• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3545 Technology courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

ITIL© 4 Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for anyone who needs an understanding of IT Service Management to help deliver better value to customers. It is appropriate for all IT staff and management, as well as customers who work closely with IT to support business requirements. This course is also designed for students who are seeking the ITIL© 4 Foundation certification and who want to prepare for ITIL© 4 Foundation exam. Overview By the completion of this course, you will have a deep understanding of the 7 Guiding Principles, 4 Dimensions of Service Management, 34 ITIL© Practices, and the new Service Value Chain that incorporate the core of ITIL© version 4. ITIL© is the world?s leading best practice framework for implementing IT Service Management. ITIL version 4 introduces IT Service Management through the lens of a Service Value System (SVS), which provides a holistic end-to-end view of how to successfully contribute to business value, and also how to leverage concepts from models such as Lean IT, Agile, DevOps and Organizational Change Management. This foundational course immerses you in the guiding principles, dimensions, and practices of ITIL© 4. This course will earn you 21 PDUs. This class includes an exam voucher. 1 - ITIL 4 OVERVIEW * Introduction to ITIL * Key Concepts of ITIL 2 - THE ITIL FRAMEWORK * The Four Dimensions of Service Management * The ITIL Service Value System 3 - THE ITIL GUIDING PRINCIPLES * Focus on Value * Start Where You Are * Progress Iteratively with Feedback * Collaborate and Promote Visibility * Think and Work Holistically * Keep It Simple and Practical * Optimize and Automate 4 - THE ITIL SERVICE VALUE SYSTEM (SVS) * Governance * The Service Value Chain * Continual Improvement 5 - KEY ITIL PRACTICES * Continual Improvement * Service Level Management * Change Control * Incident Management * Service Request Management * Service Desk * Problem Management 6 - OTHER ITIL PRACTICES * General Management Practices * Service Management Practices * Technical Management Practices

ITIL© 4 Foundation
Delivered Online4 days, Jun 3rd, 13:00 + 29 more
£1695

55348 Administering Microsoft Endpoint Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site 2 - ANALYZING DATA USING QUERIES, REPORTS, AND CMPIVOT * Introduction to queries * Configuring SQL Server Reporting Services * Analyzing the real-time state of a device by using CMPivot 3 - PREPARING THE CONFIGURATION MANAGER MANAGEMENT INFRASTRUCTURE * Configuring site boundaries and boundary groups * Configuring resource discovery * Organizing resources using device and user collections 4 - DEPLOYING AND MANAGING THE CONFIGURATION MANAGER CLIENT * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings and performing management operations 5 - MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence 6 - DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points 7 - DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying and managing Windows apps 8 - MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Enabling third-party updates 9 - IMPLEMENTING DEFENDER PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Configuring and deploying advanced threat policies 10 - MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance settings * Viewing compliance results * Managing resource and data access 11 - MANAGING OPERATING SYSTEM DEPLOYMENT * An overview of operating system deployment * Preparing a site for operating system deployment * Deploying an operating system * Managing Windows as a service 12 - MANAGING AND MAINTAINING A CONFIGURATION MANAGER SITE * Configuring role-based administration * Configuring Remote Tools * Overview of Configuration Manager site maintenance and Management Insights * Backing up and recovering a Configuration Manager site * Updating the Configuration Manager infrastructure 13 - WHAT?S NEW IN MICROSOFT ENDPOINT CONFIGURATION MANAGER * Whats new in Microsoft Endpoint Manager covering each semi annual release ADDITIONAL COURSE DETAILS: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55348 Administering Microsoft Endpoint Configuration Manager
Delivered Online6 days, Jun 3rd, 13:00 + 5 more
£2975

