• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1134 Introduction To Construction courses delivered Live Online

Introduction to Phlebotomy Course (GPT003VC) - 1 DAY Virtual Classroom

4.6(39)

By Geopace Training

Learn how to take blood ... train as a Phlebotomist Nationally Recognised Qualification No previous experience or qualifications needed OCN Accredited - Level 3 (advanced) CPD Accredited (The CPD Certification Service) Covers all steps up to live blood draw Practise on artificial arm and fake blood! Basic understanding of English language required OPEN TO ALL APPLICANTS

Introduction to Phlebotomy Course (GPT003VC) - 1 DAY Virtual Classroom
Delivered OnlineFull day, Jun 14th, 08:30 + 16 more
£285

Introduction to ECG Course (GPT009)

4.6(39)

By Geopace Training

Learn how to perform and read an ECG ... Nationally Recognised Qualification OCN Accredited - Level 3 (advanced level) CPD Accredited - The CPD Certification Service Introduces you to the fundamentals of setting up and operating an ECG machine Includes patient preparation Produce a valid (error free) ECG Learn and understand ECG traces Recognise recordings that require urgent attention Basic understanding of English language required OPEN TO ALL APPLICANTS VIRTUAL CLASSROOM OPTION INCLUDES COMPREHENSIVE PRACTISE@HOME ECG TRAINING KIT Final interpretation of all ECG recordings is the responsibility of a medical professional.

Introduction to ECG Course (GPT009)
Delivered Online or in Milton Keynes + 10 more locations3 hours, Jun 15th, 16:30 + 18 more
£195

ECG - Introduction & Advanced Course Package

4.6(39)

By Geopace Training

THIS COURSE PACKAGE INCLUDES: 1: INTRODUCTION TO ECG COURSE - RECORDING & BASIC INTERPRETATION (GPT009) 2: ADVANCED ECG COURSE - INTERPRETATION & ANALYSIS (GPT010) -------------------------------------------------------------------------------- Learn how to set up and record a basic ECG trace, followed by advanced analysis and interpretation FAST-TRACK YOUR ECG TRAINING WITH OUR BEGINNER TO ADVANCED TRAINING PACKAGE 20% off -  Multi-Course Discount * Cover all stages from Level 1 through to Level 4 (FDSc) * Cover your theory training online * Practical training in Classroom or Virtual Classroom * Comprehensive Practise@Home training kits for VC * Awards 2 accredited qualifications * Dual Accreditations are awarded for all courses (Open College Network and CPD) * Covers all steps required to competently set up and perform an ECG trace. * Practical sessions include electrode placement on mannequin, running traces and identifying anomalies. * Learn beginner to advanced skills and interpretation. * Basic understanding of English language required. * OPEN TO ALL APPLICANTS -------------------------------------------------------------------------------- About these courses 1: INTRODUCTION TO ECG COURSE - RECORDING AND BASIC INTERPRETATION (GPT009) PART 1 - Theory * Allow approx. 5-6 hours PART 2 - Practical Training * Attend a classroom location or join us in our virtual classroom * - 3-4 hours ACCREDITED LEVEL 3 QUALIFICATION * * Virtual Classroom option includes a free comprehensive Practise@Home ECG training kit. 2: ADVANCED ECG COURSE - INTERPRETATION AND ANALYSIS (GPT010) * E-LEARNING - Theory * Allow approx. 6-8 hours * ACCREDITED LEVEL 4 QUALIFICATION OPTIONAL: GETTING STARTED IN ECG (GPT002) * A free starter ECG Course (unassessed) developed to help you understand the basics of ECG recording: 3 modules in total with no Questions! * If you are already familiar with ECGs then you may prefer to save time and opt out of this mini-course at booking stage. * This "mini-course" is available at no charge. -------------------------------------------------------------------------------- Learning Outcomes GPT009: * Understanding different ECG equipment types * ECG equipment - set-up and calibration * Includes professionalism, consent, IPC * and legal requirement * Patient preparation * How to correctly apply electrodes to limbs and chest * Identify artifacts (equipment and patients * Identify and recognise routine traces * Identify and recognise non-routine traces * Identify traces requiring urgent attention * Labelling and reporting GPT010: * Understand the acceptable variations within the normal ECG of healthy adults. * Recognise the expected patterns of an ECG from a healthy child from birth onwards and identify abnormalities. * Interpret abnormal ECG patterns in adults. * Diagnose arrhythmias as an underlying cause of palpitations and syncope. Exploring sinus rhythm, extrasystoles, paroxysmal tachycardia and the importance of a physical examination. * Identifying syncopal episodes attributable to cardiovascular disease as opposed to arrhythmias. * Recognise ECG markers for tachycardias, bradycardias, pre-excitation syndromes, bi-fascicular block, and first-degree block with bundle branch block. * Differentiate between supraventricular and ventricular extrasystoles and be able to diagnose broad complex tachycardias, ventricular flutter and fibrillation, sick sinus syndrome, and Stokes-Adams attacks. * Recognise and identify symptoms associated with the causes of acute or chronic chest pain in patients who present with myocardial infarction (heart attack), pulmonary embolism, significant central pulmonary embolism, pericarditis, aortic dissection, oesophageal rupture, spinal disorders, vertebral collapse, posterior infarction, and angina. * Recognise symptoms indicative of conditions such as pulmonary oedema, chest diseases, and pulmonary congestion. -------------------------------------------------------------------------------- After the course GPT009: * Safely and competently set up an ECG machine * Introduce patients to the ECG test, adhering to compliancy requirements before and after testing * Perform an ECG test to national guidelines * Understand basic traces and their correlation to cardiac issues * Recognise normal and erroneous recordings * Recognise recordings that require urgent medical follow-up * Complete the recording and label (or record digital copies) as per guidelines GPT010: * Appreciate normal and abnormal ECG variations in the context of varying pathologies. * Be able to determine whether an arrhythmia has an underlying cause that requires medical intervention. * Interpret ECGs as a function of the patient's ongoing cardiac management. * Understand and apply the Burce Protocol exercise test in relevant clinical situations. * Know how to clinically respond to a patient with chest pain including further investigations required, pain relief, history and examination and echocardiogram. * Understand and apply the fundamental principles of arrhythmia management. * Understand the primary causes of heart disease and the diagnostic process. * Appreciate the importance of the ECG as a diagnostic tool alongside the patient’s history and clinical presentation and recognising its limitations. -------------------------------------------------------------------------------- Course Package Components: PACKAGE - Beginner to Advanced ECG - Virtual Classroom - INTRO - Part 1 online Part 2 Virtual Classroom (AM) + ADVANCED - E-learning

