-winning authors. Most recently, she was an Associate Literary Agent at Zeno Agency Ltd. As an agent she represented a roster of commercial and literary fiction, including Anne Griffin’s When All is Said, which spent five weeks at number one in Ireland and sold into 17 territories. She is delighted to be working with Hannah at Hannah Sheppard Literary Agency. Louise is looking for:- Literary and upmarket fiction that focusses on the underdog, the repressed, the suppressed. Louise is especially interested in novels that represent working-class people or children going through difficult circumstances (think Shuggie Bain by Douglas Stuart, My Name is Leon by Kit de Waal or Boys Don’t Cry by FÍona Scarlett). Irish literary and book club fiction. Think Claire Keegan, Louise Kennedy or Anne Griffin. In commercial fiction she loves novels set during the Second World War, such as The Nightingale by Kristin Hannah, The Beekeeper of Aleppo by Christi Lefteri or The Midwife of Auschwitz by Anna Stuart. Louise recently read and loved The Last List of Mabel Beaumont by Laura Pearson and would love to see anything in the same ‘older person going on a journey’ category, a more recent The Unlikely Pilgrimage of Harold Fry. Louise had a lot of fun publishing a ‘pet fiction’ novel as an editor (Molly and the Cat Café) and would love to find an author who can write an Alfie the Doorstep Cat/Dog. She has a soft spot for novels featuring time-travel or parallel universes, a ‘what if’ that plays around with conventions. At the literary end this would be books like Life After Life by Kate Atkinson, The Shining Girls by Lauren Beukes or This is How You Lose the Time War by Amal El-Mohtar and Max Gladstone. At the more commercial end Louise loved Wrong Place, Wrong Time by Gillian McAllister, Dark Matter by Blake Crouch and Oona Out of Order by Martina Montimore. She also enjoys novels set in the real world but featuring a hefty dose of magic or the supernatural. They can be commercial or literary, present-day or historical. Think Rivers of London by Ben Aaronovitch, Threadneedle by Cari Thomas, A Discovery of Witches by Deborah Harkness or The Gifts by Liz Hyder. And also cosy fantasy in the vein of Legends and Lattes or The House in the Cerulean Sea. Cosy or humorous crime. Recently, Louise absolutely loved Over My Dead Body by Maz Evans. When she was an editor Louise published the hit Luckiest Girl Alive by Jessica Knoll and would love to represent incisive, intelligent suspense written by authors such as Jessica Knoll and Gillian Flynn, or something a little more subversive and blackly comic like My Sister, the Serial Killer by Oyinkan Braithwaite. More generally, Louise would also love to see novels with a disabled protagonist or someone (like myself) who is living with an invisible disability. As an ex-primary school teacher, she also warmly welcomes submissions from teachers, especially if the submission falls into one of the other categories she has listed. Following-on from this, she enjoys reading stories that follow a ‘beating the system’ narrative. Louise is NOT looking for: -romance -romantasy -epic, traditional fantasy -space opera -straightforward women’s fiction -children’s fiction of any kind -non-fiction Louise would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Louise is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk [agent121@iaminprint.co.uk] to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 28 May 2024

ONE SPACE LEFT! 4th June Louise Buckley #Agent121. Looking for: ADULT FICTION
Delivered Online15 minutes, Jun 4th, 09:00 + 6 more
£72

