• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2279 Courses

In Business Online Networking

5.0(9)

By We Are In Business

Come to an online event. Grow your business with expert training and support from other business professionals, entrepreneurs, freelancers, small start-ups and SME's.

In Business Online Networking
Delivered Online1 hour 30 minutes, Jul 16th, 08:20 + 3 more
£10

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: * General understanding of networking and cloud computing concepts. * General IT knowledge or any general experience working in an IT environment. * General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites * General understanding of networking and cloud computing concepts. * General IT knowledge or any general experience working in an IT environment. * General understanding of Microsoft Azure and Microsoft 365. 1 - DESCRIBE SECURITY AND COMPLIANCE CONCEPTS * Describe the shared responsibility model * Describe defense in depth * Describe the Zero Trust model * Describe governance, risk, and compliance (GRC) concepts 2 - DESCRIBE IDENTITY CONCEPTS * Define authentication and authorization * Define identity as the primary security perimeter * Describe the role of the identity provider * Describe the concept of directory services and Active Directory * Describe the concept of federation 3 - DESCRIBE THE FUNCTION AND IDENTITY TYPES OF MICROSOFT ENTRA ID * Describe Microsoft Entra ID * Describe types of identities * Describe hybrid identity * Describe external identities 4 - DESCRIBE THE AUTHENTICATION CAPABILITIES OF MICROSOFT ENTRA ID * Describe authentication methods * Describe multifactor authentication * Describe self-service password reset * Describe password protection and management capabilities 5 - DESCRIBE ACCESS MANAGEMENT CAPABILITIES OF MICROSOFT ENTRA ID * Describe Conditional Access * Describe Microsoft Entra roles and role-based access control (RBAC) 6 - DESCRIBE THE IDENTITY PROTECTION AND GOVERNANCE CAPABILITIES OF AZURE AD * Describe Microsoft Entra ID Governance * Describe access reviews * Describe entitlement management * Describe the capabilities of Privileged identity Management * Describe Microsoft Entra ID Protection * Describe Microsoft Entra Permissions Management * Describe Microsoft Entra Verified ID 7 - DESCRIBE CORE INFRASTRUCTURE SECURITY SERVICES IN AZURE * Describe Azure DDoS protection * Describe Azure Firewall * Describe Web Application Firewall * Describe network segmentation in Azure * Describe Azure Network Security Groups * Describe Azure Bastion * Describe Azure Key Vault 8 - DESCRIBE THE SECURITY MANAGEMENT CAPABILITIES IN AZURE * Describe Microsoft Defender for Cloud * Describe how security policies and initiatives improve cloud security posture * Describe Cloud security posture management * Describe the enhanced security of Microsoft Defender for Cloud * Describe DevOps security management 9 - DESCRIBE SECURITY CAPABILITIES OF MICROSOFT SENTINEL * Describe threat detection and mitigation capabilities in Microsoft Sentinel * Describe Microsoft Security Copilot 10 - DESCRIBE THREAT PROTECTION WITH MICROSOFT DEFENDER XDR * Describe Microsoft Defender XDR services * Describe Microsoft Defender for Office 365 * Describe Microsoft Defender for Endpoint * Describe Microsoft Defender for Cloud Apps * Describe Microsoft Defender for Identity * Describe Microsoft Defender Vulnerability Management * Describe Microsoft Defender Threat Intelligence * Describe the Microsoft Defender portal 11 - DESCRIBE MICROSOFT?S SERVICE TRUST PORTAL AND PRIVACY CAPABILITIES * Describe the offerings of the Service Trust portal * Describe Microsoft's privacy principles * Describe Microsoft Priva 12 - DESCRIBE THE COMPLIANCE MANAGEMENT CAPABILITIES IN MICROSOFT PURVIEW * Describe the Microsoft Purview compliance portal * Describe Compliance Manager * Describe use and benefits of compliance score 13 - DESCRIBE INFORMATION PROTECTION, DATA LIFECYCLE MANAGEMENT, AND DATA GOVERNANCE CAPABILITIES IN MICROSOFT PURVIEW * Know your data, protect your data, and govern your data * Describe the data classification capabilities of the compliance portal * Describe sensitivity labels and policies * Describe data loss prevention * Describe retention policies and retention labels * Describe records management * Describe the Microsoft Purview unified data governance solution 14 - DESCRIBE THE INSIDER RISK CAPABILITIES IN MICROSOFT PURVIEW * Describe insider risk management * Describe communication compliance 15 - DESCRIBE THE EDISCOVERY AND AUDIT CAPABILITIES IN MICROSOFT PURVIEW * Describe the eDiscovery solutions in Microsoft Purview * Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered OnlineTwo days, Jul 15th, 08:30 + 4 more
£595

