• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2375 Intelligence courses

PL300 Revision Day (PL300REV)

By Online Productivity Training

OVERVIEW Prerequisites—this is a day of supervised revision for anyone who wishes to take the PL-300 exam so we expect you to have attended a PL-300 course, either taught or on your own, before attending this day of revision. We are happy for attendees to join the course if you have taken the PL-300 with us or with another provider. In the morning we look at questions from the PL-300 exam, grouped by subject area. For each question we show you the correct answer and then explain why that is the correct answer. After lunch everyone tries a practice exam under exam conditions and we finish the day with clarification on the subjects or specific questions that the class is finding hard. The cost of the course includes a free voucher to take the exam, so please don’t buy your own separately. If you do so we cannot reimburse you with the cost of the exam. COURSE BENEFITS: * Discover the parts of the course on which to focus most attention * Become familiar with the styles and formats of the exam questions * Alert yourself to some of the particularly tricky questions * Familiarise yourself with the style of the 'case study' question * Practice an exam under real exam conditions * Get a feel for the time you need to devote to the normal questions and to the case study WHO IS THE COURSE FOR? * Power BI report developers who need PL-300 Certification to apply for a job * Business Intelligence specialists who wish to enhance their career prospects with a PL-300 Certification * Anyone who wishes to maximise their chances of passing the PL-300 Power BI Data Analyst exam COURSE OUTLINE Module 1 Structure Of The Exam * Registration for the exam and setup of your workspace * The percentage of marks devoted to each subject area * Types of questions used in the exam * Advised timing for the normal questions and for the case study question Module 2 Individual Exam Question Practice * The exam questions are divided into subject areas and for each question… * We consider the question and try to answer it * We view the answer * Where necessary, we look at an in-depth explanation of why that is the correct answer * Examine case study questions and how to treat these differently from the normal questions Module 3 Practice Exam Under Exam Conditions * Attendees take a practice exam * Attendees receive a mark, broken down into subject areas Module 4 Exam Question Practice Focussed On Tricky Areas * Together, based on the results of attendees’ exam results we decide which areas on which to focus * More practice on individual exam questions using the same style as in Module 2

PL300 Revision Day (PL300REV)
Delivered OnlineFull day, Jun 13th, 08:00
£400

Weekly Energy Medicine Yoga Classes - for Health, Healing and Happiness

5.0(18)

By Prittie Yoga

Feel better now - Activate your body's natural healing intelligence with Energy Medicine Yoga -------------------------------------------------------------------------------- Mindful Yoga that amplifies your body's natural healing intelligence. Click to book: www.prittieyoga.co.uk/form Come join us in Thorpe for FEEL GOOD YOGA. No egos, just friendly kind people looking for an hour of peace and self care. Let go of stress and anxiety by joining us for a small class of ENERGY MEDICINE YOGA® It's a peaceful way and shortcut for longevity, healing and vitality. Join us for a super friendly class, Thorpe. 𝗪𝗲𝗲𝗸𝗹𝘆 𝗖𝗹𝗮𝘀𝘀 𝗦𝗰𝗵𝗲𝗱𝘂𝗹𝗲 𝗠𝗼𝗻𝗱𝗮𝘆 9.30am or 8.15pm 𝗪𝗲𝗱𝗻𝗲𝘀𝗱𝗮𝘆𝘀 Chair Yoga 10.45am 𝗧𝗵𝘂𝗿𝘀𝗱𝗮𝘆 6.30pm Yoga for your Health, Healing and Happiness Join us: https://www.prittieyoga.co.uk/contact #healyourself #yogaforselfcare #yogaforhealing #energymedicineyoga #prittieyoga #yogainsurrey #raiseyourvibration #feelgoodyoga #friendlyyoga #emyoga #mindfulness #relaxation #yogaforeveryone #yogaforimmunity #yogaforvitality #immunity #vitality #pranayama #learntomanifest #chakrawellness #yogaretreats #yoganidra Click to book: www.prittieyoga.co.uk/form

Weekly Energy Medicine Yoga Classes - for Health, Healing and Happiness
Delivered In-Person in Thorpe 1 hour, Jun 13th, 17:30 + 27 more
£12