Professional Diploma in UX Design

By UX Design Institute

Become a Certified User Experience Professional Build a career in UX with the world’s only university credit-rated online UX course. Acquire the mindset, the skills and the confidence that make UX designers so valuable. A rewarding and meaningful career awaits. Why become a UX designer? * Be in demand UX is a high-growth sector. The demand for UX designers far outstrips the supply of qualified professionals. * Get well paid UX designers are highly paid. The average entry-level salary for a UX designer in the United Kingdom is £35,465 (PayScale, 2019) * Love your job UX designers make an impact. They solve real-world problems using an exciting mix of research, design, technology and psychology. -------------------------------------------------------------------------------- Study method Online, self-paced Duration 6 months Access to content 12 months Qualification Level 8 Diploma - User Experience Design Awarded by Glasgow Caledonian University Regulated by SQA Additional info Exam(s) / assessment(s) is included in price Tutor is available to students -------------------------------------------------------------------------------- DESCRIPTION * Duration: 6 months Get certified in six months following a flexible, structured learning path. * Delivery: Online The course is delivered entirely online, including video modules, mentor-led webinars and support. * Assessment: 2-hour exam Before getting certified, you'll be assessed during a two-hour exam taken online. Outcomes for you * Think like a UX designer; adopt the mindset that sets them apart * Showcase your knowledge with a portfolio of project work * Speak with the confidence that comes from a true, deep understanding of UX * Advance your career with job-ready skills * Complete a university credit-rated course, valued by employers globally * Become a Certified UX Professional Learn with us We’ve worked hard to design the best possible online learning experience for you. As well as an unmatched syllabus, our approach includes: * Projects & portfolio Learn by doing with a series of real-world projects ideal for your UX portfolio. * Mentors & webinars Be guided by our hand-picked, world-class mentors during monthly webinars. * Structure & support Stay motivated with a structured programme supported by fellow students and our customer success team. What you’ll learn We’ve put together a university credit-rated curriculum that’s deep, rigorous and covers everything you need to know to become a certified UX professional and turbocharge your career. * Module 01 - Introduction to UX design * Module 02 - User research * Module 03 - User goals * Module 04 - Structure and navigation * Module 05 - Interactions * Module 06 - Design principles * Module 07 - Design patterns * Module 08 - Mobile * Module 09 - Workflows * Module 10 - Prototyping and wireframing * Projects and portfolio - Projects that build into a portfolio * Exam - 2-hour final exam REQUIREMENTS Background You don’t need experience in design or technology to enrol in our courses, although having one or both is a definite bonus. Our students come from a diverse array of backgrounds, including project management, development, graphic design, product management, business analysis and so on. Commitment You do need to be motivated and committed. We set a high bar. Studying for one of our professional qualifications requires a certain amount of time, energy and focus. Our team will be there to support you along every step of the way but success will come as a result of your own diligence. CAREER PATH * The average salary for entry level user experience designers is £28,000 * The average salary for user experience designers with 1-5 years experience ranges from £29,000 to £50,000 * The average salary for user experience managers/leads is £80,000 Information from LinkedIn Salary Reports, based on real jobs listings.

Professional Diploma in UX Design
Delivered Online6 months, Jun 4th, 08:00 + 7 more
£2750

Access to Finance

By Let’s Do Business Group

Looking to bring your business growth ideas to life but need a cash injection? Join us at our FREE online webinar

Access to Finance
Delivered Online1 hour, Jun 4th, 09:00
FREE

DevOps Foundation©

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Foundation course includes Management, Operations, Developers, QA and Testing professionals such as: Individuals involved in IT development IT operations or IT service management. Individuals who require an understanding of DevOps principles. IT professionals working within, or about to enter, an Agile Service Design Environment The following IT roles: Automation Architects, Application Developers, Business Analysts, Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Consultants, DevOps Engineers, Infrastructure Architect, Integration Specialists, IT Directors, IT Managers, IT Operations, IT Team Leaders, Lean Coaches, Network Administrators, Operations Managers, Project Managers, Release Engineers, Software Developers, Software Tester/QA, System Administrators, Systems Engineers, System Integrators, Tool Providers. Overview The learning objectives for DevOps Foundation include an understanding of: DevOps objectives and vocabulary Benefits to the business and IT Principles and practices including Continuous Integration, Continuous Delivery, testing, security and the Three Ways DevOps relationship to Agile, Lean and ITSM Improved workflows, communication and feedback loops Automation practices including deployment pipelines and DevOps toolchains Scaling DevOps for the enterprise Critical success factors and key performance indicators Real-life examples and results The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organizational success. Learners will gain an understanding of DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation to improve the flow of work between software developers and IT operations professionals. This course prepares you for the DevOps Foundation (DOFD) certification. EXPLORING DEVOPS * Defining DevOps * Why Does DevOps Matter? * CORE DEVOPS PRINCIPLES * The Three Ways * The First Way * The Theory of Constraints * The Second Way * The Third Way * Chaos Engineering * Learning Organizations KEY DEVOPS PRACTICES * Continuous Testing, Integration, Delivery, Deployment * Site Reliability & Resilience Engineering * DevSecOps * ChatOps * Kanban BUSINESS AND TECHNOLOGY FRAMEWORKS * Agile * ITSM * Lean * Safety Culture * Learning Organizations * Continuous Funding CULTURE, BEHAVIORS & OPERATING MODELS * Defining Culture * Cultural Debt * Behavioral Models * Organizational maturity models AUTOMATION & ARCHITECTING DEVOPS TOOLCHAINS * CI/CD * Cloud, Containers, and Microservices * AI and Machine Learning * Automation * DevOps Toolchains MEASUREMENT, METRICS, AND REPORTING * The Importance of Measurement * DevOps Metrics - Speed, Quality, Stability, Culture * Change lead/cycle time * Value Driven Metrics SHARING, SHADOWING AND EVOLVING * DevOps in the Enterprise * Roles * DevOps Leadership * Organizational Considerations * Getting Started * Challenges, Risks, and Critical Success Factors ADDITIONAL COURSE DETAILS: Nexus Humans DevOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevOps Foundation©
Delivered Online3 days, Jun 4th, 13:00 + 2 more
£1495

