• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1573 Computing & IT courses in Liverpool delivered Live Online

Security Engineering on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: * Working knowledge of IT security practices and infrastructure concepts * Familiarity with cloud computing concepts * Completed AWS Security Essentials and Architecting on AWS courses 1 - SECURITY ON AWS * Security in the AWS cloud * AWS Shared Responsibility Model * Incident response overview * DevOps with Security Engineering 2 - IDENTIFYING ENTRY POINTS ON AWS * Identify the different ways to access the AWS platform * Understanding IAM policies * IAM Permissions Boundary * IAM Access Analyzer * Multi-factor authentication * AWS CloudTrail 3 - SECURITY CONSIDERATIONS: WEB APPLICATION ENVIRONMENTS * Threats in a three-tier architecture * Common threats: user access * Common threats: data access * AWS Trusted Advisor 4 - APPLICATION SECURITY * Amazon Machine Images * Amazon Inspector * AWS Systems Manager 5 - DATA SECURITY * Data protection strategies * Encryption on AWS * Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB * Protecting archived data with Amazon S3 Glacier * Amazon S3 Access Analyzer * Amazon S3 Access Points 6 - SECURING NETWORK COMMUNICATIONS * Amazon VPC security considerations * Amazon VPC Traffic Mirroring * Responding to compromised instances * Elastic Load Balancing * AWS Certificate Manager 7 - MONITORING AND COLLECTING LOGS ON AWS * Amazon CloudWatch and CloudWatch Logs * AWS Config * Amazon Macie * Amazon VPC Flow Logs * Amazon S3 Server Access Logs * ELB Access Logs 8 - PROCESSING LOGS ON AWS * Amazon Kinesis * Amazon Athena 9 - SECURITY CONSIDERATIONS: HYBRID ENVIRONMENTS * AWS Site-to-Site and Client VPN connections * AWS Direct Connect * AWS Transit Gateway 10 - OUT-OF-REGION PROTECTION * Amazon Route 53 * AWS WAF * Amazon CloudFront * AWS Shield * AWS Firewall Manager * DDoS mitigation on AWS 11 - SECURITY CONSIDERATIONS: SERVERLESS ENVIRONMENTS * Amazon Cognito * Amazon API Gateway * AWS Lambda 12 - THREAT DETECTION AND INVESTIGATION * Amazon GuardDuty * AWS Security Hub * Amazon Detective 13 - SECRETS MANAGEMENT ON AWS * AWS KMS * AWS CloudHSM * AWS Secrets Manager 14 - AUTOMATION AND SECURITY BY DESIGN * AWS CloudFormation * AWS Service Catalog 15 - ACCOUNT MANAGEMENT AND PROVISIONING ON AWS * AWS Organizations * AWS Control Tower * AWS SSO * AWS Directory Service

Security Engineering on AWS
Delivered Online4 days, Jun 12th, 13:00 + 2 more
£2025

