• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4 Android courses in Manchester

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

CompTIA A+ bootcamp essentials and electives

5.0(3)

By Systems & Network Training

COMPTIA A+ BOOTCAMP TRAINING COURSE DESCRIPTION This course includes A+ Certification: Systems Hardware and Networking Support Skills and A+ Certification: Operating Systems and Security Support Skills. The course will provide IT "super users" or new support professionals with the fastest route to A+ Certification. Full practical sessions will prepare students for the two A+ Certification exams. Note: Some self-study each evening will be required. WHAT WILL YOU LEARN * Install, configure, and troubleshoot peripheral devices, system components, print devices, wired and wireless LAN links and internet access devices. * Install, configure, and troubleshoot the Microsoft Windows, Linux, and Mac OS PC operating systems plus iOS, Android, and Windows mobile devices. * Perform basic PC maintenance. * Configure access control measures. * Perform basic PC maintenance. COMPTIA A+ BOOTCAMP TRAINING COURSE DETAILS * Who will benefit: Students wishing to take both CompTIA A+ exams. * Prerequisites: PC fundamentals * Duration 5 days NETWORKING MICROSOFT SYSTEMS COURSE CONTENTS * Peripherals and Adapters Motherboard Components, Connection Interfaces, Display Devices, Audio and Multimedia Devices, Removable Storage Devices. * System Components Mass Storage Devices, System Memory, Processors, BIOS and UEFI, Power Supplies. * Troubleshooting and Mobile Devices Troubleshooting System Components, Laptops, Mobile Devices, Troubleshooting Mobile Devices. * Printer and Network Hardware Printers, Configuring Printers, Troubleshooting Printers, Network Architectures, Ethernet Networks. * Networks Wireless Networks, Internet Connections, Internet Protocol, Routers and Firewalls, Troubleshooting Networks. * Supporting Windows (1) Windows Operating System, Administration Tools, Managing Storage, Managing Files, Managing Applications. * Supporting Windows (2) Managing Devices, Managing Performance, Troubleshooting Windows, Installing Windows. * Supporting Windows Troubleshooting Boot Problems, Maintenance and Backup, Threats and Vulnerabilities, Viruses and Malware, Securing Workstations, Securing Data. * Supporting Windows Networks Configuring Network Connections, Securing Network Connections, Configuring Shared Resources, Virtualization and Services. * Linux, OS X, and Mobile OS Linux Operating System, OS X, Mobile Operating Systems, Mobile OS Security and Troubleshooting, Safety and Environmental Procedures, Professionalism and Communication.

CompTIA A+ bootcamp essentials and electives
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Introduction to Unschooling - Weekend Workshop

By LivePlayLearn

Get together with friends and discover unschooling with Heidi Steel

Introduction to Unschooling - Weekend Workshop
Delivered in-person, on-requestDelivered In-Person in London
£150

Telephone Training - iPECS Cloud and UCP

By Telephone Trainers Ltd

* All i-series handsets & 90 series handsets and Voicemail * UCE/UCS Softphone * UCE/UCS Mobile Apps iOS & Android * iPECS ONE Softphone & Mobile Apps iOS & Android * Phonelink  * User Web Portals (Cloud and UCP) * Cloud Manager Web Portal/UCP Admin tool * Cloud and UCP Attendant Consoles * iCalls (Tollring) Call Centre product

Telephone Training - iPECS Cloud and UCP
Delivered in-person, on-request, onlineDelivered Online & In-Person in Milton Keynes & 1 more
Price on Enquiry

Telephone Training - New! - 3CX

By Telephone Trainers Ltd

* Handset Training on Yealink & Fanvil handsets * 3CX Web Client User Training * 3CX Phone App * iOS & Android Mobile Apps * Voicemail User  * Receptionist/Switchboard * Supervisor/Agent * 3CX Web Client Admin Training (FREE/SMB/STARTUP) * 3CX Management Console Admin Training (PRO/ENT) * 3CX CFD (Call Flow Designer) **Coming soon! * XIMA CCAAS on 3CX Agent, Realtime, Recording and Reporting

