About this Training Course A few decades ago, the purchasing function in an Oil & Gas company was seen only as a procurement function in charge of supplying goods and services defined by the end user. Over the years, the purchasing function has won its letters of nobility and has proven to be a powerful leverage of savings and cost reduction. In the upstream Oil & Gas sector, where production sites are spread everywhere and sometimes in very isolated areas, purchasing & procurement performs an important mission to secure the supply of high-tech equipment which will travel all over the world before being installed offshore or in remote areas. These two objectives, cost saving and securing of supply, make the purchasing & procurement a strategic function and an essential segment of the supply chain as it drives the other steps in the chain. Training Objectives By the end of the course, the participants will feel confident in their understanding of: The supply chain functions in the upstream Oil & Gas industry and its objectives. The purchasing process from the identification of a need to its satisfaction within the specifications, planning and budget. The strategic tools of the buyer: The category management and market analysis, the definition of the frame agreement and contracts. The creation of value for their organization by using the leverages of the purchasing process from the selection of supplier, the cost analysis and the negotiation. Target Audience This course is primarily designed for purchasers or head of purchasing/procurement. It is also necessary for other stake holders in the supply chain, including expediters, stock controllers and cost controllers. This course is also recommended for the participants in the logistics function who want to enlarge their knowledge domain of the supply chain. Finally, the supply chain administrators from the technical departments may also find this course necessary in order to facilitate their interaction with the purchasing department. Course Level Basic or Foundation Trainer Your expert course leader has 25 years of experience in management positions in Contracting, Procurement and Logistics, mainly in the Oil & Gas Industry. He was a Lecturer for IFP Training for 5 years. During his Oil & Gas industry experience, he has worked on major Oil and Gas development projects like the Yadana project in Myanmar, Akpo project in Nigeria and YLNG in Yemen. His international experience allows him to adapt very easily and integrate the multicultural specificities of the Oil & Gas industry in his teaching. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 4 Days 24 CPD hours This course is intended for Students for AZ-140: Configuring and Operating Microsoft Azure Virtual Desktop are interested in delivering applications on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. As an Azure Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Azure Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Azure Virtual Desktop performance, and automate Azure Virtual Desktop management tasks. This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. Lessons include implementing and managing networking for Azure Virtual Desktop, configuring host pools and session hosts, creating session host images, implementing, and managing FSLogix, monitoring Azure Virtual Desktop performance and health, and automating Azure Virtual Desktop management tasks. Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. Candidates of this course must have solid Azure administration skills. This course assumes prior experience, including virtualization, networking, identity, storage, backup and restore, and disaster recovery. Students should have knowledge of on-premises virtual desktop infrastructure technologies as they relate to migrating to Azure Virtual Desktop. Students are expected to have used the tools common to the Azure environment, such as the Azure PowerShell and Cloud Shell. 1 - Azure Virtual Desktop Architecture Azure Virtual Desktop for the enterprise Azure Virtual Desktop components Personal and pooled desktops Service updates for Azure Virtual Desktop desktops Azure limitations for Azure Virtual Desktop Virtual machine sizing for Azure Virtual Desktop Azure Virtual Desktop pricing 2 - Design the Azure Virtual Desktop architecture Assess network capacity and speed requirements for Azure Virtual Desktop Azure Virtual Desktop Experience Estimator Recommend an operating system for an Azure Virtual Desktop implementation Balancing host pools Recommendations for using subscriptions and management groups Configure a location for the Azure Virtual Desktop metadata Recommend a configuration for performance requirements 3 - Design for user identities and profiles Select an appropriate licensing model for Azure Virtual Desktop based on requirements Personal and multi-session desktop scenarios Recommend an appropriate storage solution Plan for a desktop client deployment Plan for Azure Virtual Desktop client deployment - Remote Desktop Protocol (RDP) Windows Desktop client to multiple devices Hybrid Identity with Azure Active Directory Plan for Azure Active Directory (AD) Connect for user identities 4 - Implement and manage networking for Azure Virtual Desktop Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Azure Virtual Desktop network connectivity Implement and manage network security for Azure Virtual Desktop Configure Azure Virtual Desktop session hosts using Azure Bastion Monitor and troubleshoot network connectivity for Azure Virtual Desktop Plan and implement Remote Desktop