ECG - Introduction & Advanced Course Package
Delivered Online3 hours, Jun 15th, 16:30 + 8 more
£336

Real Estate Financial Modelling School

4.3(5)

By Bayfield Training

This week long CPD accredited training is ideal for those Real Estate professionals, who are looking to bolster the DCF modelling skills. This course covers Real Estate Investment, Development, Finance & Risk.

Real Estate Financial Modelling School
Delivered Online or in person5 days, Jun 17th, 09:00 + 2 more
£4600

55315: Introduction to SQL Databases

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is people who are moving into a database role, or whose role has expanded to include database technologies. Developers that deliver content from SQL Server databases will also benefit from this material. Overview After completing this course, you will be able to: Describe key database concepts in the context of SQL Server Describe database languages used in SQL Server Describe data modelling techniques Describe normalization and denormalization techniques Describe relationship types and effects in database design Describe the effects of database design on performance Describe commonly used database objects This course is provided as an introductory class for anyone getting started with databases. It will be useful to programmers and other IT professionals whose job roles are expanding into database management. Students will learn fundamental database concepts through demonstrations and hands-on labs on a SQL Server instance. This material updates and replaces course Microsoft course 10985 which was previously published under the same title. MODULE 1: INTRODUCTION TO DATABASES * Introduction to Relational Databases * Other Databases and Storage * Data Analysis * SQL Server Database Languages MODULE 2: DATA MODELING * Data Modelling * Designing a Database * Relationship Modeling MODULE 3: NORMALIZATION * Fundamentals of Normalization * Normal Form * Denormalization MODULE 4: RELATIONSHIPS * Introduction to Relationships * Planning Referential Integrity MODULE 5: PERFORMANCE * Indexing * Query Performance * Concurrency MODULE 6: DATABASE OBJECTS * Tables * Views * Stored Procedures, Triggers and Functions

55315: Introduction to SQL Databases
Delivered Online4 days, Jun 17th, 13:00 + 5 more
£1785

