• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

266 Encryption courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

AZ-104T00 Microsoft Azure Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. Prerequisites Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of Active Directory concepts, including users, groups, and role-based access control. Understanding of resilience and disaster recovery, including backup and restore operations. 1 - CONFIGURE MICROSOFT ENTRA ID * Describe Microsoft Entra ID benefits and features * Describe Microsoft Entra concepts * Compare Active Directory Domain Services to Microsoft Entra ID * Select Microsoft Entra editions * Implement Microsoft Entra join * Implement Microsoft Entra self-service password reset 2 - CONFIGURE USER AND GROUP ACCOUNTS * Create user accounts * Manage user accounts * Create bulk user accounts * Create group accounts * Create administrative units 3 - CONFIGURE SUBSCRIPTIONS * Identify Azure regions * Implement Azure subscriptions * Obtain an Azure subscription * Identify Azure subscription usage * Implement Microsoft Cost Management * Apply resource tagging * Apply cost savings 4 - CONFIGURE AZURE POLICY * Create management groups * Implement Azure policies * Create Azure policies * Create policy definitions * Create an initiative definition * Scope the initiative definition * Determine compliance 5 - CONFIGURE ROLE-BASED ACCESS CONTROL * Implement role-based access control * Create a role definition * Create a role assignment * Compare Azure roles to Microsoft Entra roles * Apply role-based access control * Review fundamental Azure RBAC roles 6 - CONFIGURE AZURE RESOURCES WITH TOOLS * Use the Azure portal * Use Azure Cloud Shell * Use Azure PowerShell * Use Azure CLI 7 - USE AZURE RESOURCE MANAGER * Review Azure Resource Manager benefits * Review Azure resource terminology * Create resource groups * Create Azure Resource Manager locks * Reorganize Azure resources * Remove resources and resource groups * Determine resource limits 8 - CONFIGURE RESOURCES WITH AZURE RESOURCE MANAGER TEMPLATES * Review Azure Resource Manager template advantages * Explore the Azure Resource Manager template schema * Explore the Azure Resource Manager template parameters * Consider Bicep templates * Review QuickStart templates 9 - CONFIGURE VIRTUAL NETWORKS * Plan virtual networks * Create subnets * Create virtual networks * Plan IP addressing * Create public IP addressing * Associate public IP addresses * Allocate or assign private IP addresses 10 - CONFIGURE NETWORK SECURITY GROUPS * Implement network security groups * Determine network security group rules * Determine network security group effective rules * Create network security group rules * Implement application security groups 11 - CONFIGURE AZURE DNS * Identify domains and custom domains * Verify custom domain names * Create Azure DNS zones * Delegate DNS domains * Add DNS record sets * Plan for Azure Private DNS zones * Review Azure Private DNS zone scenarios 12 - CONFIGURE AZURE VIRTUAL NETWORK PEERING * Determine Azure Virtual Network peering uses * Determine gateway transit and connectivity * Create virtual network peering * Extend peering with user-defined routes and service chaining 13 - CONFIGURE NETWORK ROUTING AND ENDPOINTS * Review system routes * Identify user-defined routes * Determine service endpoint uses * Determine service endpoint services * Identify private link uses 14 - CONFIGURE AZURE LOAD BALANCER * Determine Azure Load Balancer uses * Implement a public load balancer * Implement an internal load balancer * Determine load balancer SKUs * Create back-end pools * Create health probes * Create load balancer rules 15 - CONFIGURE AZURE APPLICATION GATEWAY * Implement Azure Application Gateway * Determine Azure Application Gateway routing * Configure Azure Application Gateway components 16 - CONFIGURE STORAGE ACCOUNTS * Implement Azure Storage * Explore Azure Storage services * Determine storage account types * Determine replication strategies * Access storage * Secure storage endpoints 17 - CONFIGURE AZURE BLOB STORAGE * Implement Azure Blob Storage * Create blob containers * Assign blob access tiers * Add blob lifecycle management rules * Determine blob object replication * Upload blobs * Determine Blob Storage pricing 18 - CONFIGURE AZURE STORAGE SECURITY * Review Azure Storage security strategies * Create shared access signatures * Identify URI and SAS parameters * Determine Azure Storage encryption * Create customer-managed keys * Apply Azure Storage security best practices 19 - CONFIGURE AZURE FILES AND AZURE FILE SYNC * Compare storage for file shares and blob data * Manage Azure file shares * Create file share snapshots * Implement Azure File Sync * Identify Azure File Sync components * Deploy Azure File Sync 20 - CONFIGURE AZURE STORAGE WITH TOOLS * Use Azure Storage Explorer * Use the Azure Import/Export service * Use the WAImportExport tool * Use the AzCopy tool 21 - CONFIGURE VIRTUAL MACHINES * Review cloud services responsibilities * Plan virtual machines * Determine virtual machine sizing * Determine virtual machine storage * Create virtual machines in the Azure portal * Connect to virtual machines 22 - CONFIGURE VIRTUAL MACHINE AVAILABILITY * Plan for maintenance and downtime * Create availability sets * Review update domains and fault domains * Review availability zones * Compare vertical and horizontal scaling * Implement Azure Virtual Machine Scale Sets * Create Virtual Machine Scale Sets * Implement autoscale * Configure autoscale 23 - CONFIGURE AZURE APP SERVICE PLANS * Implement Azure App Service plans * Determine Azure App Service plan pricing * Scale up and scale out Azure App Service * Configure Azure App Service autoscale 24 - CONFIGURE AZURE APP SERVICE * Implement Azure App Service * Create an app with App Service * Explore continuous integration and deployment * Create deployment slots * Add deployment slots * Secure your App Service app * Create custom domain names * Back up and restore your App Service app * Use Azure Application Insights 25 - CONFIGURE AZURE CONTAINER INSTANCES * Compare containers to virtual machines * Review Azure Container Instances * Implement container groups * Review the Docker platform 26 - CONFIGURE FILE AND FOLDER BACKUPS * Describe Azure Backup benefits * Implement Backup Center for Azure Backup * Configure Azure Recovery Services vault backup options * Use the Microsoft Azure Recovery Services (MARS) agent * Configure on-premises file and folder backups 27 - CONFIGURE VIRTUAL MACHINE BACKUPS * Explore options to protect virtual machine data * Create virtual machine snapshots in Azure Backup * Set up Azure Recovery Services vault backup options * Back up your virtual machines * Restore your virtual machines * Implement System Center DPM and Azure Backup Server * Compare the MARS agent and Azure Backup Server * Implement soft delete for your virtual machines * Implement Azure Site Recovery 28 - CONFIGURE AZURE MONITOR * Describe Azure Monitor key capabilities * Describe Azure Monitor components * Define metrics and logs * Identify monitoring data and tiers * Describe activity log events * Query the activity log 29 - CONFIGURE AZURE ALERTS * Describe Azure Monitor alerts * Manage Azure Monitor alerts * Create alert rules * Create action groups 30 - CONFIGURE LOG ANALYTICS * Determine Log Analytics uses * Create a Log Analytics workspace * Create Kusto (KQL) queries * Structure Log Analytics queries 31 - CONFIGURE NETWORK WATCHER * Describe Azure Network Watcher features * Review IP flow verify diagnostics * Review next hop diagnostics * Visualize the network topology

