• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

60228 Courses

Epoxy resin river coffee table workshop

By The River Shop

Learn how to design and create your own river table.

Epoxy resin river coffee table workshop
Delivered In-Person in London3 hours, Jul 14th, 07:00 + 1 more
£575

2year Masters program with Experience certificate and Chartered Engineering status

By JP Jacobs International University

Mep Design Engineering

2year Masters program with Experience certificate and Chartered Engineering status
Delivered Online1 hour, Jul 15th, 03:30 + 1 more
£3000

Wine, Cheese and Archery

By Kids Archery Durham

It's Kids' Archery - for the grown-ups! Put the kids to bed and come and have a night out with a difference. Hone your soft archery skills and enjoy some (non-alcoholic)* wine and cheese. Bring a friend or just bring yourself. Try your hand at 4 different targets/games with a prize for the winner. ​*If you'd care for something stronger then feel free to byob.

Wine, Cheese and Archery
Delivered In-Person in Durham2 hours, Jul 12th, 19:00
£15

Certified Cloud Security Professional (CCSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - ARCHITECTURAL CONCEPTS AND DESIGN REQUIREMENTS * Cloud Computing Concepts * Cloud Reference Architecture * Cloud Computing Security Concepts * Design Principles of Secure Cloud Computing * Trusted Cloud Services 2 - CLOUD DATA SECURITY * CSA (Cloud Security Alliance) Cloud Data Lifecycle * Cloud Data Storage Architectures * Data Security Strategies * Data Discovery and Classification Technologies * Protecting Privacy and PII (Personally Identifiable Information) * Data Rights Management * Data Retention, Deletion, and Archiving Policies * Auditability, Traceability, and Accountability of Data Events 3 - CLOUD PLATFORM AND INFRASTRUCTURE SECURITY * Cloud Infrastructure Components * Cloud Infrastructure Risks * Designing and Planning Security Controls * Disaster Recovery and Business Continuity Management 4 - CLOUD APPLICATION SECURITY * The Need for Security Awareness and Training in application Security * Cloud Software Assurance and Validation * Verified Secure Software * SDLC (Software Development Life Cycle) Process * Secure SDLC * Specifics of Cloud Application Architecture * Secure IAM (Identity and Access Management) Solutions 5 - OPERATIONS * Planning Process for the Data Center Design * Installation and Configuration of Physical Infrastructure for Cloud Environment * Running Physical Infrastructure for Cloud Environment * Managing Physical Infrastructure for Cloud Environment * Installation and Configuration of Logical Infrastructure for Cloud Environment * Running Logical Infrastructure for Cloud Environment * Managing Logical Infrastructure for Cloud Environment * Compliance with Regulations and Controls * Risk Assessment for Logical and Physical Infrastructure * Collection, Acquisition, and Preservation of Digital Evidence * Managing Communication with Stakeholders 6 - LEGAL AND COMPLIANCE * Legal Requirements and Unique Risks within the Cloud Environment * Relevant Privacy and PII Laws and Regulations * Audit Process, Methodologies, and Required Adaptions for a Cloud Environment * Implications of Cloud to Enterprise Risk Management * Outsourcing and Cloud Contract Design * Vendor Management

Certified Cloud Security Professional (CCSP)
Delivered Online6 days, Jul 15th, 13:00 + 1 more
£4549