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

55342 Supporting and Troubleshooting Windows 11

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is Enterprise Desktop Support Technicians (EDSTs). These technicians provide Tier 2 support to users with domain-joined computers running the Windows 11 OS, typically in medium to large enterprise organizations. Overview Important Windows 11 features How these features are used in an Active Directory How to troubleshoot these features This is a 5-day ILT course that is designed to provide you with the knowledge and skills required to support and troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment. 1: INTRODUCING WINDOWS 11 * Overview of Windows 11 * Recommendations for typical troubleshooting procedures * Troubleshooting installation and deployment * Introduction to management and troubleshooting tools 2: ADMINISTERING WINDOWS 11 REMOTELY * Using Windows Admin Center * Using Windows PowerShell * Implementing Remote Management 3: TROUBLESHOOTING STARTUP AND PERFORMING SYSTEM RECOVERY * Recovering Windows 11 * Configuring the Registry * Troubleshooting Windows 11 startup * Implementing and troubleshooting BitLocker * Troubleshooting OS service Issues 4: TROUBLESHOOTING DEVICES AND DEVICE DRIVERS * Overview of hardware troubleshooting * Troubleshooting device drivers 5: CONFIGURING AND TROUBLESHOOTING NETWORK CONNECTIVITY * Configuring network connectivity * Troubleshooting network connectivity * Implementing and troubleshooting name resolution * Implementing and troubleshooting remote access 6: TROUBLESHOOTING GROUP POLICY * Overview of Group Policy * Resolve GPO application issues on client devices 7: CONFIGURING AND TROUBLESHOOTING SECURITY SETTINGS * Implementing network security * Implementing Windows 11 security features * Configuring and troubleshooting user accounts 8: CONFIGURING AND TROUBLESHOOTING USER STATE * Implementing and troubleshooting user state * Implementing and troubleshooting Folder Redirection 9: CONFIGURING AND TROUBLESHOOTING RESOURCE ACCESS * Configuring and troubleshooting file access. * Configuring and troubleshooting shared folders. * Implementing and troubleshooting Work Folders. * Managing and troubleshooting printers. * Recovering files. 10: TROUBLESHOOTING APPS * Troubleshooting desktop apps * Troubleshooting app compatibility * Managing UWP apps 11: MONITORING AND MAINTAINING WINDOWS 11 * Monitoring Windows 11 * Optimizing Windows 11 performance * Managing Windows 11 updates

55342 Supporting and Troubleshooting Windows 11
Delivered Online6 days, Jun 17th, 13:00 + 6 more
£2975

PL-400T00 Microsoft Power Platform Developer

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Candidates for this course design, develop, secure, and troubleshoot Power Platform solutions. Candidates implement components of a solution that include application enhancements, custom user experience, system integrations, data conversions, custom process automation, and custom visualizations. Candidates will gain applied knowledge of Power Platform services, including in-depth understanding of capabilities, boundaries, and constraints. Overview After completing this course, students will be able to: Create a technical design Configure Common Data Service Create and configure Power Apps Configure business process automation Extend the user experience Extend the platform Develop Integrations The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, Automate Flows and extend the platform to complete business requirements and solve complex business problems. CREATE A MODEL-DRIVEN APPLICATION IN POWER APPS * This module introduces you to creating a model-driven app in Power Apps that uses Common Data Service. GET STARTED USING COMMON DATA SERVICE * This module will explain the concepts behind and benefits of Common Data Service. Creating an environment, entities, fields and options sets are also discussed. CREATE A CANVAS APP IN POWER APPS * This module introduces you to Power Apps, helps you create and customize an app, and then manage and distribute it. It will also show you how to provide the best app navigation, and build the best UI using themes, icons, images, personalization, different form factors, and controls. AUTOMATE A BUSINESS PROCESS USING POWER AUTOMATE * This module introduces you to Power Automate, teaches you how to build workflows, and how to administer flows. CREATE A BUSINESS PROCESS FLOW IN POWER AUTOMATE * This module introduces you to creating business process flows in Power Automate INTRODUCTION TO DEVELOPING WITH POWER PLATFORM * This module is the first step in learning about platform, tools, and the ecosystem of the Power Platform EXTENDING THE POWER PLATFORM USER EXPERIENCE MODEL DRIVEN APPS * This module describes how to create client scripting, perform common actions with client script, and automate business process flow with client scrip. Learn about what client script can do, rules, and maintaining scripts. Discover when to use client script as well as when not to use client script. CREATE COMPONENTS WITH POWER APPS COMPONENT FRAMEWORK * This module describes how to get started with Power Apps Component Framework with an introductory module on the core concepts and components. Then it shows you how to build a component and work with advanced Power Apps Component Framework features. EXTENDING THE POWER PLATFORM COMMON DATA SERVICE * This module looks at the tools and resources needed for extending the Power Platform. We'll start with looking at the SDKs, the extensibility model, and event framework. This learning path also covers when to use plug-ins. Configuration of plug-ins as well as registering and deploying plug-ins. INTEGRATE WITH POWER PLATFORM AND COMMON DATA SERVICE * This module describes how to integrate with Common Data Service using code by learning about Common Data Service API. Get an in-depth overview of options available with Common Data Service to integrate data and events to Azure. EXTEND POWER APPS PORTALS * This module describes how to transform a content portal into a full web app interacting with Common Data Service. We will also cover the options available to customizers and developers to extend the portal functionality and integrate with Office 365, Power Platform, and Azure components. ADDITIONAL COURSE DETAILS: Nexus Humans PL-400T00 Microsoft Power Platform Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-400T00 Microsoft Power Platform Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-400T00 Microsoft Power Platform Developer
Delivered Online6 days, Jun 17th, 13:00 + 4 more
£2975

