• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

859 Inventor courses

55348 Administering Microsoft Endpoint Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site 2 - ANALYZING DATA USING QUERIES, REPORTS, AND CMPIVOT * Introduction to queries * Configuring SQL Server Reporting Services * Analyzing the real-time state of a device by using CMPivot 3 - PREPARING THE CONFIGURATION MANAGER MANAGEMENT INFRASTRUCTURE * Configuring site boundaries and boundary groups * Configuring resource discovery * Organizing resources using device and user collections 4 - DEPLOYING AND MANAGING THE CONFIGURATION MANAGER CLIENT * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings and performing management operations 5 - MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence 6 - DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points 7 - DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying and managing Windows apps 8 - MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Enabling third-party updates 9 - IMPLEMENTING DEFENDER PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Configuring and deploying advanced threat policies 10 - MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance settings * Viewing compliance results * Managing resource and data access 11 - MANAGING OPERATING SYSTEM DEPLOYMENT * An overview of operating system deployment * Preparing a site for operating system deployment * Deploying an operating system * Managing Windows as a service 12 - MANAGING AND MAINTAINING A CONFIGURATION MANAGER SITE * Configuring role-based administration * Configuring Remote Tools * Overview of Configuration Manager site maintenance and Management Insights * Backing up and recovering a Configuration Manager site * Updating the Configuration Manager infrastructure 13 - WHAT?S NEW IN MICROSOFT ENDPOINT CONFIGURATION MANAGER * Whats new in Microsoft Endpoint Manager covering each semi annual release ADDITIONAL COURSE DETAILS: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55348 Administering Microsoft Endpoint Configuration Manager
Delivered Online6 days, Jul 8th, 13:00 + 4 more
£2975

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - MANAGE IDENTITIES IN MICROSOFT ENTRA ID * Secure users in Microsoft Entra ID * Secure groups in Microsoft Entra ID * Recommend when to use external identities * Secure external identities * Implement Microsoft Entra Identity protection 2 - MANAGE AUTHENTICATION BY USING MICROSOFT ENTRA ID * Configure Microsoft Entra Verified ID * Implement multifactor authentication (MFA) * Implement passwordless authentication * Implement password protection * Implement single sign-on (SSO) * Integrate single sign-on (SSO) and identity providers * Recommend and enforce modern authentication protocols 3 - MANAGE AUTHORIZATION BY USING MICROSOFT ENTRA ID * Configure Azure role permissions for management groups, subscriptions, resource groups, and resources * Assign built-in roles in Microsoft Entra ID * Assign built-in roles in Azure * Create and assign a custom role in Microsoft Entra ID * Implement and manage Microsoft Entra Permissions Management * Configure Microsoft Entra Privileged Identity Management * Configure role management and access reviews by using Microsoft Entra Identity Governance * Implement Conditional Access policies 4 - MANAGE APPLICATION ACCESS IN MICROSOFT ENTRA ID * Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants * Manage app registrations in Microsoft Entra ID * Configure app registration permission scopes * Manage app registration permission consent * Manage and use service principals * Manage managed identities for Azure resources * Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - PLAN AND IMPLEMENT SECURITY FOR VIRTUAL NETWORKS * Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) * Plan and implement User-Defined Routes (UDRs) * Plan and implement Virtual Network peering or gateway * Plan and implement Virtual Wide Area Network, including secured virtual hub * Secure VPN connectivity, including point-to-site and site-to-site * Implement encryption over ExpressRoute * Configure firewall settings on PaaS resources * Monitor network security by using Network Watcher, including NSG flow logging 6 - PLAN AND IMPLEMENT SECURITY FOR PRIVATE ACCESS TO AZURE RESOURCES * Plan and implement virtual network Service Endpoints * Plan and implement Private Endpoints * Plan and implement Private Link services * Plan and implement network integration for Azure App Service and Azure Functions * Plan and implement network security configurations for an App Service Environment (ASE) * Plan and implement network security configurations for an Azure SQL Managed Instance 7 - PLAN AND IMPLEMENT SECURITY FOR PUBLIC ACCESS TO AZURE RESOURCES * Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management * Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies * Plan and implement an Azure Application Gateway * Plan and implement an Azure Front Door, including Content Delivery Network (CDN) * Plan and implement a Web Application Firewall (WAF) * Recommend when to use Azure DDoS Protection Standard 8 - PLAN AND IMPLEMENT ADVANCED SECURITY FOR COMPUTE * Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access * Configure network isolation for Azure Kubernetes Service (AKS) * Secure and monitor AKS * Configure authentication for AKS * Configure security for Azure Container Instances (ACIs) * Configure security for Azure Container Apps (ACAs) * Manage access to Azure Container Registry (ACR) * Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption * Recommend security configurations for Azure API Management 9 - PLAN AND IMPLEMENT SECURITY FOR STORAGE * Configure access control for storage accounts * Manage life cycle for storage account access keys * Select and configure an appropriate method for access to Azure Files * Select and configure an appropriate method for access to Azure Blob Storage * Select and configure an appropriate method for access to Azure Tables * Select and configure an appropriate method for access to Azure Queues * Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage * Configure Bring your own key (BYOK) * Enable double encryption at the Azure Storage infrastructure level 10 - PLAN AND IMPLEMENT SECURITY FOR AZURE SQL DATABASE AND AZURE SQL MANAGED INSTANCE * Enable database authentication by using Microsoft Entra ID * Enable and monitor database audit * Identify use cases for the Microsoft Purview governance portal * Implement data classification of sensitive information by using the Microsoft Purview governance portal * Plan and implement dynamic mask * Implement transparent data encryption? * Recommend when to use Azure SQL Database Always Encrypted 11 - PLAN, IMPLEMENT, AND MANAGE GOVERNANCE FOR SECURITY * Create, assign, and interpret security policies and initiatives in Azure Policy * Configure security settings by using Azure Blueprint * Deploy secure infrastructures by using a landing zone * Create and configure an Azure Key Vault * Recommend when to use a dedicated Hardware Security Module (HSM) * Configure access to Key Vault, including vault access policies and Azure Role Based Access Control * Manage certificates, secrets, and keys * Configure key rotation * Configure backup and recovery of certificates, secrets, and keys 12 - MANAGE SECURITY POSTURE BY USING MICROSOFT DEFENDER FOR CLOUD * Implement Microsoft Defender for Cloud * Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory * Assess compliance against security frameworks and Microsoft Defender for Cloud * Add industry and regulatory standards to Microsoft Defender for Cloud * Add custom initiatives to Microsoft Defender for Cloud * Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud * Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - CONFIGURE AND MANAGE THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD * Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS * Configure Microsoft Defender for Servers * Configure Microsoft Defender for Azure SQL Database * Manage and respond to security alerts in Microsoft Defender for Cloud * Configure workflow automation by using Microsoft Defender for Cloud * Evaluate vulnerability scans from Microsoft Defender for Server 14 - CONFIGURE AND MANAGE SECURITY MONITORING AND AUTOMATION SOLUTIONS * Monitor security events by using Azure Monitor * Configure data connectors in Microsoft Sentinel * Create and customize analytics rules in Microsoft Sentinel * Configure automation in Microsoft Sentinel ADDITIONAL COURSE DETAILS: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered Online5 days, Jul 8th, 13:00 + 4 more
£2380