DevOps Leader (DOL)©

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Leader course are professionals including: Anyone starting or leading a DevOps cultural transformation program, Anyone interested in modern IT leadership and organizational change approaches, Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Consultants, DevOps Engineers, IT Directors, IT Managers, IT Team, Leaders, Lean Coaches, Practitioners, Product Owners, Scrum Masters, System Integrators, Tool Providers Overview The learning objectives for DOL include a practical understanding of: - DevOps and time to market - The business and IT perspectives - Key differences between DevOps IT and traditional IT - Planning and organizing - Understanding performance and culture - Measurement differences - Designing a DevOps organization - Focusing on what matters - Ideas for organizing workflows - Sharing information - Defining meaningful metrics - Value stream mapping - The Spotify Squad model - Managing culture change - Popular tools and key practices - Putting it all together The DevOps Leader course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organization by implementing DevOps. Leading people through a cultural transformation requires new skills, innovative thinking, and transformational leadership. Leaders up, down and across the IT organization must align and collaborate to break down silos and evolve the organization. The course highlights the human dynamics of cultural change and equips participants with practices, methods, and tools to engage people across the DevOps spectrum through the use of real-life scenarios and case studies. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding Value Stream Mapping. Prerequisites * DevOps Foundation 1 - DEVOPS AND TIME * What Is DevOps? * Why Do DevOps * Companies Doing DevOps * The Magic Equation 2 - KEY DIFFERENCES BETWEEN DEVOPS IT AND TRADITIONAL IT * What Sets DevOps IT apart from Traditional IT * How DevOps IT is Organized Differently * How to Perform to a Different Standard * How to Use Different Measurements 3 - BECOMING A DEVOPS ORGANIZATION * Transformational Leadership * Redesigning An Organization for DevOps * Design Principles * Focus * Work * Information * Metrics 4 - VALUE STREAM MAPPING * What is Value Stream Mapping? * Why Do We Need to Use this Framework? * Types of Maps * How to Create a Value Stream Map? * Types of Data to Collect * How to Handle Exceptions 5 - VALUE STREAM MAPPING EXERCISE 6 - SQUAD ORGANIZATIONAL MODEL * Conway's Law * The Problem with Silos * Spotify?s Squad Organization Model (Structure, Roles) * Squads * Tribes * Chapters * Guilds * How to Reorganize in Order to Move to this Model 7 - MANAGING CULTURE CHANGE * What is Culture and How Does it Impact Performance? * Types of IT Culture * Cultural Traits of a DevOps Organization * How to Manage Change 8 - CULTURE AND ITS IMPACT ON PERFORMANCE * Types of IT Culture * What is a DevOps Culture * How To Manage Change * The Three Phases Of Change * Types of Changes That Need to be Implemented 9 - POPULAR DEVOPS TOOLS AND PRACTICES * DevOps Tools Periodic Table * Top DevOps Tool Categories * Common and Popular Practices 10 - BUILDING A BUSINESS CASE 11 - BRINGING IT ALL TOGETHER 12 - ADDITIONAL SOURCES OF INFORMATION 13 - EXAM PREPARATIONS * Exam Requirements, Question Weighting, and Terminology List * Sample Exam Review ADDITIONAL COURSE DETAILS: Nexus Humans DevOps Leader (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Leader (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevOps Leader (DOL)©
Delivered Online3 days, Jun 12th, 13:00 + 1 more
£1495

Bitesize Masterclass on AI with Fiona Young

5.0(1)

By Own Your Success

Bitesize Masterclass on AI - facilitated by Fiona Young, Leading Expert and Trainer.    Are you a total beginner to AI? Or maybe you've dabbled but found it all overwhelming...or underwhelming?  Then this bitesize masterclass on AI is for you!    We'll be covering AI fundamentals, what AI means for exec support roles, and practically how to use AI chatbots (like ChatGPT and Copilot) to shortcut admin drudgery.    You’ll come away from this session with the confidence and skills to start using AI in your workflow right away, making you more efficient and giving you time back to do more of the human work you love.    Note that this is NOT a passive webinar — we'll have demos, discussions and breakouts. You'll get a chance to practice using AI chatbots in the room for real world projects with other forward-thinking assistants like you.  Here's a detailed breakdown of session content: AI fundamentals  •    Defining AI, gen AI and other need to know terms  •    Key AI risks to be aware of  •    Exciting tools for assistants right now How AI will change the assistant role  •    Explore our feelings about AI right now  •    Some predictions on what AI means for the future of exec support  •    What you can do to win in the age of AI A practical guide to using ChatGPT and LLMs at work  •    How to use AI chatbots in your workflow  •    How to craft great prompts to optimise outputs  •    A chance to practice & workshop prompting in the room   Fiona Young is founder of Carve, a series of live digital courses for executive assistants to learn AI, create capacity and develop into a strategic assistant — carving out their career growth in the process. Before launching Carve, Fiona spent five years leading learning programs at Hive Learning, the b2b peer learning app. She previously ran Learning & Development for Blenheim Chalcot, one of the world’s most successful venture builders, overseeing group learning strategy and programs for 3,000 people across 25 ventures.  Fiona started her career as an executive assistant in entrepreneurial businesses. 