AI-900T00 Microsoft Azure AI Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The Azure AI Fundamentals course is designed for anyone interested in learning about the types of solution artificial intelligence (AI) makes possible, and the services on Microsoft Azure that you can use to create them. You don?t need to have any experience of using Microsoft Azure before taking this course, but a basic level of familiarity with computer technology and the Internet is assumed. Some of the concepts covered in the course require a basic understanding of mathematics, such as the ability to interpret charts. The course includes hands-on activities that involve working with data and running code, so a knowledge of fundamental programming principles will be helpful. This course introduces fundamentals concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. The course is not designed to teach students to become professional data scientists or software developers, but rather to build awareness of common AI workloads and the ability to identify Azure services to support them. Prerequisites Prerequisite certification is not required before taking this course. Successful Azure AI Fundamental students start with some basic awareness of computing and internet concepts, and an interest in using Azure AI services. Specifically: * Experience using computers and the internet. * Interest in use cases for AI applications and machine learning models. * A willingness to learn through hands-on exp... 1 - FUNDAMENTAL AI CONCEPTS * Understand machine learning * Understand computer vision * Understand natural language processing * Understand document intelligence and knowledge mining * Understand generative AI * Challenges and risks with AI * Understand Responsible AI 2 - FUNDAMENTALS OF MACHINE LEARNING * What is machine learning? * Types of machine learning * Regression * Binary classification * Multiclass classification * Clustering * Deep learning * Azure Machine Learning 3 - FUNDAMENTALS OF AZURE AI SERVICES * AI services on the Azure platform * Create Azure AI service resources * Use Azure AI services * Understand authentication for Azure AI services 4 - FUNDAMENTALS OF COMPUTER VISION * Images and image processing * Machine learning for computer vision * Azure AI Vision 5 - FUNDAMENTALS OF FACIAL RECOGNITION * Understand Face analysis * Get started with Face analysis on Azure 6 - FUNDAMENTALS OF OPTICAL CHARACTER RECOGNITION * Get started with Vision Studio on Azure 7 - FUNDAMENTALS OF TEXT ANALYSIS WITH THE LANGUAGE SERVICE * Understand Text Analytics * Get started with text analysis 8 - FUNDAMENTALS OF QUESTION ANSWERING WITH THE LANGUAGE SERVICE * Understand question answering * Get started with the Language service and Azure Bot Service 9 - FUNDAMENTALS OF CONVERSATIONAL LANGUAGE UNDERSTANDING * Describe conversational language understanding * Get started with conversational language understanding in Azure 10 - FUNDAMENTALS OF AZURE AI SPEECH * Understand speech recognition and synthesis * Get started with speech on Azure 11 - FUNDAMENTALS OF AZURE AI DOCUMENT INTELLIGENCE * Explore capabilities of document intelligence * Get started with receipt analysis on Azure 12 - FUNDAMENTALS OF KNOWLEDGE MINING WITH AZURE COGNITIVE SEARCH * What is Azure Cognitive Search? * Identify elements of a search solution * Use a skillset to define an enrichment pipeline * Understand indexes * Use an indexer to build an index * Persist enriched data in a knowledge store * Create an index in the Azure portal * Query data in an Azure Cognitive Search index 13 - FUNDAMENTALS OF GENERATIVE AI * What is generative AI? * Large language models * What is Azure OpenAI? * What are copilots? * Improve generative AI responses with prompt engineering 14 - FUNDAMENTALS OF AZURE OPENAI SERVICE * What is generative AI * Describe Azure OpenAI * How to use Azure OpenAI * Understand OpenAI's natural language capabilities * Understand OpenAI code generation capabilities * Understand OpenAI's image generation capabilities * Describe Azure OpenAI's access and responsible AI policies 15 - FUNDAMENTALS OF RESPONSIBLE GENERATIVE AI * Plan a responsible generative AI solution * Identify potential harms * Measure potential harms * Mitigate potential harms * Operate a responsible generative AI solution ADDITIONAL COURSE DETAILS: Nexus Humans AI-900T00 - Microsoft Azure AI Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI-900T00 - Microsoft Azure AI Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AI-900T00 Microsoft Azure AI Fundamentals
Delivered OnlineTwo days, Jun 14th, 13:00 + 3 more
£595

