• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

573 Surf courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Cybersecurity: Fundamentals

5.0(9)

By Chart Learning Solutions

Cybersecurity involves safeguarding the networks and devices you use to protect your data from online criminals. At the most basic level, this can be locking your phone with facial recognition or using a strong password for your private Wi-Fi connection. So, why should you care about cybersecurity? Whether you access sensitive data daily through company networks or simply use your phone to surf the web, any online activity can provide avulnerabilityfor criminals to exploite, a loophole they can enter through to access personal information. LEARNING OBJECTIVES The following are some of the key outcomes in this course: Understand the types of cybercrime you're likely to encounter. Learn how to weigh the risks of using public Wi-Fi and how to prepare for a safe connection. Understand safe social media practices to stay connected with your social network. Understand the benefits and risks of social media platforms and the impact on your professional reputation. TARGET AUDIENCE Young Professionals

Cybersecurity: Fundamentals
Delivered Online On Demand
£34.95

Diploma in Data & Legal Protection

4.3(43)

By John Academy

DESCRIPTION: From the minute you initially associated yourself with the Internet, you have most likely been informed that you have to utilize safety efforts to secure yourself. This is something that all Internet users confront constantly. There is a great deal more to protection for Internet Marketers, however. Web Marketers require more assurance than that normal users because they have more to protect and more they have more to stake. The normal user may utilize their PCs to shop, play recreations, or to surf the Internet.  As an Internet Marketer, you presumably do those things, however, you likewise work a whole business on the web. This course has been designed for web marketers and also for those that work in the fields of data protection and privacy. Upon completion of the course, the students possess a solid knowledge of data protection law, as well as an understanding of the practical implications for different organizations. WHO IS THE COURSE FOR? * Web marketers * Anyone who wants to surf the net safely ENTRY REQUIREMENT: * This course is available to all learners, of all academic backgrounds. * Learners should be aged 16 or over to undertake the qualification. * Good understanding of English language, numeracy and ICT are required to attend this course. ASSESSMENT:  * At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. * PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. WHY CHOOSE US? * Affordable, engaging & high-quality e-learning study materials; * Tutorial videos/materials from the industry leading experts; * Study in a user-friendly, advanced online learning platform; * Efficient exam systems for the assessment and instant result; * The UK & internationally recognized accredited qualification; * Access to course content on mobile, tablet or desktop from anywhere anytime; * The benefit of career advancement opportunities; * 24/7 student support via email. CAREER PATH: Diploma in data and legal protection online is a useful qualification to possess, and would be beneficial for the following careers: * Data protection associate * legal counsellor * head of data protection * commercial solicitor * Data privacy solicitor * Layers. Diploma in Data & Legal Protection Why Internet Marketers Need More Protection 00:30:00 You Can't Be Anonymous 00:15:00 Start With Basic Security Measures 01:00:00 Using Disclaimers 01:00:00 Proper Use Of Email 01:00:00 Protecting Product Rights 01:00:00 Protecting Your Website 01:00:00 Terms Of Use Or Service 00:30:00 Privacy Policy 01:00:00 Mock Exam Mock Exam- Diploma in Data & Legal Protection 00:20:00 Final Exam Final Exam- Diploma in Data & Legal Protection 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Diploma in Data & Legal Protection
Delivered Online On Demand
£25

