• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5066 Computing & IT courses delivered Online

Bitesize Masterclass on AI with Fiona Young

5.0(1)

By Own Your Success

Bitesize Masterclass on AI - facilitated by Fiona Young, Leading Expert and Trainer.    Are you a total beginner to AI? Or maybe you've dabbled but found it all overwhelming...or underwhelming?  Then this bitesize masterclass on AI is for you!    We'll be covering AI fundamentals, what AI means for exec support roles, and practically how to use AI chatbots (like ChatGPT and Copilot) to shortcut admin drudgery.    You’ll come away from this session with the confidence and skills to start using AI in your workflow right away, making you more efficient and giving you time back to do more of the human work you love.    Note that this is NOT a passive webinar — we'll have demos, discussions and breakouts. You'll get a chance to practice using AI chatbots in the room for real world projects with other forward-thinking assistants like you.  Here's a detailed breakdown of session content: AI fundamentals  •    Defining AI, gen AI and other need to know terms  •    Key AI risks to be aware of  •    Exciting tools for assistants right now How AI will change the assistant role  •    Explore our feelings about AI right now  •    Some predictions on what AI means for the future of exec support  •    What you can do to win in the age of AI A practical guide to using ChatGPT and LLMs at work  •    How to use AI chatbots in your workflow  •    How to craft great prompts to optimise outputs  •    A chance to practice & workshop prompting in the room   Fiona Young is founder of Carve, a series of live digital courses for executive assistants to learn AI, create capacity and develop into a strategic assistant — carving out their career growth in the process. Before launching Carve, Fiona spent five years leading learning programs at Hive Learning, the b2b peer learning app. She previously ran Learning & Development for Blenheim Chalcot, one of the world’s most successful venture builders, overseeing group learning strategy and programs for 3,000 people across 25 ventures.  Fiona started her career as an executive assistant in entrepreneurial businesses. 

Bitesize Masterclass on AI with Fiona Young
Delivered Online1 hour 30 minutes, Jun 12th, 16:00
£100

tpgf

By g-mcl

tpgf
Delivered Online1 hour, Jun 13th, 08:00
FREE

55265 Microsoft© PowerApps

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class has something for everything, from beginners who wish to customise their data entry forms in SharePoint right up to advanced users who need to use advanced formulas to deliver more bespoke actions to their apps. Overview After taking this course, students will be able to: - Understand when to use PowerApp. - Describe the components of PowerApps and their correct use. - Create PowerApps from existing data sources. - Brand PowerApps. - Customize PowerApps beyond just using the automated wizards. - Connect to a range of data sources from Excel to Azure SQL. - Understand the difference between canvas apps and model-driven apps. - Integrate PowerApps with other Office 365 systems ? including Teams and SharePoint Online. - Administer and Maintain PowerApps Students will be taught how to design, test and publish new apps that work with a variety of data sources. We will take users through a selection of well-crafted lessons to help them build new applications for their business. 1 - AN INTRODUCTION TO POWERAPPS * What is PowerApps? * The benefits of apps * How to get PowerApps * Canvas Apps and Model-Driven Apps * License Options and Costs * Discover PowerApps with Templates * Lab 1: Introduction to PowerApps 2 - GETTING STARTED WITH POWERAPPS * Building a new app from a data source * Add, edit and remove controls * Intro to Formulas * Testing an app * App Settings * Publish and Share Apps * Version History and Restore * PowerApps Mobile App * Lab 1: Getting Started 3 - BRANDING AND MEDIA * Less is more * Duplicate Screens * Fonts * Screen Colours and Matching Colours * Screen Backgrounds * Buttons and Icons * Hide on Timer * Size and Alignment by reference * Show and Hide on Timer * Lab 1: Branding and Media 4 - POWERAPPS CONTROLS * Text Controls for Data Entry and Display * Controls ? Drop downs, combo box, date picker, radio button and more * Forms ? Add and edit data in underlying data sources quickly * Charts ? present information in pie, line and bar charts * Lab 1: Build Apps from Blank 5 - DATA SOURCES AND LOGIC * Data Storage and Services * How do I decide which database to use? * Connect to on-premises data - Gateway * What is Delegation? * Specific Data Examples * Displaying Data * Lab 1: Data Source and Logic 6 - MODEL-DRIVEN APPS * What is a model-driven app? * Where will my data be stored? * How do create a model-driven app * Canvas vs model-driven summary * Lab 1: Model-Driven App 7 - POWERAPP INTEGRATION * Embed PowerApps in Teams * Embed PowerApps in SharePoint Online * Start a Flow from a PowerApp * Lab 1: PowerApp Integration 8 - ADMINISTRATION AND MAINTENANCE OF POWERAPPS * Identify which users have been using PowerApps * Reuse an app in another location (move from testing or development to production) * Review app usage * Prevent a user from using PowerApps * Manage environments * Lab 1: Administration and Maintenance ADDITIONAL COURSE DETAILS: Nexus Humans 55265 Microsoft PowerApps training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55265 Microsoft PowerApps course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55265 Microsoft© PowerApps
Delivered Online3 days, Jun 13th, 13:00 + 4 more
£1190