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - INTRODUCTION TO MICROSOFT 365 THREAT PROTECTION * Explore Extended Detection & Response (XDR) response use cases * Understand Microsoft Defender XDR in a Security Operations Center (SOC) * Explore Microsoft Security Graph * Investigate security incidents in Microsoft Defender XDR 2 - MITIGATE INCIDENTS USING MICROSOFT 365 DEFENDER * Use the Microsoft Defender portal * Manage incidents * Investigate incidents * Manage and investigate alerts * Manage automated investigations * Use the action center * Explore advanced hunting * Investigate Microsoft Entra sign-in logs * Understand Microsoft Secure Score * Analyze threat analytics * Analyze reports * Configure the Microsoft Defender portal 3 - PROTECT YOUR IDENTITIES WITH MICROSOFT ENTRA ID PROTECTION * Microsoft Entra ID Protection overview * Detect risks with Microsoft Entra ID Protection policies * Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - REMEDIATE RISKS WITH MICROSOFT DEFENDER FOR OFFICE 365 * Automate, investigate, and remediate * Configure, protect, and detect * Simulate attacks 5 - SAFEGUARD YOUR ENVIRONMENT WITH MICROSOFT DEFENDER FOR IDENTITY * Configure Microsoft Defender for Identity sensors * Review compromised accounts or data * Integrate with other Microsoft tools 6 - SECURE YOUR CLOUD APPS AND SERVICES WITH MICROSOFT DEFENDER FOR CLOUD APPS * Understand the Defender for Cloud Apps Framework * Explore your cloud apps with Cloud Discovery * Protect your data and apps with Conditional Access App Control * Walk through discovery and access control with Microsoft Defender for Cloud Apps * Classify and protect sensitive information * Detect Threats 7 - RESPOND TO DATA LOSS PREVENTION ALERTS USING MICROSOFT 365 * Describe data loss prevention alerts * Investigate data loss prevention alerts in Microsoft Purview * Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - MANAGE INSIDER RISK IN MICROSOFT PURVIEW * Insider risk management overview * Create and manage insider risk policies * Investigate insider risk alerts * Take action on insider risk alerts through cases * Manage insider risk management forensic evidence * Create insider risk management notice templates 9 - INVESTIGATE THREATS BY USING AUDIT FEATURES IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW STANDARD * Explore Microsoft Purview Audit solutions * Implement Microsoft Purview Audit (Standard) * Start recording activity in the Unified Audit Log * Search the Unified Audit Log (UAL) * Export, configure, and view audit log records * Use audit log searching to investigate common support issues 10 - INVESTIGATE THREATS USING AUDIT IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW (PREMIUM) * Explore Microsoft Purview Audit (Premium) * Implement Microsoft Purview Audit (Premium) * Manage audit log retention policies * Investigate compromised email accounts using Purview Audit (Premium) 11 - INVESTIGATE THREATS WITH CONTENT SEARCH IN MICROSOFT PURVIEW * Explore Microsoft Purview eDiscovery solutions * Create a content search * View the search results and statistics * Export the search results and search report * Configure search permissions filtering * Search for and delete email messages 12 - PROTECT AGAINST THREATS WITH MICROSOFT DEFENDER FOR ENDPOINT * Practice security administration * Hunt threats within your network 13 - DEPLOY THE MICROSOFT DEFENDER FOR ENDPOINT ENVIRONMENT * Create your environment * Understand operating systems compatibility and features * Onboard devices * Manage access * Create and manage roles for role-based access control * Configure device groups * Configure environment advanced features 14 - IMPLEMENT WINDOWS SECURITY ENHANCEMENTS WITH MICROSOFT DEFENDER FOR ENDPOINT * Understand attack surface reduction * Enable attack surface reduction rules 15 - PERFORM DEVICE INVESTIGATIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Use the device inventory list * Investigate