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - EXPLORE AZURE APP SERVICE * Examine Azure App Service * Examine Azure App Service plans * Deploy to App Service * Explore authentication and authorization in App Service * Discover App Service networking features 2 - CONFIGURE WEB APP SETTINGS * Configure application settings * Configure general settings * Configure path mappings * Enable diagnostic logging * Configure security certificates 3 - SCALE APPS IN AZURE APP SERVICE * Examine autoscale factors * Identify autoscale factors * Enable autoscale in App Service * Explore autoscale best practices 4 - EXPLORE AZURE APP SERVICE DEPLOYMENT SLOTS * Explore staging environments * Examine slot swapping * Swap deployment slots * Route traffic in App Service 5 - EXPLORE AZURE FUNCTIONS * Discover Azure Functions * Compare Azure Functions hosting options * Scale Azure Functions 6 - DEVELOP AZURE FUNCTIONS * Explore Azure Functions development * Create triggers and bindings * Connect functions to Azure services 7 - EXPLORE AZURE BLOB STORAGE * Explore Azure Blob storage * Discover Azure Blob storage resource types * Explore Azure Storage security features * Discover static website hosting in Azure Storage 8 - MANAGE THE AZURE BLOB STORAGE LIFECYCLE * Explore the Azure Blob storage lifecycle * Discover Blob storage lifecycle policies * Implement Blob storage lifecycle policies * Rehydrate blob data from the archive tier 9 - WORK WITH AZURE BLOB STORAGE * Explore Azure Blob storage client library * Create a client object * Manage container properties and metadata by using .NET * Set and retrieve properties and metadata for blob resources by using REST 10 - EXPLORE AZURE COSMOS DB * Identify key benefits of Azure Cosmos DB * Explore the resource hierarchy * Explore consistency levels * Choose the right consistency level * Explore supported APIs * Discover request units 11 - WORK WITH AZURE COSMOS DB * Explore Microsoft .NET SDK v3 for Azure Cosmos DB * Create stored procedures * Create triggers and user-defined functions * Explore change feed in Azure Cosmos DB 12 - MANAGE CONTAINER IMAGES IN AZURE CONTAINER REGISTRY * Discover the Azure Container Registry * Explore storage capabilities * Build and manage containers with tasks * Explore elements of a Dockerfile 13 - RUN CONTAINER IMAGES IN AZURE CONTAINER INSTANCES * Explore Azure Container Instances * Run containerized tasks with restart policies * Set environment variables in container instances * Mount an Azure file share in Azure Container Instances 14 - IMPLEMENT AZURE CONTAINER APPS * Explore Azure Container Apps * Explore containers in Azure Container Apps * Implement authentication and authorization in Azure Container Apps * Manage revisions and secrets in Azure Container Apps * Explore Dapr integration with Azure Container Apps 15 - EXPLORE THE MICROSOFT IDENTITY PLATFORM * Explore the Microsoft identity platform * Explore service principals * Discover permissions and consent * Discover conditional access 16 - IMPLEMENT AUTHENTICATION BY USING THE MICROSOFT AUTHENTICATION LIBRARY * Explore the Microsoft Authentication Library * Initialize client applications 17 - IMPLEMENT SHARED ACCESS SIGNATURES * Discover shared access signatures * Choose when to use shared access signatures * Explore stored access policies 18 - EXPLORE MICROSOFT GRAPH * Discover Microsoft Graph * Query Microsoft Graph by using REST * Query Microsoft Graph by using SDKs * Apply best practices to Microsoft Graph 19 - IMPLEMENT AZURE KEY VAULT * Explore Azure Key Vault * Discover Azure Key Vault best practices * Authenticate to Azure Key Vault 20 - IMPLEMENT MANAGED IDENTITIES * Explore managed identities * Discover the managed identities authentication flow * Configure managed identities * Acquire an access token 21 - IMPLEMENT AZURE APP CONFIGURATION * Explore the Azure App Configuration service * Create paired keys and values * Manage application features * Secure app configuration data 22 - EXPLORE API MANAGEMENT * Discover the API Management service * Explore API gateways * Explore API Management policies * Create advanced policies * Secure APIs by using subscriptions * Secure APIs by using certificates 23 - EXPLORE AZURE EVENT GRID * Explore Azure Event Grid * Discover event schemas * Explore event delivery durability * Control access to events * Receive events by using webhooks * Filter events 24 - EXPLORE AZURE EVENT HUBS * Discover Azure Event Hubs * Explore Event Hubs Capture * Scale your processing application * Control access to events * Perform common operations with the Event Hubs client library 25 - DISCOVER AZURE MESSAGE QUEUES * Choose a message queue solution * Explore Azure Service Bus * Discover Service Bus queues, topics, and subscriptions * Explore Service Bus message payloads and serialization * Explore Azure Queue Storage * Create and manage Azure Queue Storage and messages by using .NET 26 - MONITOR APP PERFORMANCE * Explore Application Insights * Discover log-based metrics * Instrument an app for monitoring * Select an availability test * Troubleshoot app performance by using Application Map 27 - DEVELOP FOR AZURE CACHE FOR REDIS * Explore Azure Cache for Redis * Configure Azure Cache for Redis * Interact with Azure Cache for Redis by using .NET 28 - DEVELOP FOR STORAGE ON CDNS * Explore Azure Content Delivery Networks * Control cache behavior on Azure Content Delivery Networks * Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered Online6 days, Jul 15th, 08:30 + 4 more
£2975