SQL Querying Fundamentals - Part 1

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Individuals with basic computer skills, familiar with concepts related to database structure and terminology, and who want to use SQL to query databases. Overview Upon successful completion of this course, students will be able to: - connect to the SQL Server database and execute a simple query. - include a search condition in a simple query. - use various functions to perform calculations on data. - organize data obtained from a query before it is displayed on-screen. - retrieve data from tables. - format an output, save a result, and generate a report. In this course, students will compose SQL queries to retrieve desired information from a database. 1 - EXECUTING A SIMPLE QUERY * Connect to the SQL Database * Query a Database * Save a Query * Modify a Query * Execute a Saved Query 2 - PERFORMING A CONDITIONAL SEARCH * Search Using a Simple Condition * Compare Column Values * Search Using Multiple Conditions * Search for a Range of Values and Null Values * Retrieve Data Based on Patterns 3 - WORKING WITH FUNCTIONS * Perform Date Calculations * Calculate Data Using Aggregate Functions * Manipulate String Values 4 - ORGANIZING DATA * Sort Data * Rank Data * Group Data * Filter Grouped Data * Summarize Grouped Data * Use PIVOT and UNPIVOT Operators 5 - RETRIEVING DATA FROM TABLES * Combine Results of Two Queries * Compare the Results of Two Queries * Retrieve Data by Joining Tables * Check for Unmatched Records * Retrieve Information from a Single Table Using Joins 6 - PRESENTING QUERY RESULTS * Save the Query Result * Generate an XML Report

SQL Querying Fundamentals - Part 1
Delivered OnlineTwo days, Jun 13th, 13:00 + 1 more
£495