the device * Use behavioral blocking * Detect devices with device discovery 16 - PERFORM ACTIONS ON A DEVICE USING MICROSOFT DEFENDER FOR ENDPOINT * Explain device actions * Run Microsoft Defender antivirus scan on devices * Collect investigation package from devices * Initiate live response session 17 - PERFORM EVIDENCE AND ENTITIES INVESTIGATIONS USING MICROSOFT DEFENDER FOR ENDPOINT * Investigate a file * Investigate a user account * Investigate an IP address * Investigate a domain 18 - CONFIGURE AND MANAGE AUTOMATION USING MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Manage automation upload and folder settings * Configure automated investigation and remediation capabilities * Block at risk devices 19 - CONFIGURE FOR ALERTS AND DETECTIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Configure alert notifications * Manage alert suppression * Manage indicators 20 - UTILIZE VULNERABILITY MANAGEMENT IN MICROSOFT DEFENDER FOR ENDPOINT * Understand vulnerability management * Explore vulnerabilities on your devices * Manage remediation 21 - PLAN FOR CLOUD WORKLOAD PROTECTIONS USING MICROSOFT DEFENDER FOR CLOUD * Explain Microsoft Defender for Cloud * Describe Microsoft Defender for Cloud workload protections * Enable Microsoft Defender for Cloud 22 - CONNECT AZURE ASSETS TO MICROSOFT DEFENDER FOR CLOUD * Explore and manage your resources with asset inventory * Configure auto provisioning * Manual log analytics agent provisioning 23 - CONNECT NON-AZURE RESOURCES TO MICROSOFT DEFENDER FOR CLOUD * Protect non-Azure resources * Connect non-Azure machines * Connect your AWS accounts * Connect your GCP accounts 24 - MANAGE YOUR CLOUD SECURITY POSTURE MANAGEMENT? * Explore Secure Score * Explore Recommendations * Measure and enforce regulatory compliance * Understand Workbooks 25 - EXPLAIN CLOUD WORKLOAD PROTECTIONS IN MICROSOFT DEFENDER FOR CLOUD * Understand Microsoft Defender for servers * Understand Microsoft Defender for App Service * Understand Microsoft Defender for Storage * Understand Microsoft Defender for SQL * Understand Microsoft Defender for open-source databases * Understand Microsoft Defender for Key Vault * Understand Microsoft Defender for Resource Manager * Understand Microsoft Defender for DNS * Understand Microsoft Defender for Containers * Understand Microsoft Defender additional protections 26 - REMEDIATE SECURITY ALERTS USING MICROSOFT DEFENDER FOR CLOUD * Understand security alerts * Remediate alerts and automate responses * Suppress alerts from Defender for Cloud * Generate threat intelligence reports * Respond to alerts from Azure resources 27 - CONSTRUCT KQL STATEMENTS FOR MICROSOFT SENTINEL * Understand the Kusto Query Language statement structure * Use the search operator * Use the where operator * Use the let statement * Use the extend operator * Use the order by operator * Use the project operators 28 - ANALYZE QUERY RESULTS USING KQL * Use the summarize operator * Use the summarize operator to filter results * Use the summarize operator to prepare data * Use the render operator to create visualizations 29 - BUILD MULTI-TABLE STATEMENTS USING KQL * Use the union operator * Use the join operator 30 - WORK WITH DATA IN MICROSOFT SENTINEL USING KUSTO QUERY LANGUAGE * Extract data from unstructured string fields * Extract data from structured string data * Integrate external data * Create parsers with functions 31 - INTRODUCTION TO MICROSOFT SENTINEL * What is Microsoft Sentinel? * How Microsoft Sentinel works * When to use Microsoft Sentinel 32 - CREATE AND MANAGE MICROSOFT SENTINEL WORKSPACES * Plan for the Microsoft Sentinel workspace * Create a Microsoft Sentinel workspace * Manage workspaces across tenants using Azure Lighthouse * Understand Microsoft Sentinel permissions and roles * Manage Microsoft Sentinel settings * Configure logs 33 - QUERY LOGS IN MICROSOFT SENTINEL * Query logs in the logs page * Understand Microsoft Sentinel tables * Understand