Telephone Training - New! - 3CX
Delivered in-person, on-request, onlineDelivered Online & In-Person in Milton Keynes & 1 more
Price on Enquiry

Online Options

Show all 350

55348 Administering Microsoft Endpoint Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site 2 - ANALYZING DATA USING QUERIES, REPORTS, AND CMPIVOT * Introduction to queries * Configuring SQL Server Reporting Services * Analyzing the real-time state of a device by using CMPivot 3 - PREPARING THE CONFIGURATION MANAGER MANAGEMENT INFRASTRUCTURE * Configuring site boundaries and boundary groups * Configuring resource discovery * Organizing resources using device and user collections 4 - DEPLOYING AND MANAGING THE CONFIGURATION MANAGER CLIENT * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings and performing management operations 5 - MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence 6 - DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points 7 - DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying and managing Windows apps 8 - MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Enabling third-party updates 9 - IMPLEMENTING DEFENDER PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Configuring and deploying advanced threat policies 10 - MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance settings * Viewing compliance results * Managing resource and data access 11 - MANAGING OPERATING SYSTEM DEPLOYMENT * An overview of operating system deployment * Preparing a site for operating system deployment * Deploying an operating system * Managing Windows as a service 12 - MANAGING AND MAINTAINING A CONFIGURATION MANAGER SITE * Configuring role-based administration * Configuring Remote Tools * Overview of Configuration Manager site maintenance and Management Insights * Backing up and recovering a Configuration Manager site * Updating the Configuration Manager infrastructure 13 - WHAT?S NEW IN MICROSOFT ENDPOINT CONFIGURATION MANAGER * Whats new in Microsoft Endpoint Manager covering each semi annual release ADDITIONAL COURSE DETAILS: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55348 Administering Microsoft Endpoint Configuration Manager
Delivered Online6 days, Jun 3rd, 13:00 + 5 more
£2975