Saturday Sings - Emily Roblyn & Rosie Sleightholme

5.0(1)

By Rosie Sleightholme

Saturday Sings - Sat 13th July 2024 Emily Roblyn & Rosie Sleightholme

Saturday Sings - Emily Roblyn & Rosie Sleightholme
Delivered In-Person in Bristol6 hours, Jul 13th, 09:30
£40 to £50

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, Jul 15th, 13:00 + 7 more
£3395

CompTIA PenTest+ (PenTest)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-002, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management. Overview After completing this course, you will be able to plan, conduct, analyze, and report on penetration tests, including the ability to: Plan and scope penetration tests. Conduct passive reconnaissance. Perform non-technical tests to gather information. Conductive active reconnaissance. Analyze vulnerabilities. Penetrate networks. Exploit host-based vulnerabilities. Test applications. Complete post-exploit tasks. Analyze and report pen test results. Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. 1 - OUTLINE * Lesson 1: Scoping Organization/Customer Requirements * Lesson 2: Defining the Rules of Engagement * Lesson 3: Footprinting and Gathering Intelligence * Lesson 4: Evaluating Human and Physical Vulnerabilities * Lesson 5: Preparing the Vulnerability Scan * Lesson 6: Scanning Logical Vulnerabilities * Lesson 7: Analyzing Scanning Results * Lesson 8: Avoiding Detection and Covering Tracks * Lesson 9: Exploiting the LAN and Cloud * Lesson 10: Testing Wireless Networks * Lesson 11: Targeting Mobile Devices * Lesson 12: Attacking Specialized Systems * Lesson 13: Web Application-Based Attacks * Lesson 14: Performing System Hacking * Lesson 15: Scripting and Software Development * Lesson 16: Leveraging the Attack: Pivot and Penetrate * Lesson 17: Communicating During the PenTesting Process * Lesson 18: Summarizing Report Components * Lesson 19: Recommending Remediation * Lesson 20: Performing Post-Report Delivery Activities ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA PenTest+ (PenTest)
Delivered Online6 days, Jul 15th, 13:00 + 2 more
£3295