common tables * Understand Microsoft Defender XDR tables 34 - USE WATCHLISTS IN MICROSOFT SENTINEL * Plan for watchlists * Create a watchlist * Manage watchlists 35 - UTILIZE THREAT INTELLIGENCE IN MICROSOFT SENTINEL * Define threat intelligence * Manage your threat indicators * View your threat indicators with KQL 36 - CONNECT DATA TO MICROSOFT SENTINEL USING DATA CONNECTORS * Ingest log data with data connectors * Understand data connector providers * View connected hosts 37 - CONNECT MICROSOFT SERVICES TO MICROSOFT SENTINEL * Plan for Microsoft services connectors * Connect the Microsoft Office 365 connector * Connect the Microsoft Entra connector * Connect the Microsoft Entra ID Protection connector * Connect the Azure Activity connector 38 - CONNECT MICROSOFT DEFENDER XDR TO MICROSOFT SENTINEL * Plan for Microsoft Defender XDR connectors * Connect the Microsoft Defender XDR connector * Connect Microsoft Defender for Cloud connector * Connect Microsoft Defender for IoT * Connect Microsoft Defender legacy connectors 39 - CONNECT WINDOWS HOSTS TO MICROSOFT SENTINEL * Plan for Windows hosts security events connector * Connect using the Windows Security Events via AMA Connector * Connect using the Security Events via Legacy Agent Connector * Collect Sysmon event logs 40 - CONNECT COMMON EVENT FORMAT LOGS TO MICROSOFT SENTINEL * Plan for Common Event Format connector * Connect your external solution using the Common Event Format connector 41 - CONNECT SYSLOG DATA SOURCES TO MICROSOFT SENTINEL * Plan for syslog data collection * Collect data from Linux-based sources using syslog * Configure the Data Collection Rule for Syslog Data Sources * Parse syslog data with KQL 42 - CONNECT THREAT INDICATORS TO MICROSOFT SENTINEL * Plan for threat intelligence connectors * Connect the threat intelligence TAXII connector * Connect the threat intelligence platforms connector * View your threat indicators with KQL 43 - THREAT DETECTION WITH MICROSOFT SENTINEL ANALYTICS * What is Microsoft Sentinel Analytics? * Types of analytics rules * Create an analytics rule from templates * Create an analytics rule from wizard * Manage analytics rules 44 - AUTOMATION IN MICROSOFT SENTINEL * Understand automation options * Create automation rules 45 - THREAT RESPONSE WITH MICROSOFT SENTINEL PLAYBOOKS * What are Microsoft Sentinel playbooks? * Trigger a playbook in real-time * Run playbooks on demand 46 - SECURITY INCIDENT MANAGEMENT IN MICROSOFT SENTINEL * Understand incidents * Incident evidence and entities * Incident management 47 - IDENTIFY THREATS WITH BEHAVIORAL ANALYTICS * Understand behavioral analytics * Explore entities * Display entity behavior information * Use Anomaly detection analytical rule templates 48 - DATA NORMALIZATION IN MICROSOFT SENTINEL * Understand data normalization * Use ASIM Parsers * Understand parameterized KQL functions * Create an ASIM Parser * Configure Azure Monitor Data Collection Rules 49 - QUERY, VISUALIZE, AND MONITOR DATA IN MICROSOFT SENTINEL * Monitor and visualize data * Query data using Kusto Query Language * Use default Microsoft Sentinel Workbooks * Create a new Microsoft Sentinel Workbook 50 - MANAGE CONTENT IN MICROSOFT SENTINEL * Use solutions from the content hub * Use repositories for deployment 51 - EXPLAIN THREAT HUNTING CONCEPTS IN MICROSOFT SENTINEL * Understand cybersecurity threat hunts * Develop a hypothesis * Explore MITRE ATT&CK 52 - THREAT HUNTING WITH MICROSOFT SENTINEL * Explore creation and management of threat-hunting queries * Save key findings with bookmarks * Observe threats over time with livestream 53 - USE SEARCH JOBS IN MICROSOFT SENTINEL * Hunt with a Search Job * Restore historical data 54 - HUNT FOR THREATS USING NOTEBOOKS IN MICROSOFT SENTINEL * Access Azure Sentinel data with external tools * Hunt with notebooks * Create a notebook * Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered Online5 days, Jun 4th, 13:00 + 3 more
£2380