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - MANAGE IDENTITIES IN MICROSOFT ENTRA ID * Secure users in Microsoft Entra ID * Secure groups in Microsoft Entra ID * Recommend when to use external identities * Secure external identities * Implement Microsoft Entra Identity protection 2 - MANAGE AUTHENTICATION BY USING MICROSOFT ENTRA ID * Configure Microsoft Entra Verified ID * Implement multifactor authentication (MFA) * Implement passwordless authentication * Implement password protection * Implement single sign-on (SSO) * Integrate single sign-on (SSO) and identity providers * Recommend and enforce modern authentication protocols 3 - MANAGE AUTHORIZATION BY USING MICROSOFT ENTRA ID * Configure Azure role permissions for management groups, subscriptions, resource groups, and resources * Assign built-in roles in Microsoft Entra ID * Assign built-in roles in Azure * Create and assign a custom role in Microsoft Entra ID * Implement and manage Microsoft Entra Permissions Management * Configure Microsoft Entra Privileged Identity Management * Configure role management and access reviews by using Microsoft Entra Identity Governance * Implement Conditional Access policies 4 - MANAGE APPLICATION ACCESS IN MICROSOFT ENTRA ID * Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants * Manage app registrations in Microsoft Entra ID * Configure app registration permission scopes * Manage app registration permission consent * Manage and use service principals * Manage managed identities for Azure resources * Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - PLAN AND IMPLEMENT SECURITY FOR VIRTUAL NETWORKS * Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) * Plan and implement User-Defined Routes (UDRs) * Plan and implement Virtual Network peering or gateway * Plan and implement Virtual Wide Area Network, including secured virtual hub * Secure VPN connectivity, including point-to-site and site-to-site * Implement encryption over ExpressRoute * Configure firewall settings on PaaS resources * Monitor network security by using Network Watcher, including NSG flow logging 6 - PLAN AND IMPLEMENT SECURITY FOR PRIVATE ACCESS TO AZURE RESOURCES * Plan and implement virtual network Service Endpoints * Plan and implement Private Endpoints * Plan and implement Private Link services * Plan and implement network integration for Azure App Service and Azure Functions * Plan and implement network security configurations for an App Service Environment (ASE) * Plan and implement network security configurations for an Azure SQL Managed Instance 7 - PLAN AND IMPLEMENT SECURITY FOR PUBLIC ACCESS TO AZURE RESOURCES * Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management * Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies * Plan and implement an Azure Application Gateway * Plan and implement an Azure Front Door, including Content Delivery Network (CDN) * Plan and implement a Web Application Firewall (WAF) * Recommend when to use Azure DDoS Protection Standard 8 - PLAN AND IMPLEMENT ADVANCED SECURITY FOR COMPUTE * Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access * Configure network isolation for Azure Kubernetes Service (AKS) * Secure and monitor AKS * Configure authentication for AKS * Configure security for Azure Container Instances (ACIs) * Configure security for Azure Container Apps (ACAs) * Manage access to Azure Container Registry (ACR) * Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption * Recommend security configurations for Azure API Management 9 - PLAN AND IMPLEMENT SECURITY FOR STORAGE * Configure access control for storage accounts * Manage life cycle for storage account access keys * Select and configure an appropriate method for access to Azure Files * Select and configure an appropriate method for access to Azure Blob Storage * Select and configure an appropriate method for access to Azure Tables * Select and configure an appropriate method for access to Azure Queues * Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage * Configure Bring your own key (BYOK) * Enable double encryption at the Azure Storage infrastructure level 10 - PLAN AND IMPLEMENT SECURITY FOR AZURE SQL DATABASE AND AZURE SQL MANAGED INSTANCE * Enable database authentication by using Microsoft Entra ID * Enable and monitor database audit * Identify use cases for the Microsoft Purview governance portal * Implement data classification of sensitive information by using the Microsoft Purview governance portal * Plan and implement dynamic mask * Implement transparent data encryption? * Recommend when to use Azure SQL Database Always Encrypted 11 - PLAN, IMPLEMENT, AND MANAGE GOVERNANCE FOR SECURITY * Create, assign, and interpret security policies and initiatives in Azure Policy * Configure security settings by using Azure Blueprint * Deploy secure infrastructures by using a landing zone * Create and configure an Azure Key Vault * Recommend when to use a dedicated Hardware Security Module (HSM) * Configure access to Key Vault, including vault access policies and Azure Role Based Access Control * Manage certificates, secrets, and keys * Configure key rotation * Configure backup and recovery of certificates, secrets, and keys 12 - MANAGE SECURITY POSTURE BY USING MICROSOFT DEFENDER FOR CLOUD * Implement Microsoft Defender for Cloud * Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory * Assess compliance against security frameworks and Microsoft Defender for Cloud * Add industry and regulatory standards to Microsoft Defender for Cloud * Add custom initiatives to Microsoft Defender for Cloud * Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud * Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - CONFIGURE AND MANAGE THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD * Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS * Configure Microsoft Defender for Servers * Configure Microsoft Defender for Azure SQL Database * Manage and respond to security alerts in Microsoft Defender for Cloud * Configure workflow automation by using Microsoft Defender for Cloud * Evaluate vulnerability scans from Microsoft Defender for Server 14 - CONFIGURE AND MANAGE SECURITY MONITORING AND AUTOMATION SOLUTIONS * Monitor security events by using Azure Monitor * Configure data connectors in Microsoft Sentinel * Create and customize analytics rules in Microsoft Sentinel * Configure automation in Microsoft Sentinel ADDITIONAL COURSE DETAILS: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered Online5 days, Jul 8th, 13:00 + 4 more
£2380