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - EXPLORE AZURE APP SERVICE * Examine Azure App Service * Examine Azure App Service plans * Deploy to App Service * Explore authentication and authorization in App Service * Discover App Service networking features 2 - CONFIGURE WEB APP SETTINGS * Configure application settings * Configure general settings * Configure path mappings * Enable diagnostic logging * Configure security certificates 3 - SCALE APPS IN AZURE APP SERVICE * Examine autoscale factors * Identify autoscale factors * Enable autoscale in App Service * Explore autoscale best practices 4 - EXPLORE AZURE APP SERVICE DEPLOYMENT SLOTS * Explore staging environments * Examine slot swapping * Swap deployment slots * Route traffic in App Service 5 - EXPLORE AZURE FUNCTIONS * Discover Azure Functions * Compare Azure Functions hosting options * Scale Azure Functions 6 - DEVELOP AZURE FUNCTIONS * Explore Azure Functions development * Create triggers and bindings * Connect functions to Azure services 7 - EXPLORE AZURE BLOB STORAGE * Explore Azure Blob storage * Discover Azure Blob storage resource types * Explore Azure Storage security features * Discover static website hosting in Azure Storage 8 - MANAGE THE AZURE BLOB STORAGE LIFECYCLE * Explore the Azure Blob storage lifecycle * Discover Blob storage lifecycle policies * Implement Blob storage lifecycle policies * Rehydrate blob data from the archive tier 9 - WORK WITH AZURE BLOB STORAGE * Explore Azure Blob storage client library * Create a client object * Manage container properties and metadata by using .NET * Set and retrieve properties and metadata for blob resources by using REST 10 - EXPLORE AZURE COSMOS DB * Identify key benefits of Azure Cosmos DB * Explore the resource hierarchy * Explore consistency levels * Choose the right consistency level * Explore supported APIs * Discover request units 11 - WORK WITH AZURE COSMOS DB * Explore Microsoft .NET SDK v3 for Azure Cosmos DB * Create stored procedures * Create triggers and user-defined functions * Explore change feed in Azure Cosmos DB 12 - MANAGE CONTAINER IMAGES IN AZURE CONTAINER REGISTRY * Discover the Azure Container Registry * Explore storage capabilities * Build and manage containers with tasks * Explore elements of a Dockerfile 13 - RUN CONTAINER IMAGES IN AZURE CONTAINER INSTANCES * Explore Azure Container Instances * Run containerized tasks with restart policies * Set environment variables in container instances * Mount an Azure file share in Azure Container Instances 14 - IMPLEMENT AZURE CONTAINER APPS * Explore Azure Container Apps * Explore containers in Azure Container Apps * Implement authentication and authorization in Azure Container Apps * Manage revisions and secrets in Azure Container Apps * Explore Dapr integration with Azure Container Apps 15 - EXPLORE THE MICROSOFT IDENTITY PLATFORM * Explore the Microsoft identity platform * Explore service principals * Discover permissions and consent * Discover conditional access 16 - IMPLEMENT AUTHENTICATION BY USING THE MICROSOFT AUTHENTICATION LIBRARY * Explore the Microsoft Authentication Library * Initialize client applications 17 - IMPLEMENT SHARED ACCESS SIGNATURES * Discover shared access signatures * Choose when to use shared access signatures * Explore stored access policies 18 - EXPLORE MICROSOFT GRAPH * Discover Microsoft Graph * Query Microsoft Graph by using REST * Query Microsoft Graph by using SDKs * Apply best practices to Microsoft Graph 19 - IMPLEMENT AZURE KEY VAULT * Explore Azure Key Vault * Discover Azure Key Vault best practices * Authenticate to Azure Key Vault 20 - IMPLEMENT MANAGED IDENTITIES * Explore managed identities * Discover the managed identities authentication flow * Configure managed identities * Acquire an access token 21 - IMPLEMENT AZURE APP CONFIGURATION * Explore the Azure App Configuration service * Create paired keys and values * Manage application features * Secure app configuration data 22 - EXPLORE API MANAGEMENT * Discover the API Management service * Explore API gateways * Explore API Management policies * Create advanced policies * Secure APIs by using subscriptions * Secure APIs by using certificates 23 - EXPLORE AZURE EVENT GRID * Explore Azure Event Grid * Discover event schemas * Explore event delivery durability * Control access to events * Receive events by using webhooks * Filter events 24 - EXPLORE AZURE EVENT HUBS * Discover Azure Event Hubs * Explore Event Hubs Capture * Scale your processing application * Control access to events * Perform common operations with the Event Hubs client library 25 - DISCOVER AZURE MESSAGE QUEUES * Choose a message queue solution * Explore Azure Service Bus * Discover Service Bus queues, topics, and subscriptions * Explore Service Bus message payloads and serialization * Explore Azure Queue Storage * Create and manage Azure Queue Storage and messages by using .NET 26 - MONITOR APP PERFORMANCE * Explore Application Insights * Discover log-based metrics * Instrument an app for monitoring * Select an availability test * Troubleshoot app performance by using Application Map 27 - DEVELOP FOR AZURE CACHE FOR REDIS * Explore Azure Cache for Redis * Configure Azure Cache for Redis * Interact with Azure Cache for Redis by using .NET 28 - DEVELOP FOR STORAGE ON CDNS * Explore Azure Content Delivery Networks * Control cache behavior on Azure Content Delivery Networks * Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered Online6 days, Jul 15th, 08:30 + 4 more
£2975