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. COMPUTER FORENSICS IN TODAY?S WORLD * 1.1. Understand the Fundamentals of Computer Forensics * 1.2. Understand Cybercrimes and their Investigation Procedures * 1.3. Understand Digital Evidence * 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security * Operations Center) in Computer Forensics * 1.5. Identify the Roles and Responsibilities of a Forensic Investigator * 1.6. Understand the Challenges Faced in Investigating Cybercrimes * 1.7. Understand Legal Compliance in Computer Forensics * COMPUTER FORENSICS INVESTIGATION PROCESS * 2.1. Understand the Forensic Investigation Process and its Importance * 2.2. Understand the Pre-investigation Phase * 2.3. Understand First Response * 2.4. Understand the Investigation Phase * 2.5. Understand the Post-investigation Phase * UNDERSTANDING HARD DISKS AND FILE SYSTEMS * 3.1. Describe Different Types of Disk Drives and their Characteristics * 3.2. Explain the Logical Structure of a Disk * 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems * 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems * 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools * 3.6 Understand Storage Systems * 3.7. Understand Encoding Standards and Hex Editors * 3.8. Analyze Popular File Formats Using Hex Editor * DATA ACQUISITION AND DUPLICATION * 4.1. Understand Data Acquisition Fundamentals * 4.2. Understand Data Acquisition Methodology * 4.3. Prepare an Image File for Examination * DEFEATING ANTI-FORENSICS TECHNIQUES * 5.1. Understand Anti-forensics Techniques * 5.2. Discuss Data Deletion and Recycle Bin Forensics * 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions * 5.4. Explore Password Cracking/Bypassing Techniques * 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch * 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption * 5.7. Detect Program Packers and Footprint Minimizing Techniques * 5.8. Understand Anti-forensics Countermeasures * WINDOWS FORENSICS * 6.1. Collect Volatile and Non-volatile Information * 6.2. Perform Windows Memory and Registry Analysis * 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers * 6.4. Examine Windows Files and Metadata * 6.5. Understand ShellBags, LNK Files, and Jump Lists * 6.6. Understand Text-based Logs and Windows Event Logs * LINUX AND MAC FORENSICS * 7.1. Understand Volatile and Non-volatile Data in Linux * 7.2. Analyze Filesystem Images Using The Sleuth Kit * 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec * 7.4. Understand Mac Forensics * * NETWORK FORENSICS * 8.1. Understand Network Forensics * 8.2. Explain Logging Fundamentals and Network Forensic Readiness * 8.3. Summarize Event Correlation Concepts * 8.4. Identify Indicators of Compromise (IoCs) from Network Logs * 8.5. Investigate Network Traffic * 8.6. Perform Incident Detection and Examination with SIEM Tools * 8.7. Monitor and Detect Wireless Network Attacks * INVESTIGATING WEB ATTACKS * 9.1. Understand Web Application Forensics * 9.2. Understand Internet Information Services (IIS) Logs * 9.3. Understand Apache Web Server Logs * 9.4. Understand the Functionality of Intrusion Detection System (IDS) * 9.5. Understand the Functionality of Web Application Firewall (WAF) * 9.6. Investigate Web Attacks on Windows-based Servers * 9.7. Detect and Investigate Various Attacks on Web Applications * DARK WEB FORENSICS * 10.1. Understand the Dark Web * 10.2. Determine How to Identify the Traces of Tor Browser during Investigation * 10.3. Perform Tor Browser Forensics * DATABASE FORENSICS * 11.1. Understand Database Forensics and its Importance * 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server * 11.3. Collect Evidence Files on MSSQL Server * 11.4. Perform MSSQL Forensics * 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory * 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis * 11.7. Perform MySQL Forensics on WordPress Web Application Database * CLOUD FORENSICS * 12.1. Understand the Basic Cloud Computing Concepts * 12.2. Understand Cloud Forensics * 12.3. Understand the Fundamentals of Amazon Web Services (AWS) * 12.4. Determine How to Investigate Security Incidents in AWS * 12.5. Understand the Fundamentals of Microsoft Azure * 12.6. Determine How to Investigate Security Incidents in Azure * 12.7. Understand Forensic Methodologies for Containers and Microservices * INVESTIGATING EMAIL CRIMES * 13.1. Understand Email Basics * 13.2. Understand Email Crime Investigation and its Steps * 13.3. U.S. Laws Against Email Crime * MALWARE FORENSICS * 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware * 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis * 14.3. Understand and Perform Static Analysis of Malware * 14.4. Analyze Suspicious Word and PDF Documents * 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches * 14.6. Analyze Malware Behavior on System Properties in Real-time * 14.7. Analyze Malware Behavior on Network in Real-time * 14.8. Describe Fileless Malware Attacks and How they Happen * 14.9. Perform Fileless Malware Analysis - Emotet * MOBILE FORENSICS * 15.1. Understand the Importance of Mobile Device Forensics * 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices * 15.3. Explain the Steps Involved in Mobile Forensics Process * 15.4. Investigate Cellular Network Data * 15.5. Understand SIM File System and its Data Acquisition Method * 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices * 15.7. Perform Logical Acquisition on Android and iOS Devices * 15.8. Perform Physical Acquisition on Android and iOS Devices * 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report * IOT FORENSICS * 16.1. Understand IoT and IoT Security Problems * 16.2. Recognize Different Types of IoT Threats * 16.3. Understand IoT Forensics * 16.4. Perform Forensics on IoT Devices *

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online6 days, Jun 10th, 13:00 + 2 more
£3495

The Comprehensive Android Developer Bootcamp

By Packt

Learn new Android APIs such as RoomDatabase, ML Kit for face recognition, Cloud Firestore, Firebase, Maps, and the Android Studio IDE (integrated development environment)

The Comprehensive Android Developer Bootcamp
Delivered Online On Demand
£93.99

The Complete Intermediate Android Masterclass

By Packt

Build a strong foundation in intermediate Android development to leverage what you already know about Android. If you are looking for a course that takes your pre-existing Android knowledge to the next level, then this is definitely the course for you. We'll take you through all you need to know in order to become an intermediate to advanced Android developer.