Hybrid Vehicle, Car Restoration and First Aid at Work - QLS Endorsed

By Imperial Academy

Level 3, 4 & 5 QLS Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 10 CPD Courses | Lifetime Access

Hybrid Vehicle, Car Restoration and First Aid at Work - QLS Endorsed
Delivered Online On Demand
£399

Brainstorming Techniques

By Inovra Group

OVERVIEW This one day course covers the basics of brainstorming and then goes on to look at a number of different yet highly effective techniques that can be employed. DESCRIPTION Brainstorming is probably the most well known and most widely used method for bringing groups of people together to generate ideas about an issue or problem. This is because it’s a good way to gather a lot of ideas very quickly. It is also a great way of bringing people together and helping to build them as a team. Just imagine the effect on the team and its morale if ideas that they generate are actually used. There is no doubt that people are more likely to buy into the ideas that they came up with themselves. Although brainstorming is widely used for decision-making, it is not always handled very well. If that is the case, it can have the opposite effect to the one that is intended. Rather than creating ideas it can stifle them and rather than motivating people it demotivates them. This highly interactive course will help learners to make the most of brainstorming sessions and also provides alternative techniques to enliven any session that is beginning to flag. Topics covered: * What is Brainstorming? – A discussion to help participants understand what brainstorming is, and what it involves. * Brainstorming rules – A quick look at the very limited rules suggested by Alex Osborn who is generally credited with being the inventor of brainstorming. * Preparation – Although many brainstorming sessions take place on the spur of the moment they all require some preparation. We look at the importance of defining the purpose of the session, selecting the right participants, and then briefing them properly. * Storm and Floods – This is an activity that we re-visit on several occasions to take participants through the whole brainstorming process and to give them plenty of practice. * The Three R’s of Facilitation – The three R’s take you through the essential elements of facilitating an effective brainstorming session. * Closing the Session – Effective closing of the brainstorm may be just as important as the session itself. We look at the essential elements that the facilitator needs to cover. * Clarify and Nurture – Learners discover the importance of ensuring that all ideas that are unclear are clarified and that ideas are nurtured. They also learn what this involves practically. * Alternative Techniques – There are many ways to enliven a flagging brainstorming session, provide a fresh approach or simply build on initial ideas. The learners are introduced to some of the most important of these. * Brainstorming Scenarios – Learners work through up to 6 scenarios so that they can practice the alternative techniques covered during the programme. WHO SHOULD ATTEND Anyone who facilitates or takes part in brainstorming sessions, or wants to work with organisational teams to develop their problem-solving abilities. REQUIREMENTS FOR ATTENDEES None.