AI-900T00 Microsoft Azure AI Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The Azure AI Fundamentals course is designed for anyone interested in learning about the types of solution artificial intelligence (AI) makes possible, and the services on Microsoft Azure that you can use to create them. You don?t need to have any experience of using Microsoft Azure before taking this course, but a basic level of familiarity with computer technology and the Internet is assumed. Some of the concepts covered in the course require a basic understanding of mathematics, such as the ability to interpret charts. The course includes hands-on activities that involve working with data and running code, so a knowledge of fundamental programming principles will be helpful. This course introduces fundamentals concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. The course is not designed to teach students to become professional data scientists or software developers, but rather to build awareness of common AI workloads and the ability to identify Azure services to support them. Prerequisites Prerequisite certification is not required before taking this course. Successful Azure AI Fundamental students start with some basic awareness of computing and internet concepts, and an interest in using Azure AI services. Specifically: * Experience using computers and the internet. * Interest in use cases for AI applications and machine learning models. * A willingness to learn through hands-on exp... 1 - FUNDAMENTAL AI CONCEPTS * Understand machine learning * Understand computer vision * Understand natural language processing * Understand document intelligence and knowledge mining * Understand generative AI * Challenges and risks with AI * Understand Responsible AI 2 - FUNDAMENTALS OF MACHINE LEARNING * What is machine learning? * Types of machine learning * Regression * Binary classification * Multiclass classification * Clustering * Deep learning * Azure Machine Learning 3 - FUNDAMENTALS OF AZURE AI SERVICES * AI services on the Azure platform * Create Azure AI service resources * Use Azure AI services * Understand authentication for Azure AI services 4 - FUNDAMENTALS OF COMPUTER VISION * Images and image processing * Machine learning for computer vision * Azure AI Vision 5 - FUNDAMENTALS OF FACIAL RECOGNITION * Understand Face analysis * Get started with Face analysis on Azure 6 - FUNDAMENTALS OF OPTICAL CHARACTER RECOGNITION * Get started with Vision Studio on Azure 7 - FUNDAMENTALS OF TEXT ANALYSIS WITH THE LANGUAGE SERVICE * Understand Text Analytics * Get started with text analysis 8 - FUNDAMENTALS OF QUESTION ANSWERING WITH THE LANGUAGE SERVICE * Understand question answering * Get started with the Language service and Azure Bot Service 9 - FUNDAMENTALS OF CONVERSATIONAL LANGUAGE UNDERSTANDING * Describe conversational language understanding * Get started with conversational language understanding in Azure 10 - FUNDAMENTALS OF AZURE AI SPEECH * Understand speech recognition and synthesis * Get started with speech on Azure 11 - FUNDAMENTALS OF AZURE AI DOCUMENT INTELLIGENCE * Explore capabilities of document intelligence * Get started with receipt analysis on Azure 12 - FUNDAMENTALS OF KNOWLEDGE MINING WITH AZURE COGNITIVE SEARCH * What is Azure Cognitive Search? * Identify elements of a search solution * Use a skillset to define an enrichment pipeline * Understand indexes * Use an indexer to build an index * Persist enriched data in a knowledge store * Create an index in the Azure portal * Query data in an Azure Cognitive Search index 13 - FUNDAMENTALS OF GENERATIVE AI * What is generative AI? * Large language models * What is Azure OpenAI? * What are copilots? * Improve generative AI responses with prompt engineering 14 - FUNDAMENTALS OF AZURE OPENAI SERVICE * What is generative AI * Describe Azure OpenAI * How to use Azure OpenAI * Understand OpenAI's natural language capabilities * Understand OpenAI code generation capabilities * Understand OpenAI's image generation capabilities * Describe Azure OpenAI's access and responsible AI policies 15 - FUNDAMENTALS OF RESPONSIBLE GENERATIVE AI * Plan a responsible generative AI solution * Identify potential harms * Measure potential harms * Mitigate potential harms * Operate a responsible generative AI solution ADDITIONAL COURSE DETAILS: Nexus Humans AI-900T00 - Microsoft Azure AI Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI-900T00 - Microsoft Azure AI Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AI-900T00 Microsoft Azure AI Fundamentals
Delivered OnlineTwo days, Jun 14th, 13:00 + 3 more
£595