CompTIA Cybersecurity Analyst (CySA+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK * Identify the Importance of Risk Management * Assess Risk * Mitigate Risk * Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS * Assess the Impact of Reconnaissance Incidents * Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS * Assess the Impact of System Hacking Attacks * Assess the Impact of Web-Based Attacks * Assess the Impact of Malware * Assess the Impact of Hijacking and Impersonation Attacks * Assess the Impact of DoS Incidents * Assess the Impact of Threats to Mobile Security * Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES * Assess Command and Control Techniques * Assess Persistence Techniques * Assess Lateral Movement and Pivoting Techniques * Assess Data Exfiltration Techniques * Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION * Implement a Vulnerability Management Plan * Assess Common Vulnerabilities * Conduct Vulnerability Scans * Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE * Deploy a Security Intelligence Collection and Analysis Platform * Collect Data from Network-Based Intelligence Sources * Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA * Use Common Tools to Analyze Logs * Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS * Analyze Incidents with Windows-Based Tools * Analyze Incidents with Linux-Based Tools * Analyze Malware * Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS * Deploy an Incident Handling and Response Architecture * Mitigate Incidents * Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS * Apply a Forensic Investigation Plan * Securely Collect and Analyze Electronic Evidence * Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES * Remediate Identity and Access Management Issues * Implement Security During the SDLC ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cybersecurity Analyst (CySA+)
Delivered Online6 days, Jun 17th, 13:00 + 6 more
£2475

Shamanic Breathwork - Facilitating Inner Alchemy

1.0(5)

By Wild Power Alchemy

Through Conscious Connected Circular Breathing, we tap into the profound healing potential of your breath to release stress, tension, trauma, and emotional blockages, allowing your body to reconnect with your authentic, loving self.

Shamanic Breathwork - Facilitating Inner Alchemy
Delivered In-Person in Edinburgh2 hours 30 minutes, Jun 16th, 13:00
£35.35