Bitesize Masterclass on AI with Fiona Young
Delivered Online1 hour 30 minutes, Jun 12th, 16:00
£100

tpgf

By g-mcl

tpgf
Delivered Online1 hour, Jun 13th, 08:00
FREE

55265 Microsoft© PowerApps

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class has something for everything, from beginners who wish to customise their data entry forms in SharePoint right up to advanced users who need to use advanced formulas to deliver more bespoke actions to their apps. Overview After taking this course, students will be able to: - Understand when to use PowerApp. - Describe the components of PowerApps and their correct use. - Create PowerApps from existing data sources. - Brand PowerApps. - Customize PowerApps beyond just using the automated wizards. - Connect to a range of data sources from Excel to Azure SQL. - Understand the difference between canvas apps and model-driven apps. - Integrate PowerApps with other Office 365 systems ? including Teams and SharePoint Online. - Administer and Maintain PowerApps Students will be taught how to design, test and publish new apps that work with a variety of data sources. We will take users through a selection of well-crafted lessons to help them build new applications for their business. 1 - AN INTRODUCTION TO POWERAPPS * What is PowerApps? * The benefits of apps * How to get PowerApps * Canvas Apps and Model-Driven Apps * License Options and Costs * Discover PowerApps with Templates * Lab 1: Introduction to PowerApps 2 - GETTING STARTED WITH POWERAPPS * Building a new app from a data source * Add, edit and remove controls * Intro to Formulas * Testing an app * App Settings * Publish and Share Apps * Version History and Restore * PowerApps Mobile App * Lab 1: Getting Started 3 - BRANDING AND MEDIA * Less is more * Duplicate Screens * Fonts * Screen Colours and Matching Colours * Screen Backgrounds * Buttons and Icons * Hide on Timer * Size and Alignment by reference * Show and Hide on Timer * Lab 1: Branding and Media 4 - POWERAPPS CONTROLS * Text Controls for Data Entry and Display * Controls ? Drop downs, combo box, date picker, radio button and more * Forms ? Add and edit data in underlying data sources quickly * Charts ? present information in pie, line and bar charts * Lab 1: Build Apps from Blank 5 - DATA SOURCES AND LOGIC * Data Storage and Services * How do I decide which database to use? * Connect to on-premises data - Gateway * What is Delegation? * Specific Data Examples * Displaying Data * Lab 1: Data Source and Logic 6 - MODEL-DRIVEN APPS * What is a model-driven app? * Where will my data be stored? * How do create a model-driven app * Canvas vs model-driven summary * Lab 1: Model-Driven App 7 - POWERAPP INTEGRATION * Embed PowerApps in Teams * Embed PowerApps in SharePoint Online * Start a Flow from a PowerApp * Lab 1: PowerApp Integration 8 - ADMINISTRATION AND MAINTENANCE OF POWERAPPS * Identify which users have been using PowerApps * Reuse an app in another location (move from testing or development to production) * Review app usage * Prevent a user from using PowerApps * Manage environments * Lab 1: Administration and Maintenance ADDITIONAL COURSE DETAILS: Nexus Humans 55265 Microsoft PowerApps training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55265 Microsoft PowerApps course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55265 Microsoft© PowerApps
Delivered Online3 days, Jun 13th, 13:00 + 4 more
£1190