AZ-104T00 Microsoft Azure Administrator
Delivered Online5 days, May 21st, 08:30 + 24 more
£2380

MS-700T00 Managing Microsoft Teams

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. A Microsoft Teams administrator must be able to plan, deploy, and manage teams, chat, apps, channels, meetings, audio/video conferencing, live events, calling, and Teams certified devices. A Microsoft Teams administrator has experience integrating Microsoft Teams with SharePoint, OneDrive, Exchange, Microsoft 365 Groups, and other Microsoft, third-party, and custom apps. A Microsoft Teams administrator understands and collaborates with other workloads and roles, such as Network, Voice, Identity, Access, Devices, Licensing, Security, Compliance, Information management, and User Adoption. Overview What is Microsoft Teams and how the components work together How to implement Governance, Security and Compliance for Microsoft Teams How to prepare an organizations environment for a Microsoft Teams deployment How to deploy and manage teams How to manage collaboration and communication experiences in Microsoft Teams Techniques to manage and troubleshoot communication in Microsoft Teams The Managing Microsoft Teams course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. In this course, you will learn about various Teams management tools, security and compliance feature for Teams, network requirement for Teams deployment as well as different Teams settings and policies for managing collaboration and communication experience in Teams. Prerequisites A proficient understanding of basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices, including using PowerShell. 1 - EXPLORE MICROSOFT TEAMS * Explore capabilities in Microsoft Teams * Explore Microsoft Teams integration with Microsoft 365 * Explore Microsoft Teams integration with Microsoft Power Platform * Illustrate Microsoft Teams architecture * Describe Microsoft Teams with Microsoft 365 Groups * Describe Microsoft Teams with SharePoint and OneDrive * Describe Microsoft Teams with Exchange * Understand Microsoft Teams certified solutions 2 - PLAN AND DEPLOY MICROSOFT TEAMS * Designate Teams admin roles * Understand Teams management tools * Plan for Teams rollout * Plan for Teams adoption * Plan for Teams licensing * Deploy Microsoft Teams clients 3 - IMPLEMENT LIFECYCLE MANAGEMENT AND GOVERNANCE FOR MICROSOFT TEAMS * Plan for lifecycle management * Plan for Teams governance * Manage Microsoft 365 Groups creation * Configure Microsoft 365 Groups expiration policy * Configure Microsoft 365 Groups naming policy * Plan policy assignment for users and groups * Create and manage policy packages * Manage Teams preview features using Teams update policies * Create and manage teams templates and template policies 4 - MONITOR YOUR MICROSOFT TEAMS ENVIRONMENT * Monitor Microsoft Teams usage reports * Monitor Microsoft 365 usage reports * Interpret Microsoft Adoption Score * Manage user access with Azure Active Directory access reviews * Monitor the Microsoft 365 network connectivity dashboard * Manage Teams notifications and alerts * Manage feedback policies 5 - MANAGE ACCESS FOR EXTERNAL USERS * Understand features in Azure Active Directory * Work with external users in Microsoft Teams * Manage access for external users * Manage external collaboration in Azure AD * Manage external collaboration in Microsoft 365 * Manage external access in Microsoft Teams * Manage guest access in Microsoft Teams * Manage file sharing in SharePoint and OneDrive 6 - IMPLEMENT SECURITY FOR MICROSOFT TEAMS * Configure conditional access and multifactor authentication for Microsoft Teams * Configure Safe Attachments for Microsoft Teams * Configure Safe Links for Microsoft Teams * Examine the Defender for Cloud Apps * Monitor security reports for Microsoft Teams * Plan and configure enhanced encryption policies 7 - IMPLEMENT COMPLIANCE FOR MICROSOFT TEAMS * Create and manage sensitivity labels * Create and manage retention policies * Create and manage Data Loss Prevention policies * Deploy communication compliance * Enable scoped directory search * Create information barrier policy * Create security and compliance alerts for Microsoft Teams 8 - PLAN AND CONFIGURE NETWORK SETTINGS FOR MICROSOFT TEAMS * Examine network requirements for Microsoft Teams * Plan for network deployment using Network Planner * Configure network ports and protocols for Microsoft Teams * Implement Quality of Service * Configure reporting labels for location-enhanced Call Analytics reports * Configure tenant data for Call Quality Dashboard reports * Assess network readiness * Manage network topology 9 - CREATE AND MANAGE TEAMS * Create teams * Create a team from existing resources * Plan and create org-wide teams * Manage teams * Manage users in a team * Configure dynamic membership * Archive restore and delete a team 10 - MANAGE COLLABORATION EXPERIENCES FOR CHAT AND CHANNELS * Create and manage channels in a team * Create and manage Teams policies for channels * Configure teams settings * Create and manage messaging policies * Manage channel moderation * Manage access to channels 11 - MANAGE APPS FOR MICROSOFT TEAMS * Explore apps in Microsoft Teams * Describe admin settings for Teams apps * Manage access to Teams apps at the organization level * Create and manage app permission policies * Create and manage app setup policies * Manage permissions and consent for Teams apps * Plan and configure connectors * Manage custom apps uploads * Publish custom apps to Microsoft Teams * Manage purchasing of apps in the Microsoft Teams app store * Customize the organization's app store * Customize the branded experience of an app 12 - INTRODUCTION TO TEAMS MEETINGS AND CALLING * Overview of Teams meetings and events * Overview of Teams Phone * Overview of auto attendants and call queues * Overview of Teams devices 13 - MANAGE MEETINGS AND EVENTS EXPERIENCES * Explore meetings and events in Microsoft Teams * Configure meeting settings * Create and manage meeting policies * Configure audio conferencing * Create and manage meeting templates and template policies * Create and manage meetings customization policies * Configure live events settings * Create and manage live events policies * Examine live events across Microsoft 365 14 - PLAN FOR MICROSOFT TEAMS ROOMS AND SURFACE HUB * Determine license requirements for Microsoft Teams Rooms and shared devices * Understand differences between Microsoft Teams Rooms on Android and Windows * Understand Microsoft Teams Rooms on Surface Hub 2S * Understand and plan Teams Room accessories, components, and peripherals * Understand Teams Rooms management options 15 - CONFIGURE, DEPLOY, AND MANAGE TEAMS DEVICES * Manage Microsoft Teams Phones * Manage Microsoft Teams Room Systems * Microsoft Teams Rooms management options * Manage Surface Hub 2S devices * Configure Microsoft Teams SIP gateway * Manage Microsoft Teams displays * Remote provisioning and sign in for Teams Phones * Update Microsoft Teams devices remotely * Manage Microsoft Teams device tags 16 - PLAN FOR TEAMS PHONE * Plan to deploy Teams Phone * Plan for Teams Phone PSTN connectivity * Determine license requirements * Plan for Teams Phone devices * Plan and design Teams Phone features * Plan for voicemail 17 - CONFIGURE AND DEPLOY TEAMS PHONE * Configure emergency calling for Teams Calling Plans * Manage and configure Microsoft PSTN numbers * Configure Operator Connect and Teams Phone Mobile * Configure Teams Phone policies * Create and manage Teams policies * Configure Audio Conferencing 18 - CONFIGURE AND MANAGE VOICE USERS * Enable users for Teams Phone * Enable users for Direct Routing with Teams Phone * Enable additional calling features for Teams Phone * Enable users for Teams Phone Mobile 19 - CONFIGURE AUTO ATTENDANTS AND CALL QUEUES * Design call flows for auto attendants and call queues * Configure auto attendants and call queues * Deploy a channel-based call queue * Configure resource accounts * Configure Microsoft 365 groups for voicemail * Interpret call queue conference modes * Interpret call queue routing methods * Configure holidays for auto attendants and call queues * Configure custom music on hold 20 - TROUBLESHOOT AUDIO, VIDEO, AND CLIENT ISSUES * Troubleshoot Teams * Collect and identify logs * Clear Microsoft Teams client cache * Identify issues with call analytics * Identify issues with Call Quality Dashboard * Use Power BI to analyze Call Quality Dashboard data * Identify issues with the Direct Routing Health Dashboard ADDITIONAL COURSE DETAILS: Nexus Humans MS-700T00 Managing Microsoft Teams training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-700T00 Managing Microsoft Teams course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-700T00 Managing Microsoft Teams
Delivered Online5 days, May 21st, 13:00 + 4 more
£2380

