• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Microsoft AZ-303 courses in Warlingham

We couldn't find any listings for your search. Explore our online options and related educators below to see if they help you.

Know someone teaching this? Help them become an Educator on Cademy.

Online Options

Show all 437

AI-900T00 Microsoft Azure AI Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The Azure AI Fundamentals course is designed for anyone interested in learning about the types of solution artificial intelligence (AI) makes possible, and the services on Microsoft Azure that you can use to create them. You don?t need to have any experience of using Microsoft Azure before taking this course, but a basic level of familiarity with computer technology and the Internet is assumed. Some of the concepts covered in the course require a basic understanding of mathematics, such as the ability to interpret charts. The course includes hands-on activities that involve working with data and running code, so a knowledge of fundamental programming principles will be helpful. This course introduces fundamentals concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. The course is not designed to teach students to become professional data scientists or software developers, but rather to build awareness of common AI workloads and the ability to identify Azure services to support them. Prerequisites Prerequisite certification is not required before taking this course. Successful Azure AI Fundamental students start with some basic awareness of computing and internet concepts, and an interest in using Azure AI services. Specifically: * Experience using computers and the internet. * Interest in use cases for AI applications and machine learning models. * A willingness to learn through hands-on exp... 1 - FUNDAMENTAL AI CONCEPTS * Understand machine learning * Understand computer vision * Understand natural language processing * Understand document intelligence and knowledge mining * Understand generative AI * Challenges and risks with AI * Understand Responsible AI 2 - FUNDAMENTALS OF MACHINE LEARNING * What is machine learning? * Types of machine learning * Regression * Binary classification * Multiclass classification * Clustering * Deep learning * Azure Machine Learning 3 - FUNDAMENTALS OF AZURE AI SERVICES * AI services on the Azure platform * Create Azure AI service resources * Use Azure AI services * Understand authentication for Azure AI services 4 - FUNDAMENTALS OF COMPUTER VISION * Images and image processing * Machine learning for computer vision * Azure AI Vision 5 - FUNDAMENTALS OF FACIAL RECOGNITION * Understand Face analysis * Get started with Face analysis on Azure 6 - FUNDAMENTALS OF OPTICAL CHARACTER RECOGNITION * Get started with Vision Studio on Azure 7 - FUNDAMENTALS OF TEXT ANALYSIS WITH THE LANGUAGE SERVICE * Understand Text Analytics * Get started with text analysis 8 - FUNDAMENTALS OF QUESTION ANSWERING WITH THE LANGUAGE SERVICE * Understand question answering * Get started with the Language service and Azure Bot Service 9 - FUNDAMENTALS OF CONVERSATIONAL LANGUAGE UNDERSTANDING * Describe conversational language understanding * Get started with conversational language understanding in Azure 10 - FUNDAMENTALS OF AZURE AI SPEECH * Understand speech recognition and synthesis * Get started with speech on Azure 11 - FUNDAMENTALS OF AZURE AI DOCUMENT INTELLIGENCE * Explore capabilities of document intelligence * Get started with receipt analysis on Azure 12 - FUNDAMENTALS OF KNOWLEDGE MINING WITH AZURE COGNITIVE SEARCH * What is Azure Cognitive Search? * Identify elements of a search solution * Use a skillset to define an enrichment pipeline * Understand indexes * Use an indexer to build an index * Persist enriched data in a knowledge store * Create an index in the Azure portal * Query data in an Azure Cognitive Search index 13 - FUNDAMENTALS OF GENERATIVE AI * What is generative AI? * Large language models * What is Azure OpenAI? * What are copilots? * Improve generative AI responses with prompt engineering 14 - FUNDAMENTALS OF AZURE OPENAI SERVICE * What is generative AI * Describe Azure OpenAI * How to use Azure OpenAI * Understand OpenAI's natural language capabilities * Understand OpenAI code generation capabilities * Understand OpenAI's image generation capabilities * Describe Azure OpenAI's access and responsible AI policies 15 - FUNDAMENTALS OF RESPONSIBLE GENERATIVE AI * Plan a responsible generative AI solution * Identify potential harms * Measure potential harms * Mitigate potential harms * Operate a responsible generative AI solution ADDITIONAL COURSE DETAILS: Nexus Humans AI-900T00 - Microsoft Azure AI Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI-900T00 - Microsoft Azure AI Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AI-900T00 Microsoft Azure AI Fundamentals
Delivered OnlineTwo days, Jun 14th, 13:00 + 3 more
£595