SQL Querying Fundamentals - Part 1

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Individuals with basic computer skills, familiar with concepts related to database structure and terminology, and who want to use SQL to query databases. Overview Upon successful completion of this course, students will be able to: - connect to the SQL Server database and execute a simple query. - include a search condition in a simple query. - use various functions to perform calculations on data. - organize data obtained from a query before it is displayed on-screen. - retrieve data from tables. - format an output, save a result, and generate a report. In this course, students will compose SQL queries to retrieve desired information from a database. 1 - EXECUTING A SIMPLE QUERY * Connect to the SQL Database * Query a Database * Save a Query * Modify a Query * Execute a Saved Query 2 - PERFORMING A CONDITIONAL SEARCH * Search Using a Simple Condition * Compare Column Values * Search Using Multiple Conditions * Search for a Range of Values and Null Values * Retrieve Data Based on Patterns 3 - WORKING WITH FUNCTIONS * Perform Date Calculations * Calculate Data Using Aggregate Functions * Manipulate String Values 4 - ORGANIZING DATA * Sort Data * Rank Data * Group Data * Filter Grouped Data * Summarize Grouped Data * Use PIVOT and UNPIVOT Operators 5 - RETRIEVING DATA FROM TABLES * Combine Results of Two Queries * Compare the Results of Two Queries * Retrieve Data by Joining Tables * Check for Unmatched Records * Retrieve Information from a Single Table Using Joins 6 - PRESENTING QUERY RESULTS * Save the Query Result * Generate an XML Report

SQL Querying Fundamentals - Part 1
Delivered OnlineTwo days, Jun 13th, 13:00 + 1 more
£495

AI-900T00 Microsoft Azure AI Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The Azure AI Fundamentals course is designed for anyone interested in learning about the types of solution artificial intelligence (AI) makes possible, and the services on Microsoft Azure that you can use to create them. You don?t need to have any experience of using Microsoft Azure before taking this course, but a basic level of familiarity with computer technology and the Internet is assumed. Some of the concepts covered in the course require a basic understanding of mathematics, such as the ability to interpret charts. The course includes hands-on activities that involve working with data and running code, so a knowledge of fundamental programming principles will be helpful. This course introduces fundamentals concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. The course is not designed to teach students to become professional data scientists or software developers, but rather to build awareness of common AI workloads and the ability to identify Azure services to support them. Prerequisites Prerequisite certification is not required before taking this course. Successful Azure AI Fundamental students start with some basic awareness of computing and internet concepts, and an interest in using Azure AI services. Specifically: * Experience using computers and the internet. * Interest in use cases for AI applications and machine learning models. * A willingness to learn through hands-on exp... 1 - FUNDAMENTAL AI CONCEPTS * Understand machine learning * Understand computer vision * Understand natural language processing * Understand document intelligence and knowledge mining * Understand generative AI * Challenges and risks with AI * Understand Responsible AI 2 - FUNDAMENTALS OF MACHINE LEARNING * What is machine learning? * Types of machine learning * Regression * Binary classification * Multiclass classification * Clustering * Deep learning * Azure Machine Learning 3 - FUNDAMENTALS OF AZURE AI SERVICES * AI services on the Azure platform * Create Azure AI service resources * Use Azure AI services * Understand authentication for Azure AI services 4 - FUNDAMENTALS OF COMPUTER VISION * Images and image processing * Machine learning for computer vision * Azure AI Vision 5 - FUNDAMENTALS OF FACIAL RECOGNITION * Understand Face analysis * Get started with Face analysis on Azure 6 - FUNDAMENTALS OF OPTICAL CHARACTER RECOGNITION * Get started with Vision Studio on Azure 7 - FUNDAMENTALS OF TEXT ANALYSIS WITH THE LANGUAGE SERVICE * Understand Text Analytics * Get started with text analysis 8 - FUNDAMENTALS OF QUESTION ANSWERING WITH THE LANGUAGE SERVICE * Understand question answering * Get started with the Language service and Azure Bot Service 9 - FUNDAMENTALS OF CONVERSATIONAL LANGUAGE UNDERSTANDING * Describe conversational language understanding * Get started with conversational language understanding in Azure 10 - FUNDAMENTALS OF AZURE AI SPEECH * Understand speech recognition and synthesis * Get started with speech on Azure 11 - FUNDAMENTALS OF AZURE AI DOCUMENT INTELLIGENCE * Explore capabilities of document intelligence * Get started with receipt analysis on Azure 12 - FUNDAMENTALS OF KNOWLEDGE MINING WITH AZURE COGNITIVE SEARCH * What is Azure Cognitive Search? * Identify elements of a search solution * Use a skillset to define an enrichment pipeline * Understand indexes * Use an indexer to build an index * Persist enriched data in a knowledge store * Create an index in the Azure portal * Query data in an Azure Cognitive Search index 13 - FUNDAMENTALS OF GENERATIVE AI * What is generative AI? * Large language models * What is Azure OpenAI? * What are copilots? * Improve generative AI responses with prompt engineering 14 - FUNDAMENTALS OF AZURE OPENAI SERVICE * What is generative AI * Describe Azure OpenAI * How to use Azure OpenAI * Understand OpenAI's natural language capabilities * Understand OpenAI code generation capabilities * Understand OpenAI's image generation capabilities * Describe Azure OpenAI's access and responsible AI policies 15 - FUNDAMENTALS OF RESPONSIBLE GENERATIVE AI * Plan a responsible generative AI solution * Identify potential harms * Measure potential harms * Mitigate potential harms * Operate a responsible generative AI solution ADDITIONAL COURSE DETAILS: Nexus Humans AI-900T00 - Microsoft Azure AI Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI-900T00 - Microsoft Azure AI Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AI-900T00 Microsoft Azure AI Fundamentals
Delivered OnlineTwo days, Jun 14th, 13:00 + 3 more
£595