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites * Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. * A proficient understanding of DNS and basic functional experience with Microsoft 365 services. * A proficient understanding of general IT practices. * A working knowledge of PowerShell. 1 - CONFIGURE YOUR MICROSOFT 365 EXPERIENCE * Explore your Microsoft 365 cloud environment * Configure your Microsoft 365 organizational profile * Manage your tenant subscriptions in Microsoft 365 * Integrate Microsoft 365 with customer engagement apps * Complete your tenant configuration in Microsoft 365 2 - MANAGE USERS, LICENSES, AND MAIL CONTACTS IN MICROSOFT 365 * Determine the user identity model for your organization * Create user accounts in Microsoft 365 * Manage user account settings in Microsoft 365 * Manage user licenses in Microsoft 365 * Recover deleted user accounts in Microsoft 365 * Perform bulk user maintenance in Microsoft Entra ID * Create and manage guest users * Create and manage mail contacts 3 - MANAGE GROUPS IN MICROSOFT 365 * Examine groups in Microsoft 365 * Create and manage groups in Microsoft 365 * Create dynamic groups using Azure rule builder * Create a Microsoft 365 group naming policy * Create groups in Exchange Online and SharePoint Online 4 - ADD A CUSTOM DOMAIN IN MICROSOFT 365 * Plan a custom domain for your Microsoft 365 deployment * Plan the DNS zones for a custom domain * Plan the DNS record requirements for a custom domain * Create a custom domain in Microsoft 365 5 - CONFIGURE CLIENT CONNECTIVITY TO MICROSOFT 365 * Examine how automatic client configuration works * Explore the DNS records required for client configuration * Configure Outlook clients * Troubleshoot client connectivity 6 - CONFIGURE ADMINISTRATIVE ROLES IN MICROSOFT 365 * Explore the Microsoft 365 permission model * Explore the Microsoft 365 admin roles * Assign admin roles to users in Microsoft 365 * Delegate admin roles to partners * Manage permissions using administrative units in Microsoft Entra ID * Elevate privileges using Microsoft Entra Privileged Identity Management * Examine best practices when configuring administrative roles 7 - MANAGE TENANT HEALTH AND SERVICES IN MICROSOFT 365 * Monitor the health of your Microsoft 365 services * Monitor tenant health using Microsoft 365 Adoption Score * Monitor tenant health using Microsoft 365 usage analytics * Develop an incident response plan * Request assistance from Microsoft 8 - DEPLOY MICROSOFT 365 APPS FOR ENTERPRISE * Explore Microsoft 365 Apps for enterprise functionality * Explore your app compatibility by using the Readiness Toolkit * Complete a self-service installation of Microsoft 365 Apps for enterprise * Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager * Deploy Microsoft 365 Apps for enterprise from the cloud * Deploy Microsoft 365 Apps for enterprise from a local source * Manage updates to Microsoft 365 Apps for enterprise * Explore the update channels for Microsoft 365 Apps for enterprise * Manage your cloud apps using the Microsoft 365 Apps admin center 9 - ANALYZE YOUR MICROSOFT 365 WORKPLACE DATA USING MICROSOFT VIVA INSIGHTS * Examine the analytical features of Microsoft Viva Insights * Explore Personal insights * Explore Team insights * Explore Organization insights * Explore Advanced insights 10 - EXPLORE IDENTITY SYNCHRONIZATION * Examine identity models for Microsoft 365 * Examine authentication options for the hybrid identity model * Explore directory synchronization 11 - PREPARE FOR IDENTITY SYNCHRONIZATION TO MICROSOFT 365 * Plan your Microsoft Entra deployment * Prepare for directory synchronization * Choose your directory synchronization tool * Plan for directory synchronization using Microsoft Entra Connect * Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - IMPLEMENT DIRECTORY SYNCHRONIZATION TOOLS * Configure Microsoft Entra Connect prerequisites * Configure Microsoft Entra Connect * Monitor synchronization services using Microsoft Entra Connect Health * Configure Microsoft Entra Connect cloud sync prerequisites * Configure Microsoft Entra Connect cloud sync 13 - MANAGE SYNCHRONIZED IDENTITIES * Manage users with directory synchronization * Manage groups with directory synchronization * Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization * Configure object filters for directory synchronization * Explore Microsoft Identity Manager * Troubleshoot directory synchronization 14 - MANAGE SECURE USER ACCESS IN MICROSOFT 365 * Manage user passwords * Enable pass-through authentication * Enable multifactor authentication * Enable passwordless sign-in with Microsoft Authenticator * Explore self-service password management * Explore Windows Hello for Business * Implement Microsoft Entra Smart Lockout * Implement conditional access policies * Explore Security Defaults in Microsoft Entra ID * Investigate authentication issues using sign-in logs 15 - EXAMINE THREAT VECTORS AND DATA BREACHES * Explore today's work and threat landscape * Examine how phishing retrieves sensitive information * Examine how spoofing deceives users and compromises data security * Compare spam and malware * Examine account breaches * Examine elevation of privilege attacks * Examine how data exfiltration moves data out of your tenant * Examine how attackers delete data from your tenant * Examine how data spillage exposes data outside your tenant * Examine other types of attacks 16 - EXPLORE THE ZERO TRUST SECURITY MODEL * Examine the principles and components of the Zero Trust model * Plan for a Zero Trust security model in your organization * Examine Microsoft's strategy for Zero Trust networking * Adopt a Zero Trust approach 17 - EXPLORE SECURITY SOLUTIONS IN MICROSOFT 365 DEFENDER * Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 * Protect your organization's identities using Microsoft Defender for Identity * Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint * Protect against cyber attacks using Microsoft 365 Threat Intelligence * Provide insight into suspicious activity using Microsoft Cloud App Security * Review the security reports in Microsoft 365 Defender 18 - EXAMINE MICROSOFT SECURE SCORE * Explore Microsoft Secure Score * Assess your security posture with Microsoft Secure Score * Improve your secure score * Track your Microsoft Secure Score history and meet your goals 19 - EXAMINE PRIVILEGED IDENTITY MANAGEMENT * Explore Privileged Identity Management in Microsoft Entra ID * Configure Privileged Identity Management * Audit Privileged Identity Management * Control privileged admin tasks using Privileged Access Management 20 - EXAMINE AZURE IDENTITY PROTECTION * Explore Azure Identity Protection * Enable the default protection policies in Azure Identity Protection * Explore the vulnerabilities and risk events detected by Azure Identity Protection * Plan your identity investigation 21 - EXAMINE EXCHANGE ONLINE PROTECTION * Examine the anti-malware pipeline * Detect messages with spam or malware using Zero-hour auto purge * Explore anti-spoofing protection provided by Exchange Online Protection * Explore other anti-spoofing protection * Examine outbound spam filtering 22 - EXAMINE MICROSOFT DEFENDER FOR OFFICE 365 * Climb the security ladder from EOP to Microsoft Defender for Office 365 * Expand EOP protections by using Safe Attachments and Safe Links * Manage spoofed intelligence * Configure outbound spam filtering policies * Unblock users from sending email 23 - MANAGE SAFE ATTACHMENTS * Protect users from malicious attachments by using Safe Attachments * Create Safe Attachment policies using Microsoft Defender for Office 365 * Create Safe Attachments policies using PowerShell * Modify an existing Safe Attachments policy * Create a transport rule to bypass a Safe Attachments policy * Examine the end-user experience with Safe Attachments 24 - MANAGE SAFE LINKS * Protect users from malicious URLs by using Safe Links * Create Safe Links policies using Microsoft 365 Defender * Create Safe Links policies using PowerShell * Modify an existing Safe Links policy * Create a transport rule to bypass a Safe Links policy * Examine the end-user experience with Safe Links 25 - EXPLORE THREAT INTELLIGENCE IN MICROSOFT 365 DEFENDER * Explore Microsoft Intelligent Security Graph * Explore alert policies in Microsoft 365 * Run automated investigations and responses * Explore threat hunting with Microsoft Threat Protection * Explore advanced threat hunting in Microsoft 365 Defender * Explore threat analytics in Microsoft 365 * Identify threat issues using Microsoft Defender reports 26 - IMPLEMENT APP PROTECTION BY USING MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender Cloud Apps * Deploy Microsoft Defender for Cloud Apps * Configure file policies in Microsoft Defender for Cloud Apps * Manage and respond to alerts in Microsoft Defender for Cloud Apps * Configure Cloud Discovery in Microsoft Defender for Cloud Apps * Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - IMPLEMENT