Brainstorming Techniques
Delivered in-person, on-requestDelivered In-Person in Wakefield
£800

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - INTRODUCTION TO MICROSOFT 365 THREAT PROTECTION * Explore Extended Detection & Response (XDR) response use cases * Understand Microsoft Defender XDR in a Security Operations Center (SOC) * Explore Microsoft Security Graph * Investigate security incidents in Microsoft Defender XDR 2 - MITIGATE INCIDENTS USING MICROSOFT 365 DEFENDER * Use the Microsoft Defender portal * Manage incidents * Investigate incidents * Manage and investigate alerts * Manage automated investigations * Use the action center * Explore advanced hunting * Investigate Microsoft Entra sign-in logs * Understand Microsoft Secure Score * Analyze threat analytics * Analyze reports * Configure the Microsoft Defender portal 3 - PROTECT YOUR IDENTITIES WITH MICROSOFT ENTRA ID PROTECTION * Microsoft Entra ID Protection overview * Detect risks with Microsoft Entra ID Protection policies * Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - REMEDIATE RISKS WITH MICROSOFT DEFENDER FOR OFFICE 365 * Automate, investigate, and remediate * Configure, protect, and detect * Simulate attacks 5 - SAFEGUARD YOUR ENVIRONMENT WITH MICROSOFT DEFENDER FOR IDENTITY * Configure Microsoft Defender for Identity sensors * Review compromised accounts or data * Integrate with other Microsoft tools 6 - SECURE YOUR CLOUD APPS AND SERVICES WITH MICROSOFT DEFENDER FOR CLOUD APPS * Understand the Defender for Cloud Apps Framework * Explore your cloud apps with Cloud Discovery * Protect your data and apps with Conditional Access App Control * Walk through discovery and access control with Microsoft Defender for Cloud Apps * Classify and protect sensitive information * Detect Threats 7 - RESPOND TO DATA LOSS PREVENTION ALERTS USING MICROSOFT 365 * Describe data loss prevention alerts * Investigate data loss prevention alerts in Microsoft Purview * Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - MANAGE INSIDER RISK IN MICROSOFT PURVIEW * Insider risk management overview * Create and manage insider risk policies * Investigate insider risk alerts * Take action on insider risk alerts through cases * Manage insider risk management forensic evidence * Create insider risk management notice templates 9 - INVESTIGATE THREATS BY USING AUDIT FEATURES IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW STANDARD * Explore Microsoft Purview Audit solutions * Implement Microsoft Purview Audit (Standard) * Start recording activity in the Unified Audit Log * Search the Unified Audit Log (UAL) * Export, configure, and view audit log records * Use audit log searching to investigate common support issues 10 - INVESTIGATE THREATS USING AUDIT IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW (PREMIUM) * Explore Microsoft Purview Audit (Premium) * Implement Microsoft Purview Audit (Premium) * Manage audit log retention policies * Investigate compromised email accounts using Purview Audit (Premium) 11 - INVESTIGATE THREATS WITH CONTENT SEARCH IN MICROSOFT PURVIEW * Explore Microsoft Purview eDiscovery solutions * Create a content search * View the search results and statistics * Export the search results and search report * Configure search permissions filtering * Search for and delete email messages 12 - PROTECT AGAINST THREATS WITH MICROSOFT DEFENDER FOR ENDPOINT * Practice security administration * Hunt threats within your network 13 - DEPLOY THE MICROSOFT DEFENDER FOR ENDPOINT ENVIRONMENT * Create your environment * Understand operating systems compatibility and features * Onboard devices * Manage access * Create and manage roles for role-based access control * Configure device groups * Configure environment advanced features 14 - IMPLEMENT WINDOWS SECURITY ENHANCEMENTS WITH MICROSOFT DEFENDER FOR ENDPOINT * Understand attack surface reduction * Enable attack surface reduction rules 15 - PERFORM DEVICE INVESTIGATIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Use the device inventory list * Investigate the device * Use behavioral blocking * Detect devices with device discovery 16 - PERFORM ACTIONS ON A DEVICE USING MICROSOFT DEFENDER FOR ENDPOINT * Explain device actions * Run Microsoft Defender antivirus scan on devices * Collect investigation package from devices * Initiate live response session 17 - PERFORM EVIDENCE AND ENTITIES INVESTIGATIONS USING MICROSOFT DEFENDER FOR ENDPOINT * Investigate a file * Investigate a user account * Investigate an IP address * Investigate a domain 18 - CONFIGURE AND MANAGE AUTOMATION USING MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Manage automation upload and folder settings * Configure automated investigation and remediation capabilities * Block at risk devices 19 - CONFIGURE FOR ALERTS AND DETECTIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Configure alert notifications * Manage alert suppression * Manage indicators 20 - UTILIZE VULNERABILITY MANAGEMENT IN MICROSOFT DEFENDER FOR ENDPOINT * Understand vulnerability management * Explore vulnerabilities on your devices * Manage remediation 21 - PLAN FOR CLOUD WORKLOAD PROTECTIONS USING MICROSOFT DEFENDER FOR CLOUD * Explain Microsoft Defender for Cloud * Describe Microsoft Defender for Cloud workload protections * Enable Microsoft Defender for Cloud 22 - CONNECT AZURE ASSETS TO MICROSOFT DEFENDER FOR CLOUD * Explore and manage your resources with asset inventory * Configure auto provisioning * Manual log analytics agent provisioning 23 - CONNECT NON-AZURE RESOURCES TO MICROSOFT DEFENDER FOR CLOUD * Protect non-Azure resources * Connect non-Azure machines * Connect your AWS accounts * Connect your GCP accounts 24 - MANAGE YOUR CLOUD SECURITY POSTURE MANAGEMENT? * Explore Secure Score * Explore Recommendations * Measure and enforce regulatory compliance * Understand Workbooks 25 - EXPLAIN CLOUD WORKLOAD PROTECTIONS IN MICROSOFT DEFENDER FOR CLOUD * Understand Microsoft Defender for servers * Understand Microsoft Defender for App Service * Understand Microsoft Defender for Storage * Understand Microsoft Defender for SQL * Understand Microsoft Defender for open-source databases * Understand Microsoft Defender for Key Vault * Understand Microsoft Defender for Resource Manager * Understand Microsoft Defender for DNS * Understand Microsoft Defender for Containers * Understand Microsoft Defender additional protections 26 - REMEDIATE SECURITY ALERTS USING MICROSOFT DEFENDER FOR CLOUD * Understand security alerts * Remediate alerts and automate responses * Suppress alerts from Defender for Cloud * Generate threat intelligence reports * Respond to alerts from Azure resources 27 - CONSTRUCT KQL STATEMENTS FOR MICROSOFT SENTINEL * Understand the Kusto Query Language statement structure * Use the search operator * Use the where operator * Use the let statement * Use the extend operator * Use the order by operator * Use the project operators 28 - ANALYZE QUERY RESULTS USING KQL * Use the summarize operator * Use the summarize operator to filter results * Use the summarize operator to prepare data * Use the render operator to create visualizations 29 - BUILD MULTI-TABLE STATEMENTS USING KQL * Use the union operator * Use the join operator 30 - WORK WITH DATA IN MICROSOFT SENTINEL USING KUSTO QUERY LANGUAGE * Extract data from unstructured string fields * Extract data from structured string data * Integrate external data * Create parsers with functions 31 - INTRODUCTION TO MICROSOFT SENTINEL * What is Microsoft Sentinel? * How Microsoft Sentinel works * When to use Microsoft Sentinel 32 - CREATE AND MANAGE MICROSOFT SENTINEL WORKSPACES * Plan for the Microsoft Sentinel workspace * Create a Microsoft Sentinel workspace * Manage workspaces across tenants using Azure Lighthouse * Understand Microsoft Sentinel permissions and roles * Manage Microsoft Sentinel settings * Configure logs 33 - QUERY LOGS IN MICROSOFT SENTINEL * Query logs in the logs page * Understand Microsoft Sentinel tables * Understand common tables * Understand Microsoft Defender XDR tables 34 - USE WATCHLISTS IN MICROSOFT SENTINEL * Plan for watchlists * Create a watchlist * Manage watchlists 35 - UTILIZE THREAT INTELLIGENCE IN MICROSOFT SENTINEL * Define threat intelligence * Manage your threat indicators * View your threat indicators with KQL 36 - CONNECT DATA TO MICROSOFT SENTINEL USING DATA CONNECTORS * Ingest log data with data connectors * Understand data connector providers * View connected hosts 37 - CONNECT MICROSOFT SERVICES TO MICROSOFT SENTINEL * Plan for Microsoft services connectors * Connect the Microsoft Office 365 connector * Connect the Microsoft Entra connector * Connect the Microsoft Entra ID Protection connector * Connect the Azure Activity connector 38 - CONNECT MICROSOFT DEFENDER XDR TO MICROSOFT SENTINEL * Plan for Microsoft Defender XDR connectors * Connect the Microsoft Defender XDR connector * Connect Microsoft Defender for Cloud connector * Connect Microsoft Defender for IoT * Connect Microsoft Defender legacy connectors 39 - CONNECT WINDOWS HOSTS TO MICROSOFT SENTINEL * Plan for Windows hosts security events connector * Connect using the Windows Security Events via AMA Connector * Connect using the Security Events via Legacy Agent Connector * Collect Sysmon event logs 40 - CONNECT COMMON EVENT FORMAT LOGS TO MICROSOFT SENTINEL * Plan for Common Event Format connector * Connect your external solution using the Common Event Format connector 41 - CONNECT SYSLOG DATA SOURCES TO MICROSOFT SENTINEL * Plan for syslog data collection * Collect data from Linux-based sources using syslog * Configure the Data Collection Rule for Syslog Data Sources * Parse syslog data with KQL 42 - CONNECT THREAT INDICATORS TO MICROSOFT SENTINEL * Plan for threat intelligence connectors * Connect the threat intelligence TAXII connector * Connect the threat intelligence platforms connector * View your threat indicators with KQL 43 - THREAT DETECTION WITH MICROSOFT SENTINEL ANALYTICS * What is Microsoft Sentinel Analytics? * Types of analytics rules * Create an analytics rule from templates * Create an analytics rule from wizard * Manage analytics rules 44 - AUTOMATION IN MICROSOFT SENTINEL * Understand automation options * Create automation rules 45 - THREAT RESPONSE WITH MICROSOFT SENTINEL PLAYBOOKS * What are Microsoft Sentinel playbooks? * Trigger a playbook in real-time * Run playbooks on demand 46 - SECURITY INCIDENT MANAGEMENT IN MICROSOFT SENTINEL * Understand incidents * Incident evidence and entities * Incident management 47 - IDENTIFY THREATS WITH BEHAVIORAL ANALYTICS * Understand behavioral analytics * Explore entities * Display entity behavior information * Use Anomaly detection analytical rule templates 48 - DATA NORMALIZATION IN MICROSOFT SENTINEL * Understand data normalization * Use ASIM Parsers * Understand parameterized KQL functions * Create an ASIM Parser * Configure Azure Monitor Data Collection Rules 49 - QUERY, VISUALIZE, AND MONITOR DATA IN MICROSOFT SENTINEL * Monitor and visualize data * Query data using Kusto Query Language * Use default Microsoft Sentinel Workbooks * Create a new Microsoft Sentinel Workbook 50 - MANAGE CONTENT IN MICROSOFT SENTINEL * Use solutions from the content hub * Use repositories for deployment 51 - EXPLAIN THREAT HUNTING CONCEPTS IN MICROSOFT SENTINEL * Understand cybersecurity threat hunts * Develop a hypothesis * Explore MITRE ATT&CK 52 - THREAT HUNTING WITH MICROSOFT SENTINEL * Explore creation and management of threat-hunting queries * Save key findings with bookmarks * Observe threats over time with livestream 53 - USE SEARCH JOBS IN MICROSOFT SENTINEL * Hunt with a Search Job * Restore historical data 54 - HUNT FOR THREATS USING NOTEBOOKS IN MICROSOFT SENTINEL * Access Azure Sentinel data with external tools * Hunt with notebooks * Create a notebook * Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered Online5 days, Jul 29th, 13:00 + 2 more
£2380