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites * Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. * A proficient understanding of DNS and basic functional experience with Microsoft 365 services. * A proficient understanding of general IT practices. * A working knowledge of PowerShell. 1 - CONFIGURE YOUR MICROSOFT 365 EXPERIENCE * Explore your Microsoft 365 cloud environment * Configure your Microsoft 365 organizational profile * Manage your tenant subscriptions in Microsoft 365 * Integrate Microsoft 365 with customer engagement apps * Complete your tenant configuration in Microsoft 365 2 - MANAGE USERS, LICENSES, AND MAIL CONTACTS IN MICROSOFT 365 * Determine the user identity model for your organization * Create user accounts in Microsoft 365 * Manage user account settings in Microsoft 365 * Manage user licenses in Microsoft 365 * Recover deleted user accounts in Microsoft 365 * Perform bulk user maintenance in Microsoft Entra ID * Create and manage guest users * Create and manage mail contacts 3 - MANAGE GROUPS IN MICROSOFT 365 * Examine groups in Microsoft 365 * Create and manage groups in Microsoft 365 * Create dynamic groups using Azure rule builder * Create a Microsoft 365 group naming policy * Create groups in Exchange Online and SharePoint Online 4 - ADD A CUSTOM DOMAIN IN MICROSOFT 365 * Plan a custom domain for your Microsoft 365 deployment * Plan the DNS zones for a custom domain * Plan the DNS record requirements for a custom domain * Create a custom domain in Microsoft 365 5 - CONFIGURE CLIENT CONNECTIVITY TO MICROSOFT 365 * Examine how automatic client configuration works * Explore the DNS records required for client configuration * Configure Outlook clients * Troubleshoot client connectivity 6 - CONFIGURE ADMINISTRATIVE ROLES IN MICROSOFT 365 * Explore the Microsoft 365 permission model * Explore the Microsoft 365 admin roles * Assign admin roles to users in Microsoft 365 * Delegate admin roles to partners * Manage permissions using administrative units in Microsoft Entra ID * Elevate privileges using Microsoft Entra Privileged Identity Management * Examine best practices when configuring administrative roles 7 - MANAGE TENANT HEALTH AND SERVICES IN MICROSOFT 365 * Monitor the health of your Microsoft 365 services * Monitor tenant health using Microsoft 365 Adoption Score * Monitor tenant health using Microsoft 365 usage analytics * Develop an incident response plan * Request assistance from Microsoft 8 - DEPLOY MICROSOFT 365 APPS FOR ENTERPRISE * Explore Microsoft 365 Apps for enterprise functionality * Explore your app compatibility by using the Readiness Toolkit * Complete a self-service installation of Microsoft 365 Apps for enterprise * Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager * Deploy Microsoft 365 Apps for enterprise from the cloud * Deploy Microsoft 365 Apps for enterprise from a local source * Manage updates to Microsoft 365 Apps for enterprise * Explore the update channels for Microsoft 365 Apps for enterprise * Manage your cloud apps using the Microsoft 365 Apps admin center 9 - ANALYZE YOUR MICROSOFT 365 WORKPLACE DATA USING MICROSOFT VIVA INSIGHTS * Examine the analytical features of Microsoft Viva Insights * Explore Personal insights * Explore Team insights * Explore Organization insights * Explore Advanced insights 10 - EXPLORE IDENTITY SYNCHRONIZATION * Examine identity models for Microsoft 365 * Examine authentication options for the hybrid identity model * Explore directory synchronization 11 - PREPARE FOR IDENTITY SYNCHRONIZATION TO MICROSOFT 365 * Plan your Microsoft Entra deployment * Prepare for directory synchronization * Choose your directory synchronization tool * Plan for directory synchronization using Microsoft Entra Connect * Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - IMPLEMENT DIRECTORY SYNCHRONIZATION TOOLS * Configure Microsoft Entra Connect prerequisites * Configure Microsoft Entra Connect * Monitor synchronization services using Microsoft Entra Connect Health * Configure Microsoft Entra Connect cloud sync prerequisites * Configure Microsoft Entra Connect cloud sync 13 - MANAGE SYNCHRONIZED IDENTITIES * Manage users with directory synchronization * Manage groups with directory synchronization * Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization * Configure object filters for directory synchronization * Explore Microsoft Identity Manager * Troubleshoot directory synchronization 14 - MANAGE SECURE USER ACCESS IN MICROSOFT 365 * Manage user passwords * Enable pass-through authentication * Enable multifactor authentication * Enable passwordless sign-in with Microsoft Authenticator * Explore self-service password management * Explore Windows Hello for Business * Implement Microsoft Entra Smart Lockout * Implement conditional access policies * Explore Security Defaults in Microsoft Entra ID * Investigate authentication issues using sign-in logs 15 - EXAMINE THREAT VECTORS AND DATA BREACHES * Explore today's work and threat landscape * Examine how phishing retrieves sensitive information * Examine how spoofing deceives users and compromises data security * Compare spam and malware * Examine account breaches * Examine elevation of privilege attacks * Examine how data exfiltration moves data out of your tenant * Examine how attackers delete data from your tenant * Examine how data spillage exposes data outside your tenant * Examine other types of attacks 16 - EXPLORE THE ZERO TRUST SECURITY MODEL * Examine the principles and components of the Zero Trust model * Plan for a Zero Trust security model in your organization * Examine Microsoft's strategy for Zero Trust networking * Adopt a Zero Trust approach 17 - EXPLORE SECURITY SOLUTIONS IN MICROSOFT 365 DEFENDER * Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 * Protect your organization's identities using Microsoft Defender for Identity * Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint * Protect against cyber attacks using Microsoft 365 Threat Intelligence * Provide insight into suspicious activity using Microsoft Cloud App Security * Review the security reports in Microsoft 365 Defender 18 - EXAMINE MICROSOFT SECURE SCORE * Explore Microsoft Secure Score * Assess your security posture with Microsoft Secure Score * Improve your secure score * Track your Microsoft Secure Score history and meet your goals 19 - EXAMINE PRIVILEGED IDENTITY MANAGEMENT * Explore Privileged Identity Management in Microsoft Entra ID * Configure Privileged Identity Management * Audit Privileged Identity Management * Control privileged admin tasks using Privileged Access Management 20 - EXAMINE AZURE IDENTITY PROTECTION * Explore Azure Identity Protection * Enable the default protection policies in Azure