Protocol Shortpath Configure Remote Desktop Protocol Shortpath for managed networks Configure Windows Defender Firewall with Advanced Security for RDP Shortpath Plan and implement Quality of Service for Azure Virtual Desktop 5 - Implement and manage storage for Azure Virtual Desktop Storage for FSLogix components Configure storage for FSLogix components Configure storage accounts Create file shares Configure disks 6 - Create and configure host pools and session hosts for Azure Virtual Desktop Automate creation of an Azure Virtual Desktop host pool using PowerShell Configure host pool assignment type Customize Remote Desktop Protocol (RDP) properties for a host pool Manage licensing for session hosts that run Windows client Deploying Azure AD-joined virtual machines in Azure Virtual Desktop 7 - Create and manage session host image for Azure Virtual Desktop Create a managed virtual machine (VM) image Modify a session host image Plan for image update and management Create and use an Azure Compute Gallery using the portal Create an Azure Virtual Desktop image by using VM Image Builder Install Microsoft 365 Apps on a master Virtual Hard Disk image Install language packs in Azure Virtual Desktop 8 - Manage access for Azure Virtual Desktop Role-based access control (RBAC) for Azure Virtual Desktop Plan and implement Azure roles and role-based access control (RBAC) for Azure Virtual Desktop Using Azure Virtual Desktop with Microsoft Intune Configuring screen capture protection for Azure Virtual Desktop 9 - Manage security for Azure Virtual Desktop Plan and implement Conditional Access policies for connections to Azure Virtual Desktop Plan and implement multifactor authentication (MFA) in Azure Virtual Desktop Understand Conditional Access policy components Manage security by using Azure Security Center Security posture management and threat protection 10 - Implement and manage FSLogix Plan for FSLogix FSLogix profile containers and Azure files Install FSLogix Storage options for FSLogix profile containers Profile Container vs Office Container Configure Office Containers Installing Microsoft Office using FSLogix application containers Configure Cloud Cache Configure Profile Containers Create a profile container with Azure NetApp Files and capacity pool Manage Rule Sets and application masking 11 - Configure user experience settings Virtual desktop optimization principles Persistent virtual desktop environments Configure user settings through group policies Configure user settings through Endpoint Manager policies Configure session timeout properties Configure device redirections Configure Universal Print Implement the Start Virtual Machine on Connect feature Troubleshoot user profile issues Troubleshoot Azure Virtual Desktop clients 12 - Install and configure apps on a session host MSIX app attach How MSIX app attach works Set up a file share for MSIX app attach Upload MSIX images to Azure NetApp Files in Azure Virtual Desktop How to configure apps for users Using the OneDrive sync app on virtual desktops Using Microsoft Teams on Azure Virtual desktop Publish built-in apps in Azure Virtual Desktop Troubleshoot application issues for Azure Virtual Desktop 13 - Plan for disaster recovery Disaster recovery for Azure Virtual Desktop Virtual machine replication FSLogix configuration 14 - Automate Azure Virtual Desktop management tasks Scale session hosts using Azure Automation Create or update an Azure Automation account Create an Azure Automation Run As account Create the Azure Logic App and execution schedule 15 - Monitor and manage performance and health Monitor Azure Virtual Desktop by using Azure Monitor Log Analytics workspace for Azure Monitor Monitor Azure Virtual Desktop by using Azure Advisor How to resolve Azure Advisor recommendations Diagnose graphics performance issues Additional course details: Nexus Humans AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Overview This comprehensive course on British Sign Language Interpreter Training will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This British Sign Language Interpreter Training comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this British Sign Language Interpreter Training. It is available to all students, of all academic backgrounds. Requirements Our British Sign Language Interpreter Training is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 17 sections • 129 lectures • 09:18:00 total length •What is British Sign Language?: 00:01:00 •Fingerspelling A-Z with Subtitles: 00:02:00 •Fingerspelling A-Z without Subtitles: 00:01:00 •Fingerspelling A-Z: 00:00:00 •Fingerspelling Right or Left Handed: 00:01:00 •A to Z Cards: 00:10:00 •1st Name A to Z in 3 parts - Fingerspelling: 00:07:00 •1st Name A to Z Fingerspelling: 00:10:00 •Fingerspelling - Fill in the blanks: 00:02:00 •Fingerspelling - Fill in the Blanks: 00:10:00 •What is my name and Live, Where? (UK): 00:03:00 •Who am I and Live Where in UK: 00:10:00 •Meeting People and Introduction with Subtitles: 00:02:00 •Meeting People and Introduction without Subtitles DONE: 00:02:00 •Questions Signs with without Subtitles: 00:01:00 •Family sentences Homework: 00:04:00 •Meeting People: 00:10:00 •Families: 00:10:00 •Families Sign Part 1 with Subtitles: 00:01:00 •Families Sign Part 2 with Subtitles: 00:02:00 •Families Sign Part 1 without Subtitles DONE: 00:01:00 •Families Sign Part 2 without Subtitles: 00:02:00 •Number 0 to 100: 00:05:00 •Numbers: 00:10:00 •Numbers: 00:02:00 •Numbers: 00:10:00 •Bingo Numbers Games (4): 00:04:00 •BINGO 4 Games: 00:10:00 •Phone Numbers: 00:10:00 •Time and