ENDPOINT PROTECTION BY USING MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Configure Microsoft Defender for Endpoint in Microsoft Intune * Onboard devices in Microsoft Defender for Endpoint * Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management * Manage device discovery and vulnerability assessment * Reduce your threat and vulnerability exposure 28 - IMPLEMENT THREAT PROTECTION BY USING MICROSOFT DEFENDER FOR OFFICE 365 * Explore the Microsoft Defender for Office 365 protection stack * Investigate security attacks by using Threat Explorer * Identify cybersecurity issues by using Threat Trackers * Prepare for attacks with Attack simulation training 29 - EXAMINE DATA GOVERNANCE SOLUTIONS IN MICROSOFT PURVIEW * Explore data governance and compliance in Microsoft Purview * Protect sensitive data with Microsoft Purview Information Protection * Govern organizational data using Microsoft Purview Data Lifecycle Management * Minimize internal risks with Microsoft Purview Insider Risk Management * Explore Microsoft Purview eDiscovery solutions 30 - EXPLORE ARCHIVING AND RECORDS MANAGEMENT IN MICROSOFT 365 * Explore archive mailboxes in Microsoft 365 * Enable archive mailboxes in Microsoft 365 * Explore Microsoft Purview Records Management * Implement Microsoft Purview Records Management * Restore deleted data in Exchange Online * Restore deleted data in SharePoint Online 31 - EXPLORE RETENTION IN MICROSOFT 365 * Explore retention by using retention policies and retention labels * Compare capabilities in retention policies and retention labels * Define the scope of a retention policy * Examine the principles of retention * Implement retention using retention policies, retention labels, and eDiscovery holds * Restrict retention changes by using Preservation Lock 32 - EXPLORE MICROSOFT PURVIEW MESSAGE ENCRYPTION * Examine Microsoft Purview Message Encryption * Configure Microsoft Purview Message Encryption * Define mail flow rules to encrypt email messages * Add organizational branding to encrypted email messages * Explore Microsoft Purview Advanced Message Encryption 33 - EXPLORE COMPLIANCE IN MICROSOFT 365 * Plan for security and compliance in Microsoft 365 * Plan your beginning compliance tasks in Microsoft Purview * Manage your compliance requirements with Compliance Manager * Examine the Compliance Manager dashboard * Analyze the Microsoft Compliance score 34 - IMPLEMENT MICROSOFT PURVIEW INSIDER RISK MANAGEMENT * Explore insider risk management * Plan for insider risk management * Explore insider risk management policies * Create insider risk management policies * Investigate insider risk management activities and alerts * Explore insider risk management cases 35 - IMPLEMENT MICROSOFT PURVIEW INFORMATION BARRIERS * Explore Microsoft Purview Information Barriers * Configure information barriers in Microsoft Purview * Examine information barriers in Microsoft Teams * Examine information barriers in OneDrive * Examine information barriers in SharePoint 36 - EXPLORE MICROSOFT PURVIEW DATA LOSS PREVENTION * Examine Data Loss Prevention * Explore Endpoint data loss prevention * Examine DLP policies * View DLP policy results * Explore DLP reports 37 - IMPLEMENT MICROSOFT PURVIEW DATA LOSS PREVENTION * Plan to implement Microsoft Purview Data Loss Protection * Implement Microsoft Purview's default DLP policies * Design a custom DLP policy * Create a custom DLP policy from a template * Configure email notifications for DLP policies * Configure policy tips for DLP policies 38 - IMPLEMENT DATA CLASSIFICATION OF SENSITIVE INFORMATION * Explore data classification * Implement data classification in Microsoft 365 * Explore trainable classifiers * Create and retrain a trainable classifier * View sensitive data using Content explorer and Activity explorer * Detect sensitive information documents using Document Fingerprinting 39 - EXPLORE SENSITIVITY LABELS * Manage data protection using sensitivity labels * Explore what sensitivity labels can do * Determine a sensitivity label's scope * Apply sensitivity labels automatically * Explore sensitivity label policies 40 - IMPLEMENT SENSITIVITY LABELS * Plan your deployment strategy for sensitivity labels * Examine the requirements to create a sensitivity label * Create sensitivity labels * Publish sensitivity labels * Remove and delete sensitivity labels ADDITIONAL COURSE DETAILS: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online6 days, Jun 17th, 13:00 + 8 more
£2975