Encryption

By Apex Learning

OVERVIEW This comprehensive course on Encryption will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Encryption comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this Encryption. It is available to all students, of all academic backgrounds. REQUIREMENTS Our Encryption is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. COURSE CURRICULUM 7 sections • 14 lectures • 00:40:00 total length •Overview: 00:01:00 •Motivation: Why do we Encrypt?: 00:04:00 •What Does Encrypting Mean?: 00:03:00 •Basics: Symmetric and Asymmetric Encryption: 00:04:00 •Hybrid Encryption: 00:03:00 •Password-Based Encryption: 00:01:00 •Algorithms: 00:02:00 •Technical Parameters for Encryption I: 00:07:00 •Technical Parameters for Encryption II: 00:03:00 •Cryptographic Key Formats: 00:01:00 •Java program Demonstration: Plaintext to AES Encryption Text: 00:03:00 •File and System Encryption: 00:07:00 •Conclusion: 00:01:00 •Assignment - Encryption: 00:00:00

Encryption
Delivered Online On Demand
£12

55399 Implementing and Managing Microsoft Intune

By Nexus Human

Duration 3 Days 18 CPD hours This three-day instructor-led course is aimed at modern device management professionals looking to manage their enterprise devices using Microsoft Intune. This course will cover Enrolment, Application Management, Endpoint Security and Windows Autopilot as well as Azure Active Directory Conditional Access and Identity Protection. The delegates will learn how to enroll devices, deploy applications and manage them to maximize user productivity and device security. 1: INTRODUCTION TO MICROSOFT INTUNE * Mobile Device Management * Microsoft Intune * Azure Active Directory * AAD Identity Protection * AAD Conditional Access 2: MICROSOFT INTUNE DEVICE MANAGEMENT * Enrolling Devices * Device Compliance * Device Profiles * Device Updates 3: MICROSOFT INTUNE APPLICATION MANAGEMENT * Application Management * Deploying Applications * Application Configuration * Managing Applications * Policy Sets and Guided Scenarios 4: MICROSOFT INTUNE ENDPOINT SECURITY * Security Baselines and tasks * Antivirus * Disk Encryption * Firewall * Atack Surface reduction * Endpoint detection and response * Account Protection 5: DEPLOYING WINDOWS WITH WINDOWS AUTOPILOT * Windows Autopilot overview * Preparing for Windows Autopilot deployment * Deploying Windows 11 using Windows Autopilot 6: MICROSOFT INTUNE ADDITIONAL AND PREMIUM FEATURES * Remote Help * Tunnel for Mobile Application Management * Endpoint Privilege Management * Advanced Endpoint Analytics ADDITIONAL COURSE DETAILS: Nexus Humans 55399 Implementing and Managing Microsoft Intune training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55399 Implementing and Managing Microsoft Intune course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55399 Implementing and Managing Microsoft Intune
Delivered Online4 days, Jun 3rd, 13:00 + 9 more
£1785

Learn Basic of Encryption Data Terminology & Technology

By Course Cloud

Data encryption is a common method of ensuring confidentiality, by converting data from a readable format into an unreadable coded format. To gain expertise in this field, it is important to understand the many different terms associated with this process. In the Learn Basic of Encryption Data Terminology & Technology course, you will gain an in-depth understanding of what encryption means in practice and become fully familiar with the technical terms and expressions of encryption technologies. You will learn how to apply encryption properly, through the step-by-step guidance of an experienced instructor, taking your data security knowledge to the next level. This course is ideal for those looking to kickstart a career in the field of data security, as well as anyone interested in data privacy and technology. There are no specific entry requirements for this course, which can be studied on a part-time or full-time basis. This best selling Learn Basic of Encryption Data Terminology & Technology has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Learn Basic of Encryption Data Terminology & Technology is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Learn Basic of Encryption Data Terminology & Technology is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Learn Basic of Encryption Data Terminology & Technology is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Learn Basic of Encryption Data Terminology & Technology, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Learn Basic of Encryption Data Terminology & Technology will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Learn Basic of Encryption Data Terminology & Technology to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Learn Basic of Encryption Data Terminology & Technology
Delivered Online On Demand
£25