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites * Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. * A proficient understanding of DNS and basic functional experience with Microsoft 365 services. * A proficient understanding of general IT practices. * A working knowledge of PowerShell. 1 - CONFIGURE YOUR MICROSOFT 365 EXPERIENCE * Explore your Microsoft 365 cloud environment * Configure your Microsoft 365 organizational profile * Manage your tenant subscriptions in Microsoft 365 * Integrate Microsoft 365 with customer engagement apps * Complete your tenant configuration in Microsoft 365 2 - MANAGE USERS, LICENSES, AND MAIL CONTACTS IN MICROSOFT 365 * Determine the user identity model for your organization * Create user accounts in Microsoft 365 * Manage user account settings in Microsoft 365 * Manage user licenses in Microsoft 365 * Recover deleted user accounts in Microsoft 365 * Perform bulk user maintenance in Microsoft Entra ID * Create and manage guest users * Create and manage mail contacts 3 - MANAGE GROUPS IN MICROSOFT 365 * Examine groups in Microsoft 365 * Create and manage groups in Microsoft 365 * Create dynamic groups using Azure rule builder * Create a Microsoft 365 group naming policy * Create groups in Exchange Online and SharePoint Online 4 - ADD A CUSTOM DOMAIN IN MICROSOFT 365 * Plan a custom domain for your Microsoft 365 deployment * Plan the DNS zones for a custom domain * Plan the DNS record requirements for a custom domain * Create a custom domain in Microsoft 365 5 - CONFIGURE CLIENT CONNECTIVITY TO MICROSOFT 365 * Examine how automatic client configuration works * Explore the DNS records required for client configuration * Configure Outlook clients * Troubleshoot client connectivity 6 - CONFIGURE ADMINISTRATIVE ROLES IN MICROSOFT 365 * Explore the Microsoft 365 permission model * Explore the Microsoft 365 admin roles * Assign admin roles to users in Microsoft 365 * Delegate admin roles to partners * Manage permissions using administrative units in Microsoft Entra ID * Elevate privileges using Microsoft Entra Privileged Identity Management * Examine best practices when configuring administrative roles 7 - MANAGE TENANT HEALTH AND SERVICES IN MICROSOFT 365 * Monitor the health of your Microsoft 365 services * Monitor tenant health using Microsoft 365 Adoption Score * Monitor tenant health using Microsoft 365 usage analytics * Develop an incident response plan * Request assistance from Microsoft 8 - DEPLOY MICROSOFT 365 APPS FOR ENTERPRISE * Explore Microsoft 365 Apps for enterprise functionality * Explore your app compatibility by using the Readiness Toolkit * Complete a self-service installation of Microsoft 365 Apps for enterprise * Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager * Deploy Microsoft 365 Apps for enterprise from the cloud * Deploy Microsoft 365 Apps for enterprise from a local source * Manage updates to Microsoft 365 Apps for enterprise * Explore the update channels for Microsoft 365 Apps for enterprise * Manage your cloud apps using the Microsoft 365 Apps admin center 9 - ANALYZE YOUR MICROSOFT 365 WORKPLACE DATA USING MICROSOFT VIVA INSIGHTS * Examine the analytical features of Microsoft Viva Insights * Explore Personal insights * Explore Team insights * Explore Organization insights * Explore Advanced insights 10 - EXPLORE IDENTITY SYNCHRONIZATION * Examine identity models for Microsoft 365 * Examine authentication options for the hybrid identity model * Explore directory synchronization 11 - PREPARE FOR IDENTITY SYNCHRONIZATION TO MICROSOFT 365 * Plan your Microsoft Entra deployment * Prepare for directory synchronization * Choose your directory synchronization tool * Plan for directory synchronization using Microsoft Entra Connect * Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - IMPLEMENT DIRECTORY SYNCHRONIZATION TOOLS * Configure Microsoft Entra Connect prerequisites * Configure Microsoft Entra Connect * Monitor synchronization services using Microsoft Entra Connect Health * Configure Microsoft Entra Connect cloud sync prerequisites * Configure Microsoft Entra Connect cloud sync 13 - MANAGE SYNCHRONIZED IDENTITIES * Manage users with directory synchronization * Manage groups with directory synchronization * Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization * Configure object filters for directory synchronization * Explore Microsoft Identity Manager * Troubleshoot directory synchronization 14 - MANAGE SECURE USER ACCESS IN MICROSOFT 365 * Manage user passwords * Enable pass-through authentication * Enable multifactor authentication * Enable passwordless sign-in with Microsoft Authenticator * Explore self-service password management * Explore Windows Hello for Business * Implement Microsoft Entra Smart Lockout * Implement conditional access policies * Explore Security Defaults in Microsoft Entra ID * Investigate authentication issues using sign-in logs 15 - EXAMINE THREAT VECTORS AND DATA BREACHES * Explore today's work and threat landscape * Examine how phishing retrieves sensitive information * Examine how spoofing deceives users and compromises data security * Compare spam and malware * Examine account breaches * Examine elevation of privilege attacks * Examine how data exfiltration moves data out of your tenant * Examine how attackers delete data from your tenant * Examine how data spillage exposes data outside your tenant * Examine other types of attacks 16 - EXPLORE THE ZERO TRUST SECURITY MODEL * Examine the principles and components of the Zero Trust model * Plan for a Zero Trust security model in your organization * Examine Microsoft's strategy for Zero Trust networking * Adopt a Zero Trust approach 17 - EXPLORE SECURITY SOLUTIONS IN MICROSOFT 365 DEFENDER * Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 * Protect your organization's identities using Microsoft Defender for Identity * Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint * Protect against cyber attacks using Microsoft 365 Threat Intelligence * Provide insight into suspicious activity using Microsoft Cloud App Security * Review the security reports in Microsoft 365 Defender 18 - EXAMINE MICROSOFT SECURE SCORE * Explore Microsoft Secure Score * Assess your security posture with Microsoft Secure Score * Improve your secure score * Track your Microsoft Secure Score history and meet your goals 19 - EXAMINE PRIVILEGED IDENTITY MANAGEMENT * Explore Privileged Identity Management in Microsoft Entra ID * Configure Privileged Identity Management * Audit Privileged Identity Management * Control privileged admin tasks using Privileged Access Management 20 - EXAMINE AZURE IDENTITY PROTECTION * Explore Azure Identity Protection * Enable the default protection policies in Azure