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites * Foundational knowledge of Microsoft security and compliance technologies. * Basic knowledge of information protection concepts. * Understanding of cloud computing concepts. * Understanding of Microsoft 365 products and services. 1 - INTRODUCTION TO INFORMATION PROTECTION AND DATA LIFECYCLE MANAGEMENT IN MICROSOFT PURVIEW * Know your data * Protect your data * Prevent data loss * Govern your data 2 - CLASSIFY DATA FOR PROTECTION AND GOVERNANCE * Data classification overview * Classify data using sensitive information types * Classify data using trainable classifiers * Review sensitive information and label usage * Explore labeled and sensitive content * Understand activities related to your data 3 - CREATE AND MANAGE SENSITIVE INFORMATION TYPES * Compare built-in versus custom sensitive information types * Create and manage custom sensitive information types * Describe custom sensitive information types with exact data match * Implement document fingerprinting * Create keyword dictionary 4 - UNDERSTAND MICROSOFT 365 ENCRYPTION * Learn how Microsoft 365 data is encrypted at rest * Understand service encryption in Microsoft Purview * Explore customer key management using Customer Key * Learn how data is encrypted in-transit 5 - DEPLOY MICROSOFT PURVIEW MESSAGE ENCRYPTION * Implement Microsoft Purview Message Encryption * Implement Microsoft Purview Advanced Message Encryption * Use Microsoft Purview Message Encryption templates in mail flow rules 6 - PROTECT INFORMATION IN MICROSOFT PURVIEW * Information protection overview * Configure sensitivity labels * Configure sensitivity label policies * Configure auto-labeling policies * Manage, monitor, and remediate information protection 7 - APPLY AND MANAGE SENSITIVITY LABELS * Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites * Plan on-premises labeling * Configure on-premises labeling for the Unified Labeling Scanner * Apply protections and restrictions to email and files * Monitor label performance using label analytics 8 - PREVENT DATA LOSS IN MICROSOFT PURVIEW * Data loss prevention overview * Identify content to protect * Define policy settings for your DLP policy * Test and create your DLP policy * Prepare Endpoint DLP * Manage DLP alerts in the Microsoft Purview compliance portal * View data loss prevention reports * Implement the Microsoft Purview Extension 9 - CONFIGURE DLP POLICIES FOR MICROSOFT DEFENDER FOR CLOUD APPS AND POWER PLATFORM * Configure data loss prevention policies for Power Platform * Integrate data loss prevention in Microsoft Defender for Cloud Apps * Configure policies in Microsoft Defender for Cloud Apps * Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - MANAGE DATA LOSS PREVENTION POLICIES AND REPORTS IN MICROSOFT 365 * Configure data loss prevention for policy precedence * Implement data loss prevention policies in test mode * Explain data loss prevention reporting capabilities * Manage permissions for data loss prevention reports * Manage and respond to data loss prevention policy violations 11 - MANAGE THE DATA LIFECYCLE IN MICROSOFT PURVIEW * Data Lifecycle Management overview * Configure retention policies * Configure retention labels * Configure manual retention label policies * Configure auto-apply retention label policies * Import data for Data Lifecycle Management * Manage, monitor, and remediate Data Lifecycle Management 12 - MANAGE DATA RETENTION IN MICROSOFT 365 WORKLOADS * Explain retention in Exchange Online * Explain retention in SharePoint Online and OneDrive * Explain retention in Microsoft Yammer * Activate archive mailboxes in Microsoft Exchange * Apply mailbox holds in Microsoft Exchange * Recover content in Microsoft Exchange 13 - MANAGE RECORDS IN MICROSOFT PURVIEW * Records management overview * Import a file plan * Configure retention labels * Configure event driven retention * Manage, monitor, and remediate records 14 - EXPLORE COMPLIANCE IN MICROSOFT 365 * Plan for security and compliance in Microsoft 365 * Plan your beginning compliance tasks in Microsoft Purview * Manage your compliance requirements with Compliance Manager * Examine the Compliance Manager dashboard * Analyze the Microsoft Compliance score 15 - SEARCH FOR CONTENT IN THE MICROSOFT PURVIEW COMPLIANCE PORTAL * Explore Microsoft Purview eDiscovery solutions * Create a content search * View the search results and statistics * Export the search results and search report * Configure search permissions filtering * Search for and delete email messages 16 - MANAGE MICROSOFT PURVIEW EDISCOVERY (STANDARD) * Explore Microsoft Purview eDiscovery solutions * Implement Microsoft Purview eDiscovery (Standard) * Create eDiscovery holds * Search for content in a case * Export content from a case * Close, reopen, and delete a case 17 - MANAGE MICROSOFT PURVIEW EDISCOVERY (PREMIUM) * Explore Microsoft Purview eDiscovery (Premium) * Implement Microsoft Purview eDiscovery (Premium) * Create and manage an eDiscovery (Premium) case * Manage custodians and non-custodial data sources * Analyze case content 18 - MANAGE MICROSOFT PURVIEW AUDIT (STANDARD) * Explore Microsoft Purview Audit solutions * Implement Microsoft Purview Audit (Standard) * Search the audit log * Export, configure, and view audit log records * Use audit log searching to investigate common support issues 19 - PREPARE MICROSOFT PURVIEW COMMUNICATION COMPLIANCE * Plan for communication compliance * Identify and resolve communication compliance workflow * Case study--Configure an offensive language policy * Investigate and remediate communication compliance alerts 20 - MANAGE INSIDER RISK IN MICROSOFT PURVIEW * Insider risk management overview * Create and manage insider risk policies * Investigate insider risk alerts * Take action on insider risk alerts through cases * Manage insider risk management forensic evidence * Create insider risk management notice templates 21 - IMPLEMENT MICROSOFT PURVIEW INFORMATION BARRIERS * Explore Microsoft Purview Information Barriers * Configure information barriers in Microsoft Purview * Examine information barriers in Microsoft Teams * Examine information barriers in OneDrive * Examine information barriers in SharePoint 22 - MANAGE REGULATORY AND PRIVACY REQUIREMENTS WITH MICROSOFT PRIVA * Create and manage risk management policies * Investigate and remediate risk management alerts * Create rights requests * Manage data estimate and retrieval for rights requests * Review data from rights requests * Get reports from rights requests 23 - IMPLEMENT PRIVILEGED ACCESS MANAGEMENT * Case study--Implementing privileged access management 24 - MANAGE CUSTOMER LOCKBOX * Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered Online5 days, Jun 17th, 13:00 + 2 more
£2380