Advanced Architecting on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Solution Architects Overview At the end of this course, you will be able to: Apply the AWS Well-Architected Framework Manage multiple AWS accounts for your organization Connect an on-premises datacenter to AWS cloud Move large data from an on-premises datacenter to AWS Design large datastores for AWS cloud Understand different architectural designs for scalability Protect your infrastructure from DDoS attack Secure your data on AWS with encryption Enhance the performance of your solutions Select the most appropriate AWS deployment mechanism Building on concepts introduced in Architecting on AWS, Advanced Architecting on AWS is intended for individuals who are experienced with designing scalable and elastic applications on the AWS platform. Building on concepts introduced in Architecting on AWS, this course covers how to build complex solutions which incorporate data services, governance, and security on AWS. This course introduces specialized AWS services, including AWS Direct Connect and AWS Storage Gateway to support Hybrid architecture. It also covers designing best practices for building scalable, elastic, secure, and highly available applications on AWS. MODULE 1: AWS ACCOUNT MANAGEMENT * Multiple accounts * Multi-account patterns * License management * Manage security and costs with multiple accounts * AWS Organizations * AWS Directory Service * Hands-on lab: Multi-VPC connectivity using a VPN MODULE 2: ADVANCED NETWORK ARCHITECTURES * Improve VPC network connections * Enhance performance for HPC workloads * VPN connections over AWS * AWS Direct Connect * AWS Transit Gateway * Amazon Route 53 * Exercise: Design a hybrid architecture MODULE 3: DEPLOYMENT MANAGEMENT ON AWS * Application lifecycle management * Application deployment using containers * AWS Elastic Beanstalk * AWS OpsWorks * AWS CloudFormation MODULE 4: DATA * Optimize Amazon S3 storage * Amazon ElastiCache * AWS Snowball * AWS Storage Gateway * AWS DataSync * Backup and archival considerations * Database migration * Designing for big data with Amazon DynamoDB * Hands-on lab: Build a failover solution with Amazon Route 53 and Amazon RDS MODULE 5: DESIGNING FOR LARGE SCALE APPLICATIONS * AWS Auto Scaling * Migrating over-provisioned resources * Blue-green deployments on AWS * Hands-on lab: Blue-green deployment with AWS MODULE 6: BUILDING RESILIENT ARCHITECTURES * DDoS attack overview * AWS Shield * AWS WAF * Amazon GuardDuty * High availability using Microsoft SQL Server and Microsoft SharePoint on AWS * High availability using MongoDB on Amazon EC2 * AWS Global Accelerator * Hands-on lab: CloudFront content delivery and automating AWS WAF rules MODULE 7: ENCRYPTION AND DATA SECURITY * Encryption primer * DIY key management in AWS * AWS Marketplace for encryption products * AWS Key Management Service (AWS KMS) * Cloud Hardware Security Module (HSM) * Comparison of key management options * Hands-on lab: AWS KMS with envelope encryption

Advanced Architecting on AWS
Delivered Online4 days, Jun 17th, 08:30 + 1 more
£1717