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks. The job roles best suited to the material in this course are: Entry-level network engineer Network administrator Network support technician Help desk technician Overview This course will help you: Learn the knowledge and skills to install, configure, and operate a small- to medium-sized network Gain a foundation in the essentials of networking, security, and automation Earn 30 CE credits toward recertification The Implementing and Administering Cisco Solutions (CCNA) v2.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. This course helps you prepare to take the 200-301 Cisco© Certified Network Associate (CCNA©) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification. COURSE OUTLINE * Exploring the Functions of Networking ? Lecture * Introducing the Host-to-Host Communications Model ? Lecture * Operating Cisco IOS Software ? Lecture * Introducing LANs ? Lecture * Exploring the TCP/IP Link Layer ? Lecture * Starting a Switch ? Lecture * Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets ? Lecture * Explaining the TCP/IP Transport Layer and Application Layer ? Lecture * Exploring the Functions of Routing ? Lecture * Configuring a Cisco Router ? Lecture * Exploring the Packet Delivery Process ? Lecture * Troubleshooting a Simple Network ? Lecture * Introducing Basic IPv6 ? Lecture * Configuring Static Routing ? Lecture * Implementing VLANs and Trunks ? Lecture * Routing Between VLANs ? Lecture * Introducing OSPF ? Lecture * Building Redundant Switched Topologies ? Self-study * Improving Redundant Switched Topologies with EtherChannel ? Lecture * Exploring Layer 3 Redundancy ? Self-study * Introducing WAN Technologies ? Self-study * Explaining Basics of ACL ? Lecture * Enabling Internet Connectivity ? Lecture * Introducing QoS ? Self-study * Explaining Wireless Fundamentals ? Self-study * Introducing Architectures and Virtualization ? Self-study * Explaining the Evolution of Intelligent Networks ? Lecture * Introducing System Monitoring ? Lecture * Managing Cisco Devices ? Lecture * Examining the Security Threat Landscape ? Self-study ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)
Delivered Online6 days, Jun 17th, 13:00 + 14 more
£4195