Self Motivation Course

4.8(8)

By Skill Up

Self-motivation lets you take control of your own life. Live a life full of motivation,stay positive. Learn 'Goals & What is Motivation?', 'The SOURCE of All Motivation'.

Self Motivation Course
Delivered Online On Demand
£25

LEATHER SEWING CLASS

5.0(52)

By The London Leather Workshop

LEARN HOW TO PROFESSIONALLY SEW LEATHER WITH INDUSTRIAL SEWING MACHINES – BEGINNERS & INTERMEDIATES – ONE TEACHER, FOUR STUDENTS WERE? AT OUR LONDON STUDIOhttps://www.thelondonleatherworkshop.com/contact-us/ WHEN? PLEASE SELECT YOUR PREFERRED DATE(S) THROUGH THE BUTTON BELOW COST 2 MEETINGS OF 6 HOURS EACH (12 HOURS IN TOTAL) £330 COURSE MATERIALS INCLUDED (WORTH £30)   LEVEL: BEGINNERS, BEGINNERS WITH PREVIOUS EXPERIENCE AND INTERMEDIATE SEWERS. LEARN HOW TO SEW LEATHER WITH A MACHINE: WHAT IS THIS COURSE ABOUT? THIS IS A MOSTLY PRACTICAL ONE TO FOUR TUITION DURING WHICH YOU WILL BE TAUGHT THE ESSENTIAL SKILLS OF SEWING LEATHER WITH AND INDUSTRIAL SEWING MACHINE AND THE BASIC, MOST POPULAR CONSTRUCTION TECHNIQUES USED IN BAG AND ACCESSORY MAKING. THROUGH THE LESSON YOU WILL ALSO RECEIVE SOME BASIC TRAINING ON HOW TO MARK, CUT AND GLUE LEATHER AS WELL AS HOW TO CONSTRUCT COMMON BAG FEATURES. AT THE END OF THE TUITION, YOU WILL HAVE GAINED CONFIDENCE IN SEWING LEATHER WITH INDUSTRIAL SEWING MACHINES AND HAVE THE SKILLS TO REALISE SOME SIMPLE ITEMS INDEPENDENTLY. YOU WILL LEARN HOW TO TROUBLESHOOT SEWING PROBLEMS AND HOW TO MANAGE CHALLENGES SUCH AS CURVES, MULTIPLE LAYERS OF LEATHER, STRETCHY/ROUGH/SLIPPERY SURFACES AND MORE. YOU WILL LEARN HOW TO SEW BASIC COMPONENTS OF A BAG SUCH US SOME TYPES OF SIMPLE ZIPS, STRAPS AND GUSSETS.  YOU WILL PRODUCE YOUR OWN SAMPLES OF WORK TO TAKE HOME WITH YOU. AS THIS IS A ONE TO THREE TUITION, THE EXPERIENCE WILL BE CUSTOMISED TO YOUR ABILITY AND PREVIOUS EXPERIENCE.   WHAT WILL BE TAUGHT? BELOW IS A LIST OF TOPICS COVERED DURING THE CLASSES: – INDUSTRIAL MACHINES: DIFFERENCES AND MAIN FEATURES – TO CHOOSE THE RIGHT SEWING MACHINE FOR A SPECIFIC TYPE OF MATERIAL OR CONSTRUCTION – TO OPERATE A LOCK STITCH WALKING FOOT MACHINE – TO THREAD INDUSTRIAL SEWING MACHINES – TO UNDERSTAND HOW TO OBTAIN THE CORRECT TENSION IN YOUR SEWING – TO USE VARIOUS TOOLS AND EQUIPMENT IN YOUR SEWING – TO UNDERSTAND THREAD TYPES AND NEEDLE SIZES – TO LEARN HOW TO CORRECTLY SEW LEATHER AND HOW THIS DIFFERS FROM SEWING OTHER MATERIALS – SEWING THIN VS THICK LEATHER – TO LEARN HOW TO SEW STRAIGHT LINES, CURVES AND PARALLEL LINES – TO PRODUCE A RANGE OF BASIC SEAMS, SEAM FINISHES, CONSTRUCTION, CONTINUOUS AND REINFORCED SEAMS – TO HANDLE SEWING MULTIPLE LAYERS OF LEATHER – LEARN HOW TO SEW AND FINISH A SIMPLE ZIP ON LEATHER – LEARN HOW TO CUT, ASSEMBLE AND SEW SIMPLE STRAPS AND HANDLES – HOW TO INCORPORATE TWO TYPES OF LINING IN YOUR PROJECT – HOW TO MARK, CUT AND GLUE LEATHER   IMPORTANT TO KNOW: WE WILL ALWAYS TRY TO COVER AS MUCH ON THE SYLLABUS AS POSSIBLE AND DEPENDING ON YOUR ABILITY AND PREVIOUS EXPERIENCE, WE MIGHT NOT BE ABLE TO COMPLETE THE PROGRAM OR WE MIGHT INSTEAD BE ABLE TO TEACH YOU ADDITIONAL TECHNIQUES RELATING TO THE ABOVE LISTED TOPICS, SUCH AS: – FINISHING TECHNIQUES (PIPING, BINDING, FOLDING) – LEARN HOW TO ASSEMBLE AND SEW SIMPLE GUSSETS – LEARN HOW TO SEW AND FINISH MORE COMPLEX ZIPS STYLES – LEARN HOW TO SEW AND FINISH MORE COMPLEX STRAPS AND HANDLES STYLES – LEARN HOW TO CONSTRUCT BUTTON HOLES & POCKETS INCLUDED IN THE COURSE: ON THE DAY YOU WILL BE PROVIDED WITH USEFUL HANDOUTS TO TAKE HOME WITH YOU WHICH CONTAIN: – AN ILLUSTRATED GUIDE PROVIDING CRUCIAL INFORMATION OF SEWING MACHINES TYPES AND COMPONENTS – A GLOSSARY CONTAINING INFORMATION ABOUT NEEDLES, THREAD TYPES AND ESSENTIAL KEY WORDS RELATED TO THE TOPICS OF THE LESSON WHAT ARE THE ENTRY REQUIREMENTS? THIS COURSE IS SUITABLE FOR TOTAL BEGINNERS, BEGINNERS WITH SOME PREVIOUS BASIC MACHINE SEWING EXPERIENCE AND INTERMEDIATE SEWERS (EITHER USING INDUSTRIAL OR DOMESTIC MACHINES). YOU SHOULD BE ABLE TO USE MEASUREMENTS AND UNDERSTAND VERBAL AND WRITTEN ENGLISH INSTRUCTIONS.   ARE THERE ANY OTHER COSTS? IS THERE ANYTHING I NEED TO BRING? MATERIALS ARE INCLUDED. FEEL FREE TO BRING A NOTEPAD, IF YOU WOULD LIKE TO TAKE SOME NOTES, WE WILL PROVIDE THE REST.