Mixing Techniques Stage 2 - Advanced mix tools and mastering (6-week course every Tuesday evening)

0.0(2)

By MakeNoiseAcademy

MIXING TECHNIQUES STAGE 2 EVERY TUESDAY FOR SIX WEEKS 5pm - 9pm So you've worked out how to EQ things, when to use a compressor, how to manipulate the space with reverb and how much fun modulation effects can be. BUT ever feel like there's something they're just not telling you? This course gives you answers to the questions you didn't even know to ask!

Mixing Techniques Stage 2 - Advanced mix tools and mastering (6-week course every Tuesday evening)
Delivered In-Person in Sheffield6 weeks, Jun 4th, 16:00 + 5 more
£100

Professional Certificate in UI Design

By UX Design Institute

Become a certified UI designer * Learn how to create beautiful, pixel-perfect user interfaces * Accelerate your career with an in-demand skillset * Get a professional qualification in just 12 weeks * Manage your own schedule with our flexible, self-paced online course Expand your career options UI skills are needed worldwide, and demand is growing. With a globally recognised qualification, you’ll become a more valuable, sought-after professional. Design with confidence You’ll understand the ‘why’ of good UI design by knowing the principles behind it. You’ll be able to defend your decisions and design with confidence. Work in a creative, rewarding job UI designers add personality and visual appeal to user interfaces. It’s an enjoyable career that rewards creativity: the perfect entry into tech for visually-minded people. A flexible, university-backed curriculum Our curriculum is university credit-rated and approved by the industry. Over 12 weeks, you’ll learn the principles and skills you need to become a confident UI designer. -------------------------------------------------------------------------------- Study method Online, self-paced Duration 12 weeks Access to content 12 months Qualification Professional Certificate in UI Design Awarded by Scottish Qualifications Authority trading as SQA Additional info Exam(s) / assessment(s) is included in price Tutor is available to students -------------------------------------------------------------------------------- DESCRIPTION During this 12 week, online course you will learn: * Introduction to UI Design * Brand and Personality * Layout * Design Principles * Interactivity * Typography * Colour, shapes and effects * Iconography and imagery * Design process * Presenting ideas * UI design tools You will also work on a project and your portfolio with access to weekly mentor sessions, an active student community, and support from our student success team. WHO IS THIS COURSE FOR? * Graphic designers and digital designers who want to upskill to UI design * UI designers who want to strengthen their knowledge and craft * UX professionals who want to become more rounded product designers * Anybody with a design background looking for a creative job in tech REQUIREMENTS You don’t need experience in design or technology to enrol in our courses, although having one or both is a definite bonus. Our students come from a diverse mix of backgrounds, including project management, development, graphic design, product management, business analysis and so on. You need to be motivated and committed. We set a high bar. Studying for one of our professional qualifications requires a certain amount of time, energy and focus. You need to be comfortable learning in English. All video lessons, course materials, webinars, correspondence and the final exam are delivered in English. CAREER PATH Students typically graduate into UI Designer jobs. The average UI Designer salary in the UK with 3-5 years experience is £62,500. This is based on data from Payscale, Totaljobs, Indeed, Talent, and Glassdoor

Professional Certificate in UI Design
Delivered Online12 weeks, Jun 5th, 08:00 + 7 more
£1750

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - A. ORGANIZATIONAL GOVERNANCE * Organizational Strategy, Goals, and Objectives * Organizational Structure, Roles, and Responsibilities * Organizational Culture * Policies and Standards * Business Processes * Organizational Assets GOVERNANCE - B. RISK GOVERNANCE * Enterprise Risk Management and Risk Management Framework * Three Lines of Defense * Risk Profile * Risk Appetite and Risk Tolerance * Legal, Regulatory, and Contractual Requirements * Professional Ethics of Risk Management IT RISK ASSESSMENT - A. IT RISK IDENTIFICATION * Risk Events (e.g., contributing conditions, loss result) * Threat Modelling and Threat Landscape * Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) * Risk Scenario Development IT RISK ASSESSMENT - B. IT RISK ANALYSIS AND EVALUATION * Risk Assessment Concepts, Standards, and Frameworks * Risk Register * Risk Analysis Methodologies * Business Impact Analysis * Inherent and Residual Risk RISK RESPONSE AND REPORTING - A. RISK RESPONSE * Risk Treatment / Risk Response Options * Risk and Control Ownership * Third-Party Risk Management * Issue, Finding, and Exception Management * Management of Emerging Risk RISK RESPONSE AND REPORTING - B. CONTROL DESIGN AND IMPLEMENTATION * Control Types, Standards, and Frameworks * Control Design, Selection, and Analysis * Control Implementation * Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - C. RISK MONITORING AND REPORTING * Risk Treatment Plans * Data Collection, Aggregation, Analysis, and Validation * Risk and Control Monitoring Techniques * Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) * Key Performance Indicators * Key Risk Indicators (KRIs) * Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - A. INFORMATION TECHNOLOGY PRINCIPLES * Enterprise Architecture * IT Operations Management (e.g., change management, IT assets, problems, incidents) * Project Management * Disaster Recovery Management (DRM) * Data Lifecycle Management * System Development Life Cycle (SDLC) * Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - B. INFORMATION SECURITY PRINCIPLES * Information Security Concepts, Frameworks, and Standards * Information Security Awareness Training * Business Continuity Management * Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered Online4 days, Jun 5th, 13:00 + 2 more
£2037