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks. The job roles best suited to the material in this course are: Entry-level network engineer Network administrator Network support technician Help desk technician Overview This course will help you: Learn the knowledge and skills to install, configure, and operate a small- to medium-sized network Gain a foundation in the essentials of networking, security, and automation Earn 30 CE credits toward recertification The Implementing and Administering Cisco Solutions (CCNA) v2.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. This course helps you prepare to take the 200-301 Cisco© Certified Network Associate (CCNA©) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification. COURSE OUTLINE * Exploring the Functions of Networking ? Lecture * Introducing the Host-to-Host Communications Model ? Lecture * Operating Cisco IOS Software ? Lecture * Introducing LANs ? Lecture * Exploring the TCP/IP Link Layer ? Lecture * Starting a Switch ? Lecture * Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets ? Lecture * Explaining the TCP/IP Transport Layer and Application Layer ? Lecture * Exploring the Functions of Routing ? Lecture * Configuring a Cisco Router ? Lecture * Exploring the Packet Delivery Process ? Lecture * Troubleshooting a Simple Network ? Lecture * Introducing Basic IPv6 ? Lecture * Configuring Static Routing ? Lecture * Implementing VLANs and Trunks ? Lecture * Routing Between VLANs ? Lecture * Introducing OSPF ? Lecture * Building Redundant Switched Topologies ? Self-study * Improving Redundant Switched Topologies with EtherChannel ? Lecture * Exploring Layer 3 Redundancy ? Self-study * Introducing WAN Technologies ? Self-study * Explaining Basics of ACL ? Lecture * Enabling Internet Connectivity ? Lecture * Introducing QoS ? Self-study * Explaining Wireless Fundamentals ? Self-study * Introducing Architectures and Virtualization ? Self-study * Explaining the Evolution of Intelligent Networks ? Lecture * Introducing System Monitoring ? Lecture * Managing Cisco Devices ? Lecture * Examining the Security Threat Landscape ? Self-study ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)
Delivered Online6 days, Jun 17th, 13:00 + 14 more
£4195