The Complete Intermediate Android Masterclass
Delivered Online On Demand
£33.99

Android Jetpack Compose - Build Android Native UIs Fast

By Packt

You will be learning from the basics of a Composable function to how to handle state in Compose and how to build full-fledged Android apps that leverage the full power of Jetpack Compose and Kotlin. This course is tailored for beginners and advanced developers.

Android Jetpack Compose - Build Android Native UIs Fast
Delivered Online On Demand
£41.99

The Art of Doing: Dive Into Android Development with Kotlin

By Packt

This course will help you to gain a mastery level understanding of the fundamentals of Android Studio, Android app development, and the Kotlin programming language by building six full-fledged applications as well as many more 'learning' applications throughout the course.

The Art of Doing: Dive Into Android Development with Kotlin
Delivered Online On Demand
£101.99

MS-721T00 Collaboration Communications Systems Engineer

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Collaboration Communications Systems Engineers are responsible for planning, deploying, configuring, maintaining, and troubleshooting Microsoft Teams Phone, meetings, and personal and shared space devices, including Microsoft Teams Rooms and Surface Hub. Collaboration Communications Systems Engineers have a fundamental understanding ofÿnetworking, telecommunications, audio/visual and meeting room technologies, identity and access management. They are proficient in managing and monitoring Teams Phone, meetings, and certified devices using the Microsoft Teams admin center, PowerShell, the Microsoft Teams Rooms Pro Portal, and the Call Quality Dashboard. They deploy and configure Microsoft Teams Phone with PSTN connectivity through Microsoft Calling Plans, Operator Connect, Teams Phone Mobile, and Direct Routing. Collaboration Communications Systems Engineers work with Teams Administrators, Microsoft Identity and Access Administrators, and Microsoft 365ÿAdministrators. In addition, they may work with owners of other workloads, including facilitiesÿmanagers, network engineers, security engineers, device manufacturers, telephony providers, and Microsoft Certified solutions providers. This training course is designed to give participants the knowledge and skills to become a Collaboration Communications Systems Engineer. Participants should understand the fundamentals of networking, telecommunications, audio/visual and meeting room technologies, identity and access management, and Microsoft Teams. They will gain hands-on experience configuring and deploying Microsoft Teams Phone, meetings and certified devices including Microsoft Teams Rooms and Surface Hub. The course will also cover how to manage and monitor Teams Phone, meetings, and certified devices using the Microsoft Teams admin center, PowerShell, the Microsoft Teams Rooms Pro Portal, and the Call Quality Dashboard. In addition, the course will cover configuring and deploying Microsoft Teams Phone with PSTN connectivity through Microsoft Calling Plans, Operator Connect, Teams Phone Mobile, and Direct Routing. Prerequisites * Microsoft 365 and Microsoft Teams * Networking, telecommunications, and audio/visual basics * Identity and access management basics 1 - INTRODUCTION TO TEAMS MEETINGS AND CALLING * Overview of Teams meetings and events * Overview of Teams Phone * Overview of auto attendants and call queues * Overview of Teams devices 2 - PLAN FOR TEAMS PHONE * Plan to deploy Teams Phone * Plan for Teams Phone PSTN connectivity * Determine license requirements * Plan for Teams Phone devices * Plan and design Teams Phone features * Plan for voicemail 3 - PLAN FOR MICROSOFT TEAMS ROOMS AND SURFACE HUB * Determine license requirements for Microsoft Teams Rooms and shared devices * Understand differences between Microsoft Teams Rooms on Android and Windows * Understand Microsoft Teams Rooms on Surface Hub 2S * Understand and plan Teams Room accessories, components, and peripherals * Understand Teams Rooms management options 4 - PLAN AND OPTIMIZE NETWORK PERFORMANCE FOR TEAMS MEDIA * Understand Teams network requirements * Design network for media optimization * Design and implement QoS 5 - CONFIGURE AND DEPLOY TEAMS PHONE * Configure emergency calling for Teams Calling Plans * Manage and configure Microsoft PSTN numbers * Configure Operator Connect and Teams Phone Mobile * Configure Teams Phone policies * Create and manage Teams policies * Configure Audio Conferencing 6 - CONFIGURE AND DEPLOY TEAMS PHONE WITH DIRECT ROUTING * Design Direct Routing call flows * Implement SIP trunking with Direct Routing * Configure Emergency Calling for Direct Routing * Extend Teams Direct Routing infrastructure * Deploy and maintain a survivable branch appliance 7 - EXTEND TEAMS PHONE WITH ADDITIONAL SERVICES * Understand how Teams interacts with additional services * Configure compliance recording in Teams * Configure and integrate a certified contact center in Teams * Design and deploy voice bots in Teams 8 - MANAGE MEETINGS AND EVENTS EXPERIENCES * Explore meetings and events in Microsoft Teams * Configure meeting settings * Create and manage meeting policies * Configure audio conferencing * Create and manage meeting templates and template policies * Create and manage meetings customization policies * Configure live events settings * Create and manage live events policies * Examine live events across Microsoft 365 9 - GUIDED PROJECT - CREATE AND ASSIGN TEAMS POLICIES TO MEET BUSINESS REQUIREMENTS IN MICROSOFT TEAMS * Prepare 10 - CONFIGURE AND MANAGE VOICE USERS * Enable users for Teams Phone * Enable users for Direct Routing with Teams Phone * Enable additional calling features for Teams Phone * Enable users for Teams Phone Mobile 11 - CONFIGURE AUTO ATTENDANTS AND CALL QUEUES * Design call flows for auto attendants and call queues * Configure auto attendants and call queues * Deploy a channel-based call queue * Configure resource accounts * Configure Microsoft 365 groups for voicemail * Interpret call queue conference modes * Interpret call queue routing methods * Configure holidays for auto attendants and call queues * Configure custom music on hold 12 - CONFIGURE, DEPLOY, AND MANAGE TEAMS DEVICES * Manage Microsoft Teams Phones * Manage Microsoft Teams Room Systems * Microsoft Teams Rooms management options * Manage Surface Hub 2S devices * Configure Microsoft Teams SIP gateway * Manage Microsoft Teams displays * Remote provisioning and sign in for Teams Phones * Update Microsoft Teams devices remotely * Manage Microsoft Teams device tags 13 - GUIDED PROJECT - PREPARE MEETING ROOM EXPERIENCES * Prepare 14 - MONITOR AND TROUBLESHOOT TEAMS COLLABORATION COMMUNICATIONS SYSTEMS * Diagnose and troubleshoot phone number assignment * Diagnose and troubleshoot Teams client issues * Diagnose and troubleshoot call failure and call quality issues * Report on and troubleshoot Teams calls with Call Quality Dashboard * Diagnose and troubleshoot Direct Routing issues * Troubleshoot and monitor Teams devices * Troubleshoot Teams meetings and calling * Troubleshoot Teams Rooms devices