Introduction for Workplace Health Champions (Level 2 Award) (Online Classroom)- 2 days

4.4(16)

By Active Lancashire

-------------------------------------------------------------------------------- Thanks for expressing interest in the course. Please note this is a provisional booking and confirmation of your place is subject to completion and approval of eligibility forms which will be sent to you via email shortly   Promoting and supporting employee health and wellbeing is at the heart of our purpose! Championing better workplaces and working lives because an effective workplace health and wellbeing programme can deliver mutual benefits to people, organisations and communities.    Healthy workplaces help people to flourish and reach their potential. This means creating an environment that actively promotes a state of contentment, benefiting both employees and the organisations.   Our Level 2 NCFE Introduction to the Workplace Health Champion allows you to gain an understanding of the concept of workplace health and the role to support. Gain an deeper understanding of the leading factors affecting physical and mental health, key behaviours, the need to safeguard adults as a workplace health champion and an understanding of how to plan initiatives in the workplace. If you and your Organisation recognise that investing in employee workplace health can lead to increased resilience, better employee engagement, reduced sickness absence and higher performance and productivity then this is the course for you!   For more information regarding this course, please contact champions@activelancashire.org.uk [champions@activelancashire.org.uk]  -------------------------------------------------------------------------------- Please note both sessions must be completed in order to gain the qualification

Introduction for Workplace Health Champions (Level 2 Award) (Online Classroom)- 2 days
Delivered Online4 days, Jun 17th, 13:00
£99

Educators matching "Introduction To Construction"