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - EXPLORE THE ENTERPRISE DESKTOP * Examine benefits of modern management * Examine the enterprise desktop life-cycle model * Examine planning and purchasing * Examine desktop deployment * Plan an application deployment * Plan for upgrades and retirement 2 - EXPLORE WINDOWS EDITIONS * Examine Windows client editions and capabilities * Select client edition * Examine hardware requirements 3 - UNDERSTAND MICROSOFT ENTRA ID * Examine Microsoft Entra ID * Compare Microsoft Entra ID and Active Directory Domain Services * Examine Microsoft Entra ID as a directory service for cloud apps * Compare Microsoft Entra ID P1 and P2 plans * Examine Microsoft Entra Domain Services 4 - MANAGE MICROSOFT ENTRA IDENTITIES * Examine RBAC and user roles in Microsoft Entra ID * Create and manage users in Microsoft Entra ID * Create and manage groups in Microsoft Entra ID * Manage Microsoft Entra objects with PowerShell * Synchronize objects from AD DS to Microsoft Entra ID 5 - MANAGE DEVICE AUTHENTICATION * Describe Microsoft Entra join * Examine Microsoft Entra join prerequisites limitations and benefits * Join devices to Microsoft Entra ID * Manage devices joined to Microsoft Entra ID 6 - ENROLL DEVICES USING MICROSOFT CONFIGURATION MANAGER * Deploy the Microsoft Configuration Manager client * Monitor the Microsoft Configuration Manager client * Manage the Microsoft Configuration Manager client 7 - ENROLL DEVICES USING MICROSOFT INTUNE * Manage mobile devices with Intune * Enable mobile device management * Explain considerations for device enrollment * Manage corporate enrollment policy * Enroll Windows devices in Intune * Enroll Android devices in Intune * Enroll iOS devices in Intune * Explore device enrollment manager * Monitor device enrollment * Manage devices remotely 8 - EXECUTE DEVICE PROFILES * Explore Intune device profiles * Create device profiles * Create a custom device profile 9 - OVERSEE DEVICE PROFILES * Monitor device profiles in Intune * Manage device sync in Intune * Manage devices in Intune using scripts 10 - MAINTAIN USER PROFILES * Examine user profile * Explore user profile types * Examine options for minimizing user profile size * Deploy and configure folder redirection * Sync user state with Enterprise State Roaming * Configure Enterprise State Roaming in Azure 11 - EXECUTE MOBILE APPLICATION MANAGEMENT * Examine mobile application management * Examine considerations for mobile application management * Prepare line-of-business apps for app protection policies * Implement mobile application management policies in Intune * Manage mobile application management policies in Intune 12 - DEPLOY AND UPDATE APPLICATIONS * Deploy applications with Intune * Add apps to Intune * Manage Win32 apps with Intune * Deploy applications with Configuration Manager * Deploying applications with Group Policy * Assign and publish software * Explore Microsoft Store for Business * Implement Microsoft Store Apps * Update Microsoft Store Apps with Intune * Assign apps to company employees 13 - ADMINISTER ENDPOINT APPLICATIONS * Manage apps with Intune * Manage Apps on non-enrolled devices * Deploy Microsoft 365 Apps with Intune * Additional Microsoft 365 Apps Deployment Tools * Configure Microsoft Edge Internet Explorer mode * App Inventory Review 14 - PROTECT IDENTITIES IN MICROSOFT ENTRA ID * Explore Windows Hello for Business * Deploy Windows Hello * Manage Windows Hello for Business * Explore Microsoft Entra ID Protection * Manage self-service password reset in Microsoft Entra ID * Implement multi-factor authentication 15 - ENABLE ORGANIZATIONAL ACCESS * Enable access to organization resources * Explore VPN types and configuration * Explore Always On VPN * Deploy Always On VPN 16 - IMPLEMENT DEVICE COMPLIANCE * Protect access to resources using Intune * Explore device compliance policy * Deploy a device compliance policy * Explore conditional access * Create conditional access policies 17 - GENERATE INVENTORY AND COMPLIANCE REPORTS * Report enrolled devices inventory in Intune * Monitor and report device compliance * Build custom Intune inventory reports * Access Intune using Microsoft Graph API 18 - DEPLOY DEVICE DATA PROTECTION * Explore Windows Information Protection * Plan Windows Information Protection * Implement and use Windows Information Protection * Explore Encrypting File System in Windows client * Explore BitLocker 19 - MANAGE MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Examine key capabilities of Microsoft Defender for Endpoint * Explore Windows Defender Application Control and Device Guard * Explore Microsoft Defender Application Guard * Examine Windows Defender Exploit Guard * Explore Windows Defender System Guard 20 - MANAGE MICROSOFT DEFENDER IN WINDOWS CLIENT * Explore Windows Security Center * Explore Windows Defender Credential Guard * Manage Microsoft Defender Antivirus * Manage Windows Defender Firewall * Explore Windows Defender Firewall with Advanced Security 21 - MANAGE MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender for Cloud Apps * Planning Microsoft Defender for Cloud Apps * Implement Microsoft Defender for Cloud Apps 22 - ASSESS DEPLOYMENT READINESS * Examine deployment guidelines * Explore readiness tools * Assess application compatibility * Explore tools for application compatibility mitigation * Prepare network and directory for deployment * Plan a pilot 23 - DEPLOY USING THE MICROSOFT DEPLOYMENT TOOLKIT * Evaluate traditional deployment methods * Set up the Microsoft Deployment Toolkit for client deployment * Manage and deploy images using the Microsoft Deployment Toolkit 24 - DEPLOY USING MICROSOFT CONFIGURATION MANAGER * Explore client deployment using Configuration Manager * Examine deployment components of Configuration Manager * Manage client deployment using Configuration Manager * Plan in-place upgrades using Configuration Manager 25 - DEPLOY DEVICES USING WINDOWS AUTOPILOT * Use Autopilot for modern deployment * Examine requirements for Windows Autopilot * Prepare device IDs for Autopilot * Implement device registration and out-of-the-box customization * Examine Autopilot scenarios * Troubleshoot Windows Autopilot 26 - IMPLEMENT DYNAMIC DEPLOYMENT METHODS * Examine subscription activation * Deploy using provisioning packages * Use Windows Configuration Designer * Use Microsoft Entra join with automatic MDM enrollment 27 - PLAN A TRANSITION TO MODERN ENDPOINT MANAGEMENT * Explore using co-management to transition to modern endpoint management * Examine prerequisites for co-management * Evaluate modern management considerations * Evaluate upgrades and migrations in modern transitioning * Migrate data when modern transitioning * Migrate workloads when modern transitioning 28 - MANAGE WINDOWS 365 * Explore Windows 365 * Configure Windows 365 * Administer Windows 365 29 - MANAGE AZURE VIRTUAL DESKTOP * Examine Azure Virtual Desktop * Explore Azure Virtual Desktop * Configure Azure Virtual Desktop * Administer Azure Virtual Desktop ADDITIONAL COURSE DETAILS: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online6 days, Jun 17th, 08:30 + 14 more
£2975