Calendar Signs with Subtitles: 00:01:00 •Time and Calendar without Subtitles: 00:01:00 •Calendars: 00:10:00 •Calendars Birthday Ages and Names: 00:10:00 •What is the Time? With Subtitles: 00:01:00 •What is the Time? Without Subtitles: 00:01:00 •What is the time: 00:10:00 •Calendar Signs with Subtitles: 00:05:00 •Calendar Signs without Subtitles: 00:05:00 •Birthday, When?: 00:02:00 •Birthday When: 00:10:00 •Colour Signs with Subtitles: 00:01:00 •Colour Signs without Subtitles: 00:01:00 •Colours: 00:04:00 •Colours: 00:10:00 •Draw a colour Elephant: 00:02:00 •HNADOUT ANSWER Draw a colour Elephant: 00:00:00 •Transports: 00:10:00 •Transports sign with Subtitles: 00:02:00 •Transports sign without Subtitles: 00:01:00 •Transport and Time Signs with Subtitles: 00:01:00 •Transport and Time Signs without Subtitles: 00:01:00 •Weather Signs with Subtitles: 00:01:00 •Weather Signs without Subtitles: 00:01:00 •Weather: 00:10:00 •Weather and Questions: 00:01:00 •Directions Signs with Subtitles: 00:02:00 •Directions Signs without Subtitles: 00:02:00 •Directions: 00:06:00 •Questions for Directions Signs with Subtitles: 00:01:00 •Questions on Directions Signs without Subtitles: 00:01:00 •Non-Manual Features (NMF) in BSL: 00:10:00 •Affirmative & Negative Signs with Subtitles: 00:01:00 •Affirmative & Negative Signs without Subtitles: 00:01:00 •Affirmative and Negative: 00:10:00 •Activities Interests and Sports Handouts: 00:10:00 •Information about different clubs: 00:10:00 •Interests and Hobbies with Subtitles: 00:03:00 •Interests and Hobbies without Subtitles: 00:01:00 •Sports Signs with Subtitles: 00:03:00 •Sports Signs without Subtitles: 00:03:00 •Hobbies/Interests Questions with Subtitles: 00:01:00 •Hobbies/Interests Questions without Subtitles: 00:01:00 •Sports Clubs: 00:01:00 •Description of a Person with Subtitles: 00:04:00 •Description of a Person without Subtitles: 00:04:00 •Describing a Person: 00:13:00 •Describing Clothes with Subtitles: 00:02:00 •Describing Clothes without Subtitles: 00:02:00 •Wearing Clothes: 00:13:00 •A -Z of Animals with Subtitles: 00:02:00 •A -Z of Animals without Subtitles: 00:02:00 •Animal A to Z: 00:22:00 •Questions about Pets with Subtitles: 00:01:00 •Questions about Pets without Subtitles: 00:01:00 •STUDY About Pets: 00:02:00 •STUDY ANSWERS About Pets: 00:01:00 •Money Signs (Part 1) with Subtitles: 00:01:00 •Money Signs (Part 1) without Subtitles: 00:01:00 •Money Signs (Part 2) with Subtitles: 00:01:00 •Money Signs (Part 2) without Subtitles: 00:01:00 •How Much is it?: 00:01:00 •How much is it: 00:01:00 •Foods and Drinks with Subtitles: 00:09:00 •Foods and Drinks without Subtitles: 00:09:00 •Food and Drinks: 00:12:00 •Hurley's Food and Drink Menu with Images: 00:09:00 •Hurley's Food and Drink Menu without Images: 00:09:00 •HANDOUT Top Eat Menu: 00:02:00 •Hurley' s Food and Drink Menu: 00:10:00 •STUDY At the Restaurant: 00:10:00 •STUDY HANDOUT ANSWERS At the Restaurant: 00:02:00 •STUDY: BSL LEVEL 1 EXAM: 00:04:00 •STUDY ANSWERS : BSL LEVEL 1 EXAM: 00:01:00 •Asking Questions about the Jobs without Subtitles: 00:02:00 •Asking Questions about the Jobs without Subtitles: 00:02:00 •STUDY What is My Job: 00:05:00 •Job Vocabulary with Subtitles: 00:06:00 •Job Vocabulary without Subtitles: 00:06:00 •Jobs Signs with Images: 00:02:00 •Jobs Signs without Images: 00:02:00 •Type of Buildings with Subtitles: 00:03:00 •Type of Buildings without Subtitles: 00:03:00 •At Home (Room) with subtitles: 00:03:00 •At Home (Room) without Subtitles: 00:01:00 •At Home - What is in each room with subtitles: 00:05:00 •At Home - What is in each room without Subtitles: 00:05:00 •How to describe each room with Subtitles: 00:12:00 •Day to Day Routine with Images: 00:02:00 •Day to Day Routine without images: 00:02:00 •Emotional Signs with Subtitles: 00:02:00 •Emotional Signs without Subtitles: 00:02:00 •Emotional Signs: 00:02:00 •Emotional Stories Study: 00:05:00 •Countries and Flags: 00:04:00 •L2 Itemising_Listings inc 4 Stories: 00:09:00 •L2 Multi-Channels Sign with Subtitles: 00:03:00 •L2 Multi-Channels Sign without Subtitles: 00:03:00 •Transport HOMEWORK: 00:03:00 •Assignment - British Sign Language Interpreter Training: 00:00:00
Overview This comprehensive course on Learn AutoCAD Programming using VB.NET - Hands On! will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Learn AutoCAD Programming using VB.NET - Hands On! comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Learn AutoCAD Programming using VB.NET - Hands On!. It is available to all students, of all academic backgrounds. Requirements Our Learn AutoCAD Programming using VB.NET - Hands On! is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 11 sections • 105 lectures • 12:09:00 total length •Module 01: Course Outline: 00:05:00 •Module 02: Introduction: 00:01:00 •Module 03: Who is this Course for?: 00:01:00 •Module 04: What will I learn from this Course?: 00:01:00 •Module 05: What is VB.NET?: 00:01:00 •Module 06: What is AutoCAD .NET API?: 00:01:00 •Module 07: What are the advantages of programming in AutoCAD .NET API?: 00:01:00 •Module 08: Hands-on Projects overview: 00:06:00 •Module 01: AutoCAD .NET API Components Overview: 00:01:00 •Module 02: AutoCAD .NET API Assemblies: 00:02:00 •Module 03: Understanding AutoCAD Object Hierarchy: 00:03:00 •Module 04: AutoCAD .NET API Application Object: 00:02:00 •Module 05: AutoCAD .NET API Document Object: 00:02:00 •Module 06: AutoCAD .NET API Database Object: 00:04:00 •Module 01: Section Overview: 00:04:00 •Module 02: Installing Visual Studio 2019: 00:05:00 •Module 03: Setting up Visual Studio 2019 Integrated