Cloud Operations on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview Identify the AWS services that support the different phases of Operational Excellence, an AWS Well-Architected Framework pillar Manage access to AWS resources using AWS accounts and organizations and AWS Identity and Access Management (IAM) Maintain an inventory of in-use AWS resources by using AWS services, such as AWS Systems Manager, AWS CloudTrail, and AWS Config Develop a resource deployment strategy using metadata tags, Amazon Machine Images (AMIs), and AWS Control Tower to deploy and maintain an AWS cloud environment Automate resource deployment by using AWS services, such as AWS CloudFormation and AWS Service Catalog Use AWS services to manage AWS resources through CloudOps lifecycle processes, such as deployments and patches Configure a highly available cloud environment that uses AWS services, such as Amazon Route 53 and Elastic Load Balancing, to route traffic for optimal latency and performance Configure AWS Auto Scaling and Amazon EC2 Auto Scaling to scale out your cloud environment based on demand Use Amazon CloudWatch and associated features, such as alarms, dashboards, and widgets, to monitor your cloud environment Manage permissions and track activity in your cloud environment by using AWS services, such as AWS CloudTrail and AWS Config Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service State the purpose, benefits, and appropriate use cases for mountable storage in your AWS Cloud environment Explain the operational characteristics of object storage in the AWS Cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier Build a comprehensive cost model to help gather, optimize, and predict your cloud costs by using services such as AWS Cost Explorer and the AWS Cost & Usage Report This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems. The course also covers specific AWS features, tools, and best practices related to these functions. Prerequisites Successfully completed the AWS Technical Essentials course Background in either software development or systems administration Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows Basic knowledge of networking protocols (TCP/IP, HTTP) 1 - INTRODUCTION TO CLOUD OPERATIONS ON AWS * What is Cloud Operations * AWS Well-Architected Framework * AWS Well-Architected Tool 2 - ACCESS MANAGEMENT * AWS Identity and Access Management (IAM) * Resources, accounts, and AWS Organizations 3 - SYSTEM DISCOVERY * Methods to interact with AWS services * Tools for automating resource discovery * Inventory with AWS Systems Manager and AWS Config * Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config 4 - DEPLOY AND UPDATE RESOURCES * Cloud Operations in deployments * Tagging strategies * Deployment using Amazon Machine Images (AMIs) * Deployment using AWS Control Tower 5 - AUTOMATE RESOURCE DEPLOYMENT * Deployment using AWS CloudFormation * Deployment using AWS Service Catalog * Hands-On Lab: Infrastructure as Code 6 - MANAGE RESOURCES * AWS Systems Manager * Hands-On Lab: Operations as Code 7 - CONFIGURE HIGHLY AVAILABLE SYSTEMS * Distributing traffic with Elastic Load Balancing * Amazon Route 53 8 - AUTOMATE SCALING * Scaling with AWS Auto Scaling * Scaling with Spot Instances * Managing licenses with AWS License Manager 9 - MONITOR AND MAINTAIN SYSTEM HEALTH * Monitoring and maintaining healthy workloads * Monitoring AWS infrastructure * Monitoring applications * Hands-On Lab: Monitor Applications and Infrastructure 10 - DATA SECURITY AND SYSTEM AUDITING * Maintaining a strong identity and access foundation * Implementing detection mechanisms * Automating incident remediation 11 - OPERATE SECURE AND RESILIENT NETWORKS * Building a secure Amazon Virtual Private Cloud (Amazon VPC) * Networking beyond the VPC 12 - MOUNTABLE STORAGE * Configuring Amazon Elastic Block Store (Amazon EBS) * Sizing Amazon EBS volumes for performance * Using Amazon EBS snapshots * Using Amazon Data Lifecycle Manager to manage your AWS resources * Creating backup and data recovery plans * Configuring shared file system storage * Hands-On Lab: Automating with AWS Backup for Archiving and Recovery 13 - OBJECT STORAGE * Deploying Amazon Simple Storage Service (Amazon S3) * Managing storage lifecycles on Amazon S3 14 - COST REPORTING, ALERTS, AND OPTIMIZATION * Gaining AWS cost awareness * Using control mechanisms for cost management * Optimizing your AWS spend and usage * Hands-On Lab: Capstone lab for CloudOps ADDITIONAL COURSE DETAILS: Nexus Humans Cloud Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloud Operations on AWS
Delivered Online4 days, Aug 14th, 13:00 + 1 more
£2025