SharePoint - Site Basics (Modern Experience)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for Microsoft© Windows© and Microsoft Office users who are transitioning to a SharePoint environment, and who need to access information from and collaborate with team members within Microsoft SharePoint. Overview Launch a SharePoint site and navigate among the pages and resources provided by the site. Use SharePoint lists to track and view information. Use document libraries to store and organize documents. Find, share, and archive content stored in SharePoint. Author documents as a member of a SharePoint team site. Use SharePoint workflow automation tools. In many professional environments, people work collaboratively in teams. Information technology and applications facilitate this by enabling people to easily share, access, edit, and save information. Microsoft© SharePoint© is a platform specifically designed to facilitate communication and collaboration, enabling people to use familiar applications and web-based tools to create, access, store, and track documents and data in a central location. In this course, you will use SharePoint to access, store, share, and collaborate with information and documents. Prerequisites To ensure your success in this course, you should have basic end-user skills with a current version of Microsoft Windows. LESSON 1: NAVIGATING SHAREPOINT SITES * Topic A: Launch SharePoint * Topic B: Gain Access to a Site You Didn't Create * Topic C: Navigate Within a SharePoint Site * Topic D: Access SharePoint from Your Mobile Device LESSON 2: USING LISTS TO TRACK INFORMATION * Topic A: Add and Populate Lists * Topic B: Change View Options * Topic C: Create a Custom View LESSON 3: USING DOCUMENT LIBRARIES TO SHARE AND ORGANIZE DOCUMENTS * Topic A: Store Files in a Document Library * Topic B: Create and Use Document Templates LESSON 4: FINDING, SHARING, AND ARCHIVING CONTENT * Topic A: Search for Items in Lists or Libraries * Topic B: Share Through Links * Topic C: Move Files Offline LESSON 5: AUTHORING DOCUMENTS AS A TEAM * Topic A: Work Together on Documents * Topic B: Manage File Versions and Document Recovery LESSON 6: AUTOMATING BUSINESS PROCESSES * Topic A: Use Rule-Based Automation * Topic B: Use Power Automate to Automate a Workflow

SharePoint - Site Basics (Modern Experience)
Delivered OnlineTwo days, Jun 5th, 13:00 + 1 more
£495

Educators matching "Technology"

Show all 3221
The Technology Academy

the technology academy

1.0(1)

Winchester

Founded in 2007, we are an independent company that develops and delivers online training courses in the specialised fields of radio frequency (RF), wireless and microwave technology. Our instruction is focused is on teaching practical, relevant and up-to-date technical skills and knowledge, underpinned by essential theory that can be immediately applied in the workplace. Our Instructors As experts in their respective fields, all of our instructors are carefully selected from leading technology companies and universities for their comprehensive knowledge and experience of the subject matter they teach. Each has an ability to translate complex technical theory into practical, understandable and relevant concepts and convey this to a professional audience in an effective, lively and enthusiastic manner. Our Aim We aim to deliver technology training excellence in an engaging and enthusiastic manner, inspiring individuals to achieve their goals while adding measurable value to their companies and organisations. All of our courses are taught by leading technical experts from industry and academia with many years of experience in their specialist fields. Our Mission Our mission is to provide technology professionals with relevant and up-to-date technical skills and knowledge in order to significantly enhance their productivity and increase the competitive advantage of their employers. Our Vision Our vision is to be widely known within our technology niches as a premium provider of training courses, setting a respected benchmark for technology education excellence. Our Values The following six core values are central to how we operate: Responsive – We continually adapt and update courses to encompass feedback, technology developments and best learning practices. Stimulating – We deliver remarkable training in an engaging and enthusiastic manner, inspiring individuals to achieve their goals. Supportive – We provide help and support, so that individuals develop the skills and knowledge required for success in their chosen field. Focused – We deliver results that make a positive impact on individuals and add measurable value to their companies and organisations. Integrity – We operate with uncompromising integrity and a commitment to financial responsibility. Professional – We treat staff, instructors, delegates and their organisations with utmost respect and continually strive for excellence.