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - EXPLORE THE ENTERPRISE DESKTOP * Examine benefits of modern management * Examine the enterprise desktop life-cycle model * Examine planning and purchasing * Examine desktop deployment * Plan an application deployment * Plan for upgrades and retirement 2 - EXPLORE WINDOWS EDITIONS * Examine Windows client editions and capabilities * Select client edition * Examine hardware requirements 3 - UNDERSTAND MICROSOFT ENTRA ID * Examine Microsoft Entra ID * Compare Microsoft Entra ID and Active Directory Domain Services * Examine Microsoft Entra ID as a directory service for cloud apps * Compare Microsoft Entra ID P1 and P2 plans * Examine Microsoft Entra Domain Services 4 - MANAGE MICROSOFT ENTRA IDENTITIES * Examine RBAC and user roles in Microsoft Entra ID * Create and manage users in Microsoft Entra ID * Create and manage groups in Microsoft Entra ID * Manage Microsoft Entra objects with PowerShell * Synchronize objects from AD DS to Microsoft Entra ID 5 - MANAGE DEVICE AUTHENTICATION * Describe Microsoft Entra join * Examine Microsoft Entra join prerequisites limitations and benefits * Join devices to Microsoft Entra ID * Manage devices joined to Microsoft Entra ID 6 - ENROLL DEVICES USING MICROSOFT CONFIGURATION MANAGER * Deploy the Microsoft Configuration Manager client * Monitor the Microsoft Configuration Manager client * Manage the Microsoft Configuration Manager client 7 - ENROLL DEVICES USING MICROSOFT INTUNE * Manage mobile devices with Intune * Enable mobile device management * Explain considerations for device enrollment * Manage corporate enrollment policy * Enroll Windows devices in Intune * Enroll Android devices in Intune * Enroll iOS devices in Intune * Explore device enrollment manager * Monitor device enrollment * Manage devices remotely 8 - EXECUTE DEVICE PROFILES * Explore Intune device profiles * Create device profiles * Create a custom device profile 9 - OVERSEE DEVICE PROFILES * Monitor device profiles in Intune * Manage device sync in Intune * Manage devices in Intune using scripts 10 - MAINTAIN USER PROFILES * Examine user profile * Explore user profile types * Examine options for minimizing user profile size * Deploy and configure folder redirection * Sync user state with Enterprise State Roaming * Configure Enterprise State Roaming in Azure 11 - EXECUTE MOBILE APPLICATION MANAGEMENT * Examine mobile application management * Examine considerations for mobile application management * Prepare line-of-business apps for app protection policies * Implement mobile application management policies in Intune * Manage mobile application management policies in Intune 12 - DEPLOY AND UPDATE APPLICATIONS * Deploy applications with Intune * Add apps to Intune * Manage Win32 apps with Intune * Deploy applications with Configuration Manager * Deploying applications with Group Policy * Assign and publish software * Explore Microsoft Store for Business * Implement Microsoft Store Apps * Update Microsoft Store Apps with Intune * Assign apps to company employees 13 - ADMINISTER ENDPOINT APPLICATIONS * Manage apps with Intune * Manage Apps on non-enrolled devices * Deploy Microsoft 365 Apps with Intune * Additional Microsoft 365 Apps Deployment Tools * Configure Microsoft Edge Internet Explorer mode * App Inventory Review 14 - PROTECT IDENTITIES IN MICROSOFT ENTRA ID * Explore Windows Hello for Business * Deploy Windows Hello * Manage Windows Hello for Business * Explore Microsoft Entra ID Protection * Manage self-service password reset in Microsoft Entra ID * Implement multi-factor authentication 15 - ENABLE ORGANIZATIONAL ACCESS * Enable access to organization resources * Explore VPN types and configuration * Explore Always On VPN * Deploy Always On VPN 16 - IMPLEMENT DEVICE COMPLIANCE * Protect access to resources using Intune * Explore device compliance policy * Deploy a device compliance policy * Explore conditional access * Create conditional access policies 17 - GENERATE INVENTORY AND COMPLIANCE REPORTS * Report enrolled devices inventory in Intune * Monitor and report device compliance * Build custom Intune inventory reports * Access Intune using Microsoft Graph API 18 - DEPLOY DEVICE DATA PROTECTION * Explore Windows Information Protection * Plan Windows Information Protection * Implement and use Windows Information Protection * Explore Encrypting File System in Windows client * Explore BitLocker 19 - MANAGE MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Examine key capabilities of Microsoft Defender for Endpoint * Explore Windows Defender Application Control and Device Guard * Explore Microsoft Defender Application Guard * Examine Windows Defender Exploit Guard * Explore Windows Defender System Guard 20 - MANAGE MICROSOFT DEFENDER IN WINDOWS CLIENT * Explore Windows Security Center * Explore Windows Defender Credential Guard * Manage Microsoft Defender Antivirus * Manage Windows Defender Firewall * Explore Windows Defender Firewall with Advanced Security 21 - MANAGE MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender for Cloud Apps * Planning Microsoft Defender for Cloud Apps * Implement Microsoft Defender for Cloud Apps 22 - ASSESS DEPLOYMENT READINESS * Examine deployment guidelines * Explore readiness tools * Assess application compatibility * Explore tools for application compatibility mitigation * Prepare network and directory for deployment * Plan a pilot 23 - DEPLOY USING THE MICROSOFT DEPLOYMENT TOOLKIT * Evaluate traditional deployment methods * Set up the Microsoft Deployment Toolkit for client deployment * Manage and deploy images using the Microsoft Deployment Toolkit 24 - DEPLOY USING MICROSOFT CONFIGURATION MANAGER * Explore client deployment using Configuration Manager * Examine deployment components of Configuration Manager * Manage client deployment using Configuration Manager * Plan in-place upgrades using Configuration Manager 25 - DEPLOY DEVICES USING WINDOWS AUTOPILOT * Use Autopilot for modern deployment * Examine requirements for Windows Autopilot * Prepare device IDs for Autopilot * Implement device registration and out-of-the-box customization * Examine Autopilot scenarios * Troubleshoot Windows Autopilot 26 - IMPLEMENT DYNAMIC DEPLOYMENT METHODS * Examine subscription activation * Deploy using provisioning packages * Use Windows Configuration Designer * Use Microsoft Entra join with automatic MDM enrollment 27 - PLAN A TRANSITION TO MODERN ENDPOINT MANAGEMENT * Explore using co-management to transition to modern endpoint management * Examine prerequisites for co-management * Evaluate modern management considerations * Evaluate upgrades and migrations in modern transitioning * Migrate data when modern transitioning * Migrate workloads when modern transitioning 28 - MANAGE WINDOWS 365 * Explore Windows 365 * Configure Windows 365 * Administer Windows 365 29 - MANAGE AZURE VIRTUAL DESKTOP * Examine Azure Virtual Desktop * Explore Azure Virtual Desktop * Configure Azure Virtual Desktop * Administer Azure Virtual Desktop ADDITIONAL COURSE DETAILS: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online6 days, Jun 17th, 08:30 + 14 more
£2975