MS-721T00 Collaboration Communications Systems Engineer
Delivered Online5 days, Jun 10th, 13:00 + 1 more
£2380

Create an Android File Manager and Explorer App in Android Studio Today!

By Course Cloud

COURSE OVERVIEW The Create an Android File Manager and Explorer App in Android Studio Today! course will take you through the steps to create an up-to-date and high-quality file manager and explorer app for Android, with no previous experience required!  Through this course, you will gain the in-demand industry skills needed to become a top app developer, learning best practices from an experienced instructor. It will guide you through how to access the Android file system and existing files, make general big fixes and improvements, add features to navigate through folders, rename files, and much more.  This training program is an industry-recognised qualification, ideal for beginners and Java students who are looking to learn from the experts. There are no particular entry requirements for this course, which can be studied on a part-time or full-time basis. This best selling Create an Android File Manager and Explorer App in Android Studio Today! has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Create an Android File Manager and Explorer App in Android Studio Today! is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Create an Android File Manager and Explorer App in Android Studio Today! is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Create an Android File Manager and Explorer App in Android Studio Today! is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Create an Android File Manager and Explorer App in Android Studio Today!, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Create an Android File Manager and Explorer App in Android Studio Today! will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Create an Android File Manager and Explorer App in Android Studio Today! to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Create an Android File Manager and Explorer App in Android Studio Today!
Delivered Online On Demand
£319