Identity Protection * Explore the vulnerabilities and risk events detected by Azure Identity Protection * Plan your identity investigation 21 - EXAMINE EXCHANGE ONLINE PROTECTION * Examine the anti-malware pipeline * Detect messages with spam or malware using Zero-hour auto purge * Explore anti-spoofing protection provided by Exchange Online Protection * Explore other anti-spoofing protection * Examine outbound spam filtering 22 - EXAMINE MICROSOFT DEFENDER FOR OFFICE 365 * Climb the security ladder from EOP to Microsoft Defender for Office 365 * Expand EOP protections by using Safe Attachments and Safe Links * Manage spoofed intelligence * Configure outbound spam filtering policies * Unblock users from sending email 23 - MANAGE SAFE ATTACHMENTS * Protect users from malicious attachments by using Safe Attachments * Create Safe Attachment policies using Microsoft Defender for Office 365 * Create Safe Attachments policies using PowerShell * Modify an existing Safe Attachments policy * Create a transport rule to bypass a Safe Attachments policy * Examine the end-user experience with Safe Attachments 24 - MANAGE SAFE LINKS * Protect users from malicious URLs by using Safe Links * Create Safe Links policies using Microsoft 365 Defender * Create Safe Links policies using PowerShell * Modify an existing Safe Links policy * Create a transport rule to bypass a Safe Links policy * Examine the end-user experience with Safe Links 25 - EXPLORE THREAT INTELLIGENCE IN MICROSOFT 365 DEFENDER * Explore Microsoft Intelligent Security Graph * Explore alert policies in Microsoft 365 * Run automated investigations and responses * Explore threat hunting with Microsoft Threat Protection * Explore advanced threat hunting in Microsoft 365 Defender * Explore threat analytics in Microsoft 365 * Identify threat issues using Microsoft Defender reports 26 - IMPLEMENT APP PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender Cloud Apps * Deploy Microsoft Defender for Cloud Apps * Configure file policies in Microsoft Defender for Cloud Apps * Manage and respond to alerts in Microsoft Defender for Cloud Apps * Configure Cloud Discovery in Microsoft Defender for Cloud Apps * Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - IMPLEMENT ENDPOINT PROTECTION BY USING MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Configure Microsoft Defender for Endpoint in Microsoft Intune * Onboard devices in Microsoft Defender for Endpoint * Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management * Manage device discovery and vulnerability assessment * Reduce your threat and vulnerability exposure 28 - IMPLEMENT THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR OFFICE 365 * Explore the Microsoft Defender for Office 365 protection stack * Investigate security attacks by using Threat Explorer * Identify cybersecurity issues by using Threat Trackers * Prepare for attacks with Attack simulation training 29 - EXAMINE DATA GOVERNANCE SOLUTIONS IN MICROSOFT PURVIEW * Explore data governance and compliance in Microsoft Purview * Protect sensitive data with Microsoft Purview Information Protection * Govern organizational data using Microsoft Purview Data Lifecycle Management * Minimize internal risks with Microsoft Purview Insider Risk Management * Explore Microsoft Purview eDiscovery solutions 30 - EXPLORE ARCHIVING AND RECORDS MANAGEMENT IN MICROSOFT 365 * Explore archive mailboxes in Microsoft 365 * Enable archive mailboxes in Microsoft 365 * Explore Microsoft Purview Records Management * Implement Microsoft Purview Records Management * Restore deleted data in Exchange Online * Restore deleted data in SharePoint Online 31 - EXPLORE RETENTION IN MICROSOFT 365 * Explore retention by using retention policies and retention labels * Compare capabilities in retention policies and retention labels * Define the scope of a retention policy * Examine the principles of retention * Implement retention using retention policies, retention labels, and eDiscovery holds * Restrict retention changes by using Preservation Lock 32 - EXPLORE MICROSOFT PURVIEW MESSAGE ENCRYPTION * Examine Microsoft Purview Message Encryption * Configure Microsoft Purview Message Encryption * Define mail flow rules to encrypt email messages * Add organizational branding to encrypted email messages * Explore Microsoft Purview Advanced Message Encryption 33 - EXPLORE COMPLIANCE IN MICROSOFT 365 * Plan for security and compliance in Microsoft 365 * Plan your beginning compliance tasks in Microsoft Purview * Manage your compliance requirements with Compliance Manager * Examine the Compliance Manager dashboard * Analyze the Microsoft Compliance score 34 - IMPLEMENT MICROSOFT PURVIEW INSIDER RISK MANAGEMENT * Explore insider risk management * Plan for insider risk management * Explore insider risk management policies * Create insider risk management policies * Investigate insider risk management activities and alerts * Explore insider risk management cases 35 - IMPLEMENT MICROSOFT PURVIEW INFORMATION BARRIERS * Explore Microsoft Purview Information Barriers * Configure information barriers in Microsoft Purview * Examine information barriers in Microsoft Teams * Examine information barriers in OneDrive * Examine information barriers in SharePoint 36 - EXPLORE MICROSOFT PURVIEW DATA LOSS PREVENTION * Examine Data Loss Prevention * Explore Endpoint data loss prevention * Examine DLP policies * View DLP policy results * Explore DLP reports 37 - IMPLEMENT MICROSOFT PURVIEW DATA LOSS PREVENTION * Plan to implement Microsoft Purview Data Loss Protection * Implement Microsoft Purview's default DLP policies * Design a custom DLP policy * Create a custom DLP policy from a template * Configure email notifications for DLP policies * Configure policy tips for DLP policies 38 - IMPLEMENT DATA CLASSIFICATION OF SENSITIVE INFORMATION * Explore data classification * Implement data classification in Microsoft 365 * Explore trainable classifiers * Create and retrain a trainable classifier * View sensitive data using Content explorer and Activity explorer * Detect sensitive information documents using Document Fingerprinting 39 - EXPLORE SENSITIVITY LABELS * Manage data protection using sensitivity labels * Explore what sensitivity labels can do * Determine a sensitivity label's scope * Apply sensitivity labels automatically * Explore sensitivity label policies 40 - IMPLEMENT SENSITIVITY LABELS * Plan your deployment strategy for sensitivity labels * Examine the requirements to create a sensitivity label * Create sensitivity labels * Publish sensitivity labels * Remove and delete sensitivity labels ADDITIONAL COURSE DETAILS: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online6 days, Jul 15th, 13:00 + 6 more
£2975