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites * Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. * A proficient understanding of DNS and basic functional experience with Microsoft 365 services. * A proficient understanding of general IT practices. * A working knowledge of PowerShell. 1 - CONFIGURE YOUR MICROSOFT 365 EXPERIENCE * Explore your Microsoft 365 cloud environment * Configure your Microsoft 365 organizational profile * Manage your tenant subscriptions in Microsoft 365 * Integrate Microsoft 365 with customer engagement apps * Complete your tenant configuration in Microsoft 365 2 - MANAGE USERS, LICENSES, AND MAIL CONTACTS IN MICROSOFT 365 * Determine the user identity model for your organization * Create user accounts in Microsoft 365 * Manage user account settings in Microsoft 365 * Manage user licenses in Microsoft 365 * Recover deleted user accounts in Microsoft 365 * Perform bulk user maintenance in Microsoft Entra ID * Create and manage guest users * Create and manage mail contacts 3 - MANAGE GROUPS IN MICROSOFT 365 * Examine groups in Microsoft 365 * Create and manage groups in Microsoft 365 * Create dynamic groups using Azure rule builder * Create a Microsoft 365 group naming policy * Create groups in Exchange Online and SharePoint Online 4 - ADD A CUSTOM DOMAIN IN MICROSOFT 365 * Plan a custom domain for your Microsoft 365 deployment * Plan the DNS zones for a custom domain * Plan the DNS record requirements for a custom domain * Create a custom domain in Microsoft 365 5 - CONFIGURE CLIENT CONNECTIVITY TO MICROSOFT 365 * Examine how automatic client configuration works * Explore the DNS records required for client configuration * Configure Outlook clients * Troubleshoot client connectivity 6 - CONFIGURE ADMINISTRATIVE ROLES IN MICROSOFT 365 * Explore the Microsoft 365 permission model * Explore the Microsoft 365 admin roles * Assign admin roles to users in Microsoft 365 * Delegate admin roles to partners * Manage permissions using administrative units in Microsoft Entra ID * Elevate privileges using Microsoft Entra Privileged Identity Management * Examine best practices when configuring administrative roles 7 - MANAGE TENANT HEALTH AND SERVICES IN MICROSOFT 365 * Monitor the health of your Microsoft 365 services * Monitor tenant health using Microsoft 365 Adoption Score * Monitor tenant health using Microsoft 365 usage analytics * Develop an incident response plan * Request assistance from Microsoft 8 - DEPLOY MICROSOFT 365 APPS FOR ENTERPRISE * Explore Microsoft 365 Apps for enterprise functionality * Explore your app compatibility by using the Readiness Toolkit * Complete a self-service installation of Microsoft 365 Apps for enterprise * Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager * Deploy Microsoft 365 Apps for enterprise from the cloud * Deploy Microsoft 365 Apps for enterprise from a local source * Manage updates to Microsoft 365 Apps for enterprise * Explore the update channels for Microsoft 365 Apps for enterprise * Manage your cloud apps using the Microsoft 365 Apps admin center 9 - ANALYZE YOUR MICROSOFT 365 WORKPLACE DATA USING MICROSOFT VIVA INSIGHTS * Examine the analytical features of Microsoft Viva Insights * Explore Personal insights * Explore Team insights * Explore Organization insights * Explore Advanced insights 10 - EXPLORE IDENTITY SYNCHRONIZATION * Examine identity models for Microsoft 365 * Examine authentication options for the hybrid identity model * Explore directory synchronization 11 - PREPARE FOR IDENTITY SYNCHRONIZATION TO MICROSOFT 365 * Plan your Microsoft Entra deployment * Prepare for directory synchronization * Choose your directory synchronization tool * Plan for directory synchronization using Microsoft Entra Connect * Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - IMPLEMENT DIRECTORY SYNCHRONIZATION TOOLS * Configure Microsoft Entra Connect prerequisites * Configure Microsoft Entra Connect * Monitor synchronization services using Microsoft Entra Connect Health * Configure Microsoft Entra Connect cloud sync prerequisites * Configure Microsoft Entra Connect cloud sync 13 - MANAGE SYNCHRONIZED IDENTITIES * Manage users with directory synchronization * Manage groups with directory synchronization * Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization * Configure object filters for directory synchronization * Explore Microsoft Identity Manager * Troubleshoot directory synchronization 14 - MANAGE SECURE USER ACCESS IN MICROSOFT 365 * Manage user passwords * Enable pass-through authentication * Enable multifactor authentication * Enable passwordless sign-in with Microsoft Authenticator * Explore self-service password management * Explore Windows Hello for Business * Implement Microsoft Entra Smart Lockout * Implement conditional access policies * Explore Security Defaults in Microsoft Entra ID * Investigate authentication issues using sign-in logs 15 - EXAMINE THREAT VECTORS AND DATA BREACHES * Explore today's work and threat landscape * Examine how phishing retrieves sensitive information * Examine how spoofing deceives users and compromises data security * Compare spam and malware * Examine account breaches * Examine elevation of privilege attacks * Examine how data exfiltration moves data out of your tenant * Examine how attackers delete data from your tenant * Examine how data spillage exposes data outside your tenant * Examine other types of attacks 16 - EXPLORE THE ZERO TRUST SECURITY MODEL * Examine the principles and components of the Zero Trust model * Plan for a Zero Trust security model in your organization * Examine Microsoft's strategy for Zero Trust networking * Adopt a Zero Trust approach 17 - EXPLORE SECURITY SOLUTIONS IN MICROSOFT 365 DEFENDER * Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 * Protect your organization's identities using Microsoft Defender for Identity * Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint * Protect against cyber attacks using Microsoft 365 Threat Intelligence * Provide insight into suspicious activity using Microsoft Cloud App Security * Review the security reports in Microsoft 365 Defender 18 - EXAMINE MICROSOFT SECURE SCORE * Explore Microsoft Secure Score * Assess your security posture with Microsoft Secure Score * Improve your secure score * Track your Microsoft Secure Score history and meet your goals 19 - EXAMINE PRIVILEGED IDENTITY MANAGEMENT * Explore Privileged Identity Management in Microsoft Entra ID * Configure Privileged Identity Management * Audit Privileged Identity Management * Control privileged admin tasks using Privileged Access Management 20 - EXAMINE AZURE IDENTITY PROTECTION * Explore Azure Identity Protection * Enable the default protection policies in Azure Identity Protection * Explore the vulnerabilities and risk events detected by Azure Identity Protection * Plan your identity investigation 21 - EXAMINE EXCHANGE ONLINE PROTECTION * Examine the anti-malware pipeline * Detect messages with spam or malware using Zero-hour auto purge * Explore anti-spoofing protection provided by Exchange Online Protection * Explore other anti-spoofing protection * Examine outbound spam filtering 22 - EXAMINE MICROSOFT DEFENDER FOR OFFICE 365 * Climb the security ladder from EOP to Microsoft Defender for Office 365 * Expand EOP protections by using Safe Attachments and Safe Links * Manage spoofed intelligence * Configure outbound spam filtering policies * Unblock users from sending email 23 - MANAGE SAFE ATTACHMENTS * Protect users from malicious attachments by using Safe Attachments * Create Safe Attachment policies using Microsoft Defender for Office 365 * Create Safe Attachments policies using PowerShell * Modify an existing Safe Attachments policy * Create a transport rule to bypass a Safe Attachments policy * Examine the end-user experience with Safe Attachments 24 - MANAGE SAFE LINKS * Protect users from malicious URLs by using Safe Links * Create Safe Links policies using Microsoft 365 Defender * Create Safe Links policies using PowerShell * Modify an existing Safe Links policy * Create a transport rule to bypass a Safe Links policy * Examine the end-user experience with Safe Links 25 - EXPLORE THREAT INTELLIGENCE IN MICROSOFT 365 DEFENDER * Explore Microsoft Intelligent Security Graph * Explore alert policies in Microsoft 365 * Run automated investigations and responses * Explore threat hunting with Microsoft Threat Protection * Explore advanced threat hunting in Microsoft 365 Defender * Explore threat analytics in Microsoft 365 * Identify threat issues using Microsoft Defender reports 26 - IMPLEMENT APP PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender Cloud Apps * Deploy Microsoft Defender for Cloud Apps * Configure file policies in Microsoft Defender for Cloud Apps * Manage and respond to alerts in Microsoft Defender for Cloud Apps * Configure Cloud Discovery in Microsoft Defender for Cloud Apps * Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - IMPLEMENT ENDPOINT PROTECTION BY USING MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Configure Microsoft Defender for Endpoint in Microsoft Intune * Onboard devices in Microsoft Defender for Endpoint * Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management * Manage device discovery and vulnerability assessment * Reduce your threat and vulnerability exposure 28 - IMPLEMENT THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR OFFICE 365 * Explore the Microsoft Defender for Office 365 protection stack * Investigate security attacks by using Threat Explorer * Identify cybersecurity issues by using Threat Trackers * Prepare for attacks with Attack simulation training 29 - EXAMINE DATA GOVERNANCE SOLUTIONS IN MICROSOFT PURVIEW * Explore data governance and compliance in Microsoft Purview * Protect sensitive data with Microsoft Purview Information Protection * Govern organizational data using Microsoft Purview Data Lifecycle Management * Minimize internal risks with Microsoft Purview Insider Risk Management * Explore Microsoft Purview eDiscovery solutions 30 - EXPLORE ARCHIVING AND RECORDS MANAGEMENT IN MICROSOFT 365 * Explore archive mailboxes in Microsoft 365 * Enable archive mailboxes in Microsoft 365 * Explore Microsoft Purview Records Management * Implement Microsoft Purview Records Management * Restore deleted data in Exchange Online * Restore deleted data in SharePoint Online 31 - EXPLORE RETENTION IN MICROSOFT 365 * Explore retention by using retention policies and retention labels * Compare capabilities in retention policies and retention labels * Define the scope of a retention policy * Examine the principles of retention * Implement retention using retention policies, retention labels, and eDiscovery holds * Restrict retention changes by using Preservation Lock 32 - EXPLORE MICROSOFT PURVIEW MESSAGE ENCRYPTION * Examine Microsoft Purview Message Encryption * Configure Microsoft Purview Message Encryption * Define mail flow rules to encrypt email messages * Add organizational branding to encrypted email messages * Explore Microsoft Purview Advanced Message Encryption 33 - EXPLORE COMPLIANCE IN MICROSOFT 365 * Plan for security and compliance in Microsoft 365 * Plan your beginning compliance tasks in Microsoft Purview * Manage your compliance requirements with Compliance Manager * Examine the Compliance Manager dashboard * Analyze the Microsoft Compliance score 34 - IMPLEMENT MICROSOFT PURVIEW INSIDER RISK MANAGEMENT * Explore insider risk management * Plan for insider risk management * Explore insider risk management policies * Create insider risk management policies * Investigate insider risk management activities and alerts * Explore insider risk management cases 35 - IMPLEMENT MICROSOFT PURVIEW INFORMATION BARRIERS * Explore Microsoft Purview Information Barriers * Configure information barriers in Microsoft Purview * Examine information barriers in Microsoft Teams * Examine information barriers in OneDrive * Examine information barriers in SharePoint 36 - EXPLORE MICROSOFT PURVIEW DATA LOSS PREVENTION * Examine Data Loss Prevention * Explore Endpoint data loss prevention * Examine DLP policies * View DLP policy results * Explore DLP reports 37 - IMPLEMENT MICROSOFT PURVIEW DATA LOSS PREVENTION * Plan to implement Microsoft Purview Data Loss Protection * Implement Microsoft Purview's default DLP policies * Design a custom DLP policy * Create a custom DLP policy from a template * Configure email notifications for DLP policies * Configure policy tips for DLP policies 38 - IMPLEMENT DATA CLASSIFICATION OF SENSITIVE INFORMATION * Explore data classification * Implement data classification in Microsoft 365 * Explore trainable classifiers * Create and retrain a trainable classifier * View sensitive data using Content explorer and Activity explorer * Detect sensitive information documents using Document Fingerprinting 39 - EXPLORE SENSITIVITY LABELS * Manage data protection using sensitivity labels * Explore what sensitivity labels can do * Determine a sensitivity label's scope * Apply sensitivity labels automatically * Explore sensitivity label policies 40 - IMPLEMENT SENSITIVITY LABELS * Plan your deployment strategy for sensitivity labels * Examine the requirements to create a sensitivity label * Create sensitivity labels * Publish sensitivity labels * Remove and delete sensitivity labels ADDITIONAL COURSE DETAILS: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online6 days, Jun 17th, 13:00 + 8 more
£2975