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - EXPLORE THE ENTERPRISE DESKTOP * Examine benefits of modern management * Examine the enterprise desktop life-cycle model * Examine planning and purchasing * Examine desktop deployment * Plan an application deployment * Plan for upgrades and retirement 2 - EXPLORE WINDOWS EDITIONS * Examine Windows client editions and capabilities * Select client edition * Examine hardware requirements 3 - UNDERSTAND MICROSOFT ENTRA ID * Examine Microsoft Entra ID * Compare Microsoft Entra ID and Active Directory Domain Services * Examine Microsoft Entra ID as a directory service for cloud apps * Compare Microsoft Entra ID P1 and P2 plans * Examine Microsoft Entra Domain Services 4 - MANAGE MICROSOFT ENTRA IDENTITIES * Examine RBAC and user roles in Microsoft Entra ID * Create and manage users in Microsoft Entra ID * Create and manage groups in Microsoft Entra ID * Manage Microsoft Entra objects with PowerShell * Synchronize objects from AD DS to Microsoft Entra ID 5 - MANAGE DEVICE AUTHENTICATION * Describe Microsoft Entra join * Examine Microsoft Entra join prerequisites limitations and benefits * Join devices to Microsoft Entra ID * Manage devices joined to Microsoft Entra ID 6 - ENROLL DEVICES USING MICROSOFT CONFIGURATION MANAGER * Deploy the Microsoft Configuration Manager client * Monitor the Microsoft Configuration Manager client * Manage the Microsoft Configuration Manager client 7 - ENROLL DEVICES USING MICROSOFT INTUNE * Manage mobile devices with Intune * Enable mobile device management * Explain considerations for device enrollment * Manage corporate enrollment policy * Enroll Windows devices in Intune * Enroll Android devices in Intune * Enroll iOS devices in Intune * Explore device enrollment manager * Monitor device enrollment * Manage devices remotely 8 - EXECUTE DEVICE PROFILES * Explore Intune device profiles * Create device profiles * Create a custom device profile 9 - OVERSEE DEVICE PROFILES * Monitor device profiles in Intune * Manage device sync in Intune * Manage devices in Intune using scripts 10 - MAINTAIN USER PROFILES * Examine user profile * Explore user profile types * Examine options for minimizing user profile size * Deploy and configure folder redirection * Sync user state with Enterprise State Roaming * Configure Enterprise State Roaming in Azure 11 - EXECUTE MOBILE APPLICATION MANAGEMENT * Examine mobile application management * Examine considerations for mobile application management * Prepare line-of-business apps for app protection policies * Implement mobile application management policies in Intune * Manage mobile application management policies in Intune 12 - DEPLOY AND UPDATE APPLICATIONS * Deploy applications with Intune * Add apps to Intune * Manage Win32 apps with Intune * Deploy applications with Configuration Manager * Deploying applications with Group Policy * Assign and publish software * Explore Microsoft Store for Business * Implement Microsoft Store Apps * Update Microsoft Store Apps with Intune * Assign apps to company employees 13 - ADMINISTER ENDPOINT APPLICATIONS * Manage apps with Intune * Manage Apps on non-enrolled devices * Deploy Microsoft 365 Apps with Intune * Additional Microsoft 365 Apps Deployment Tools * Configure Microsoft Edge Internet Explorer mode * App Inventory Review 14 - PROTECT IDENTITIES IN MICROSOFT ENTRA ID * Explore Windows Hello for Business * Deploy Windows Hello * Manage Windows Hello for Business * Explore Microsoft Entra ID Protection * Manage self-service password reset in Microsoft Entra ID * Implement multi-factor authentication 15 - ENABLE ORGANIZATIONAL ACCESS * Enable access to organization resources * Explore VPN types and configuration * Explore Always On VPN * Deploy Always On VPN 16 - IMPLEMENT DEVICE COMPLIANCE * Protect access to resources using Intune * Explore device compliance policy * Deploy a device compliance policy * Explore conditional access * Create conditional access policies 17 - GENERATE INVENTORY AND COMPLIANCE REPORTS * Report enrolled devices inventory in Intune * Monitor and report device compliance * Build custom Intune inventory reports * Access Intune using Microsoft Graph API 18 - DEPLOY DEVICE DATA PROTECTION * Explore Windows Information Protection * Plan Windows Information Protection * Implement and use Windows Information Protection * Explore Encrypting File System in Windows client * Explore BitLocker 19 - MANAGE MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Examine key capabilities of Microsoft Defender for Endpoint * Explore Windows Defender Application Control and Device Guard * Explore Microsoft Defender Application Guard * Examine Windows Defender Exploit Guard * Explore Windows Defender System Guard 20 - MANAGE MICROSOFT DEFENDER IN WINDOWS CLIENT * Explore Windows Security Center * Explore Windows Defender Credential Guard * Manage Microsoft Defender Antivirus * Manage Windows Defender Firewall * Explore Windows Defender Firewall with Advanced Security 21 - MANAGE MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender for Cloud Apps * Planning Microsoft Defender for Cloud Apps * Implement Microsoft Defender for Cloud Apps 22 - ASSESS DEPLOYMENT READINESS * Examine deployment guidelines * Explore readiness tools * Assess application compatibility * Explore tools for application compatibility mitigation * Prepare network and directory for deployment * Plan a pilot 23 - DEPLOY USING THE MICROSOFT DEPLOYMENT TOOLKIT * Evaluate traditional deployment methods * Set up the Microsoft Deployment Toolkit for client deployment * Manage and deploy images using the Microsoft Deployment Toolkit 24 - DEPLOY USING MICROSOFT CONFIGURATION MANAGER * Explore client deployment using Configuration Manager * Examine deployment components of Configuration Manager * Manage client deployment using Configuration Manager * Plan in-place upgrades using Configuration Manager 25 - DEPLOY DEVICES USING WINDOWS AUTOPILOT * Use Autopilot for modern deployment * Examine requirements for Windows Autopilot * Prepare device IDs for Autopilot * Implement device registration and out-of-the-box customization * Examine Autopilot scenarios * Troubleshoot Windows Autopilot 26 - IMPLEMENT DYNAMIC DEPLOYMENT METHODS * Examine subscription activation * Deploy using provisioning packages * Use Windows Configuration Designer * Use Microsoft Entra join with automatic MDM enrollment 27 - PLAN A TRANSITION TO MODERN ENDPOINT MANAGEMENT * Explore using co-management to transition to modern endpoint management * Examine prerequisites for co-management * Evaluate modern management considerations * Evaluate upgrades and migrations in modern transitioning * Migrate data when modern transitioning * Migrate workloads when modern transitioning 28 - MANAGE WINDOWS 365 * Explore Windows 365 * Configure Windows 365 * Administer Windows 365 29 - MANAGE AZURE VIRTUAL DESKTOP * Examine Azure Virtual Desktop * Explore Azure Virtual Desktop * Configure Azure Virtual Desktop * Administer Azure Virtual Desktop ADDITIONAL COURSE DETAILS: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online6 days, Jun 10th, 13:00 + 15 more
£2975

Learn How To Create Android Studio Gallery App

By Course Cloud

COURSE OVERVIEW Android Studio is the leading Android app development tool for building apps on any Android device. In the Learn How To Create Android Studio Gallery App course, you will learn the A-Z of Android Studio to create a simple gallery app from scratch. This practical training course will walk you through the entire app development process in detail. It will show you how to display images in your app, adjust image resolution, rotate images, and work with essential app development tools. You will also learn step-by-step how to adapt your app for different purposes, and fix any bugs and technical issues. This course is the perfect foundation training for aspiring app developers. There are no specific entry requirements for this course, which is open to both part-time and full-time students. This best selling Learn How To Create Android Studio Gallery App has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Learn How To Create Android Studio Gallery App is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Learn How To Create Android Studio Gallery App is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Learn How To Create Android Studio Gallery App is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Learn How To Create Android Studio Gallery App, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Learn How To Create Android Studio Gallery App will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Learn How To Create Android Studio Gallery App to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Learn How To Create Android Studio Gallery App
Delivered Online On Demand
£319

Educators matching "Android"

Show all 1