Show all 11
2020 Training

2020 training

Nottingham

At 2020 Training, we are an ever-expanding team who have a wealth of experience and industry expertise when it comes to providing accredited or creating bespoke, health and safety training for your workplace. 2020 Training has the scope to cover the whole country so let us provide the training where you need it! We offer a huge range of courses, including the CITB Site Safety Plus suite, Fire Marshal, Vehicle Banksman, First Aid, Asbestos, IPAF, PASMA, CISRS, Mental Health and Plant courses to name some of our most sought-after training. Whilst all of our courses have an element of set content that needs to be covered and assessed, unlike other training providers in this field, we are passionate about creating an engaging and interactive learning environment which drives and nurtures positive behavioural change. In essence, 2020 Training will work with you, collaborating and discussing your exact requirements in order to deliver courses relevant to you and your business. Simply tell us what you need and we will shape our content around you! We have successfully delivered courses to 1000s of delegates and we are passionate about not only keeping people safe, but transforming an individual or an organisation’s operational performance. We make training relevant, interactive and engaging so that delegates and organisations maximise the investment they make. We don’t want training to be a tick box exercise. Here at 2020 Training Ltd, we help and promote behavioural change by making it relevant and suitable in order that tangible results can be seen back in the workplace – whether that be in helping to save time and money, increase knowledge and awareness and of course, in helping to save lives. We’re passionate about doing our bit to make sure that people go home safely to their families every night – this is our priority!

Proactive NLP Ltd

proactive nlp ltd

Bowness-on-windermere

At Proactive NLP Ltd we offer perhaps the widest range of NLP based services. Whatever your context we have solutions that will deliver the outcome you're seeking. Our core offering is traditional accredited NLP training at Diploma, Practitioner & Master Practitioner levels.  This series of personal development really is the most intensive journey you can take and the most rewarding.  You will give yourself the maximum choice of the life you want to lead. All our services incorporate NLP at their core, hence, learning NLP is central to you achieving exactly what you want to achieve. For individuals struggling to identify the future they want because they are shackled with Anxiety and Stress or Depression we have a service that lets you take those shackles and chains off.  Our 'A Life Without Anxiety' site is where we assist individuals re-train their minds to shaoe the life they want to lead.  We have conducted an extensive review of lots of 'Anxiety Journals' and "Anxiety Cure' books...lets just say they re-inforce anxiety in the reader!  Our approach is totally different, we will guide you to create the life you want...free from an anxiety.  We will be publishing our own Journal and accompanying Book. For businesses and organisations we have two distinct offerings.  Firstly, our Business NLP offering takes our traditional NLP training and reframes this as a development programme focused on developing Collaborative Leadership and Collaborative Cultures.  Having worked on most of the major infrastructure projects delivered within the UK over the last 12 years we have encountered multiple scenarios where 'collaborative working' was a stated aim of the project.  However, virtually zero collaboration actually took place.  What we encounter mostly is the traditional and acrimonious 'client / contractor' game playing.  This simply derails and extends the life of projects.  This is the opposite of the stated aim of the project.  We believe if organisations can master the dynamics of collaboration they can achieve everything they want.  Our Business NLP programmes are Diploma - The Fundamentals of Collaborative Behaviour; Practitioner - Developing Collaborative Relationships and Master Practitioner - Leading & Developing Collaborative Cultures. For organisations dealing with low performance, conflict or struggling to deliver against their objectives our specialist Workshop Facilitation business is the answer.  Here we conduct a diagnostic process to uncover the patterns and dynamics getting in the way performance improving.  We then deliver specialised facilitation of workshops and meetings to create a new level of engagement within teams.  Our main assignments for this tend to be teams and groups struggling because of 'conflict' and a lack of 'accountability'.  We have successfully delivered programmes that have resolved these issues and have seen teams we have worked with go on and achieve the level of performance they had initially struggled with. Whatever it is you're looking for in terms of personal or organisational development we have the solutions that will deliver what you're seeking to achieve.  All you ahve to do is get in touch.