Identity Protection * Explore the vulnerabilities and risk events detected by Azure Identity Protection * Plan your identity investigation 21 - EXAMINE EXCHANGE ONLINE PROTECTION * Examine the anti-malware pipeline * Detect messages with spam or malware using Zero-hour auto purge * Explore anti-spoofing protection provided by Exchange Online Protection * Explore other anti-spoofing protection * Examine outbound spam filtering 22 - EXAMINE MICROSOFT DEFENDER FOR OFFICE 365 * Climb the security ladder from EOP to Microsoft Defender for Office 365 * Expand EOP protections by using Safe Attachments and Safe Links * Manage spoofed intelligence * Configure outbound spam filtering policies * Unblock users from sending email 23 - MANAGE SAFE ATTACHMENTS * Protect users from malicious attachments by using Safe Attachments * Create Safe Attachment policies using Microsoft Defender for Office 365 * Create Safe Attachments policies using PowerShell * Modify an existing Safe Attachments policy * Create a transport rule to bypass a Safe Attachments policy * Examine the end-user experience with Safe Attachments 24 - MANAGE SAFE LINKS * Protect users from malicious URLs by using Safe Links * Create Safe Links policies using Microsoft 365 Defender * Create Safe Links policies using PowerShell * Modify an existing Safe Links policy * Create a transport rule to bypass a Safe Links policy * Examine the end-user experience with Safe Links 25 - EXPLORE THREAT INTELLIGENCE IN MICROSOFT 365 DEFENDER * Explore Microsoft Intelligent Security Graph * Explore alert policies in Microsoft 365 * Run automated investigations and responses * Explore threat hunting with Microsoft Threat Protection * Explore advanced threat hunting in Microsoft 365 Defender * Explore threat analytics in Microsoft 365 * Identify threat issues using Microsoft Defender reports 26 - IMPLEMENT APP PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender Cloud Apps * Deploy Microsoft Defender for Cloud Apps * Configure file policies in Microsoft Defender for Cloud Apps * Manage and respond to alerts in Microsoft Defender for Cloud Apps * Configure Cloud Discovery in Microsoft Defender for Cloud Apps * Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - IMPLEMENT ENDPOINT PROTECTION BY USING MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Configure Microsoft Defender for Endpoint in Microsoft Intune * Onboard devices in Microsoft Defender for Endpoint * Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management * Manage device discovery and vulnerability assessment * Reduce your threat and vulnerability exposure 28 - IMPLEMENT THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR OFFICE 365 * Explore the Microsoft Defender for Office 365 protection stack * Investigate security attacks by using Threat Explorer * Identify cybersecurity issues by using Threat Trackers * Prepare for attacks with Attack simulation training 29 - EXAMINE DATA GOVERNANCE SOLUTIONS IN MICROSOFT PURVIEW * Explore data governance and compliance in Microsoft Purview * Protect sensitive data with Microsoft Purview Information Protection * Govern organizational data using Microsoft Purview Data Lifecycle Management * Minimize internal risks with Microsoft Purview Insider Risk Management * Explore Microsoft Purview eDiscovery solutions 30 - EXPLORE ARCHIVING AND RECORDS MANAGEMENT IN MICROSOFT 365 * Explore archive mailboxes in Microsoft 365 * Enable archive mailboxes in Microsoft 365 * Explore Microsoft Purview Records Management * Implement Microsoft Purview Records Management * Restore deleted data in Exchange Online * Restore deleted data in SharePoint Online 31 - EXPLORE RETENTION IN MICROSOFT 365 * Explore retention by using retention policies and retention labels * Compare capabilities in retention policies and retention labels * Define the scope of a retention policy * Examine the principles of retention * Implement retention using retention policies, retention labels, and eDiscovery holds * Restrict retention changes by using Preservation Lock 32 - EXPLORE MICROSOFT PURVIEW MESSAGE ENCRYPTION * Examine Microsoft Purview Message Encryption * Configure Microsoft Purview Message Encryption * Define mail flow rules to encrypt email messages * Add organizational branding to encrypted email messages * Explore Microsoft Purview Advanced Message Encryption 33 - EXPLORE COMPLIANCE IN MICROSOFT 365 * Plan for security and compliance in Microsoft 365 * Plan your beginning compliance tasks in Microsoft Purview * Manage your compliance requirements with Compliance Manager * Examine the Compliance Manager dashboard * Analyze the Microsoft Compliance score 34 - IMPLEMENT MICROSOFT PURVIEW INSIDER RISK MANAGEMENT * Explore insider risk management * Plan for insider risk management * Explore insider risk management policies * Create insider risk management policies * Investigate insider risk management activities and alerts * Explore insider risk management cases 35 - IMPLEMENT MICROSOFT PURVIEW INFORMATION BARRIERS * Explore Microsoft Purview Information Barriers * Configure information barriers in Microsoft Purview * Examine information barriers in Microsoft Teams * Examine information barriers in OneDrive * Examine information barriers in SharePoint 36 - EXPLORE MICROSOFT PURVIEW DATA LOSS PREVENTION * Examine Data Loss Prevention * Explore Endpoint data loss prevention * Examine DLP policies * View DLP policy results * Explore DLP reports 37 - IMPLEMENT MICROSOFT PURVIEW DATA LOSS PREVENTION * Plan to implement Microsoft Purview Data Loss Protection * Implement Microsoft Purview's default DLP policies * Design a custom DLP policy * Create a custom DLP policy from a template * Configure email notifications for DLP policies * Configure policy tips for DLP policies 38 - IMPLEMENT DATA CLASSIFICATION OF SENSITIVE INFORMATION * Explore data classification * Implement data classification in Microsoft 365 * Explore trainable classifiers * Create and retrain a trainable classifier * View sensitive data using Content explorer and Activity explorer * Detect sensitive information documents using Document Fingerprinting 39 - EXPLORE SENSITIVITY LABELS * Manage data protection using sensitivity labels * Explore what sensitivity labels can do * Determine a sensitivity label's scope * Apply sensitivity labels automatically * Explore sensitivity label policies 40 - IMPLEMENT SENSITIVITY LABELS * Plan your deployment strategy for sensitivity labels * Examine the requirements to create a sensitivity label * Create sensitivity labels * Publish sensitivity labels * Remove and delete sensitivity labels ADDITIONAL COURSE DETAILS: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online6 days, Jul 15th, 13:00 + 6 more
£2975