55343 Networking with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for existing IT professionals who have some networking knowledge and experience and are looking for a single course that provides insight into core and advanced networking technologies in Windows Server. This audience would typically include: Network administrators who are looking to reinforce existing skills and learn about new networking technology changes and functionality in Windows Server. System or Infrastructure Administrators with general networking knowledge who are looking to gain core and advanced networking knowledge and skills on Windows Server. Overview Plan and implement an IPv4 network. Implement Dynamic Host Configuration Protocol (DHCP). Implement IPv6. Implement Domain Name System (DNS). Implement and manage IP address management (IPAM). Plan for remote access. Implement DirectAccess. Implement virtual private networks (VPNs). Implement networking for branch offices. Configure advanced networking features. Implement Software Defined Networking. 55343A is the Community Courseware equivalent of retired Legacy Course 20741BC - Networking with Windows Server 2016. This 5-day classroom-based course provides the fundamental networking skills required to deploy and support Windows Server in most organizations. It covers IP fundamentals, remote access technologies, and more advanced content including Software Defined Networking. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. Prerequisites In addition to professional experience, students who attend this training should already have the following technical knowledge: Experience working with Windows Server Knowledge of the Open Systems Interconnection (OSI) model Understanding of core networking infrastructure components and technologies such as cabling, routers and switches Familiarity with networking topologies and architectures such as local area networks (LANs), wide area networks (WANs) and wireless networking Some basic knowledge of the TCP/IP protocol stack, addressing and name resolution Experience with and knowledge of virtualization Hands-on experience working with the Windows client operating systems such as Windows 10 or Windows 11 1 - PLANNING AND IMPLEMENTING AN IPV4 NETWORK * Planning IPv4 addressing * Configuring an IPv4 host * Managing and troubleshooting IPv4 network connectivity 2 - IMPLEMENTING DHCP * Overview of the DHCP server role * Deploying DHCP * Managing and troubleshooting DHCP 3 - IMPLEMENTING IPV6 * Overview of IPv6 addressing * Configuring an IPv6 host * Implementing IPv6 and IPv4 coexistence * Transitioning from IPv4 to IPv6 4 - IMPLEMENTING DNS * Implementing DNS servers * Configuring zones in DNS * Configuring name resolution between DNS zones * Configuring DNS integration with Active Directory Domain Services (AD DS) * Configuring advanced DNS settings 5 - IMPLEMENTING AND MANAGING IPAM * Overview of IPAM * Deploying IPAM * Managing IP address spaces by using IPAM 6 - REMOTE ACCESS IN WINDOWS SERVER * Overview of remote access * Implementing the Web Application Proxy 7 - IMPLEMENTING DIRECTACCESS * Overview of DirectAccess * Implementing DirectAccess by using the Getting Started Wizard * Implementing and managing an advanced DirectAccess infrastructure 8 - IMPLEMENTING VPNS * Planning VPNs * Implementing VPNs 9 - IMPLEMENTING NETWORKING FOR BRANCH OFFICES * Networking features and considerations for branch offices * Implementing Distributed File System (DFS) for branch offices * Implementing BranchCache for branch offices 10 - CONFIGURING ADVANCED NETWORKING FEATURES * Overview of high performance networking features * Configuring advanced Microsoft Hyper-V networking features 11 - IMPLEMENTING SOFTWARE DEFINED NETWORKING * Overview of SDN. * Implementing network virtualization * Implementing Network Controller