Women's Technology Training

women's technology training

4.3(71)

Liverpool

Blackburne House, formerly the Women’s Technology and Education Centre (WTEC), was established in 1983 with the aim of progressing women from disadvantaged backgrounds into employment within technical professions – an area in which, at the time, women were significantly under-represented. The organisation grew quickly and considerably and, in 1991, moved into new premises in Liverpool’s famous Georgian Quarter. More than £4m was raised in order to breathe new life back into Blackburne House and the beautiful, Grade II-listed building became our new home. Today, Blackburne House is a vibrant and thriving organisation and one of the country’s leading education centres for women – but we wouldn’t have experienced the growth we have without the help of our partner organisations. Over the years, we have established a number of successful social enterprises that succeed in supporting our educational aims and provide tangible examples of how new markets can be used to serve local communities. Attracting thousands of visitors each year, our facilities now include a thriving bistro, health spa, conference and events facilities and a 30-place nursery. HISTORY OF THE BULDING Blackburne House is a stunning Grade II-listed building, situated on Hope Street in Liverpool’s famous Georgian Quarter. Hope Street was voted Britain’s Best Street in 2012 and it’s little wonder; it’s a strikingly beautiful area, boasting two cathedrals and some of the best restaurants in town, not to mention a lively arts scene and independent retailers. You can read more about Hope Street here. The building has a deep-rooted history in providing education to women and girls – dating as far back as the mid-1800s as the first girl's school in the country – with some well-known faces passing through its doors, including former MP Edwina Currie, actress Tina Malone and journalist Gillian Reynolds, who was awarded an MBE in 1999 for her services to broadcasting. The Liverpool Institute High School for Girls, as Blackburne House was formerly known, closed its doors in 1986 and the building remained unused until 1992. We reopened the doors to a totally transformed Blackburne House in 1994, following an extensive programme of regeneration. Today, the building retains much of its original charm, whilst a suite of new facilities ensure it is comfortable and accessible for students and visitors alike. We are currently undergoing a planned refurbishment programme of the building to ensure its continuation of purpose, reduced environmental impacts and to future-proof it for the student and visitors of the future. You can read more about the history of Blackburne House here. VISION & VALUES The vision of Blackburne House is to educate and upskill women so that they can pursue professions in every sector and at every level – including maintenance, logistics and technology, where women are still typically under-represented. We aspire to give confidence to the women we work with so that they can go on to live independent lives, believe in their dreams and achieve their ambitions. We want to inspire our women to believe that anything is possible. We want to instil a culture of empathy and understanding; of inclusion and acceptance. We want to overcome prejudice, discrimination and adversity and create a positive and holistic environment where women can share, learn and grow. At Blackburne House, we have a core set of values that is ingrained into everything that we do. Those values are integral to our organisation, helping to define our long-term aims and objectives and influence the way we work. We are committed to inspiring the women we work with at Blackburne House; raising aspirations is built into our education and development programmes and always reflected in our teaching, working and the services we provide. INSPIRATION TRANSFORMATION By thinking and working creatively, we continually seek new ways to meet and exceed our financial, social and environmental aims – renewing and transforming areas of our business to ensure that we positively influence everyone who works with us. EQUALITY Blackburne House actively promotes a holistic approach to improving the lives of women – all women. We are committed to developing the services we offer to ensure that we are delivering services that will contribute to improving the lives of women. INDEPENDENCE We seek to promote confidence amongst the women we help and aim to equip them in order that they can be both personally and financially independent. We have also established a number of social enterprise businesses and a programme of charitable activity so that Blackburne House can be commercially independent. SOCIAL VALUE As a high-performing social business, our social purpose and the social value we create is key to all of the activities undertaken at Blackburne House. We are home to a wide range of social businesses including The School for Social Entrepreneurs, Blackburne House Bistro, Blackburne House Nursery, The Health Place, and Blackburne House Conferencing and Events – all of which create social value for the wider community. All of our profits enable us to deliver outstanding educational and economic opportunities for women from across the city who view Blackburne House as a safe place to access learning and personal development. Feedback from our learners and customers has proven that, by offering a range of educational opportunities, women across the city go on to access higher education and employment, becoming role models for their family and friends. Blackburne House is key to the economic activity of many women and this can only be achieved as our social enterprises generate income and opportunities.