Real Estate Financial Modelling School

4.3(5)

By Bayfield Training

This week long CPD accredited training is ideal for those Real Estate professionals, who are looking to bolster the DCF modelling skills. This course covers Real Estate Investment, Development, Finance & Risk.

Real Estate Financial Modelling School
Delivered Online or in person5 days, Jun 17th, 09:00 + 2 more
£4600

Tableau for Data-Driven Decision Makers

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for professionals in a variety of job roles who receive Tableau data visualizations from data analysts or from data visualization engineers. These data report recipients want to take advantage of the many Tableau features and capabilities that enable them to explore the data behind the initial analysis, perform additional analysis to ask next-level questions of the data, and to customize visualizations and dashboards to share new insights and create compelling reports. Overview Explore Tableau reports. Analyze data to get answers and insights. Sort and group data for analysis and reporting. Filter views. Prepare reports. Troubleshoot, collaborate, and share views and analysis As data acquisition, access, analysis, and reporting are interwoven with our businesses and lives, more and more data is collected about business and personal activities. This abundance of data and the computing power to analyze it has increased the use of data analysis and data visualization across a broad range of job roles. Decision makers of all types, including managers and executives, must interact with, interpret, and develop reports based on data and analysis provided to them. Tableau© software is designed for data analysis and the creation of visualizations. Data analysts prepare data, perform initial analysis, and create visualizations that are then passed on to business data-driven decision makers. These decision makers can use Tableau's tools to explore the data, perform further analysis to find new insights, make decisions, and create customized reports to share their findings. Prerequisites To ensure your success in this course, you should have experience managing data with Microsoft© Excel© or Google Sheets? LESSON 1: EXPLORING TABLEAU REPORTS * Topic A: Data Analysis Workflow with Tableau * Topic B: Explore Views * Topic C: Edit Workbooks LESSON 2: ANALYZING DATA TO GET ANSWERS AND INSIGHTS * Topic A: Configure Marks with the Marks Card * Topic B: Ask New Questions by Changing Aggregation * Topic C: Find Answers with Calculations * Topic D: Answer Questions with Table Calculations LESSON 3: SORTING AND GROUPING DATA FOR ANALYSIS AND REPORTING * Topic A: Sort Data * Topic B: Group Data LESSON 4: FILTERING VIEWS * Topic A: Filter Data to Refine Analysis * Topic B: Create Interactive Filters for Reports LESSON 5: PREPARING REPORTS * Topic A: Format and Annotate Views to Tell Your Story * Topic B: Emphasize Data in Reports * Topic C: Animate Visualizations for Clarity LESSON 6: TROUBLESHOOTING, SHARING, AND COLLABORATING * Topic A: Troubleshoot Data Issues * Topic B: Collaborate in Tableau Online * Topic C: Collaborate with Non-Tableau Users

Tableau for Data-Driven Decision Makers
Delivered OnlineTwo days, Jun 17th, 13:00
£695

Real Estate Analyst (Investment Cash Flow Modelling in Excel)

4.3(5)

By Bayfield Training

The Real Estate Analyst course has been taught non-stop to global real estate firms over the last 25 years, and is without doubt the core financial modelling training in your career portfolio. Whether you have an upcoming financial modelling test for a new job or an APC exam, the Real Estate Analyst course is the choice for you.

Real Estate Analyst (Investment Cash Flow Modelling in Excel)
Delivered Online or in personTwo days, Jun 17th, 09:00 + 6 more
£1750

Critical Thinking

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who want to become more rational and disciplined thinkers. Overview Upon successful completion of this course, students will boost their performance with an increase in their decision-making ability. In this course, students will learn develop their ability to analyze and evaluate information. 1 - GETTING STARTED * Icebreaker * Housekeeping Items * The Parking Lot * Workshop Objectives 2 - COMPONENTS OF CRITICAL THINKING * Applying Reason * Open Mindedness * Analysis * Logic * Case Study 3 - NON-LINEAR THINKING * Step Out of Your Comfort Zone * Don't Jump to Conclusions * Expect and Initiate Change * Being Ready to Adapt * Case Study 4 - LOGICAL THINKING * Ask the Right Questions * Organize the Data * Evaluate the Information * Draw Conclusions * Case Study 5 - CRITICAL THINKERS (I) * Active Listening * Be Curious * Be Disciplined * Be Humble * Case Study 6 - CRITICAL THINKERS (II) * Seeing the Big Picture * Objectivity * Using Your Emotions * Being Self-Aware * Case Study 7 - EVALUATE INFORMATION * Making Assumptions * Watch out for Bias * Ask Clarifying Questions * SWOT Analysis * Case Study 8 - BENEFITS OF CRITICAL THINKING * Being More Persuasive * Better Communication * Better Problem Solving * Increased Emotional Intelligence * Case Study 9 - CHANGING YOUR PERSPECTIVE * Limitations of Your Point of View * Considering Others Viewpoint * Influences on Bias * When New Information Arrives * Case Study 10 - PROBLEM SOLVING * Identify Inconsistencies * Trust Your Instincts * Asking Why? * Evaluate the Solution(s) * Case Study 11 - PUTTING IT ALL TOGETHER * Retaining Your New Skills * Reflect and Learn From Mistakes * Always Ask Questions * Practicing Critical Thinking * Case Study 12 - WRAPPING UP * Words from the Wise * Review of Parking Lot * Lessons Learned * Completion of Action Plans and Evaluations

Critical Thinking
Delivered OnlineTwo days, Jun 18th, 13:00
£395

Educators matching "Intelligence"

Show all 841