55343 Networking with Windows Server
Delivered Online6 days, Sept 23rd, 13:00 + 1 more
£2975

The Therapeutic Power of Language

By Human Givens College

– a psychotherapy skills masterclass The language we use has a huge impact on others – on this practical, inspiring course you will learn how to combine solution-focused techniques and effective language skills to help relieve distress and improve outcomes, as quickly as possible… -------------------------------------------------------------------------------- * Accredited CPD Certificate : 12 hours * * Length 2 days (9:30am - 4:00pm) -------------------------------------------------------------------------------- > Excellent course! I’ve learnt so much and been inspired so much. Gareth has a > wonderful style of delivery... > > MARY FLYNN This course is suitable for anyone working with adults, teens or children – the knowledge and skills you will gain have a wide range of applications in addition to therapy and counselling, including coaching, healthcare, teaching, motivation, overcoming resistance, emotional turmoil and much more. You will leave with a powerful toolkit of precisely-targeted and creative therapeutic language skills, as well as a range of effective brief therapy strategies. These can be easily tailored to any individual and used to successfully help people resolve a wide range of conditions and problems as quickly as possible. If you want to be more effective in what you do, these are core skills to have…   Denise Winn previously taught this course, it is now delivered by Gareth Hughes WHY TAKE THIS COURSE Language is key to everything we do – being aware of the power of language to help or do harm is essential when we’re trying to help people. Knowing how to use it well can make all the difference to a successful therapeutic outcome. Paying attention to the language we use is central to the human givens approach to therapy and counselling: our choice of words is crucial in building rapport with people, learning more about someone – their unique qualities and abilities – in listening and responding, in providing motivation and in collaborating to agree goals and strategies for the effective resolution of their problems. The careful use of language is essential for other areas of life too: at work, home, with family and friends – and this  2-day course is accessible to all. It can be taken as part of the Human Givens Diploma or as a stand-alone course. You will gain a solid foundation in the most effective brief solution-focused strategies and language skills that are essential if you want to be able to help people as quickly as possible. By distilling the essence of proven brief therapy approaches and working in tune with the givens of human nature, outcomes can be dramatically improved and suffering successfully reduced. You will also learn how any team of professional healthcare workers can safely incorporate brief therapy techniques into their work with patients suffering from depression, anxiety, panic attacks, PTSD, anger, OCD, eating disorders, addiction and relationship/marital/family problems, thereby improving outcomes and reducing suffering on an even wider scale. -------------------------------------------------------------------------------- GOOD TO KNOW This course gives you essential skills that are used in the successful treatment of a wide range of conditions, such as anxiety disorders, depression [https://www.humangivens.com/college/lift-depression/], addictions, self-harm, OCD and the rewind technique [https://www.humangivens.com/college/rewind-technique-training/] for treating trauma and phobias. They are also fundamental skills to have when using guided imagery and visualisation [https://www.humangivens.com/college/guided-imagery-and-visualisation/]. This course is an essential component of Part 1 of the HG Diploma. > I feel very excited and energised. I can't wait to start using these > techniques... > > OCCUPATIONAL THERAPIST WHAT WILL YOU LEARN * The essential skills needed for successful brief therapy * New information about the APET™ model – why it is so important to construct therapy that is in tune with our how brains work (our emotional reactions come first) – this speeds up therapy and explains why purely cognitive and behavioural approaches can take so long * An ability to get to the root of the matter quickly by establishing which innate needs are not being met and why (the essence of effective brief therapy) * Quick rapport building skills * How to use the RIGAAR™ structure to improve therapy outcomes * Reflective listening and reflective reframing * How to use therapeutic language skills directly and indirectly to initiate change * Ways to use solution-focused questioning to create a framework for change * How to identify and use your client’s own life resources * An understanding of why the human givens approach dramatically increases the likelihood of therapy being brief, regardless of the presenting problem * A range of psychological interventions to use with common psychiatric problems: anxiety, panic attacks, depression, intrusive thoughts, relationship difficulties and so on * Promoting cooperation by developing realistic and achievable goals * How to identify exceptions (when the problem doesn’t occur) and get the patient to take credit for them * How to generate motivation for change in your patients * Separating the patient’s core identity from their problem * How to minimise or overcome resistance * How not to be drawn in to a client’s negative self-view * Great use of case histories to illustrate the skills covered * How to use the psychological laws of positive expectancy and concentrated attention * An understanding of why taking this collaborative human givens stance, reduces stress and pressure on you * Plenty of opportunity to consolidate what you are learning by practising the skills yourself -------------------------------------------------------------------------------- HOW IS THE COURSE STRUCTURED? Held over two consecutive days, this skills-based practical workshop combines a blend of talks, demonstrations and exercises.  Each day starts at 9.30pm and finishes at 4.00pm, with 2 breaks for networking and refreshment and 45 minutes for lunch. Course notes, refreshments and lunch are included on both days. -------------------------------------------------------------------------------- WHO IS THIS COURSE SUITABLE FOR? You and your patients will benefit enormously from you attending these two days. If you are a counsellor, psychotherapist, clinical psychologist, mental health nurse, GP, doctor, nurse, OT, physiotherapist, youth worker, social worker, health visitor, support worker or any other caring professional, and wish to be more effective in what you do, this course gives you the perfect opportunity to discover new, subtle but highly effective skills with plenty of time to practise to help you assimilate them into your own work. Many other professions – such as educational and business professionals – also find the skills and information covered highly applicable to and beneficial for their own work. It is also suitable for anyone who is thinking of a career in this field as these are core skills needed for successful brief, solution-focused psychotherapy. -------------------------------------------------------------------------------- This course has been independently accredited by the internationally recognised CPD Standards Office for 12 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