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - EXPLORE THE ENTERPRISE DESKTOP * Examine benefits of modern management * Examine the enterprise desktop life-cycle model * Examine planning and purchasing * Examine desktop deployment * Plan an application deployment * Plan for upgrades and retirement 2 - EXPLORE WINDOWS EDITIONS * Examine Windows client editions and capabilities * Select client edition * Examine hardware requirements 3 - UNDERSTAND MICROSOFT ENTRA ID * Examine Microsoft Entra ID * Compare Microsoft Entra ID and Active Directory Domain Services * Examine Microsoft Entra ID as a directory service for cloud apps * Compare Microsoft Entra ID P1 and P2 plans * Examine Microsoft Entra Domain Services 4 - MANAGE MICROSOFT ENTRA IDENTITIES * Examine RBAC and user roles in Microsoft Entra ID * Create and manage users in Microsoft Entra ID * Create and manage groups in Microsoft Entra ID * Manage Microsoft Entra objects with PowerShell * Synchronize objects from AD DS to Microsoft Entra ID 5 - MANAGE DEVICE AUTHENTICATION * Describe Microsoft Entra join * Examine Microsoft Entra join prerequisites limitations and benefits * Join devices to Microsoft Entra ID * Manage devices joined to Microsoft Entra ID 6 - ENROLL DEVICES USING MICROSOFT CONFIGURATION MANAGER * Deploy the Microsoft Configuration Manager client * Monitor the Microsoft Configuration Manager client * Manage the Microsoft Configuration Manager client 7 - ENROLL DEVICES USING MICROSOFT INTUNE * Manage mobile devices with Intune * Enable mobile device management * Explain considerations for device enrollment * Manage corporate enrollment policy * Enroll Windows devices in Intune * Enroll Android devices in Intune * Enroll iOS devices in Intune * Explore device enrollment manager * Monitor device enrollment * Manage devices remotely 8 - EXECUTE DEVICE PROFILES * Explore Intune device profiles * Create device profiles * Create a custom device profile 9 - OVERSEE DEVICE PROFILES * Monitor device profiles in Intune * Manage device sync in Intune * Manage devices in Intune using scripts 10 - MAINTAIN USER PROFILES * Examine user profile * Explore user profile types * Examine options for minimizing user profile size * Deploy and configure folder redirection * Sync user state with Enterprise State Roaming * Configure Enterprise State Roaming in Azure 11 - EXECUTE MOBILE APPLICATION MANAGEMENT * Examine mobile application management * Examine considerations for mobile application management * Prepare line-of-business apps for app protection policies * Implement mobile application management policies in Intune * Manage mobile application management policies in Intune 12 - DEPLOY AND UPDATE APPLICATIONS * Deploy applications with Intune * Add apps to Intune * Manage Win32 apps with Intune * Deploy applications with Configuration Manager * Deploying applications with Group Policy * Assign and publish software * Explore Microsoft Store for Business * Implement Microsoft Store Apps * Update Microsoft Store Apps with Intune * Assign apps to company employees 13 - ADMINISTER ENDPOINT APPLICATIONS * Manage apps with Intune * Manage Apps on non-enrolled devices * Deploy Microsoft 365 Apps with Intune * Additional Microsoft 365 Apps Deployment Tools * Configure Microsoft Edge Internet Explorer mode * App Inventory Review 14 - PROTECT IDENTITIES IN MICROSOFT ENTRA ID * Explore Windows Hello for Business * Deploy Windows Hello * Manage Windows Hello for Business * Explore Microsoft Entra ID Protection * Manage self-service password reset in Microsoft Entra ID * Implement multi-factor authentication 15 - ENABLE ORGANIZATIONAL ACCESS * Enable access to organization resources * Explore VPN types and configuration * Explore Always On VPN * Deploy Always On VPN 16 - IMPLEMENT DEVICE COMPLIANCE * Protect access to resources using Intune * Explore device compliance policy * Deploy a device compliance policy * Explore conditional access * Create conditional access policies 17 - GENERATE INVENTORY AND COMPLIANCE REPORTS * Report enrolled devices inventory in Intune * Monitor and report device compliance * Build custom Intune inventory reports * Access Intune using Microsoft Graph API 18 - DEPLOY DEVICE DATA PROTECTION * Explore Windows Information Protection * Plan Windows Information Protection * Implement and use Windows Information Protection * Explore Encrypting File System in Windows client * Explore BitLocker 19 - MANAGE MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Examine key capabilities of Microsoft Defender for Endpoint * Explore Windows Defender Application Control and Device Guard * Explore Microsoft Defender Application Guard * Examine Windows Defender Exploit Guard * Explore Windows Defender System Guard 20 - MANAGE MICROSOFT DEFENDER IN WINDOWS CLIENT * Explore Windows Security Center * Explore Windows Defender Credential Guard * Manage Microsoft Defender Antivirus * Manage Windows Defender Firewall * Explore Windows Defender Firewall with Advanced Security 21 - MANAGE MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender for Cloud Apps * Planning Microsoft Defender for Cloud Apps * Implement Microsoft Defender for Cloud Apps 22 - ASSESS DEPLOYMENT READINESS * Examine deployment guidelines * Explore readiness tools * Assess application compatibility * Explore tools for application compatibility mitigation * Prepare network and directory for deployment * Plan a pilot 23 - DEPLOY USING THE MICROSOFT DEPLOYMENT TOOLKIT * Evaluate traditional deployment methods * Set up the Microsoft Deployment Toolkit for client deployment * Manage and deploy images using the Microsoft Deployment Toolkit 24 - DEPLOY USING MICROSOFT CONFIGURATION MANAGER * Explore client deployment using Configuration Manager * Examine deployment components of Configuration Manager * Manage client deployment using Configuration Manager * Plan in-place upgrades using Configuration Manager 25 - DEPLOY DEVICES USING WINDOWS AUTOPILOT * Use Autopilot for modern deployment * Examine requirements for Windows Autopilot * Prepare device IDs for Autopilot * Implement device registration and out-of-the-box customization * Examine Autopilot scenarios * Troubleshoot Windows Autopilot 26 - IMPLEMENT DYNAMIC DEPLOYMENT METHODS * Examine subscription activation * Deploy using provisioning packages * Use Windows Configuration Designer * Use Microsoft Entra join with automatic MDM enrollment 27 - PLAN A TRANSITION TO MODERN ENDPOINT MANAGEMENT * Explore using co-management to transition to modern endpoint management * Examine prerequisites for co-management * Evaluate modern management considerations * Evaluate upgrades and migrations in modern transitioning * Migrate data when modern transitioning * Migrate workloads when modern transitioning 28 - MANAGE WINDOWS 365 * Explore Windows 365 * Configure Windows 365 * Administer Windows 365 29 - MANAGE AZURE VIRTUAL DESKTOP * Examine Azure Virtual Desktop * Explore Azure Virtual Desktop * Configure Azure Virtual Desktop * Administer Azure Virtual Desktop ADDITIONAL COURSE DETAILS: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online6 days, Jun 17th, 08:30 + 14 more
£2975