Development Environment (IDE): 00:04:00 •Module 04: Creating First VB.NET Plugin (Hello AutoCAD): 00:12:00 •Module 05: Different ways to communicate with the User: 00:04:00 •Module 06: Configuring VS2019 Target Processor: 00:10:00 •Module 01: Creating AutoCAD Object using VB.NET Overview: 00:01:00 •Module 02: Creating DrawObjects Project: 00:04:00 •Module 03: Creating a Line Object using VB.NET: 00:15:00 •Module 04: Creating a MText Object using VB.NET: 00:12:00 •Module 05: Creating a Circle Object using VB.NET: 00:09:00 •Module 06: Creating an Arc Object using VB.NET: 00:07:00 •Module 07: Creating a Polyline Object using VB.NET: 00:08:00 •Module 08: Creating Multiple Circles Vertically: 00:09:00 •Module 09: Creating Multiple Circles Horizontally: 00:05:00 •Module 01: Manipulating AutoCAD Objects Overview: 00:01:00 •Module 02: Creating the Project ManipulateObjects: 00:04:00 •Module 03: Creating the SingleCopy Method: 00:13:00 •Module 04: Creating the MultipleCopy Method: 00:11:00 •Module 05: Creating the EraseObject Method: 00:12:00 •Module 06: Creating the MoveObject method: 00:07:00 •Module 07: Creating the MirrorObject method: 00:10:00 •Module 08: Creating the RotateObject method: 00:07:00 •Module 09: Creating the ScaleObject method: 00:05:00 •Module 10: Creating the OffsetObject method: 00:05:00 •Module 01: Exploring AutoCAD Dictionaries - Overview: 00:02:00 •Module 02: Creating LayersLineTypesAndStyles Project: 00:06:00 •Module 03: Creating the ListLayers Method: 00:11:00 •Module 04: Creating the CreateLayer Method: 00:10:00 •Module 05: Creating the UpdateLayer Method: 00:12:00 •Module 06: Creating the SetLayerOnOff Method: 00:08:00 •Module 07: Creating the SetLayerFrozenOrThaw Method: 00:04:00 •Module 08: Creating the DeleteLayer Method: 00:05:00 •Module 09: Creating the LockUnlockLayer Method: 00:04:00 •Module 10: Creating the SetLayerToObject Method: 00:08:00 •Module 11: Creating the ListLineTypes Method: 00:09:00 •Module 12: Creating the LoadLineType Method: 00:07:00 •Module 13: Creating the SetCurrentLineType Method: 00:05:00 •Module 14: Creating the DeleteLineType Method: 00:09:00 •Module 15: Creating the SetLineTypeToObject Method: 00:05:00 •Module 16: Exploring TextStyles - Overview: 00:01:00 •Module 17: Creating the ListStyles Method: 00:08:00 •Module 18: Creating the UpdateCurrentTextStyleFont Method: 00:12:00 •Module 19: Creating the SetCurrentTextStyle Method: 00:08:00 •Module 20: Creating the SetTextStyleToObject Method: 00:08:00 •Module 01: User Input Functions - Overview: 00:02:00 •Module 02: Creating the UserInteractions Project: 00:03:00 •Module 03: Creating the GetName Method: 00:11:00 •Module 04: Creating the SetLayer Method using the GetString function: 00:12:00 •Module 05: Creating the CreateLineUsingGetpoint Method: 00:11:00 •Module 06: Creating the CalculateDefinedArea Method: 00:17:00 •Module 07: Creating the DrawObjectsUsingGetKeywords Method: 00:14:00 •Module 08: Creating the GetDistanceBetweenTwoPoints Method: 00:05:00 •Module 09: Creating the CountObjects Method: 00:15:00 •Module 01: Selection Sets and Filters - Overview: 00:13:00 •Module 02: Creating the SelectionSets Project: 00:05:00 •Module 03: Creating the SelectAllAndChangeLayer Method: 00:12:00 •Module 04: Creating the SelectObjectOnScreen Method: 00:08:00 •Module 05: Creating the SelectWindowAndChangeColor Method: 00:06:00 •Module 06: Creating the SelectCrossingAndDelete Method: 00:05:00 •Module 07: Creating the SelectFenceAndChangeLayer Method: 00:06:00 •Module 08: Creating the CountPickFirstSelection Method: 00:07:00 •Module 09: Creating the SelectLines Method: 00:13:00 •Module 10: Creating the SelectMTexts Method: 00:05:00 •Module 11: Creating the SelectPlines Method: 00:04:00 •Module 12: Creating the SelectWalls Method: 00:07:00 •Module 13: Creating the SelectStairs Method: 00:03:00 •Module 14: Creating the SelectFrenchDoors Method: 00:04:00 •Module 15: Creating the SelectBifoldDoors Method: 00:03:00 •Module 16: Creating CountReceptacles Method: 00:04:00 •Module 17: Creating the CountLightingFixtures Method: 00:10:00 •Module 01: Developing Projects - Hands on Overview: 00:02:00 •Module 02: BlocksCounter Plugin Demo: 00:03:00 •Module 03: Creating the BlocksCounter Project: 00:04:00 •Module 04: Creating the CountBlocksToTable Method: 00:08:00 •Module 05: Creating the PromptUser Function: 00:08:00 •Module 06: Creating the GatherBlocksAndDrawTable Method: 00:12:00 •Module 07: Continuation of GatherBlocksAndDrawTable Method: 00:17:00 •Module 08: Running and Debugging the BlocksCounter Project - Part 1: 00:15:00 •Module 09: Running and Debugging the BlocksCounter Project - Part 2: 00:11:00 •Module 10: Running and Debugging the BlocksCounter Project - Part 3: 00:01:00 •Module 11: Creating the ObjectExtractor Plugin Project: 00:04:00 •Module 12: Creating the ExtractObjects Method: 00:07:00 •Module 13: Creating the ExtractLine Method: 00:16:00 •Module 14: Running and Debugging the ExtractLine Method: 00:05:00 •Module 15: Creating the ExtractCircle Method: 00:11:00 •Module 16: Creating the ExtractMText Method: 00:13:00 •Module 17: Creating the ExtractPolyline Method: 00:19:00 •Module 18: Creating the ExtractBlock Method: 00:10:00 •Module 01: Congratulations and Thank you very much!: 00:01:00 •Assignment - Learn AutoCAD Programming using VB.NET - Hands On!: 00:00:00