Course Gate

course gate

5.0(1)

London

Welcome to Course Gate, your gateway to a world of knowledge and opportunity. We are a leading online learning marketplace dedicated to empowering individuals and organisations with the skills they need to succeed in today's dynamic and competitive environment. -------------------------------------------------------------------------------- Our Mission Our mission is to make education accessible and enjoyable for everyone. We want to help you discover your passion, expand your knowledge, and grow your confidence. Whether you want to learn a new language, master software, or develop a hobby, we have the right course for you.  -------------------------------------------------------------------------------- Our Vision  At Course Gate, we envision a future where education knows no boundaries. Our goal is to eliminate the traditional barriers of time, location, and accessibility, empowering learners from diverse backgrounds to unlock their full potential. Through our innovative approach, we aim to revolutionise the learning experience by making top-quality education accessible to everyone, regardless of their location. -------------------------------------------------------------------------------- Why Choose Course Gate? When you opt for Course Gate, you're choosing excellence, convenience, and an unparalleled learning experience. Here's why learners and organisations worldwide trust us: * Unmatched Quality: We meticulously curate our courses, collaborating with industry-leading experts to provide the highest-quality, relevant, and up-to-date content. * Flexible Learning: Our platform enables you to learn at your own pace, fitting into your schedule. Whether you're a full-time professional, a stay-at-home parent, or a busy student. * 24/7 Customer Support: Our dedicated customer support team is available to assist you whenever you need help. * Accreditation & Endorsement: We hold CPD accreditation and QLS endorsement, and we're a registered course provider on the UKRLP in the UK. * Affordability: We believe education should be accessible to all. Course Gate provides competitive pricing and discounts, ensuring that the cost never becomes a barrier to your personal and professional development. So, what are you waiting for? Join the thousands of learners who have already chosen Course Gate as their trusted learning partner and unlock your full potential. --------------------------------------------------------------------------------

Academy for Health and Fitness

academy for health and fitness

4.7(10)

London

Who We Are Academy for Health and Fitness is a growing online course provider where students learn and transform themselves for a better tomorrow. We created our courses with a specific emphasis on three primary categories: fitness, Therapy, and Health. Our organisation provides a wide variety of individually accredited courses and a comprehensive certification programme, through which we give millions of professionals the employable skills they need to succeed in their careers. Moreover, we focus strongly on providing our students with the necessary expertise for the future world. Our Mission As a growing Health and fitness course provider, we deliver our students the best learning environment possible and open up the opportunity for everyone to learn new skills. While granting access to various courses, we strive to uphold our sterling reputation, excellent service, and complete transparency. Our Vision We aim to raise higher learning standards and establish ourselves as the UK's leading course provider. Furthermore, we want to create a safer learning environment with the highest flexibility while maximising each student's potential to enhance their employability, both now and in the future. We Provide * Courses curated by leading industry experts * Fully accredited courses & study materials * Business Team Training * Affordable subscription * Accredited Certification * New courses every month * Flexible learning * 24/7 Support What Made Us Unique We are dedicated to providing the greatest customer service and the most comprehensive selection of courses. With new courses being added constantly, you can rest assured that you will get the best learning experience and an outstanding customer support team to help you become skilled and certified.