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, Jun 17th, 13:00 + 8 more
£3395

Educators matching "Computing & IT"

Show all 113
Liverpool Law Society

liverpool law society

Liverpool

Liverpool Law Society boasts 2500 or so members in practice; it is one of the largest local Law Societies in England and Wales. Membership is broad and varies from practitioners engaged in high-value commercial work to complex charity work. The Society prides itself in being at the forefront of debate and has been able to communicate on behalf of its members their concerns in a number of areas both public and professional, and at regional and national levels. The directors meet twice a year with local MPs where there is exchange of information, news about bills going through parliament and constituent issues are raised and discussed and parliamentary questions are put down on behalf of LLS members. Separately, the directors also meet with the nominated councillors from the Liverpool City Region local authorities. This again is a useful way of ensuring our members’ concerns and issues, including those of their clients, can be raised at one of these meetings. The councillors also come to the Society with matters their constituents are facing and we work together on joint initiatives where there is a common aim. The Society also has good communication channels with The Law Society, the SRA and the LeO, where members’ issues can be raised and matters affecting the legal profession discussed. On a regional level, Liverpool Law Society is a member of the Joint V, a grouping of autonomous local law societies that meet and discuss common issues affecting membership organisations for legal professionals, sharing best practice. The members of the Joint V are Birmingham, Bristol, Leeds, Liverpool and Manchester Law Societies. United the Joint V have a strong voice nationally, representing over 10,000 legal professionals. In addition to our representation role, Liverpool Law Society runs an extensive legal training programme with approximately 100 seminars and conferences organised every year in various specialist areas of law. To view the training programme, please click here.