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - INTRODUCTION TO MICROSOFT 365 THREAT PROTECTION * Explore Extended Detection & Response (XDR) response use cases * Understand Microsoft Defender XDR in a Security Operations Center (SOC) * Explore Microsoft Security Graph * Investigate security incidents in Microsoft Defender XDR 2 - MITIGATE INCIDENTS USING MICROSOFT 365 DEFENDER * Use the Microsoft Defender portal * Manage incidents * Investigate incidents * Manage and investigate alerts * Manage automated investigations * Use the action center * Explore advanced hunting * Investigate Microsoft Entra sign-in logs * Understand Microsoft Secure Score * Analyze threat analytics * Analyze reports * Configure the Microsoft Defender portal 3 - PROTECT YOUR IDENTITIES WITH MICROSOFT ENTRA ID PROTECTION * Microsoft Entra ID Protection overview * Detect risks with Microsoft Entra ID Protection policies * Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - REMEDIATE RISKS WITH MICROSOFT DEFENDER FOR OFFICE 365 * Automate, investigate, and remediate * Configure, protect, and detect * Simulate attacks 5 - SAFEGUARD YOUR ENVIRONMENT WITH MICROSOFT DEFENDER FOR IDENTITY * Configure Microsoft Defender for Identity sensors * Review compromised accounts or data * Integrate with other Microsoft tools 6 - SECURE YOUR CLOUD APPS AND SERVICES WITH MICROSOFT DEFENDER FOR CLOUD APPS * Understand the Defender for Cloud Apps Framework * Explore your cloud apps with Cloud Discovery * Protect your data and apps with Conditional Access App Control * Walk through discovery and access control with Microsoft Defender for Cloud Apps * Classify and protect sensitive information * Detect Threats 7 - RESPOND TO DATA LOSS PREVENTION ALERTS USING MICROSOFT 365 * Describe data loss prevention alerts * Investigate data loss prevention alerts in Microsoft Purview * Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - MANAGE INSIDER RISK IN MICROSOFT PURVIEW * Insider risk management overview * Create and manage insider risk policies * Investigate insider risk alerts * Take action on insider risk alerts through cases * Manage insider risk management forensic evidence * Create insider risk management notice templates 9 - INVESTIGATE THREATS BY USING AUDIT FEATURES IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW STANDARD * Explore Microsoft Purview Audit solutions * Implement Microsoft Purview Audit (Standard) * Start recording activity in the Unified Audit Log * Search the Unified Audit Log (UAL) * Export, configure, and view audit log records * Use audit log searching to investigate common support issues 10 - INVESTIGATE THREATS USING AUDIT IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW (PREMIUM) * Explore Microsoft Purview Audit (Premium) * Implement Microsoft Purview Audit (Premium) * Manage audit log retention policies * Investigate compromised email accounts using Purview Audit (Premium) 11 - INVESTIGATE THREATS WITH CONTENT SEARCH IN MICROSOFT PURVIEW * Explore Microsoft Purview eDiscovery solutions * Create a content search * View the search results and statistics * Export the search results and search report * Configure search permissions filtering * Search for and delete email messages 12 - PROTECT AGAINST THREATS WITH MICROSOFT DEFENDER FOR ENDPOINT * Practice security administration * Hunt threats within your network 13 - DEPLOY THE MICROSOFT DEFENDER FOR ENDPOINT ENVIRONMENT * Create your environment * Understand operating systems compatibility and features * Onboard devices * Manage access * Create and manage roles for role-based access control * Configure device groups * Configure environment advanced features 14 - IMPLEMENT WINDOWS SECURITY ENHANCEMENTS WITH MICROSOFT DEFENDER FOR ENDPOINT * Understand attack surface reduction * Enable attack surface reduction rules 15 - PERFORM DEVICE INVESTIGATIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Use the device inventory list * Investigate the device * Use behavioral blocking * Detect devices with device discovery 16 - PERFORM ACTIONS ON A DEVICE USING MICROSOFT DEFENDER FOR ENDPOINT * Explain device actions * Run Microsoft Defender antivirus scan on devices * Collect investigation package from devices * Initiate live response session 17 - PERFORM EVIDENCE AND ENTITIES INVESTIGATIONS USING MICROSOFT DEFENDER FOR ENDPOINT * Investigate a file * Investigate a user account * Investigate an IP address * Investigate a domain 18 - CONFIGURE AND MANAGE AUTOMATION USING MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Manage automation upload and folder settings * Configure automated investigation and remediation capabilities * Block at risk devices 19 - CONFIGURE FOR ALERTS AND DETECTIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Configure alert notifications * Manage alert suppression * Manage indicators 20 - UTILIZE VULNERABILITY MANAGEMENT IN MICROSOFT DEFENDER FOR ENDPOINT * Understand vulnerability management * Explore vulnerabilities on your devices * Manage remediation 21 - PLAN FOR CLOUD WORKLOAD PROTECTIONS USING MICROSOFT DEFENDER FOR CLOUD * Explain Microsoft Defender for Cloud * Describe Microsoft Defender for Cloud workload protections * Enable Microsoft Defender for Cloud 22 - CONNECT AZURE ASSETS TO MICROSOFT DEFENDER FOR CLOUD * Explore and manage your resources with asset inventory * Configure auto provisioning * Manual log analytics agent provisioning 23 - CONNECT NON-AZURE RESOURCES TO MICROSOFT DEFENDER FOR CLOUD * Protect non-Azure resources * Connect non-Azure machines * Connect your AWS accounts * Connect your GCP accounts 24 - MANAGE YOUR CLOUD SECURITY POSTURE MANAGEMENT? * Explore Secure Score * Explore Recommendations * Measure and enforce regulatory compliance * Understand Workbooks 25 - EXPLAIN CLOUD WORKLOAD PROTECTIONS IN MICROSOFT DEFENDER FOR CLOUD * Understand Microsoft Defender for servers * Understand Microsoft Defender for App Service * Understand Microsoft Defender for Storage * Understand Microsoft Defender for SQL * Understand Microsoft Defender for open-source databases * Understand Microsoft Defender for Key Vault * Understand Microsoft Defender for Resource Manager * Understand Microsoft Defender for DNS * Understand Microsoft Defender for Containers * Understand Microsoft Defender additional protections 26 - REMEDIATE SECURITY ALERTS USING MICROSOFT DEFENDER FOR CLOUD * Understand security alerts * Remediate alerts and automate responses * Suppress alerts from Defender for Cloud * Generate threat intelligence reports * Respond to alerts from Azure resources 27 - CONSTRUCT KQL STATEMENTS FOR MICROSOFT SENTINEL * Understand the Kusto Query Language statement structure * Use the search operator * Use the where operator * Use the let statement * Use the extend operator * Use the order by operator * Use the project operators 28 - ANALYZE QUERY RESULTS USING KQL * Use the summarize operator * Use the summarize operator to filter results * Use the summarize operator to prepare data * Use the render operator to create visualizations 29 - BUILD MULTI-TABLE STATEMENTS USING KQL * Use the union operator * Use the join operator 30 - WORK WITH DATA IN MICROSOFT SENTINEL USING KUSTO QUERY LANGUAGE * Extract data from unstructured string fields * Extract data from structured string data * Integrate external data * Create parsers with functions 31 - INTRODUCTION TO MICROSOFT SENTINEL * What is Microsoft Sentinel? * How Microsoft Sentinel works * When to use Microsoft Sentinel 32 - CREATE AND MANAGE MICROSOFT SENTINEL WORKSPACES * Plan for the Microsoft Sentinel workspace * Create a Microsoft Sentinel workspace * Manage workspaces across tenants using Azure Lighthouse * Understand Microsoft Sentinel permissions and roles * Manage Microsoft Sentinel settings * Configure logs 33 - QUERY LOGS IN MICROSOFT SENTINEL * Query logs in the logs page * Understand Microsoft Sentinel tables * Understand common tables * Understand Microsoft Defender XDR tables 34 - USE WATCHLISTS IN MICROSOFT SENTINEL * Plan for watchlists * Create a watchlist * Manage watchlists 35 - UTILIZE THREAT INTELLIGENCE IN MICROSOFT SENTINEL * Define threat intelligence * Manage your threat indicators * View your threat indicators with KQL 36 - CONNECT DATA TO MICROSOFT SENTINEL USING DATA CONNECTORS * Ingest log data with data connectors * Understand data connector providers * View connected hosts 37 - CONNECT MICROSOFT SERVICES TO MICROSOFT SENTINEL * Plan for Microsoft services connectors * Connect the Microsoft Office 365 connector * Connect the Microsoft Entra connector * Connect the Microsoft Entra ID Protection connector * Connect the Azure Activity connector 38 - CONNECT MICROSOFT DEFENDER XDR TO MICROSOFT SENTINEL * Plan for Microsoft Defender XDR connectors * Connect the Microsoft Defender XDR connector * Connect Microsoft Defender for Cloud connector * Connect Microsoft Defender for IoT * Connect Microsoft Defender legacy connectors 39 - CONNECT WINDOWS HOSTS TO MICROSOFT SENTINEL * Plan for Windows hosts security events connector * Connect using the Windows Security Events via AMA Connector * Connect using the Security Events via Legacy Agent Connector * Collect Sysmon event logs 40 - CONNECT COMMON EVENT FORMAT LOGS TO MICROSOFT SENTINEL * Plan for Common Event Format connector * Connect your external solution using the Common Event Format connector 41 - CONNECT SYSLOG DATA SOURCES TO MICROSOFT SENTINEL * Plan for syslog data collection * Collect data from Linux-based sources using syslog * Configure the Data Collection Rule for Syslog Data Sources * Parse syslog data with KQL 42 - CONNECT THREAT INDICATORS TO MICROSOFT SENTINEL * Plan for threat intelligence connectors * Connect the threat intelligence TAXII connector * Connect the threat intelligence platforms connector * View your threat indicators with KQL 43 - THREAT DETECTION WITH MICROSOFT SENTINEL ANALYTICS * What is Microsoft Sentinel Analytics? * Types of analytics rules * Create an analytics rule from templates * Create an analytics rule from wizard * Manage analytics rules 44 - AUTOMATION IN MICROSOFT SENTINEL * Understand automation options * Create automation rules 45 - THREAT RESPONSE WITH MICROSOFT SENTINEL PLAYBOOKS * What are Microsoft Sentinel playbooks? * Trigger a playbook in real-time * Run playbooks on demand 46 - SECURITY INCIDENT MANAGEMENT IN MICROSOFT SENTINEL * Understand incidents * Incident evidence and entities * Incident management 47 - IDENTIFY THREATS WITH BEHAVIORAL ANALYTICS * Understand behavioral analytics * Explore entities * Display entity behavior information * Use Anomaly detection analytical rule templates 48 - DATA NORMALIZATION IN MICROSOFT SENTINEL * Understand data normalization * Use ASIM Parsers * Understand parameterized KQL functions * Create an ASIM Parser * Configure Azure Monitor Data Collection Rules 49 - QUERY, VISUALIZE, AND MONITOR DATA IN MICROSOFT SENTINEL * Monitor and visualize data * Query data using Kusto Query Language * Use default Microsoft Sentinel Workbooks * Create a new Microsoft Sentinel Workbook 50 - MANAGE CONTENT IN MICROSOFT SENTINEL * Use solutions from the content hub * Use repositories for deployment 51 - EXPLAIN THREAT HUNTING CONCEPTS IN MICROSOFT SENTINEL * Understand cybersecurity threat hunts * Develop a hypothesis * Explore MITRE ATT&CK 52 - THREAT HUNTING WITH MICROSOFT SENTINEL * Explore creation and management of threat-hunting queries * Save key findings with bookmarks * Observe threats over time with livestream 53 - USE SEARCH JOBS IN MICROSOFT SENTINEL * Hunt with a Search Job * Restore historical data 54 - HUNT FOR THREATS USING NOTEBOOKS IN MICROSOFT SENTINEL * Access Azure Sentinel data with external tools * Hunt with notebooks * Create a notebook * Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered Online5 days, Jun 4th, 13:00 + 3 more
£2380