The Therapeutic Power of Language
Delivered In-Person in Leeds + 1 more locations6 hours 30 minutes, Jul 16th, 08:30 + 3 more
£396

Level 4 Diploma in IT - Networking

4.0(2)

By London School Of Business And Research

The rationale for the Level 4 Diploma in IT - Networking qualification (Accredited by Qualifi, UK) is that it provides a career path for learners who wish to develop a broad base of knowledge and skills that will enable them to work in a variety of roles in the information technology (IT) industry, notably in programming, website design or PC maintenance. The technical skills and knowledge delivered through the successful achievement of this Level 4 Diploma in IT - Networking qualification are required and recognised internationally. The diploma is accredited at Level 4 and has a total equivalence of 120 credits. Key Highlights of this Level 4 Diploma in Information Technology - Networking qualification are: * Program Duration: 9 Months (Fast track 6 months duration course also available) * Program Credits: 120 * Designed for working Professionals * Format: Online * No Written Exam. The Assessment is done via Submission of Assignment * Tutor Assist available * Dedicated Student Success Manager * Timely Doubt Resolution * Regular Networking Events with Industry Professionals * Become eligible to gain direct entry into relevant Undergraduate degree programme. * Alumni Status * No Cost EMI Option REQUIREMENTS This Level 4 Diploma in Information Technology - Networking (Accredited by Qualifi, UK) qualifications has been designed to be accessible without artificial barriers that restrict access and progression. Entry to the qualification will be through centre interview and learners will be expected to hold the following: * Qualifications at Level 3 OR * Level 4 qualification in another discipline and want to develop their careers in information technology and networking CAREER PATH Learners after completing this course progress to: * BSc (Hons) in Business Computing and Information Systems degree, * Combined Level 5 + level 6 Diploma in Information Technology , * Combined Level 4 + Level 5 Diploma in Cyber Security, * Level 5 Diploma in Information Technology (Fast Track Mode), * The Second year of Undergraduate study, * Directly into employment in an associated profession. CERTIFICATES CERTIFICATE OF ACHIEVEMENT Hard copy certificate - Included Qualifi courses: Once you complete the course, you would be receiving a Physical hard copy of your Diploma along with its Transcript which we would Courier to your address via DHL or Royal Mail without any additional charge.

Level 4 Diploma in IT - Networking
Delivered Online On Demand
£1499

Computer Networking Course Online

By Hi-Tech Training

COMPUTER NETWORKING COURSE AIM Computer Networking Online Virtual Classroom course is designed to enable participants to install, configure and test a fundamental computer network. The opportunities for employment within the area of network support are enormous as businesses continue to grow and utilise the new technology available to them. This is a vital role to ensure the smooth running of businesses reliant on their network and IT systems. This course provides learners with both the practical and theoretical knowledge of networks. During the course, participants will learn about the different components used to create a network including hardware, software and topologies. DURATION AND SCHEDULE The course runs over 5 days next course commencing on Saturday 16th November at 10.00 am. A payment of £65 secures your place on your chosen course. The balance of the course fees of £600 can be paid shortly before course commencement. ONLINE VIRTUAL CLASSROOM – HOW IT WORKS? The course will be delivered through blended training consisting of 5 virtual classroom 6-hour sessions with assessments and examinations taking place on the 5th  day. During the Online Virtual Classroom sessions, trainees will have a live video feed with their instructor talking to them, doing practical live demonstrations and involving trainees actively in the learning. In preparation for this, we plan to have a quick informal online meeting a few days before course commencement for about an hour just to make sure that people get connected properly, let you know what the online virtual classroom will be like and go through any questions you may have. To join the virtual sessions, you will need a PC/Laptop or Tablet with an internet connection. Joining instructions (login IDs, etc) will be sent before the Informal Induction session. LEARNING OBJECTIVES Computer Networking Course equips participants with practical “Hands-on” skills relevant to the workplace and the theory required for certification. Participants on successful completion of the course will have the skills and knowledge to: – * Identify network concepts and terminology * Identify components that make up a network * Install, configure and test a network * Use and control a local area network COURSE CONTENT * The network features hardware and software components. * Network topologies, technologies and communication protocols. * Peer-to-peer and server-based networks including – servers, clients, peers, shared resources, operating systems, administration, security, central support systems. * OSI layers (Open Systems Interconnection), MAC address, sub-netting. * Internet access technologies: – DSL, Broadband (ADSL), PSTN (dial-up), Satellite, Wireless. * Select cable or wireless systems for connection. * Hardware components for a peer-to-peer network including: – interface cards, hubs/switches, cables, connectors, tools and anti-static equipment. * Connecting network printers. * Virus protection, firewalls and passwords, security measures, file management and access rights. * Testing networks, resolving routine problems associated with installation CERTIFICATION * City & Guilds of London Institute “Install, Configure and Test ICT Networks” (Examination No. 7266/7267-408). This examination consists of 2 practical assignments. The qualification can be used as part of the requirement for City & Guilds Diploma in IT Systems Support (7267-24). [http://hitechtraining.ie/city-guilds-certification/] * On completion of the Course, having been successful in an examination, the participant will receive a Hi-Tech Training Certificate.