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites * Foundational knowledge of Microsoft security and compliance technologies. * Basic knowledge of information protection concepts. * Understanding of cloud computing concepts. * Understanding of Microsoft 365 products and services. 1 - INTRODUCTION TO INFORMATION PROTECTION AND DATA LIFECYCLE MANAGEMENT IN MICROSOFT PURVIEW * Know your data * Protect your data * Prevent data loss * Govern your data 2 - CLASSIFY DATA FOR PROTECTION AND GOVERNANCE * Data classification overview * Classify data using sensitive information types * Classify data using trainable classifiers * Review sensitive information and label usage * Explore labeled and sensitive content * Understand activities related to your data 3 - CREATE AND MANAGE SENSITIVE INFORMATION TYPES * Compare built-in versus custom sensitive information types * Create and manage custom sensitive information types * Describe custom sensitive information types with exact data match * Implement document fingerprinting * Create keyword dictionary 4 - UNDERSTAND MICROSOFT 365 ENCRYPTION * Learn how Microsoft 365 data is encrypted at rest * Understand service encryption in Microsoft Purview * Explore customer key management using Customer Key * Learn how data is encrypted in-transit 5 - DEPLOY MICROSOFT PURVIEW MESSAGE ENCRYPTION * Implement Microsoft Purview Message Encryption * Implement Microsoft Purview Advanced Message Encryption * Use Microsoft Purview Message Encryption templates in mail flow rules 6 - PROTECT INFORMATION IN MICROSOFT PURVIEW * Information protection overview * Configure sensitivity labels * Configure sensitivity label policies * Configure auto-labeling policies * Manage, monitor, and remediate information protection 7 - APPLY AND MANAGE SENSITIVITY LABELS * Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites * Plan on-premises labeling * Configure on-premises labeling for the Unified Labeling Scanner * Apply protections and restrictions to email and files * Monitor label performance using label analytics 8 - PREVENT DATA LOSS IN MICROSOFT PURVIEW * Data loss prevention overview * Identify content to protect * Define policy settings for your DLP policy * Test and create your DLP policy * Prepare Endpoint DLP * Manage DLP alerts in the Microsoft Purview compliance portal * View data loss prevention reports * Implement the Microsoft Purview Extension 9 - CONFIGURE DLP POLICIES FOR MICROSOFT DEFENDER FOR CLOUD APPS AND POWER PLATFORM * Configure data loss prevention policies for Power Platform * Integrate data loss prevention in Microsoft Defender for Cloud Apps * Configure policies in Microsoft Defender for Cloud Apps * Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - MANAGE DATA LOSS PREVENTION POLICIES AND REPORTS IN MICROSOFT 365 * Configure data loss prevention for policy precedence * Implement data loss prevention policies in test mode * Explain data loss prevention reporting capabilities * Manage permissions for data loss prevention reports * Manage and respond to data loss prevention policy violations 11 - MANAGE THE DATA LIFECYCLE IN MICROSOFT PURVIEW * Data Lifecycle Management overview * Configure retention policies * Configure retention labels * Configure manual retention label policies * Configure auto-apply retention label policies * Import data for Data Lifecycle Management * Manage, monitor, and remediate Data Lifecycle Management 12 - MANAGE DATA RETENTION IN MICROSOFT 365 WORKLOADS * Explain retention in Exchange Online * Explain retention in SharePoint Online and OneDrive * Explain retention in Microsoft Yammer * Activate archive mailboxes in Microsoft Exchange * Apply mailbox holds in Microsoft Exchange * Recover content in Microsoft Exchange 13 - MANAGE RECORDS IN MICROSOFT PURVIEW * Records management overview * Import a file plan * Configure retention labels * Configure event driven retention * Manage, monitor, and remediate records 14 - EXPLORE COMPLIANCE IN MICROSOFT 365 * Plan for security and compliance in Microsoft 365 * Plan your beginning compliance tasks in Microsoft Purview * Manage your compliance requirements with Compliance Manager * Examine the Compliance Manager dashboard * Analyze the Microsoft Compliance score 15 - SEARCH FOR CONTENT IN THE MICROSOFT PURVIEW COMPLIANCE PORTAL * Explore Microsoft Purview eDiscovery solutions * Create a content search * View the search results and statistics * Export the search results and search report * Configure search permissions filtering * Search for and delete email messages 16 - MANAGE MICROSOFT PURVIEW EDISCOVERY (STANDARD) * Explore Microsoft Purview eDiscovery solutions * Implement Microsoft Purview eDiscovery (Standard) * Create eDiscovery holds * Search for content in a case * Export content from a case * Close, reopen, and delete a case 17 - MANAGE MICROSOFT PURVIEW EDISCOVERY (PREMIUM) * Explore Microsoft Purview eDiscovery (Premium) * Implement Microsoft Purview eDiscovery (Premium) * Create and manage an eDiscovery (Premium) case * Manage custodians and non-custodial data sources * Analyze case content 18 - MANAGE MICROSOFT PURVIEW AUDIT (STANDARD) * Explore Microsoft Purview Audit solutions * Implement Microsoft Purview Audit (Standard) * Search the audit log * Export, configure, and view audit log records * Use audit log searching to investigate common support issues 19 - PREPARE MICROSOFT PURVIEW COMMUNICATION COMPLIANCE * Plan for communication compliance * Identify and resolve communication compliance workflow * Case study--Configure an offensive language policy * Investigate and remediate communication compliance alerts 20 - MANAGE INSIDER RISK IN MICROSOFT PURVIEW * Insider risk management overview * Create and manage insider risk policies * Investigate insider risk alerts * Take action on insider risk alerts through cases * Manage insider risk management forensic evidence * Create insider risk management notice templates 21 - IMPLEMENT MICROSOFT PURVIEW INFORMATION BARRIERS * Explore Microsoft Purview Information Barriers * Configure information barriers in Microsoft Purview * Examine information barriers in Microsoft Teams * Examine information barriers in OneDrive * Examine information barriers in SharePoint 22 - MANAGE REGULATORY AND PRIVACY REQUIREMENTS WITH MICROSOFT PRIVA * Create and manage risk management policies * Investigate and remediate risk management alerts * Create rights requests * Manage data estimate and retrieval for rights requests * Review data from rights requests * Get reports from rights requests 23 - IMPLEMENT PRIVILEGED ACCESS MANAGEMENT * Case study--Implementing privileged access management 24 - MANAGE CUSTOMER LOCKBOX * Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered Online5 days, Jun 17th, 13:00 + 2 more
£2380