LEATHER SEWING CLASS
Delivered In-Person in London6 hours, Jul 4th, 09:00 + 1 more
£330

Mastering Meaningful Engagement

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for * Professionals desiring to develop meaning engagement strategies to better connect with leadership, peers, and clients. * JOB ROLES: Personal Development Leader of Teams/Projects Leader of Managers/Departments Leader of Organizational Strategy Overview Develop better strategies in preparation and execution with audiences of all kinds Engage audience members more deeply and intently Optimize ability to prepare delivery, style, and transparency in sharing information Deliver your message with more clarity, purpose, and passion Create deeper meaning in who you are as a leader for others What?s the difference between good engagement and incredible engagement? How do you know when your audience, employees, or teammates are committed to everything you say and do? The answer is Authentic Engagement. When you notice amazing leaders, you will notice they possess all seven of these traits, regardless of whether they have been in the profession twenty years or twenty weeks. This course is the map toward shaping the next wave of leaders, regardless of style, audience, or modality! The question is: Are you ready to embark on your voyage? In this course, you will learn how to authentically engage others, build a more purposeful message that resonates, and learn the strategies to gain stronger engagement and input back from the people you work with. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. THE CYA MODEL OF PREPARATION * Preparing Your Content * Learning the 4-Square to Holistic Content Delivery * Getting Ready for the Seven C?s for Engagement * Preparing for Yourself and Audience 2. PREPARING YOURSELF AND THE POWER OF YOUR DELIVERY * Understanding the Power of Delivery and Style * Learning when to be Transparent in your Approach * Understanding How You Shine Remotely vs. Face-to-Face * Understanding Your Command * Knowing What and When to Change Your Approach * Building Better Efficacy and Confidence 3. CAPTURING, BUILDING, AND CONNECTING WITH THE PEOPLE YOU ENGAGE * Learning the Differences between Surface-Level Engagement and Deeper Connection * Understanding the Four Levels of Audience to Build Relationships * Developing Captivation Techniques with Engagement * Establishing Clarity through Depth and Alignment * Connecting Deeper and Establishing Trust 4. GOING BEYOND FOR COMPLETENESS * Looking to the Future of Engagement, Technology, and Leadership * Plotting Your Next Course for Delivery * Using the Anchor Guide to Renew Your Approach * Mapping the Next Steps ADDITIONAL COURSE DETAILS: Nexus Humans Mastering Meaningful Engagement training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Mastering Meaningful Engagement course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Mastering Meaningful Engagement
Delivered Online3 days, Jul 15th, 13:00
£1495

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - INTRODUCTION TO ZERO TRUST AND BEST PRACTICE FRAMEWORKS * Zero Trust initiatives * Zero Trust technology pillars part 1 * Zero Trust technology pillars part 2 2 - DESIGN SOLUTIONS THAT ALIGN WITH THE CLOUD ADOPTION FRAMEWORK (CAF) AND WELL-ARCHITECTED FRAMEWORK (WAF) * Define a security strategy * Cloud Adoption Framework secure methodology * Design security with Azure Landing Zones * The Well-Architected Framework security pillar 3 - DESIGN SOLUTIONS THAT ALIGN WITH THE MICROSOFT CYBERSECURITY REFERENCE ARCHITECTURE (MCRA) AND MICROSOFT CLOUD SECURITY BENCHMARK (MCSB) * Design solutions with best practices for capabilities and controls * Design solutions with best practices for attack protection 4 - DESIGN A RESILIENCY STRATEGY FOR COMMON CYBERTHREATS LIKE RANSOMWARE * Common cyberthreats and attack patterns * Support business resiliency * Ransomware protection * Configurations for secure backup and restore * Security updates 5 - CASE STUDY: DESIGN SOLUTIONS THAT ALIGN WITH SECURITY BEST PRACTICES AND PRIORITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 6 - DESIGN SOLUTIONS FOR REGULATORY COMPLIANCE * Translate compliance requirements into a security solution * Address compliance requirements