Overview This comprehensive course on Train the Trainer will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Train the Trainer comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? After successfully completing the course you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this Train the Trainer. It is available to all students, of all academic backgrounds. Requirements Our Train the Trainer is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 35 sections • 98 lectures • 18:47:00 total length •Introduction to Trainer Bootcamp: 00:13:00 •What Makes a Great Trainer?: 00:18:00 •Make Them Feel Safe Before Class Introduction: 00:05:00 •Make Comfortable Small Talk - Part 1: 00:17:00 •Make Comfortable Small Talk - Part 2: 00:20:00 •Make Comfortable Small Talk - Activity Feedback: 00:09:00 •Make an Impressive First Impression: 00:15:00 •Give Last Minute Reminders - Part 1: 00:19:00 •Give Last Minute Reminders - Part 2: 00:15:00 •Give Your Introduction - Part 1: 00:18:00 •Give Your Introduction - Part 2: 00:20:00 •Give Your Introduction - Part 3: 00:00:00 •Find Out About Them: 00:18:00 •Reveal the Takeaways: 00:13:00 •Set Boundaries and Expectations - Part 1: 00:18:00 •Set Boundaries and Expectations - Part 2: 00:06:00 •Give the Lesson Hook: 00:07:00 •Do an Oral Review - Part 1: 00:17:00 •Do an Oral Review - Part 2: 00:04:00 •Send Them to Break: 00:04:00 •Walk and Talk During Break: 00:11:00 •Bring Them Back From Break: 00:13:00 •Workbook - Train the Trainer - Part 1: 00:00:00 •Introduction: 00:11:00 •Build Pre-Activity Credibility and Rapport: 00:15:00 •Hook the Trainees on the Activity - Part 1: 00:15:00 •Hook the Trainees on the Activity - Part 2: 00:12:00 •Craig Czarnecki - 1-3 Get Buy-In for the Activity: 00:06:00 •Craig Czarnecki - 1-1 Part 1 Activity - Get Buy In for the Activity: 00:11:00 •Craig Czarnecki - 2-1 Find Trainees Who Need Help: 00:10:00 •Craig Czarnecki - 2-2 Find Trainees Who Need Help: 00:19:00 •Craig Czarnecki - 2-3 Activity Find Trainees Who Need Help: 00:18:00 •Craig Czarnecki - 3-1 Activity Tutor Effectively During Activities: 00:17:00 •Craig Czarnecki - 3-2 Tutor Effectively During Activities: 00:11:00 •Craig Czarnecki - 3-3 Tutor Effectively During Activities: 00:20:00 •Craig Czarnecki - 3-4 Activity Tutor Effectively During Activities: 00:19:00 •Craig Czarnecki - 3-5 Activity Tutor Effectively During Activities: 00:09:00 •Craig Czarnecki - 4-1 Manage the Activity Pace: 00:17:00 •Craig Czarnecki - 4-2 Activity Manage the Activity Pace: 00:14:00 •Craig Czarnecki - 5 Activity Prepare to Lead an Activity: 00:18:00 •Craig Czarnecki - Activity Highlight Video: 00:00:00 •Workbook - Training on Facilitating Classroom Activity: 00:00:00 •0.1 Craig Czarnecki - Coach Intro Part 1: 00:19:00 •0.2 Craig Czarnecki - Coach Intro Part 2: 00:07:00 •1.1 Craig Czarnecki - Coach Learn About the Trainer - Recognize the Trainers Strengths: 00:13:00 •1.2 Craig Czarnecki - Coach Learn About the Trainer - Gauge areas for improvement: 00:07:00 •1.3 Craig Czarnecki - Coach Learn About the Trainer - Identify what's Important to the trainer: 00:03:00 •1.4 Craig Czarnecki - Coach Identify the Trainers Style: 00:01:00 •2.1 Craig Czarnecki - Coach Create Initial Value for the Trainer - Create Deliverables for the kickoff meeting: 00:08:00 •2.2 Craig Czarnecki - Coach Create Initial Value for the Trainer - Create a hook for the kickoff meeting: 00:10:00 •2.3 Craig Czarnecki - Coach Create Initial Value for the Trainer - Prepare for the kickoff meeting: 00:07:00 •3.1.1 Craig Czarnecki - Make a Good First Impression - Build a Teammate Relationship Immediately Part 1: 00:10:00 •3.1.2 Craig Czarnecki - Make a Good First Impression - Build a Teammate Relationship Immediately Part 2: 00:14:00 •3.1.3 Craig Czarnecki - Make a Good First Impression - Build a Teammate Relationship Immediately Part 3: 00:16:00 •3.2.1 Craig Czarnecki - Make a Good First Impression - Discuss the Process for Trainer Growth Part 1: 00:12:00 •3.2.2 Craig Czarnecki - Make a Good First Impression - Discuss the Process for Trainer Growth part 2: 00:12:00 •4.1 Craig Czarnecki - Observe the Trainer in the Classroom - Prepare for the Classroom Observation: 00:15:00 •4.2.1 Craig Czarnecki - Observe the Trainer in the Classroom - Master 7 Keys to Effective Note-Taking Part 1: 00:14:00 •4.2.2 Craig Czarnecki - Observe the Trainer in the Classroom - Master 7 Keys to Effective Note-Taking Part 2: 00:14:00 •4.3 Craig Czarnecki - Observe the Trainer in the Classroom - Apply 4 Quick Steps to Classroom Oberserations: 00:09:00 •4.4.1 Craig Czarnecki - Observe trainer activity part 1: 00:19:00 •4.4.2 Craig Czarnecki - Observe trainer activity part 2: 00:18:00 •5.1.1 Craig Czarnecki - Write a Classroom Observation Summary - Identify Strengths and Areas for Improvement Part 1: 00:12:00 •5.1.2 Craig Czarnecki - Write a Classroom Observation Summary - Identify Strengths and Areas for Improvement part 2: 00:13:00 •5.2.1 Craig Czarnecki - Write a Classroom Observation - Record Strengths and Areas for Improvement Part 1: 00:19:00 •5.2.2 Craig Czarnecki - Write a Classroom Observation - Record Strengths and Areas for Improvement Part 2: 00:17:00 •5.2.3 Craig Czarnecki - Write a Classroom Observation - Record Strengths and Areas for Improvement Part 3: 00:18:00 •5.3 Craig Czarnecki - Write a Classroom Observation - Record the Main Strength of the Trainer: 00:35:00 •Introduction and Welcome: 00:00:00 •Open Well: 00:27:00 •Communicate Effectively: 00:15:00 •Provide In Class Support: 00:17:00 •Workbook - Train the Trainer Coliseum: How to Train Very Large Classes: 00:00:00 •Introduction and Welcome: 00:19:00 •Take Good Care Of Yourself: 00:06:00 •Manage Your Stress: 00:09:00 •Anticipate Unexpected Issues: 00:08:00 •Get Help And Make It Helpful: 00:00:00 •Help Them Get It: 00:14:00 •Manage Large Classes: 00:09:00 •Have Fun Your Way: 00:13:00 •Control Tough Customers: 00:10:00 •Engage Adult Students With Ease: 00:02:00 •Interpret Your Feedback: 00:02:00 •Wrap Up Questions And Answers: 00:04:00 •Introduction and Welcome: 00:06:00 •Hog-Tie the Talk Hogs: 00:20:00 •Give the Experts the Spotlight: 00:12:00 •Simmer Down the Know-it-Alls: 00:11:00 •Placate Resenters - Part 1: 00:11:00 •Placate Resenters - Part 2: 00:14:00 •Handle the Fault-Finders: 00:11:00 •Shut Down the Hecklers: 00:10:00 •Stimulate Stubborn Passivists: 00:06:00 •Engage the Distracted Inefficient: 00:07:00 •Workbook - Train the Trainer Serenity Course: 00:00:00 •Assignment - Train the Trainer: 00:00:00 •Order Your Certificate: 00:00:00