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, Jun 17th, 13:00 + 8 more
£3395

CompTIA A+ Part 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ Core 2 220-1102 Certification Exam. Overview Identify, install and configure Windows Operating System features Perform OS installations and upgrades Identify features and tools of macOS Identify features and tools of Linux OS Summarize security measures and protocols Configure SOHO network security Manage security settings Troubleshoot Windows OS problems Explain change-management best practices Implement workstation backup and recover methods Identify the basics of scripting CompTIA A+ certified professionals are proven problem solvers. They support today?s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today?s digital world. It is the only industry recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. This course follows after the A+ Part 1 course and prepares you for the A+ Core 2 exam 220-1101. Prerequisites While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training. LESSON 1: CONFIGURING WINDOWS * Topic 1A: Configure Windows User Settings * Topic 1B: Configure Windows System Settings LESSON 2: MANAGING WINDOWS * Topic 2A: Use Management Consoles * Topic 2B: Use Performance and Troubleshooting Tools * Topic 2C: Use Command-line Tools LESSON 3: IDENTIFYING OS TYPES AND FEATURES * Topic 3A: Explain OS Types * Topic 3B: Compare Windows Editions LESSON 4: SUPPORTING WINDOWS * Topic 4A: Perform OS Installations and Upgrades * Topic 4B: Install and Configure Application * Topic 4C: Troubleshoot Windows OS Problems LESSON 5: MANAGING WINDOWS NETWORKING * Topic 5A: Manage Windows Networking * Topic 5B: Troubleshoot Windows Networking * Topic 5C: Configure Windows Security Settings * Topic 5D: Manage Windows Shares LESSON 6: MANAGING LINUX AND MACOS * Topic 6A: Identify Features of Linux * Topic 6B: Identify Features of macOS LESSON 7: CONFIGURING SOHO NETWORK SECURITY * Topic 7A: Explain Attacks, Threats, and Vulnerabilities * Topic 7B: Compare Wireless Security Protocols * Topic 7C: Configure SOHO Router Security * Topic 7D: Summarize Security Measures LESSON 8: MANAGING SECURITY SETTINGS * Topic 8A: Configure Workstation Security * Topic 8B: Configure Browser Security * Topic 8C: Troubleshoot Workstation Security Issues LESSON 9: SUPPORTING MOBILE SOFTWARE * Topic 9A: Configure Mobile OS Security * Topic 9B: Troubleshoot Mobile OS and App Software * Topic 9C: Troubleshoot Mobile OS and App Security LESSON 10: USING SUPPORT AND SCRIPTING TOOLS * Topic 10A: Use Remote Access Technologies * Topic 10B: Implement Backup and Recovery * Topic 10C: Explain Data Handling Best Practices * Topic 10D: Identify Basics of Scripting LESSON 11: IMPLEMENTING OPERATIONAL PROCEDURES * Topic 11A: Implement Best Practice Documentation * Topic 11B: Use Proper Communication Techniques * Topic 11C: Use Common Safety and Environmental Procedures

CompTIA A+ Part 2
Delivered Online6 days, Jun 17th, 13:00 + 2 more
£2475

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

Educators matching "Computing & IT"

Show all 7512