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - EXPLORE AZURE APP SERVICE * Examine Azure App Service * Examine Azure App Service plans * Deploy to App Service * Explore authentication and authorization in App Service * Discover App Service networking features 2 - CONFIGURE WEB APP SETTINGS * Configure application settings * Configure general settings * Configure path mappings * Enable diagnostic logging * Configure security certificates 3 - SCALE APPS IN AZURE APP SERVICE * Examine autoscale factors * Identify autoscale factors * Enable autoscale in App Service * Explore autoscale best practices 4 - EXPLORE AZURE APP SERVICE DEPLOYMENT SLOTS * Explore staging environments * Examine slot swapping * Swap deployment slots * Route traffic in App Service 5 - EXPLORE AZURE FUNCTIONS * Discover Azure Functions * Compare Azure Functions hosting options * Scale Azure Functions 6 - DEVELOP AZURE FUNCTIONS * Explore Azure Functions development * Create triggers and bindings * Connect functions to Azure services 7 - EXPLORE AZURE BLOB STORAGE * Explore Azure Blob storage * Discover Azure Blob storage resource types * Explore Azure Storage security features * Discover static website hosting in Azure Storage 8 - MANAGE THE AZURE BLOB STORAGE LIFECYCLE * Explore the Azure Blob storage lifecycle * Discover Blob storage lifecycle policies * Implement Blob storage lifecycle policies * Rehydrate blob data from the archive tier 9 - WORK WITH AZURE BLOB STORAGE * Explore Azure Blob storage client library * Create a client object * Manage container properties and metadata by using .NET * Set and retrieve properties and metadata for blob resources by using REST 10 - EXPLORE AZURE COSMOS DB * Identify key benefits of Azure Cosmos DB * Explore the resource hierarchy * Explore consistency levels * Choose the right consistency level * Explore supported APIs * Discover request units 11 - WORK WITH AZURE COSMOS DB * Explore Microsoft .NET SDK v3 for Azure Cosmos DB * Create stored procedures * Create triggers and user-defined functions * Explore change feed in Azure Cosmos DB 12 - MANAGE CONTAINER IMAGES IN AZURE CONTAINER REGISTRY * Discover the Azure Container Registry * Explore storage capabilities * Build and manage containers with tasks * Explore elements of a Dockerfile 13 - RUN CONTAINER IMAGES IN AZURE CONTAINER INSTANCES * Explore Azure Container Instances * Run containerized tasks with restart policies * Set environment variables in container instances * Mount an Azure file share in Azure Container Instances 14 - IMPLEMENT AZURE CONTAINER APPS * Explore Azure Container Apps * Explore containers in Azure Container Apps * Implement authentication and authorization in Azure Container Apps * Manage revisions and secrets in Azure Container Apps * Explore Dapr integration with Azure Container Apps 15 - EXPLORE THE MICROSOFT IDENTITY PLATFORM * Explore the Microsoft identity platform * Explore service principals * Discover permissions and consent * Discover conditional access 16 - IMPLEMENT AUTHENTICATION BY USING THE MICROSOFT AUTHENTICATION LIBRARY * Explore the Microsoft Authentication Library * Initialize client applications 17 - IMPLEMENT SHARED ACCESS SIGNATURES * Discover shared access signatures * Choose when to use shared access signatures * Explore stored access policies 18 - EXPLORE MICROSOFT GRAPH * Discover Microsoft Graph * Query Microsoft Graph by using REST * Query Microsoft Graph by using SDKs * Apply best practices to Microsoft Graph 19 - IMPLEMENT AZURE KEY VAULT * Explore Azure Key Vault * Discover Azure Key Vault best practices * Authenticate to Azure Key Vault 20 - IMPLEMENT MANAGED IDENTITIES * Explore managed identities * Discover the managed identities authentication flow * Configure managed identities * Acquire an access token 21 - IMPLEMENT AZURE APP CONFIGURATION * Explore the Azure App Configuration service * Create paired keys and values * Manage application features * Secure app configuration data 22 - EXPLORE API MANAGEMENT * Discover the API Management service * Explore API gateways * Explore API Management policies * Create advanced policies * Secure APIs by using subscriptions * Secure APIs by using certificates 23 - EXPLORE AZURE EVENT GRID * Explore Azure Event Grid * Discover event schemas * Explore event delivery durability * Control access to events * Receive events by using webhooks * Filter events 24 - EXPLORE AZURE EVENT HUBS * Discover Azure Event Hubs * Explore Event Hubs Capture * Scale your processing application * Control access to events * Perform common operations with the Event Hubs client library 25 - DISCOVER AZURE MESSAGE QUEUES * Choose a message queue solution * Explore Azure Service Bus * Discover Service Bus queues, topics, and subscriptions * Explore Service Bus message payloads and serialization * Explore Azure Queue Storage * Create and manage Azure Queue Storage and messages by using .NET 26 - MONITOR APP PERFORMANCE * Explore Application Insights * Discover log-based metrics * Instrument an app for monitoring * Select an availability test * Troubleshoot app performance by using Application Map 27 - DEVELOP FOR AZURE CACHE FOR REDIS * Explore Azure Cache for Redis * Configure Azure Cache for Redis * Interact with Azure Cache for Redis by using .NET 28 - DEVELOP FOR STORAGE ON CDNS * Explore Azure Content Delivery Networks * Control cache behavior on Azure Content Delivery Networks * Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£2975