Amalfi Corporate Solutions Uk

amalfi corporate solutions uk

London

Based in Surrey we are Automated Penetration Testing specialists, cyber security advisors, GDPR consultants, virtual DPO’s, cyber security awareness trainers, password management guru's, email security kings and offer the most flexible and cost effective IT support for SME's Automated penetration testing from Pcysys, Cycognito and Neuralegion overcomes the limitations of traditional periodic human based penetration testing thus improving and maintaining your security posture. We offer solutions for automated penetration testing of your infrastructure with Pcysys Pentera, your applications with Neuralegion and your Web Attack Surface/Shadow IT with Cycognito . In response to questions related to automated penetration testing a research VP at Gartner is quoted “I think we can risk saying Pen testing as it is today will cease to exist” We work with customers large and small Image British Film Institute Image Image Image Image Data Protection Officer - DPO Services Innovative program - from one day per month - no long term contract - makes having your own DPO affordable. Support Services With no complex on-boarding process we simply take on what you have and run with it. We don’t do ‘packages’ or introduce complexity, our contract is two pages, our price is fixed and our service is top drawer. Automated Penetration Testing Automated Penetration Testing – the bad guys never sleep. It is no longer enough to test once a year or rely on outdated technologies to detect weaknesses and attacks. AI and ML with real-time detection are now must have technologies. Email Security Health Check - FREE 30 seconds is all it takes for this Email Security Health Check and it is FREE. Works for in-house/cloud hosted/O365/GSuite. Test to see which of 17 email bourne threats get through your defences. Security Services From fully managed security awareness training programs and managed email protection systems which automate removal of malicious content to simple endpoint malware we cover the whole spectrum. DMARC - FREE email protection recommended by City of London Police and Global Cyber Alliance It is FREE and just needs to be configured and enabled. It helps protect against phishing, Business Email Compromise, Whaling and Spoofing as well as reducing SPAM Get a Personal Service IT support contracts get a personal service rather than a helpdesk Our range of services, enterprise in class but delivered at an SME price point, are designed to help you protect your data whilst not breaking the bank. Why Amalfitech For SMB and Enterprise Our solutions are tailored to the size of the company whether small, medium or large. Our small and mid-size business solutions are designed with costs and sustainability in mind, so you won’t get offered a low entry point and then get hit with high cost professional services. Everything is upfront, open and above all we are honest. Run by Techies Our customer facing staff are techies. The company is owned by techies. We don’t do high pressure sales. We just offer great advice and service. No Weekend Rates Is your current support company taking you offline during the working day to fix problems, or charging out of hours/weekend rates for services? Our fixed price unlimited, all-inclusive remote support packages have no extra charge for problem solving out of hours or at weekends. . IT Security Specialists and IT Support We are a GDPR and Data protection consultancy, IT security specialists and IT support company for small businesses. We are run by techies for the benefit of techies. Virtual CISO and DPO GDPR, PECR and Compliance Managed Security Internal Fraud Prevention Automated Penetration Testing Security Awareness Training IT Support and Maintenance Cloud Cost and Performance Optimisation The 'IT Sanity Check' for CEO's Image Image IT Solutions We provide new and creative solutions to difficult problems. Our goal is to help you through the minefield of rhetoric and marketing to make the best choice you can make, within your budget and that above all it works. Automated Penetration Testing Attacker and Insider threat Detection Email Phishing Testing, Prevention and Training Email and File Encryption Email/File/SharePoint Backup and Archiving VOIP Unified Endpoint Management OS and Application Containerisation Anti-Malware