MB-500T00 Dynamics 365 - Finance and Operations Apps Developer

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Microsoft Dynamics 365 Finance and Operations Apps Developers Overview By the end of this course, you will learn to develop fully realized solutions by using standardized application coding patterns. In this course, you will learn the tasks needed to fulfill the role of developer in Dynamics 365 Finance and Operations Apps. The Dynamics 365 for Finance and Operations (FO) developer is a key technical resource that implements and extends the application to meet the requirements of the business. MODULE 1: OVERVIEW & ARCHITECTUREN * Explore the ecosystem and main components * Explore the technical architecture * Explore design and deployment considerations MODULE 2: DEVELOPER TOOLS * Manage implementations by using Lifecycle Services * Manage source code by using version control * Customize by using Visual Studio MODULE 3: SOLUTION DESIGN * Implement application lifecycle management MODULE 4: AOT ELEMENTS * Build extended data types and enumerations * Build tables * Build forms and optimize form performance * Create classes * Create other user interface elements MODULE 5: CODE DEVELOPMENT & TESTING * Explore the test framework and use tools * Get started with development using X++ * Develop object-oriented code * Use RSAT tool MODULE 6: DATA MIGRATION * Prepare data for migration MODULE 7: FRAMEWORKS * Introduction * Explore extensions and the extension framework * Extend elements * SysOperationSandbox framework * Summary MODULE 8: INTEGRATION * Identify data integration patterns and scenarios * Implement data integration concepts and solutions * Implement the data management package API * Data integrations * Integrate with Microsoft Azure * Connecting to Power Platform services * Consume business events * Integrate Finance and Operations apps with Microsoft Dataverse MODULE 9: REPORTING * Explore the reporting tools * Build reports * Build workspaces * Manage data sources with external data stores MODULE 10: SECURITY & PERFORMANCE * Work with performance and monitoring tools * Implement role-based security * Apply basic performance optimization techniques ADDITIONAL COURSE DETAILS: Nexus Humans MB-500T00 Dynamics 365 - Finance and Operations Apps Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-500T00 Dynamics 365 - Finance and Operations Apps Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-500T00 Dynamics 365 - Finance and Operations Apps Developer
Delivered Online6 days, Jul 15th, 13:00
£2975