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites * Foundational knowledge of Microsoft security and compliance technologies. * Basic knowledge of information protection concepts. * Understanding of cloud computing concepts. * Understanding of Microsoft 365 products and services. 1 - INTRODUCTION TO INFORMATION PROTECTION AND DATA LIFECYCLE MANAGEMENT IN MICROSOFT PURVIEW * Know your data * Protect your data * Prevent data loss * Govern your data 2 - CLASSIFY DATA FOR PROTECTION AND GOVERNANCE * Data classification overview * Classify data using sensitive information types * Classify data using trainable classifiers * Review sensitive information and label usage * Explore labeled and sensitive content * Understand activities related to your data 3 - CREATE AND MANAGE SENSITIVE INFORMATION TYPES * Compare built-in versus custom sensitive information types * Create and manage custom sensitive information types * Describe custom sensitive information types with exact data match * Implement document fingerprinting * Create keyword dictionary 4 - UNDERSTAND MICROSOFT 365 ENCRYPTION * Learn how Microsoft 365 data is encrypted at rest * Understand service encryption in Microsoft Purview * Explore customer key management using Customer Key * Learn how data is encrypted in-transit 5 - DEPLOY MICROSOFT PURVIEW MESSAGE ENCRYPTION * Implement Microsoft Purview Message Encryption * Implement Microsoft Purview Advanced Message Encryption * Use Microsoft Purview Message Encryption templates in mail flow rules 6 - PROTECT INFORMATION IN MICROSOFT PURVIEW * Information protection overview * Configure sensitivity labels * Configure sensitivity label policies * Configure auto-labeling policies * Manage, monitor, and remediate information protection 7 - APPLY AND MANAGE SENSITIVITY LABELS * Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites * Plan on-premises labeling * Configure on-premises labeling for the Unified Labeling Scanner * Apply protections and restrictions to email and files * Monitor label performance using label analytics 8 - PREVENT DATA LOSS IN MICROSOFT PURVIEW * Data loss prevention overview * Identify content to protect * Define policy settings for your DLP policy * Test and create your DLP policy * Prepare Endpoint DLP * Manage DLP alerts in the Microsoft Purview compliance portal * View data loss prevention reports * Implement the Microsoft Purview Extension 9 - CONFIGURE DLP POLICIES FOR MICROSOFT DEFENDER FOR CLOUD APPS AND POWER PLATFORM * Configure data loss prevention policies for Power Platform * Integrate data loss prevention in Microsoft Defender for Cloud Apps * Configure policies in Microsoft Defender for Cloud Apps * Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - MANAGE DATA LOSS PREVENTION POLICIES AND REPORTS IN MICROSOFT 365 * Configure data loss prevention for policy precedence * Implement data loss prevention policies in test mode * Explain data loss prevention reporting capabilities * Manage permissions for data loss prevention reports * Manage and respond to data loss prevention policy violations 11 - MANAGE THE DATA LIFECYCLE IN MICROSOFT PURVIEW * Data Lifecycle Management overview * Configure retention policies * Configure retention labels * Configure manual retention label policies * Configure auto-apply retention label policies * Import data for Data Lifecycle Management * Manage, monitor, and remediate Data Lifecycle Management 12 - MANAGE DATA RETENTION IN MICROSOFT 365 WORKLOADS * Explain retention in Exchange Online * Explain retention in SharePoint Online and OneDrive * Explain retention in Microsoft Yammer * Activate archive mailboxes in Microsoft Exchange * Apply mailbox holds in Microsoft Exchange * Recover content in Microsoft Exchange 13 - MANAGE RECORDS IN MICROSOFT PURVIEW * Records management overview * Import a file plan * Configure retention labels * Configure event driven retention * Manage, monitor, and remediate records 14 - EXPLORE COMPLIANCE IN MICROSOFT 365 * Plan for security and compliance in Microsoft 365 * Plan your beginning compliance tasks in Microsoft Purview * Manage your compliance requirements with Compliance Manager * Examine the Compliance Manager dashboard * Analyze the Microsoft Compliance score 15 - SEARCH FOR CONTENT IN THE MICROSOFT PURVIEW COMPLIANCE PORTAL * Explore Microsoft Purview eDiscovery solutions * Create a content search * View the search results and statistics * Export the search results and search report * Configure search permissions filtering * Search for and delete email messages 16 - MANAGE MICROSOFT PURVIEW EDISCOVERY (STANDARD) * Explore Microsoft Purview eDiscovery solutions * Implement Microsoft Purview eDiscovery (Standard) * Create eDiscovery holds * Search for content in a case * Export content from a case * Close, reopen, and delete a case 17 - MANAGE MICROSOFT PURVIEW EDISCOVERY (PREMIUM) * Explore Microsoft Purview eDiscovery (Premium) * Implement Microsoft Purview eDiscovery (Premium) * Create and manage an eDiscovery (Premium) case * Manage custodians and non-custodial data sources * Analyze case content 18 - MANAGE MICROSOFT PURVIEW AUDIT (STANDARD) * Explore Microsoft Purview Audit solutions * Implement Microsoft Purview Audit (Standard) * Search the audit log * Export, configure, and view audit log records * Use audit log searching to investigate common support issues 19 - PREPARE MICROSOFT PURVIEW COMMUNICATION COMPLIANCE * Plan for communication compliance * Identify and resolve communication compliance workflow * Case study--Configure an offensive language policy * Investigate and remediate communication compliance alerts 20 - MANAGE INSIDER RISK IN MICROSOFT PURVIEW * Insider risk management overview * Create and manage insider risk policies * Investigate insider risk alerts * Take action on insider risk alerts through cases * Manage insider risk management forensic evidence * Create insider risk management notice templates 21 - IMPLEMENT MICROSOFT PURVIEW INFORMATION BARRIERS * Explore Microsoft Purview Information Barriers * Configure information barriers in Microsoft Purview * Examine information barriers in Microsoft Teams * Examine information barriers in OneDrive * Examine information barriers in SharePoint 22 - MANAGE REGULATORY AND PRIVACY REQUIREMENTS WITH MICROSOFT PRIVA * Create and manage risk management policies * Investigate and remediate risk management alerts * Create rights requests * Manage data estimate and retrieval for rights requests * Review data from rights requests * Get reports from rights requests 23 - IMPLEMENT PRIVILEGED ACCESS MANAGEMENT * Case study--Implementing privileged access management 24 - MANAGE CUSTOMER LOCKBOX * Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered Online5 days, Jun 17th, 13:00 + 2 more
£2380