with Microsoft Purview * Address privacy requirements with Microsoft Priva * Address security and compliance requirements with Azure policy * Evaluate infrastructure compliance with Defender for Cloud 7 - DESIGN SOLUTIONS FOR IDENTITY AND ACCESS MANAGEMENT * Design cloud, hybrid and multicloud access strategies (including Azure AD) * Design a solution for external identities * Design modern authentication and authorization strategies * Align conditional access and Zero Trust * Specify requirements to secure Active Directory Domain Services (AD DS) * Design a solution to manage secrets, keys, and certificates 8 - DESIGN SOLUTIONS FOR SECURING PRIVILEGED ACCESS * The enterprise access model * Design identity governance solutions * Design a solution to secure tenant administration * Design a solution for cloud infrastructure entitlement management (CIEM) * Design a solution for privileged access workstations and bastion services 9 - DESIGN SOLUTIONS FOR SECURITY OPERATIONS * Design security operations capabilities in hybrid and multicloud environments * Design centralized logging and auditing * Design security information and event management (SIEM) solutions * Design solutions for detection and response * Design a solution for security orchestration, automation, and response (SOAR) * Design security workflows * Design threat detection coverage 10 - CASE STUDY: DESIGN SECURITY OPERATIONS, IDENTITY AND COMPLIANCE CAPABILITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 11 - DESIGN SOLUTIONS FOR SECURING MICROSOFT 365 * Evaluate security posture for collaboration and productivity workloads * Design a Microsoft 365 Defender solution * Design configurations and operational practices for Microsoft 365 12 - DESIGN SOLUTIONS FOR SECURING APPLICATIONS * Design and implement standards to secure application development * Evaluate security posture of existing application portfolios * Evaluate application threats with threat modeling * Design security lifecycle strategy for applications * Secure access for workload identities * Design a solution for API management and security * Design a solution for secure access to applications 13 - DESIGN SOLUTIONS FOR SECURING AN ORGANIZATION'S DATA * Design a solution for data discovery and classification using Microsoft Purview * Design a solution for data protection * Design data security for Azure workloads * Design security for Azure Storage * Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR APPLICATIONS AND DATA * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 15 - SPECIFY REQUIREMENTS FOR SECURING SAAS, PAAS, AND IAAS SERVICES * Specify security baselines for SaaS, PaaS, and IaaS services * Specify security requirements for web workloads * Specify security requirements for containers and container orchestration 16 - DESIGN SOLUTIONS FOR SECURITY POSTURE MANAGEMENT IN HYBRID AND MULTICLOUD ENVIRONMENTS * Evaluate security posture by using Microsoft Cloud Security Benchmark * Design integrated posture management and workload protection * Evaluate security posture by using Microsoft Defender for Cloud * Posture evaluation with Microsoft Defender for Cloud secure score * Design cloud workload protection with Microsoft Defender for Cloud * Integrate hybrid and multicloud environments with Azure Arc * Design a solution for external attack surface management 17 - DESIGN SOLUTIONS FOR SECURING SERVER AND CLIENT ENDPOINTS * Specify server security requirements * Specify requirements for mobile devices and clients * Specify internet of things (IoT) and embedded device security requirements * Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT * Specify security baselines for server and client endpoints * Design a solution for secure remote access 18 - DESIGN SOLUTIONS FOR NETWORK SECURITY * Design solutions for network segmentation * Design solutions for traffic filtering with network security groups * Design solutions for network posture management * Design solutions for network monitoring 19 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR INFRASTRUCTURE * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough ADDITIONAL COURSE DETAILS: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered Online5 days, Jul 29th, 13:00 + 1 more
£2380