Duration 4 Days 24 CPD hours This course is intended for Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Prerequisites Before attending this course, students must have previous experience deploying or administering Azure resources and conceptual knowledge of: Azure Active Directory Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability AZ-104T00 - Microsoft Azure Administrator 1 - Design governance Design for governance Design for management groups Design for subscriptions Design for resource groups Design for resource tags Design for Azure Policy Design for role-based access control (RBAC) Design for Azure landing zones 2 - Design an Azure compute solution Choose an Azure compute service Design for Azure Virtual Machines solutions Design for Azure Batch solutions Design for Azure App Service solutions Design for Azure Container Instances solutions Design for Azure Kubernetes Service solutions Design for Azure Functions solutions Design for Azure Logic Apps solutions 3 - Design a data storage solution for non-relational data Design for data storage Design for Azure storage accounts Design for data redundancy Design for Azure Blob Storage Design for Azure Files Design for Azure managed disks Design for storage security 4 - Design a data storage solution for relational data Design for Azure SQL Database Design for Azure SQL Managed Instance Design for SQL Server on Azure Virtual Machines Recommend a solution for database scalability Recommend a solution for database availability Design security for data at rest, data in motion, and data in use Design for Azure SQL Edge Design for Azure Cosmos DB and Table Storage 5 - Design data integration Design a data integration solution with Azure Data Factory Design a data integration solution with Azure Data Lake Design a data integration and analytic solution with Azure Databricks Design a data integration and analytic solution with Azure Synapse Analytics Design strategies for hot, warm, and cold data paths Design an Azure Stream Analytics solution for data analysis 6 - Design an application architecture Describe message and event scenarios Design a messaging solution Design an Azure Event Hubs messaging solution Design an event-driven solution Design a caching solution Design API integration Design an automated app deployment solution Design an app configuration management solution 7 - Design authentication and authorization solutions Design for identity and access management (IAM) Design for Microsoft Entra ID Design for Microsoft Entra business-to-business (B2B) Design for Azure Active Directory B2C (business-to-customer) Design for conditional access Design for identity protection Design for access reviews Design service principals for applications Design managed identities Design for Azure Key Vault 8 - Design a solution to log and monitor Azure resources Design for Azure Monitor data sources Design for Azure Monitor Logs (Log Analytics) workspaces Design for Azure Workbooks and Azure insights Design for Azure Data Explorer 9 - Design network solutions Recommend a network architecture solution based on workload requirements Design patterns for Azure network connectivity services Design outbound connectivity and routing Design for on-premises connectivity to Azure Virtual Network Choose an application delivery service Design for application delivery services Design for application protection services 10 - Design a solution for backup and disaster recovery Design for backup and recovery Design for Azure Backup Design for Azure blob backup and recovery Design for Azure files backup and recovery Design for Azure virtual machine backup and recovery Design for Azure SQL backup and recovery Design for Azure Site Recovery 11 - Design migrations Evaluate migration with the Cloud Adoption Framework Describe the Azure migration framework Assess your on-premises workloads Select a migration tool Migrate your structured data in databases Select an online storage migration tool for unstructured data Migrate offline data 12 - Introduction to the Microsoft Azure Well-Architected Framework Azure Well-Architected Framework pillars Cost optimization Operational excellence Performance efficiency Reliability Security 13 - Microsoft Azure Well-Architected Framework - Cost Optimization Develop cost-management discipline Design with a cost-efficiency mindset Design for usage optimization Design for rate optimization Monitor and optimize over time 14 - Microsoft Azure Well-Architected Framework - Operational excellence Embrace DevOps culture Establish development standards Evolve operations with observability Deploy with confidence Automate for efficiency Adopt safe deployment practices 15 - Microsoft Azure Well-Architected Framework - Performance efficiency Negotiate realistic performance targets Design to meet capacity requirements Achieve and sustain performance Improve