DP-300T00 Administering Microsoft Azure SQL Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The audience for this course is data professionals managing data and databases who want to learn about administering the data platform technologies that are available on Microsoft Azure. This course is also valuable for data architects and application developers who need to understand what technologies are available for the data platform with Azure and how to work with those technologies through applications. This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases. Prerequisites In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses: AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - PREPARE TO MAINTAIN SQL DATABASES ON AZURE * Describe Microsoft Intelligent Data Platform roles * Understand SQL Server in an Azure virtual machine * Design Azure SQL Database for cloud-native applications * Explore Azure SQL Database Managed Instance 2 - DEPLOY IAAS SOLUTIONS WITH AZURE SQL * Explain IaaS options to deploy SQL Server in Azure * Understand hybrid scenarios * Explore performance and security * Explain high availability and disaster recovery options 3 - DEPLOY PAAS SOLUTIONS WITH AZURE SQL * Explain PaaS options for deploying SQL Server in Azure * Explore single SQL database * Deploy SQL database elastic pool * Understand SQL database hyperscale * Examine SQL managed instance * Describe SQL Edge 4 - EVALUATE STRATEGIES FOR MIGRATING TO AZURE SQL * Understand compatibility level * Understand Azure preview features * Describe Azure database migration options 5 - MIGRATE SQL WORKLOADS TO AZURE SQL DATABASES * Choose the right SQL Server Instance option in Azure * Migrate SQL Server to Azure SQL Database offline * Migrate SQL Server to Azure SQL Database online * Load and move data to Azure SQL Database 6 - MIGRATE SQL WORKLOADS TO AZURE MANAGED INSTANCES * Evaluate migration scenarios to SQL Database Managed Instance * Migrate to SQL Database Managed Instance * Load and Move data to SQL Database Managed Instance 7 - CONFIGURE DATABASE AUTHENTICATION AND AUTHORIZATION * Describe Active Directory and Azure Active Directory * Describe authentication and identities * Describe Security Principals * Describe database and object permissions * Identify authentication and authorization failures 8 - PROTECT DATA IN-TRANSIT AND AT REST * Explore Transparent Data Encryption * Configure server and database firewall rules * Explain object encryption and secure enclaves * Enable encrypted connections * Describe SQL injection * Understand Azure Key Vault 9 - IMPLEMENT COMPLIANCE CONTROLS FOR SENSITIVE DATA * Explore data classification * Explore server and database audit * Implement Dynamic Data Masking * Implement Row Level security * Understand Microsoft Defender for SQL * Explore Azure SQL Database Ledger * Implement Azure Purview 10 - DESCRIBE PERFORMANCE MONITORING * Describe performance monitoring tools * Describe critical performance metrics * Establish baseline metrics * Explore extended events * Describe Azure SQL Insights * Explore Query Performance Insight 11 - CONFIGURE SQL SERVER RESOURCES FOR OPTIMAL PERFORMANCE * Explain how to optimize Azure storage for SQL Server virtual machines * Describe virtual machine resizing * Optimize database storage * Control SQL Server resources 12 - CONFIGURE DATABASES FOR OPTIMAL PERFORMANCE * Explore database maintenance checks * Describe database scoped configuration options * Describe automatic tuning * Describe intelligent query processing 13 - EXPLORE QUERY PERFORMANCE OPTIMIZATION * Understand query plans * Explain estimated and actual query plans * Describe dynamic management views and functions * Explore Query Store * Identify problematic query plans * Describe blocking and locking 14 - EVALUATE PERFORMANCE IMPROVEMENTS * Describe wait statistics * Tune and maintain indexes * Understand query hints 15 - EXPLORE PERFORMANCE-BASED DESIGN * Describe normalization * Choose appropriate data types * Design indexes 16 - AUTOMATE DEPLOYMENT OF DATABASE RESOURCES * Describe deployment models in Azure * Automate deployment by using Azure Resource Manager templates and Bicep * Automate deployment by using PowerShell * Automate deployment by using Azure CLI 17 - CREATE AND MANAGE SQL AGENT JOBS * Create a SQL Server maintenance plan * Describe task status notifications 18 - MANAGE AZURE PAAS TASKS USING AUTOMATION * Explore Elastic jobs * Understand Azure Automation * Build an automation runbook * Automate database workflows by using Logic Apps * Monitor automated tasks 19 - DESCRIBE HIGH AVAILABILITY AND DISASTER RECOVERY STRATEGIES * Describe recovery time objective and recovery point objective * Explore high availability and disaster recovery options * Describe Azure high availability and disaster recovery features for Azure Virtual Machines * Describe high availability and disaster recovery options for PaaS deployments * Explore an IaaS high availability and disaster recovery solution * Describe hybrid solutions 20 - EXPLORE IAAS AND PAAS SOLUTIONS FOR HIGH AVAILABILITY AND DISASTER RECOVERY * Describe failover clusters in Windows Server * Configure Always-on availability groups * Describe temporal tables in Azure SQL Database * Describe active geo-replication for Azure SQL Database * Explore auto-failover groups for Azure SQL Database and Azure SQL Managed Instance 21 - BACK UP AND RESTORE DATABASES * Back up and restore SQL Server running on Azure virtual machines * Back up a SQL Server virtual machine * Back up and restore a database using Azure SQL Database ADDITIONAL COURSE DETAILS: Nexus Humans DP-300T00: Administering Microsoft Azure SQL Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-300T00: Administering Microsoft Azure SQL Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-300T00 Administering Microsoft Azure SQL Solutions
Delivered Online5 days, Jun 17th, 13:00 + 3 more
£2380

AZ-900T00 Microsoft Azure Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is suitable for IT personnel who are just beginning to work with Azure. This audience wants to learn about our offerings and get hands-on experience with the product. This course primarily uses the Azure portal and command line interface to create resources and does not require scripting skills. Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator. This course combines lecture, demonstrations, and hands-on labs. This course will also help prepare someone for the AZ-900 exam. This course will provide foundational level knowledge on cloud concepts; core Azure services; and Azure management and governance features and tools. Prerequisites There are no prerequisites for taking this course. Familiarity with cloud computing is helpful, but isn't necessary. 1 - DESCRIBE CLOUD COMPUTING * What is cloud computing * Describe the shared responsibility model * Define cloud models * Describe the consumption-based model 2 - DESCRIBE THE BENEFITS OF USING CLOUD SERVICES * Describe the benefits of high availability and scalability in the cloud * Describe the benefits of reliability and predictability in the cloud * Describe the benefits of security and governance in the cloud * Describe the benefits of manageability in the cloud 3 - DESCRIBE CLOUD SERVICE TYPES * Describe Infrastructure as a Service * Describe Platform as a Service * Describe Software as a Service 4 - DESCRIBE THE CORE ARCHITECTURAL COMPONENTS OF AZURE * What is Microsoft Azure * Get started with Azure accounts * Describe Azure physical infrastructure * Describe Azure management infrastructure 5 - DESCRIBE AZURE COMPUTE AND NETWORKING SERVICES * Describe Azure Virtual Machines * Describe Azure Virtual Desktop * Describe Azure Containers * Describe Azure Functions * Describe application hosting options * Describe Azure Virtual Networking * Describe Azure Virtual Private Networks * Describe Azure ExpressRoute * Describe Azure DNS 6 - DESCRIBE AZURE STORAGE SERVICES * Describe Azure storage accounts * Describe Azure storage redundancy * Describe Azure storage services * Identify Azure data migration options * Identify Azure file movement options 7 - DESCRIBE AZURE IDENTITY, ACCESS, AND SECURITY * Describe Azure directory services * Describe Azure authentication methods * Describe Azure external identities * Describe Azure conditional access * Describe Azure role-based access control * Describe zero trust model * Describe defense-in-depth * Describe Microsoft Defender for Cloud 8 - DESCRIBE COST MANAGEMENT IN AZURE * Describe factors that can affect costs in Azure * Compare the Pricing and Total Cost of Ownership calculators * Describe the Microsoft Cost Management tool * Describe the purpose of tags 9 - DESCRIBE FEATURES AND TOOLS IN AZURE FOR GOVERNANCE AND COMPLIANCE * Describe the purpose of Microsoft Purview * Describe the purpose of Azure Policy * Describe the purpose of resource locks * Describe the purpose of the Service Trust portal 10 - DESCRIBE FEATURES AND TOOLS FOR MANAGING AND DEPLOYING AZURE RESOURCES * Describe tools for interacting with Azure * Describe the purpose of Azure Arc * Describe Azure Resource Manager and Azure ARM templates 11 - DESCRIBE MONITORING TOOLS IN AZURE * Describe the purpose of Azure Advisor * Describe Azure Service Health * Describe Azure Monitor ADDITIONAL COURSE DETAILS: Nexus Humans AZ-900T00 Microsoft Azure Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-900T00 Microsoft Azure Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-900T00 Microsoft Azure Fundamentals
Delivered OnlineTwo days, Jun 17th, 13:00 + 15 more
£1190