Managing Conflict

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for any business professional who encounters conflict in the workplace. Overview Recognize the impact of conflict in the workplace by identifying your personal reaction and developing a healthy attitude toward conflict. Analyze conflict by assessing the situation and identifying the source of the conflict. Utilize effective communication techniques to manage conflict in a proactive manner. Resolve conflict by evaluating approaches, and determining and implementing an action plan with the best solution. An organization improves its likelihood of success by effectively managing conflict. As a leader within your organization, you share in that responsibility. This course will help you cultivate the skills necessary to help manage conflict and ultimately to decrease the presence of conflict in the workplace. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. RECOGNIZING THE IMPACT OF CONFLICT * Identify Your Personal Reaction to Conflict * Develop a Healthy Attitude Toward Conflict 2. ANALYZING CONFLICT * Assess the Situation * Identify the Source of the Conflict 3. DEALING WITH CONFLICT * Listen Actively * Communicate Effectively * Respond to Negative Tactics * Avoid Conflict Escalation 4. RESOLVING CONFLICT * Evaluate Approaches to Conflict Resolution * Determine the Best Solution * Implement an Action Plan ADDITIONAL COURSE DETAILS: Nexus Humans Managing Conflict (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Conflict (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing Conflict
Delivered OnlineTwo days, Jun 4th, 13:00
£435