AWS Security Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security IT business-level professionals interested in cloud security practices Security professionals with minimal to no working knowledge of AWS Overview Assimilate Identify security benefits and responsibilities of using the AWS Cloud Describe the access control and management features of AWS Explain the available methods for providing encryption of data in transit and data at rest when storing your data in AWS. Describe how to secure network access to your AWS resources Determine which AWS services can be used for monitoring and incident response This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization. Prerequisites Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts 1 - SECURITY ON AWS * Security design principles in the AWS Cloud * AWS Shared Responsibility Model 2 - SECURITY OF THE CLOUD * AWS Global Infrastructure * Data center security * Compliance and governance 3 - SECURITY IN THE CLOUD ? PART 1 * Identity and access management * Data protection essentials * Lab 01 ? Introduction to security policies 4 - SECURITY IN THE CLOUD ? PART 2 * Securing your infrastructure * Monitoring and detective controls * Lab 02 ? Securing VPC resources with Security Groups 5 - SECURITY IN THE CLOUD ? PART 3 * DDoS mitigation * Incident response essentials * Lab 03 ? Remediating issues with AWS Config Conformance Packs 6 - COURSE WRAP UP * AWS Well-Architected tool overview * Next Steps ADDITIONAL COURSE DETAILS: Nexus Humans AWS Security Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Essentials
Delivered OnlineTwo days, Jun 10th, 13:00 + 2 more
£675

Email Etiquette

By Nexus Human

This course is intended for Beginner-Moderate exposure is recommended for this course. The topics covered are cumulative in nature, and they require minimal understanding of email applications and composition. Overview The objective of the course is to give students the information needed to create emails that are written in a succinct, effective, and user-friendly manner. Students will learn how to set up an email subject, salutation, and will then work on how to write a credible email. In this course, students will learn about e-mail policies and learn how to write professional e-mail memos that convey appropriate messages. 1 - E-MAIL BASICS * E-mail characteristics * Writing online versus on paper * Understanding the advantages and disadvantages of e-mail * Understanding the cultural significance of e-mail * E-mail programs * Using an e-mail program to send e-mail * When to use e-mail * Communicating by e-mail * Understanding when to avoid using e-mail * Writing an e-mail message * Using the MAIL acronym 2 - E-MAIL POLICIES * Company policies * Avoiding improper e-mail messages * Ensuring employee compliance to e-mail policies * Copyright laws, viruses, and liability * Avoiding copyright infringement * Avoiding viruses * Identifying e-mail liability 3 - E-MAIL FEATURES AND SECURITY * Features of an e-mail program * Using attachments * Using priority labels and signature files * Features of an e-mail program * Using attachments * Using priority labels and signature files * Discussing e-mail program options * Securing e-mail * Using encryption and digital signatures * Using passwords 4 - E-MAIL MESSAGES * Message headers * Using headers * E-mail message body * Including proper greeting * Structuring an e-mail message * Closing an e-mail message 5 - E-MAIL EFFECTIVENESS * E-mail recipients * Considering the factors that determine e-mail writing * Anticipating recipient reaction * Message management * Managing your e-mail effectively 6 - NETIQUETTE GUIDELINES * Netiquette style * Using proper tone * Following formatting guidelines * Emoticons and abbreviations * Using emoticons and electronic abbreviations 7 - COMPOSING ONLINE CORRESPONDENCE * Online communication * Achieving the objective of the message * Language and punctuation * Improving online writing style * Using punctuation correctly * Efficient writing habits * Constructing sentences * Constructing paragraphs * Editing e-mail messages

Email Etiquette
Delivered OnlineTwo days, Jun 6th, 13:00
£395

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. COURSE OUTLINE * Information Security Threats and Vulnerabilities * Information Security Attacks * Network Security Fundamentals * Identification, Authentication, and Authorization * Network Security Controls: Administrative Controls * Network Security Controls: Physical Controls * Network Security Controls: Technical Controls * Network Security Assessment Techniques and Tools * Application Security * Virtualization and Cloud Computing * Wireless Network Security * Mobile Device Security * Internet of Things (IoT) and Operational Technology (OT) Security * Cryptography * Data Security * Network Troubleshooting * Network Traffic Monitoring * Network Log Monitoring and Analysis * Incident Response * Computer Forensics * Business Continuity and Disaster Recovery * Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered Online6 days, Jun 10th, 13:00 + 1 more
£3495

Educators matching "Encryption"