55318: Advanced Automated Administration with Windows PowerShell

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for IT professionals who are experienced in general Windows Server and Windows Client administration. Students should have a foundational knowledge of Windows PowerShell, which they can obtain by taking course 10961C: Automating Administration with Windows PowerShell. In addition, this course provides scripting guidance for Microsoft Azure administrators and developers who support development environments and deployment processes. Overview After completing this course, you will be able to: Create advanced functions. Use Microsoft .NET Framework and REST API in Windows PowerShell. Handle script errors. Use XML, JSON, and custom formatted data. Manage Microsoft Azure resources Analyze and debug scripts Understand Windows PowerShell workflow. This course teaches students how to automate administrative tasks using PowerShell. Students will learn crucial scripting skills such as creating advanced functions, writing controller scripts, and handling script errors. Candidates will learn how to use PowerShell when working with Microsoft Azure, SQL Server, Active Directory, IIS, Windows PowerShell Workflow, .NET resources, the REST API and XML, CSV & JSON formatted data files.This course replaces retired Microsoft course 10962. MODULE 1: CREATING ADVANCED FUNCTIONS * Lesson 1: Converting a command into an advanced function * Lesson 2: Creating a script module * Lesson 3: Defining parameter attributes and input validation * Lesson 4: Writing functions that accept pipeline input * Lesson 5: Producing complex pipeline output * Lesson 6: Using comment-based Help * Lesson 7: Using Whatif and Confirm parameters MODULE 2: USING MICROSOFT .NET FRAMEWORK AND REST API IN WINDOWS POWERSHELL * Lesson 1: Using .NET Framework in PowerShell * Lesson 2: Using REST API in PowerShell MODULE 3: WRITING CONTROLLER SCRIPTS * Lesson 1: Understanding controller scripts * Lesson 2: Writing controller scripts with a user interface * Lesson 3: Writing controller scripts that create reports MODULE 4: HANDLING SCRIPT ERRORS * Lesson 1: Understanding error handling * Lesson 2: Handling errors in a script MODULE 5: USING XML, JSON, AND CUSTOM-FORMATTED DATA * Lesson 1: Working with XML formatted data * Lesson 2: Working with JSON formatted data * Lesson 3: Working with custom-formatted data MODULE 6: ENHANCING SERVER MANAGEMENT WITH DESIRED STATE CONFIGURATION AND JUST ENOUGH ADMINISTRATION * Lesson 1: Implementing Desired State Configuration * Lesson 2: Implementing Just Enough Administration MODULE 7: ANALYZING AND DEBUGGING SCRIPTS * Lesson 1: Debugging in Windows PowerShell * Lesson 2: Analyzing and debugging an existing script MODULE 8: UNDERSTANDING WINDOWS POWERSHELL WORKFLOW * Lesson 1: Understanding Windows PowerShell Workflows * Lesson 2: Running Windows PowerShell Workflows

55318: Advanced Automated Administration with Windows PowerShell
Delivered Online4 days, Jun 17th, 13:00 + 2 more
£1785

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites * SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals * AZ-104T00 - Microsoft Azure Administrator 1 - EXPLORE IDENTITY IN MICROSOFT ENTRA ID * Explain the identity landscape * Explore zero trust with identity * Discuss identity as a control plane * Explore why we have identity * Define identity administration * Contrast decentralized identity with central identity systems * Discuss identity management solutions * Explain Microsoft Entra Business to Business * Compare Microsoft identity providers * Define identity licensing * Explore authentication * Discuss authorization * Explain auditing in identity 2 - IMPLEMENT INITIAL CONFIGURATION OF MICROSOFT ENTRA ID * Configure company brand * Configure and manage Microsoft Entra roles * Configure delegation by using administrative units * Analyze Microsoft Entra role permissions * Configure and manage custom domains * Configure tenant-wide setting 3 - CREATE, CONFIGURE, AND MANAGE IDENTITIES * Create, configure, and manage users * Create, configure, and manage groups * Configure and manage device registration * Manage licenses * Create custom security attributes * Explore automatic user creation 4 - IMPLEMENT AND MANAGE EXTERNAL IDENTITIES * Describe guest access and Business to Business accounts * Manage external collaboration * Invite external users - individually and in bulk * Demo - manage guest users in Microsoft Entra ID * Manage external user accounts in Microsoft Entra ID * Manage external users in Microsoft 365 workloads * Implement and manage Microsoft Entra Verified ID * Configure identity providers * Implement cross-tenant access controls 5 - IMPLEMENT AND MANAGE HYBRID IDENTITY * Plan, design, and implement Microsoft Entra Connect * Implement manage password hash synchronization (PHS) * Implement manage pass-through authentication (PTA) * Demo - Manage pass-through authentication and seamless single sign-on (SSO) * Implement and manage federation * Trouble-shoot synchronization errors * Implement Microsoft Entra Connect Health * Manage Microsoft Entra Health 6 - SECURE MICROSOFT ENTRA USERS WITH MULTIFACTOR AUTHENTICATION * What is Microsoft Entra multifactor authentication? * Plan your multifactor authentication deployment * Configure multi-factor authentication methods 7 - MANAGE USER AUTHENTICATION * Administer FIDO2 and passwordless authentication methods * Explore Authenticator app and OATH tokens * Implement an authentication solution based on Windows Hello for Business * Deploy and manage password protection * Configure smart lockout thresholds * Implement Kerberos and certificate-based authentication in Microsoft Entra ID * Configure Microsoft Entra user authentication for virtual machines 8 - PLAN, IMPLEMENT, AND ADMINISTER CONDITIONAL ACCESS * Plan security defaults * Plan Conditional Access policies * Implement Conditional Access policy controls and assignments * Test and troubleshoot Conditional Access policies * Implement application controls * Implement session management * Implement continuous access evaluation 9 - MANAGE MICROSOFT ENTRA IDENTITY PROTECTION * Review identity protection basics * Implement and manage user risk policy * Monitor, investigate, and remediate elevated risky users * Implement security for workload identities * Explore Microsoft Defender for Identity 10 - IMPLEMENT ACCESS MANAGEMENT FOR AZURE RESOURCES * Assign Azure roles * Configure custom Azure roles * Create and configure managed identities * Access Azure resources with managed identities * Analyze Azure role permissions * Configure Azure Key Vault RBAC policies * Retrieve objects from Azure Key Vault * Explore Microsoft Entra Permissions Management 11 - PLAN AND DESIGN THE INTEGRATION OF ENTERPRISE APPS FOR SSO * Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report * Configure connectors to apps * Design and implement app management roles * Configure preintegrated gallery SaaS apps * Implement and manage policies for OAuth apps 12 - IMPLEMENT AND MONITOR THE INTEGRATION OF ENTERPRISE APPS FOR SSO * Implement token customizations * Implement and configure consent settings * Integrate on-premises apps with Microsoft Entra application proxy * Integrate custom SaaS apps for single sign-on * Implement application-based user provisioning * Monitor and audit access to Microsoft Entra integrated enterprise applications * Create and manage application collections 13 - IMPLEMENT APP REGISTRATION * Plan your line of business application registration strategy * Implement application registration * Register an application * Configure permission for an application * Grant tenant-wide admin consent to applications * Implement application authorization * Manage and monitor application by using app governance 14 - PLAN AND IMPLEMENT ENTITLEMENT MANAGEMENT * Define access packages * Configure entitlement management * Configure and manage connected organizations * Review per-user entitlements 15 - PLAN, IMPLEMENT, AND MANAGE ACCESS REVIEW * Plan for access reviews * Create access reviews for groups and apps * Create and configure access review programs * Monitor access review findings * Automate access review management tasks * Configure recurring access reviews 16 - PLAN AND IMPLEMENT PRIVILEGED ACCESS * Define a privileged access strategy for administrative users * Configure Privileged Identity Management for Azure resources * Plan and configure Privileged Access Groups * Analyze Privileged Identity Management audit history and reports * Create and manage emergency access accounts 17 - MONITOR AND MAINTAIN MICROSOFT ENTRA ID * Analyze and investigate sign-in logs to troubleshoot access issues * Review and monitor Microsoft Entra audit logs * Export logs to third-party security information and event management system * Analyze Microsoft Entra workbooks and reporting * Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered Online5 days, Jun 18th, 13:00 + 3 more
£2380