The In House Training Company

the in house training company

Harpenden

WHAT WE DO We offer top-quality in-house training, in a wide range of subjects, at a sensible price. All our programmes are delivered by independent subject specialists who also have outstanding training skills. We have rigorous standards and refuse to work with anyone but the best trainers. Our extensive network means that we have a choice of trainers to offer for all of these subjects, partly to ensure the best ‘fit’ between trainer and client and partly so that we can resource large-scale ‘roll-out’ programmes when required. We use a core team of around 40 associate trainers, with about another 150 specialists available on an ad hoc basis. WHERE WE DO IT Generally, we send the trainer to train up a group of people on your own premises. We work across the UK and internationally. WHO WE DO IT FOR We have an incredibly wide range of in-house training clients, of all sizes and across all sectors, as the following small selection of current and recent clients shows: Private sector • Accelerated Bridging Finance • AGD Equipment • Airbus • Alcoa • Altechnic • Appleyards • Aquaterra • AQL • Archant • Arinc • Arvato Loyalty • ASK-Mercury • ASOS • Assura • Atlas Copco • ATS Euromaster • Babcock International • BE Aerospace • Berkmann Wine Cellars • Bell & Clements • Biffa Waste Management • Bluefin • BM Trada • Bridge Hall • BSkyB • buy-a-gift.com • Carillion • CBS Butler • CG Power • Compass Group • Computacenter • Crowcon • Dalys Systems • Dawson Group • Davies Tapes • De Lage Landen • Demco Europe • Dental Supply • Domex UK • e2v technologies plc • EADS • Elstree Golf Club • Eminate • En Route • EPOQ • ESD • Fairbanks • Fourways • Fresh Student Living • FrontlineGB • Genus Construction • GeoNetworks • Gonative • GPS UK • Grace Foods • Grant Thornton • Guardian Global • GVS • Harveys Furniture • Hellmann • Hicks • Horiba • Hutchison Whampoa • Hydro International • IIJ • ILX Group • Intellident • IT Builder • Jacksons Bakery • JE Hartley • Johnson Matthey • KCE FM • Kembrey • Kennedys • Kent PHK • Lasnek • Liberty Bishop • London Underground • Longhurst Group • Mashpac • Mayflex • Meadow Foods • Michael Lewin Solicitors • Millbrook Healthcare • Mole Valley Farmers • Moon Beever Solicitor • Morris Lubricants • My Family Care • Mumford • Natixis • Network Resources • New England Biolabs • NFC Food Services • NLP Planning • Ocean Sky • OpenText • Otis Ltd • Oxford Instruments • Pegasus • Personal Group • Ping • Pudlo • Reaction Engines • Rentokil • Renewable Energy Systems • RIAS • Roadchef • Roythornes • RTC Group • RTS • RWD • RWE npower • S Farmer Consulting • Sage UK • SEA • Schroff • Scottish Power • Seico • SFPL • Sharkey & Co • Sherford • Shield Pest Control • Skincare • Sledge • Smiths Detection • Stanco • Strutt & Parker • Swift • Systech • Tennants • Tinies • Ultra Electronics • United Healthcare • Urbaser • Utilize • Vapormatic • Victoria Palace Theatre • Wasabi • WDR • WEG • Whitbread • Wincanton • WK Linkline Group • Wolverine Proctor • Xchanging • Yorkshire Water Services Public sector / education • Aylesbury College • Bedford Design Group • Berkshire Healthcare Authority • Big Lottery Fund • Brighton & Hove Council • Bromsgrove & Redditch Councils • Carmel College • Central Bedfordshire Council • City and Islington College • Daventry District Council • East Kent NHS Trust • Environment Agency • Greenwich Community Health • H M Treasury • Herts County Council • Hertsmere Borough Council • Medical Research Council • Mid-Yorks Hospital • NHS Cambridgeshire • NHS Yorkshire • NHS Western Isles • Ofsted (ALI) • Open University • Orchard Centre • Peak District National Park Authority • RAF Brize Norton • South City College, Birmingham • Stoke Sixth-Form College • Telford Sixth-Form College • University of Portsmouth • University of Southampton • Welwyn Hatfield Borough Council • Windsor & Maidenhead Council Charities / housing / not-for-profit • 4children • AgeUK • Association of Aircraft Engineers • BFI (British Film Institution) • Charities Aid Foundation • Chime • Guy Chester Centre • Hexagon Housing • Housing Plus • Independent Age • LCCA • Life • Magenta Living • Methodist Church • MS Trust • National Pharmaceutical Association • NAVCA • North Herts Homes • Nuffield Hospitals • Origins Housing • RNLI • Royal British Legion • Stevenage Leisure • Supported Independent Living • The Wine Society International African Development Bank (Tunisia) • Aramco (Saudi Arabia) • Camco Global (China) • DDB (Morocco) • Difko (Denmark) • East-West Seeds (Thailand) • NHMFL (USA) • OpenText (Germany) • Oyo State (Nigeria) • Staurus (Dubai) • Syngenta (Greece) Open course clients / partners Hertfordshire Chamber of Commerce • IET (Institution of Engineering and Technology) • Institution of Mechanical Engineers

iStudy UK

istudy uk

We understand more than anyone how important it is for you to get the right qualifications at the right time. We also understand that when you have a lot to do, you might not always have the time free to go to a place of study. That is why we created this site, so you can take all the time you need to learn more about your chosen topics as well as be able to do the whole thing from home. We believe in empowering people by offering them opportunities to expand and extend their knowledge and skill set as well as giving them the support they need to achieve great things. With thousands of courses available and a team who will do just about anything to help you, it is safe to say that you will not find a better course provider on the internet and so we would love to work with you to make sure that you get the best experience and best results out of your education. WHAT WE DO Here at iStudy we provide a range of online training courses for those who want to gain new skills, and qualifications and update their knowledge. iStudy training courses are delivered entirely online through our sophisticated student learning portal. The student learning portal is an online learning management system that allows students to study for their courses online. This innovative technology means there is no need to attend any classes or take time off work to study. Professionally accredited courses All our courses are delivered in partnership with nationally recognised awarding bodies so be assured that what you learn with us matters when it comes to achieving your career goals. Study that suits you You do not have to give up your job or your life to get a new qualification, you can learn anytime, anywhere.