Data Bundle Course

4.3(43)

By John Academy

> Are interested in understanding and protecting big data? Do you want to > utilize any data that have been presented to you to its full extent? This > Bundle Course will solve all of your problems! DESCRIPTION:  Interpreting data is of immense importance when you handling data. Only then you can fully use it to your business. At the same time when you use data online, there is always a chance that your data can be stolen. Learn how to protect your information in this data bundle course. Make you own database and reap its benefits. In this course, you will know how to create your database and database user.You will then master how to import database tables since most new scripts come with a built-in installer, the scripts create all database, but when the time comes that there is no installer provided, then you have to create one manually. Upon completion of the course the students will possess a solid knowledge of data protection law, as well as an understanding of the practical implications for different organisations. WHO IS THE COURSE FOR? * Employees of the business industry and other businessmen who want to learn how to utilise and create their database. * Anyone who wants to surf the net safely. * People who have an interest in setting up their database and learn to become an expert on it. ENTRY REQUIREMENT: * This course is available to all learners, of all academic backgrounds.  * Learners should be aged 16 or over to undertake the qualification. * Good understanding of English language, numeracy and ICT are required to attend this course. ASSESSMENT: * At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at a cost of £39 or in PDF format at a cost of £24. * PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. WHY CHOOSE US? * Affordable, engaging & high-quality e-learning study materials; * Tutorial videos/materials from the industry leading experts; * Study in a user-friendly, advanced online learning platform; * Efficient exam systems for the assessment and instant result; * The UK & internationally recognised accredited qualification; * Access to course content on mobile, tablet or desktop from anywhere anytime; * The benefit of career advancement opportunities; * 24/7 student support via email. CAREER PATH: The Data Bundle Course will be very beneficial and helpful, especially to the following careers: * Businessman * Product Creators * Programmers * Sales Managers * Top Executives * Website Developer * Data protection associate * Legal counsellor * Head of data protection * Commercial solicitor * Data privacy solicitor. Module 1: Database Basics What is a Database 01:00:00 Definition of Terms 01:00:00 Database Users and Languages 01:00:00 Components of a Database System 01:00:00 Basic Set Concepts 01:00:00 Relations as a Database 01:00:00 Relational Database Operators 01:00:00 Database keys 01:00:00 Module 2: Understanding Big Data What Is Big Data? Hint: You're a Part of It Every Day 01:00:00 Why Is Big Data Important? 01:00:00 Why IBM for Big Data? 01:00:00 All About Hadoop: The Big Data Lingo Chapter 01:00:00 InfoSphere BigInsights: Analytics for Big Data at Rest 01:00:00 IBM InfoSphere Streams: Analytics for Big Data in Motion 01:00:00 Module 3: Data Protection Why Internet Marketers Need More Protection 00:30:00 You Can't Be Anonymous 00:15:00 Start With Basic Security Measures 01:00:00 Using Disclaimers 01:00:00 Proper Use Of Email 01:00:00 Protecting Product Rights 01:00:00 Protecting Your Website 01:00:00 Terms Of Use Or Service 00:30:00 Privacy Policy 01:00:00 Refer A Friend Refer A Friend 00:00:00 Mock Exam Mock Exam- Data Bundle Course 00:30:00 Final Exam Final Exam- Data Bundle Course 00:30:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Data Bundle Course
Delivered Online On Demand
£25