efficiency through optimization 16 - Microsoft Azure Well-Architected Framework - Reliability Design for business requirements Design for resilience Design for recovery Design for operations Keep it simple 17 - Microsoft Azure Well-Architected Framework - Security Plan your security readiness Design to protect confidentiality Design to protect integrity Design to protect availability Sustain and evolve your security posture 18 - Getting started with the Microsoft Cloud Adoption Framework for Azure Customer narrative Common blockers 19 - Prepare for successful cloud adoption with a well-defined strategy Customer narrative Capture strategic motivation Define objectives and key results Evaluate financial considerations Understand technical considerations Create a business case 20 - Prepare for cloud adoption with a data-driven plan Customer narrative 21 - Choose the best Azure landing zone to support your requirements for cloud operations Customer narrative Common operating models Design areas for Azure landing zones Design principles for Azure landing zones Journey to the target architecture Choose an Azure landing zone option Deploy the Azure landing zone accelerator Enhance your landing zone 22 - Migrate to Azure through repeatable processes and common tools Customer narrative Migration process Migration tools Common tech platforms 23 - Address tangible risks with the Govern methodology of the Cloud Adoption Framework for Azure Customer narrative Govern methodology Corporate policies Governance disciplines Deploy a cloud governance foundation The Cost Management discipline 24 - Ensure stable operations and optimization across all supported workloads deployed to the cloud Establish business commitments Deploy an operations baseline Protect and recover Enhance an operations baseline Manage platform and workload specialization 25 - Innovate applications by using Azure cloud technologies Follow the innovation lifecycle Azure technologies for the build process Infuse your applications with AI Azure technologies for measuring business impact Azure technologies for the learn process 26 - Prepare for cloud security by using the Microsoft Cloud Adoption Framework for Azure Customer narrative Methodology Security roles and responsibilities Simplify compliance and security Simplify security implementation Security tools and policies Additional course details: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Participants must possess a valid data centre training certificate such as CDCP or any other approved equivalent. Please submit a copy of your certificate for verification upon registration for the CTDC course. Overview After completion of the course the participant will be able to:1. Learn to properly comprehend and apply the ANSI/TIA-942 Standard requirements and guidelines2. Understand the proper intent of the ANSI/TIA-942 Standard to avoid both over- and/or under-investment3. Align the selection of redundancy levels and infrastructure investments to the business requirements.4. Understand the criteria and requirements for a high-availability data centre design and how to effectively establish the data centre from the perspective of the ANSI/TIA-942 Standard5. Understand how the ANSI/TIA-942 Standard relates to various worldwide standards This course, the participant will learn how to design an ANSI/TIA-942 compliant data centre. It will provide a clear understanding of the requirements of the ANSI/TIA-942 Standard and possible implementation variations. Introduction to Data Centre Facilities About the ANSI/TIA-942 Life of the ANSI/TIA-942 Standard Relation to other standards Architectural Electrical Mechanical Telecommunication Areas under scope High level redundancy definitions Redundancy options (N, N+1 etc.) Fault tolerant Concurrent maintainability Compartmentalisation Examples of redundancy levels Data Centre Space PlanningData Centre TopologiesRecommendations for Energy EfficiencyArchitectural Site selection Parking Multi-tenant building Building construction Vapor barrier Roofing Floor loading Raised flooring Suspended/drop ceiling Hanging load Seismic Building Security & Safety Security CCTV Staffing Bullet/ballistic proofing Lighting Safety - Signage Building and Room Access Security checkpoints Entry lobby Doors and windows Exit corridors Shipping and receiving areas Room/Area Design Requirements Administrative offices Security offce Operations centre Restroom and break room UPS/Battery rooms Generator and fuel storage area Computer room Electrical Utility power - Substation - Feed requirements - Self-generation HT/HV switch gear Generator and fuel supply LT/LV switch gear - ATS - Alternatives to ATS UPS and batteries PDU STS Grounding Surge protection EPO Central power monitoring Load banks Testing Equipment maintenance - Preventive maintenance - Facility training programs Mechanical Environmental design - Temperature and humidity requirements - Contamination - Sources - Clean air - Pressurisation - Radio sources - Vibration - Water ingress Water cooled systems - Heat rejection - Chilled water system - Condenser water? - Make up water Air cooled systems HVAC control systems Plumbing - Pipe routing Fire suppression Water leak detection Telecommunications Network topology Redundancy level design Media and connectors Cabling pathways Detailed cabling design considerations Administration and labeling Cable testing Data centre fabrics Exam: Certified TIA-942 Design Consultant Actual course outline may vary depending on offering center. Contact your sales representative for more information.