55342 Supporting and Troubleshooting Windows 11

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is Enterprise Desktop Support Technicians (EDSTs). These technicians provide Tier 2 support to users with domain-joined computers running the Windows 11 OS, typically in medium to large enterprise organizations. Overview Important Windows 11 features How these features are used in an Active Directory How to troubleshoot these features This is a 5-day ILT course that is designed to provide you with the knowledge and skills required to support and troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment. 1: INTRODUCING WINDOWS 11 * Overview of Windows 11 * Recommendations for typical troubleshooting procedures * Troubleshooting installation and deployment * Introduction to management and troubleshooting tools 2: ADMINISTERING WINDOWS 11 REMOTELY * Using Windows Admin Center * Using Windows PowerShell * Implementing Remote Management 3: TROUBLESHOOTING STARTUP AND PERFORMING SYSTEM RECOVERY * Recovering Windows 11 * Configuring the Registry * Troubleshooting Windows 11 startup * Implementing and troubleshooting BitLocker * Troubleshooting OS service Issues 4: TROUBLESHOOTING DEVICES AND DEVICE DRIVERS * Overview of hardware troubleshooting * Troubleshooting device drivers 5: CONFIGURING AND TROUBLESHOOTING NETWORK CONNECTIVITY * Configuring network connectivity * Troubleshooting network connectivity * Implementing and troubleshooting name resolution * Implementing and troubleshooting remote access 6: TROUBLESHOOTING GROUP POLICY * Overview of Group Policy * Resolve GPO application issues on client devices 7: CONFIGURING AND TROUBLESHOOTING SECURITY SETTINGS * Implementing network security * Implementing Windows 11 security features * Configuring and troubleshooting user accounts 8: CONFIGURING AND TROUBLESHOOTING USER STATE * Implementing and troubleshooting user state * Implementing and troubleshooting Folder Redirection 9: CONFIGURING AND TROUBLESHOOTING RESOURCE ACCESS * Configuring and troubleshooting file access. * Configuring and troubleshooting shared folders. * Implementing and troubleshooting Work Folders. * Managing and troubleshooting printers. * Recovering files. 10: TROUBLESHOOTING APPS * Troubleshooting desktop apps * Troubleshooting app compatibility * Managing UWP apps 11: MONITORING AND MAINTAINING WINDOWS 11 * Monitoring Windows 11 * Optimizing Windows 11 performance * Managing Windows 11 updates

55342 Supporting and Troubleshooting Windows 11
Delivered Online6 days, Jun 17th, 13:00 + 6 more
£2975

Educators matching "Microsoft AZ-303"

Show all 5
Course Gate

course gate

5.0(1)

London

Welcome to Course Gate, your gateway to a world of knowledge and opportunity. We are a leading online learning marketplace dedicated to empowering individuals and organisations with the skills they need to succeed in today's dynamic and competitive environment. -------------------------------------------------------------------------------- Our Mission Our mission is to make education accessible and enjoyable for everyone. We want to help you discover your passion, expand your knowledge, and grow your confidence. Whether you want to learn a new language, master software, or develop a hobby, we have the right course for you.  -------------------------------------------------------------------------------- Our Vision  At Course Gate, we envision a future where education knows no boundaries. Our goal is to eliminate the traditional barriers of time, location, and accessibility, empowering learners from diverse backgrounds to unlock their full potential. Through our innovative approach, we aim to revolutionise the learning experience by making top-quality education accessible to everyone, regardless of their location. -------------------------------------------------------------------------------- Why Choose Course Gate? When you opt for Course Gate, you're choosing excellence, convenience, and an unparalleled learning experience. Here's why learners and organisations worldwide trust us: * Unmatched Quality: We meticulously curate our courses, collaborating with industry-leading experts to provide the highest-quality, relevant, and up-to-date content. * Flexible Learning: Our platform enables you to learn at your own pace, fitting into your schedule. Whether you're a full-time professional, a stay-at-home parent, or a busy student. * 24/7 Customer Support: Our dedicated customer support team is available to assist you whenever you need help. * Accreditation & Endorsement: We hold CPD accreditation and QLS endorsement, and we're a registered course provider on the UKRLP in the UK. * Affordability: We believe education should be accessible to all. Course Gate provides competitive pricing and discounts, ensuring that the cost never becomes a barrier to your personal and professional development. So, what are you waiting for? Join the thousands of learners who have already chosen Course Gate as their trusted learning partner and unlock your full potential. --------------------------------------------------------------------------------

Nexus Human

nexus human

London

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK.  For over two decades, Nexus Human has been a steadfast source of reliable and high-quality training solutions, catering to a diverse range of professional and educational needs. With a strong reputation in the Training Industry, Nexus Human has consistently demonstrated its commitment to equipping individuals and organisations with the skills and knowledge required to thrive in today's dynamic world.  Our training programs span a wide spectrum, encompassing IT certifications, business skills, and much more.   What sets Nexus Human apart is our unwavering dedication to staying at the forefront of industry trends and technology advancements.  Our expert instructors, coupled with cutting-edge training resources, ensure that students receive the most up-to-date and relevant knowledge available. The impact of Nexus Human extends far and wide, helping individuals enhance their career prospects and aiding businesses in achieving their goals.  This 20-year journey has solidified our institution's standing as a trusted partner in personal and professional growth, offering reliable, excellent training that continues to shape the future.  Whether you seek to upskill, reskill, or simply stay ahead of the curve, Nexus Human is the place to turn for an educational experience marked by quality, reliability, and innovation.