Computer Networking Course Online
Delivered Online
Dates arranged on request
£85 to £685

Level 4 Diploma in IT - Networking (Fast Track)

4.0(2)

By London School Of Business And Research

The rationale for the fast track Level 4 Diploma in IT - Networking qualification (Accredited by Qualifi, UK) is that it provides a career path for learners who wish to develop a broad base of knowledge and skills that will enable them to work in a variety of roles in the information technology (IT) industry, notably in programming, website design or PC maintenance. The technical skills and knowledge delivered through the successful achievement of this fast track Level 4 Diploma in IT - Networking qualification are required and recognised internationally. The diploma is accredited at Level 4 and has a total equivalence of 120 credits. Key Highlights of this Fast Track Level 4 Diploma in IT - Networking qualification are: * Program Duration: Fast Track 6 Months (Regular 9 months duration course also available) * Program Credits: 120 * Designed for working Professionals * Format: Online * No Written Exam. The Assessment is done via Submission of Assignment * Tutor Assist available * Dedicated Student Success Manager * Timely Doubt Resolution * Regular Networking Events with Industry Professionals * Become eligible to gain direct entry into relevant Undergraduate degree programme. * Alumni Status * No Cost EMI Option REQUIREMENTS This Level 4 Diploma in IT - Networking (Fast Track) (Accredited by Qualifi, UK) qualifications has been designed to be accessible without artificial barriers that restrict access and progression. Entry to the qualification will be through centre interview and learners will be expected to hold the following: * Qualifications at Level 3 OR * Level 4 qualification in another discipline and want to develop their careers in information technology or networking. CAREER PATH Learners after completing this course progress to: * BSc (Hons) in Business Computing and Information Systems degree, * Combined Level 5 + level 6 Diploma in Information Technology , * Combined Level 4 + Level 5 Diploma in Cyber Security, * Level 5 Diploma in Information Technology (Fast Track Mode), * The Second year of Undergraduate study, * Directly into employment in an associated profession. CERTIFICATES CERTIFICATE OF ACHIEVEMENT Hard copy certificate - Included Qualifi courses: Once you complete the course, you would be receiving a Physical hard copy of your Diploma along with its Transcript which we would Courier to your address via DHL or Royal Mail without any additional charge

Level 4 Diploma in IT - Networking (Fast Track)
Delivered Online On Demand
£1599

Workplace Team Networking Diploma

4.3(43)

By John Academy

> Do you work in an institution that consists of teams and departments of teams? > If networking is part of your daily life then this course will help you > improve your networking skills. DESCRIPTION: In every aspect of our lives, networking is significant. You will need it for your professional career, personal development and in every step of the way. Taking this course will equip you with the necessary skills to become good at work place networking. You will know what networking means and learn about its principles. Know the tools to avoid common mistakes in networking. Learn the in depth knowledge, skills and information about work place networking. You will also know how to build relationships and manage time successfully. You will be learning all of these things about networking through this course. Good luck.  WHO IS THE COURSE FOR? * Professionals who want to upgrade their team networking skills. * Team members who want to learn about professional networking. ENTRY REQUIREMENT: * This course is available to all learners, of all academic backgrounds. * Learners should be aged 16 or over to undertake the qualification. * Good understanding of English language, numeracy and ICT are required to attend this course. ASSESSMENT:   * At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. * PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. WHY CHOOSE US? * Affordable, engaging & high-quality e-learning study materials; * Tutorial videos/materials from the industry leading experts; * Study in a user-friendly, advanced online learning platform; * Efficient exam systems for the assessment and instant result; * The UK & internationally recognised accredited qualification; * Access to course content on mobile, tablet or desktop from anywhere anytime; * The benefit of career advancement opportunities; * 24/7 student support via email. CAREER PATH: The Workplace Team Networking Diploma Course is a useful qualification to possess and would be beneficial for the following careers: * Department Chief or Head * Manager * Network Adviser * Supervisor * Team Leader. Module One - Getting Started 01:00:00 Module Two - The Benefits of Networking at Work 00:15:00 Module Three - Networking Obstacles 00:30:00 Module Four - Networking Principles 01:00:00 Module Five - How to Build Networks 00:30:00 Module Six - Recognize Networking Opportunities 00:30:00 Module Seven - Common Networking Mistakes 01:00:00 Module Eight - Develop Interpersonal Relationships 01:00:00 Module Nine - Online Networking Tools 01:00:00 Module Ten - Time Management 00:30:00 Module Eleven - Maintaining Relationships Over Time 00:30:00 Module Twelve - Wrapping Up 01:00:00 Activities Workplace Team Networking Diploma- Activities 00:00:00 Mock Exam Mock Exam- Workplace Team Networking Diploma 00:20:00 Final Exam Final Exam- Workplace Team Networking Diploma 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Workplace Team Networking Diploma
Delivered Online On Demand
£25