Educators matching "EDI"

Show all 2004
Inclusive Practice

inclusive practice

Manchester

Where are you on your EDI journey? We are all unique. Fact. Diversity is what makes the world such an interesting and vibrant place. Utilising diverse skills and talents makes excellent business sense. When diversity is valued and an equitable, inclusive culture prevails, people feel safe to be themselves. Staff and students are more engaged and more productive. Over recent years, great strides have been made on a legal level towards making organisations more inclusive, however knowing how to do so takes a little extra help. In our ideal world, equality, diversity and inclusion would become so completely embedded across society that our services would no longer be required… but until that happens, here we are to help you on your EDI journey. We offer a free and friendly consultation call to discuss your training requirements. If you’re not quite sure what an EDI training course should entail, you can trust us to use our knowledge and experience to advise on the length and content of the session to ensure your training needs are met. We employ a range of teaching styles and resources to cater for different learning styles to allow delegates to discuss, debate, ask questions and explore real-life situations in context. We are Approachable We pride ourselves in being friendly and approachable. You’ll get that from our emails, phone calls and in the training session itself. We recognise that EDI can feel like an uncomfortable topic, so establishing a safe space is super important. We aim to create an environment where people feel they can share diverse viewpoints, contribute to discussions and ask questions without fear. We are Committed We are committed to promoting real and lasting change that goes beyond simply awareness-raising. Our training will provide delegates with practical strategies that can be implemented immediately after the training, as well as longer-term measures. The Equality Code, our best practice audits and the signposting to further resources give you all the tools you need to continue your EDI journey, long after we’ve left the building. We are Honest Honesty is the cornerstone of integrity for us. We will answer your questions openly and honestly and guide you to make the best decisions for your organisation based on our years of experience. Should you ask for something that we don’t think will work, we’ll say so.

The Bristol SETsquared Centre

the bristol setsquared centre

London

We exist to help tech founders who want to have an impact in the world. We incubate tech startups – helping them transition from where they are now to where they need to be. Through coaching and training, workspace and a vibrant network of advisers and investors - we offer early-stage entrepreneurs everything they need to enjoy high economic growth while delivering real impact. Changing the world from Bristol We grow global businesses from our base in Bristol – the spirited, independently-minded, connected city we call home. In fact, we were born out of the University of Bristol and their desire to see innovative thinking succeed. Put simply, we’ve got good roots that you can tap into. Putting founders first No two startups are the same. It’s why helping them develop is so exciting. And why it makes sense to approach every incubation with fresh eyes. We totally tailor our support because fixed timelines and premade processes don’t spell success to us. Our members enjoy bespoke advice crafted around their ambitions. And our approach works. We’ve been named Europe’s Hottest Accelerator and Global No 1 University Incubator – having already helped over 300 companies, in 27 sectors, thrive. Brilliant companies that have seen over half a billion pounds in investment. In fact, our members are 4 times more likely to succeed than the average UK startup. Saying no to barriers We’re no fan of boundaries, and truly believe that tech should be accessible. As long as you have a brilliant tech idea and big ambitions we’re interested. Right now, 45% of our member founders are women and 23% are from a BAME background. And we continue to run inclusion programmes, like our Breakthrough Bursary and Enterprising Women initiatives, to ensure our sector is truly representative. Our history SETsquared Bristol has been around since 2002, supporting hundreds of promising startups. We’re part of the University of Bristol and the SETsquared Partnership which means we can offer our membership packages at heavily discounted rates and tap into a vast array of resources and benefits for you if you join us. Read about our partners. We’re looking for ambitious startups to incubate today - taking the best from all tech sectors, whatever stage you’re at, wherever you’re based in the UK. So, if you want to have a real impact in the world, let's talk.