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. Prerequisites An understanding of the following concepts as related to Windows Server technologies: High availability and disaster recovery Automation Monitoring Troubleshooting 1 - SECURE WINDOWS SERVER USER ACCOUNTS * Configure user account rights * Protect user accounts with the Protected Users group * Describe Windows Defender Credential Guard * Block NTLM authentication * Locate problematic accounts 2 - HARDENING WINDOWS SERVER * Describe Local Password Administrator Solution * Configure Privileged Access Workstations * Secure domain controllers * Analyze security configuration with Security Compliance Toolkit * Secure SMB traffic 3 - WINDOWS SERVER UPDATE MANAGEMENT * Explore Windows Update * Outline Windows Server Update Services server deployment options * Define Windows Server Update Services update management process * Describe the process of Update Management 4 - SECURE WINDOWS SERVER DNS * Implement split-horizon DNS * Create DNS policies * Implement DNS policies * Secure Windows Server DNS * Implement DNSSEC 5 - IMPLEMENT WINDOWS SERVER IAAS VM NETWORK SECURITY * Implement network security groups and Windows IaaS VMs * Implement adaptive network hardening * Implement Azure Firewall and Windows IaaS VMs * Implement Windows firewall with Windows Server IaaS VMs * Choose the appropriate filtering solution * Deploy and configure Azure firewall using the Azure portal * Capture network traffic with network watcher * Log network traffic to and from a VM using the Azure portal 6 - AUDIT THE SECURITY OF WINDOWS SERVER IAAS VIRTUAL MACHINES * Describe Azure Security Center * Enable Azure Security Center in hybrid environments * Implement and assess security policies * Protect your resources with Azure Security Center * Implement Azure Sentinel 7 - MANAGE AZURE UPDATES * Describe update management * Enable update management * Deploy updates * View update assessments * Manage updates for your Azure Virtual Machines 8 - CREATE AND IMPLEMENT APPLICATION ALLOWLISTS WITH ADAPTIVE APPLICATION CONTROL * Describe adaptive application control * Implement adaptive application control policies 9 - CONFIGURE BITLOCKER DISK ENCRYPTION FOR WINDOWS IAAS VIRTUAL MACHINES * Describe Azure Disk Encryption and server-side encryption * Configure Key Vault for Azure Disk Encryption * Encrypt Azure IaaS Virtual Machine hard disks * Back up and recover data from encrypted disks * Create and encrypt a Windows Virtual Machine 10 - IMPLEMENT CHANGE TRACKING AND FILE INTEGRITY MONITORING FOR WINDOWS IAAS VMS * Implement Change Tracking and Inventory * Manage Change Tracking and Inventory * Manage tracked files * Implement File Integrity Monitoring * Select and monitor entities * Use File Integrity Monitoring 11 - INTRODUCTION TO CLUSTER SHARED VOLUMES * Determine the functionality of Cluster Shared Volumes * Explore the architecture and components of Cluster Shared Volumes * Implement Cluster Shared Volumes 12 - IMPLEMENT WINDOWS SERVER FAILOVER CLUSTERING * Define Windows Server failover clustering * Plan Windows Server failover clustering * Implement Windows Server failover clustering * Manage Windows Server failover clustering * Implement stretch clusters * Define cluster sets 13 - IMPLEMENT HIGH AVAILABILITY OF WINDOWS SERVER VMS * Select high-availability options for Hyper-V * Consider network load balancing for Hyper-V VMs * Implement Hyper-V VM live migration * Implement Hyper-V VMs storage migration 14 - IMPLEMENT WINDOWS SERVER FILE SERVER HIGH AVAILABILITY * Explore the Windows Server File Server high-availability options * Define Cluster Shared Volumes * Implement Scale-Out File Server * Implement Storage Replica 15 - IMPLEMENT SCALE AND HIGH AVAILABILITY WITH WINDOWS SERVER VM * Describe virtual machine scale sets * Implement scaling * Implement load-balancing VMs * Create a virtual machine scale set in the Azure portal * Describe Azure Site Recovery * Implement Azure Site Recovery 16 - IMPLEMENT HYPER-V REPLICA * Define Hyper-V Replica * Plan for Hyper-V Replica * Configure and implement Hyper-V Replica * Define extended replication * Define Azure Site Recovery * Implement Site Recovery from on-premises