Show all 5
ssg solutions

ssg solutions

SSG Solutions (P) Ltd., is a company based in Hyderabad, the capital city of the State of Andhra Pradesh offering software solutions to the customers with high quality software products. Started in April, 1996 as a regional distributor for Dr. Solomon’s range of products we have established our name in the market as anti virus experts. We are specialized in providing solutions in the areas of Antivirus, Antispam, IPS, Data encryption, Data Recovery,DLP, Data Backup, Network Security and monitoring. Depending on organization needs and their future growth we offer the solutions using the best fit from the products from software houses like McAfee Security, Symantec,Trend Micro, Fortinet, Sonicwall, Watchguard, Websense, Stellar, Girsoft, PGP, Ironport, Bluecoat, Computer Associates, Microsoft, Oracle, Autodesk, Adobe etc. Our endeavour has been to engage ourselves in commercial business services to render satisfactory services to the customers. Service Overview Our focus is mainly to offer software solutions to the customers for their networking needs and data security requirements. Our clientele includes all the public sector units, major corporate sector units, Defence organizations, Banks and the Government institutions in this region. What we offer ANTIVIRUS - MCAFEE, SYMANTEC, TRENDMICRO,F-Secure,QUICK HEAL SEQRITE ETC. ANTISPAM - MCAFEE, SYMANTEC, TRENDMICRO, BARRACUDA, WEBSENSE CLOUD SECURITY - MCAFEE SKYHIGH, SYMANTEC CASB SOLUTIONS ENCRYPTION - CHECKPOINT, PGP(SYMANTEC), MCAFEE WEB SECURITY - GFI, WEBSENSE, MCAFEE, SYMANTEC, TRENDMICRO, BARRACUDA, BLUECOAT DATA LOSS PREVENTION - MCAFEE, TRENDMICRO, WEBSENSE, SYMANTEC FIREWALL - SONICWALL, WATCHGUARD, MCAFEE, CHECKPOINT, FORTINET NETWORK ACCESS CONTROL - FORSCOUT, SYMANTEC SOFTWARE - MICROSOFT, ORACLE, ADOBE, ABBYY, PROPALMS, AUTODESK DATA RECOVERY - STELLAR BACKUP & STORAGE - SYMANTEC, COMPUTER ASSOCIATES, SONICWALL, IBM. SSG Solutions (P) Ltd., All rights reserved.

Amalfi Corporate Solutions Uk

amalfi corporate solutions uk

London

Based in Surrey we are Automated Penetration Testing specialists, cyber security advisors, GDPR consultants, virtual DPO’s, cyber security awareness trainers, password management guru's, email security kings and offer the most flexible and cost effective IT support for SME's Automated penetration testing from Pcysys, Cycognito and Neuralegion overcomes the limitations of traditional periodic human based penetration testing thus improving and maintaining your security posture. We offer solutions for automated penetration testing of your infrastructure with Pcysys Pentera, your applications with Neuralegion and your Web Attack Surface/Shadow IT with Cycognito . In response to questions related to automated penetration testing a research VP at Gartner is quoted “I think we can risk saying Pen testing as it is today will cease to exist” We work with customers large and small Image British Film Institute Image Image Image Image Data Protection Officer - DPO Services Innovative program - from one day per month - no long term contract - makes having your own DPO affordable. Support Services With no complex on-boarding process we simply take on what you have and run with it. We don’t do ‘packages’ or introduce complexity, our contract is two pages, our price is fixed and our service is top drawer. Automated Penetration Testing Automated Penetration Testing – the bad guys never sleep. It is no longer enough to test once a year or rely on outdated technologies to detect weaknesses and attacks. AI and ML with real-time detection are now must have technologies. Email Security Health Check - FREE 30 seconds is all it takes for this Email Security Health Check and it is FREE. Works for in-house/cloud hosted/O365/GSuite. Test to see which of 17 email bourne threats get through your defences. Security Services From fully managed security awareness training programs and managed email protection systems which automate removal of malicious content to simple endpoint malware we cover the whole spectrum. DMARC - FREE email protection recommended by City of London Police and Global Cyber Alliance It is FREE and just needs to be configured and enabled. It helps protect against phishing, Business Email Compromise, Whaling and Spoofing as well as reducing SPAM Get a Personal Service IT support contracts get a personal service rather than a helpdesk Our range of services, enterprise in class but delivered at an SME price point, are designed to help you protect your data whilst not breaking the bank. Why Amalfitech For SMB and Enterprise Our solutions are tailored to the size of the company whether small, medium or large. Our small and mid-size business solutions are designed with costs and sustainability in mind, so you won’t get offered a low entry point and then get hit with high cost professional services. Everything is upfront, open and above all we are honest. Run by Techies Our customer facing staff are techies. The company is owned by techies. We don’t do high pressure sales. We just offer great advice and service. No Weekend Rates Is your current support company taking you offline during the working day to fix problems, or charging out of hours/weekend rates for services? Our fixed price unlimited, all-inclusive remote support packages have no extra charge for problem solving out of hours or at weekends. . IT Security Specialists and IT Support We are a GDPR and Data protection consultancy, IT security specialists and IT support company for small businesses. We are run by techies for the benefit of techies. Virtual CISO and DPO GDPR, PECR and Compliance Managed Security Internal Fraud Prevention Automated Penetration Testing Security Awareness Training IT Support and Maintenance Cloud Cost and Performance Optimisation The 'IT Sanity Check' for CEO's Image Image IT Solutions We provide new and creative solutions to difficult problems. Our goal is to help you through the minefield of rhetoric and marketing to make the best choice you can make, within your budget and that above all it works. Automated Penetration Testing Attacker and Insider threat Detection Email Phishing Testing, Prevention and Training Email and File Encryption Email/File/SharePoint Backup and Archiving VOIP Unified Endpoint Management OS and Application Containerisation Anti-Malware