Artful Cyanotypes - Cyanotypes on fabric and playing with pattern

5.0(1)

By Artful Mind

An exciting & enriching course designed by artist and art educator Lucy Perry to immerse students in the magical world of cyanotypes. Lucy offers you a creative approach to this accessible and fascinating alternative photographic technique.

Artful Cyanotypes - Cyanotypes on fabric and playing with pattern
Delivered In-Person in WingfieldTwo days, Jul 9th, 09:00
£170

Food Safety for Retail, Level 2

5.0(50)

By Pochat Training

QA LEVEL 2 AWARD IN FOOD SAFETY FOR RETAIL (RQF) -------------------------------------------------------------------------------- * Face to Face: Full day course * Virtual Classroom: Spread over 3 sessions of 2½ hr duration * Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely * Recommended by HSE and Environmental Health Officers (EHO's) -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- COURSE CONTENTS: * The Importance of Food Safety * Food Safety Laws * Legal Responsibilities of Food Handlers * Types of Contamination and the Associated Risks * Bacteriology * Food Poisoning * Foodborne Illnesses * An Introduction to Hazard Analysis and Critical Control Points (HACCP) * Personal Hygiene * Work Flow, Work Surfaces and Equipment * Cleaning and Disinfection * Waste Disposal * Pest Control * Safe Food Handling Practices including Time and Temperature Controls * Preparation * Cooking and Reheating * Chilling * Cooling * Thawing * Hot holding * Displaying food * Core temperatures * Food Preservation * Storage * Stock Control Procedures BENEFITS OF THIS COURSE: * Businesses have a duty to their customers to produce food that is safe for consumption. * There are one million cases of food poisoning [https://www.food.gov.uk/news-alerts/news/avoid-the-unwanted-gift-of-food-poisoning-this-christmas] in the UK each year. * More than 6,000 are admitted to hospital. * In 2014/2015, businesses in Chesterfield were issued 344 written enforcement notices. Derby received 1,116. * Doing our Ofqual regulated, nationally accredited course ensures that nothing of importance is left out. * EU and UK regulations [https://pochattraining.co.uk/resources-food-law-code-of-practice/] state that all food handlers must receive appropriate training in food safety practices relevant to their duties. * The Food Standards Agency [https://www.food.gov.uk/business-guidance/food-hygiene-for-your-business] says that 'Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely’. Our QA Level 2 Award in Food Safety in Catering (RQF) is a nationally accredited qualification especially suitable for people working in, or planning to work in, the food retail industry, and complies with the training regulations.

Food Safety for Retail, Level 2
Delivered Online or in ChesterfieldTwo days, Jul 11th, 09:00 + 6 more
£105