site to Azure * Implement Site Recovery from on-premises site to on-premises site 17 - PROTECT YOUR ON-PREMISES INFRASTRUCTURE FROM DISASTERS WITH AZURE SITE RECOVERY * Azure Site Recovery overview * Workloads supported for protection with Azure Site Recovery * Run a disaster recovery drill * Failover and failback 18 - IMPLEMENT HYBRID BACKUP AND RECOVERY WITH WINDOWS SERVER IAAS * Describe Azure Backup * Implement recovery vaults * Implement Azure Backup policies * Recover Windows IaaS Virtual Machines * Perform file and folder recovery * Perform backup and restore of on-premises workloads * Manage Azure Virtual Machine backups with Azure Backup service 19 - PROTECT YOUR AZURE INFRASTRUCTURE WITH AZURE SITE RECOVERY * What is Azure Site Recovery * Prepare for disaster recovery with Azure Site Recovery * Run a disaster recovery drill * Failover and failback using Azure Site Recovery 20 - PROTECT YOUR VIRTUAL MACHINES BY USING AZURE BACKUP * Azure Backup features and scenarios * Back up an Azure virtual machine by using Azure Backup * Restore virtual machine data 21 - ACTIVE DIRECTORY DOMAIN SERVICES MIGRATION * Examine upgrade vs. migration * Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 * Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version * Explore the Active Directory Migration Tool 22 - MIGRATE FILE SERVER WORKLOADS USING STORAGE MIGRATION SERVICE * Storage Migration Service overview and usage scenarios * Storage migration requirements * Migrate a server with Storage migration * Evaluate storage migration considerations 23 - MIGRATE WINDOWS SERVER ROLES * Describe the Windows Server Migration Tools * Install the Migration Tools * Migrate roles using the Migration Tools 24 - MIGRATE ON-PREMISES WINDOWS SERVER INSTANCES TO AZURE IAAS VIRTUAL MACHINES * Plan your migration * Describe Azure Migrate * Perform server assessment * Assess physical servers with Azure Migrate * Migrate Windows Server workloads by using Azure Migrate 25 - UPGRADE AND MIGRATE WINDOWS SERVER IAAS VIRTUAL MACHINES * Describe Azure Migrate * Migrate Windows Server workloads by using Azure Migrate * Describe storage migration * Migrate file servers by using Storage Migration Service 26 - CONTAINERIZE AND MIGRATE ASP.NET APPLICATIONS TO AZURE APP SERVICE * Azure Migrate App Containerization overview 27 - MONITOR WINDOWS SERVER PERFORMANCE * Use Performance Monitor to identify performance problems * Use Resource Monitor to review current resource usage * Review reliability with Reliability Monitor * Implement a performance monitoring methodology * Use Data Collector Sets to analyze server performance * Monitor network infrastructure services * Monitor virtual machines running Windows Server * Monitor performance with Windows Admin Center * Use System Insights to help predict future capacity issues * Optimize the performance of Windows Server 28 - MANAGE AND MONITOR WINDOWS SERVER EVENT LOGS * Describe Windows Server event logs * Use Windows Admin Center to review logs * Use Server Manager to review logs * Use custom views * Implement event log subscriptions 29 - IMPLEMENT WINDOWS SERVER AUDITING AND DIAGNOSTICS * Describe basic auditing categories * Describe advanced categories * Log user access * Enable setup and boot event collection 30 - TROUBLESHOOT ACTIVE DIRECTORY * Recover objects from the AD recycle bin * Recover the AD DS database * Recover SYSVOL * Troubleshoot AD DS replication * Troubleshoot hybrid authentication issues 31 - MONITOR WINDOWS SERVER IAAS VIRTUAL MACHINES AND HYBRID INSTANCES * Enable Azure Monitor for Virtual Machines * Monitor an Azure Virtual Machine with Azure Monitor * Enable Azure Monitor in hybrid scenarios * Collect data from a Windows computer in a hybrid environment * Integrate Azure Monitor with Microsoft Operations Manager 32 - MONITOR YOUR AZURE VIRTUAL MACHINES WITH AZURE MONITOR * Monitoring for Azure VMs * Monitor VM host data * Use Metrics Explorer to view detailed host metrics * Collect client performance counters by using VM insights * Collect VM client event logs 33 - TROUBLESHOOT ON-PREMISES AND HYBRID NETWORKING * Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered Online5 days, Aug 19th, 13:00 + 2 more
£2380

Women in Leadership Program

By Netwomen

Give women managers and employees the skills they need to climb the corporate ladder within your organisation. * Optimised for tailored audiences * Built for groups of 20+ * Led by experienced and certified professionals * Specialised to address issues around inclusivity and equity in all industries -------------------------------------------------------------------------------- Program Details For Upper Management Teams: Strategies for Upward Mobility Module 1 – Theories and Realities: Female Leadership 15 Principles Module 2 – Communicating Clearly Module 3 – Management Revelations: Relationship vs. Task Management Module 4 – Set Your Path: Empowerment Techniques For Middle Management & Staff Teams Module 1 – What the Data Tells Us Module 2 – What Are Your Leadership Skills?: Personal Skill Inventory Module 3 – What Does Good Company Culture Look Like? Module 4 – Taking On Your Performance -------------------------------------------------------------------------------- Investment Fee: £50,000 25 participants max per 12-week cohort -------------------------------------------------------------------------------- TRAINING FORMAT : * 12 - Week Cohorts * Delivered in 1-hour sessions * Virtually Facilitated Sessions -------------------------------------------------------------------------------- Women in Leadership Program One Pager [https://images.cademy.co.uk/38ac3949-f2a7-4450-a6c3-ed8b461337e2/703b68dd-b16d-42c5-b06f-690c4a13804e/original.pdf]

Women in Leadership Program
Delivered on-request, onlineDelivered Online
£50000

Innovation & New Products Services - INPERSON WORKSHOP

By Let’s Do Business Group

Learn how to correctly navigate intellectual property to safeguard your ideas and creations whilst fostering a culture of innovation within your business.

Innovation & New Products Services - INPERSON WORKSHOP
Delivered In-Person in Chelmsford2 hours 30 minutes, Sept 17th, 09:30
FREE

Inventory Manager - QLS Endorsed Bundle

By Imperial Academy

10 QLS Endorsed Courses for Inventory Manager | 10 QLS Endorsed Certificates Included | Life Time Access | Tutor Support

Inventory Manager - QLS Endorsed Bundle
Delivered Online On Demand
£599