About this Training Course This five-day training course will cover aspects of FPSO operations with an emphasis on management of safety. A background of the methodology used to generate the various safety plans and codes used in the operational safety case will be covered. The course will also review general operational guidelines in the offshore environment to ensure that the operations are completed as designed. This will include offtake operations and maintenance processes for the plant and vessel as well as a session on subsea. Training Objectives To enable participants to obtain an in-depth understanding of FPSO operations, safety and maintenance: Provide a broad overview of how an FPSO operation is set up and established in the field Grasp the various methods used to moor the production units Analyse information and methods required to establish the operation according to local and international regulations. Assess the methods used to calculate the safety parameters and requirements to construct an approved valid safety case Explore conditions to monitor during operations with regards to safety and structure Inspect various types of hazards associated with production and produced materials Review regular and emergency operational maintenance requirements Examine cyclones and weather events causing disconnection Comprehend manning, training requirements and operations including cargo Case studies and Exercises: The training course uses real life examples and case studies to explain the setup, preparation, implementation and operational activities required to successfully complete FPSO operations from a safety and maintenance perspective. This will allow the application of participants' newly-acquired knowledge. Case studies also stimulate independent thinking and discussion among the participants. Case Studies The case studies proposed for this course will include: A group exercise to consider what is the minimum requirement for the production of a safety case Generic plan for the development of a maintenance management system using computer software systems (e.g. Amos) Construction of a UWILD plan to include scope and potential tendering requirements Quizzes The various quizzes can be expanded or arranged to suit the group/interests and topics covered but will generally include the following topics: Mooring types and location where they are primarily used Safety cases Safety management systems Process hazards and mitigation UWILD components and regulations Operations management Offtake operations Target Audience The course is generally aimed at personnel who are involved in FPSO operations as either offshore crew or onshore support team members. This course will also greatly benefit the following groups but not limited to: Process engineers Surveyors Facility engineers Naval architects Operations engineer Health, Safety, Environment (HSE) specialists and managers Maintenance engineers Course Level Intermediate Training Methods The training course is presented in an interactive workshop format that allows for discussion. The course will be delivered through analysis of case studies and running examples of problems. Course Duration: 5 days in total (35 hours) The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training comprises of information supplemented by visual activities including photographs from various operations and videos of operational and safety activities. Interaction verbally will be necessary to achieve the best learning outcome from the materials. Course timings and breaks 0830 - Registration 0900 - Start of training 1030 - Morning break 1045 - Training recommences 1230 - Lunch break 1330 - Training recommences 1515 - Afternoon break 1530 - Training recommences 1700 - End of training Trainer Your expert course leader has been involved in the Oil and Gas industry for over 28 years in several different roles commencing as a second deck officer on FPSO's and moving through the industry from deck officer to Master, OIM and Field Superintendent. He has also been in charge of semisubmersible and fixed production platforms as field superintendent before moving ashore into senior management roles. On completion of industry specific activities, he moved to teaching roles at South Tyneside Maritime College in the department of marine and simulation and presented live courses to maritime students from cadet to Master. Prior to returning to Perth in March 2019, he was training manager for a subsidiary of Gaz Transport and Technigaz of France. He has a Master Class 1 certificate with endorsements for hazardous cargoes and a Graduate Certificate in Business Administration as well as multiple course certificates required to operate FPSO's, platforms and semisubmersible facilities. He has been involved in the preparation of national standards for Safety Cases (Australia); Designing and structural setup of competency-based training systems in South East Asia. He was also involved in the development of minimum standards, competency profiles position based and preparation and implementation of training plans to ensure competency in the local staff in Asian operations. He was part of the development team for minimum standards of offshore safety in Australian offshore operations including the implementation of the Common Safety Training Program (CSTP). He was also involved in implementing training plans for both simulator and classroom based courses in LNG operations and cargo tank design and construction. Highlighted work experience: Premier Petroleum Myanmar Ltd Petronas Carigali Newfield Australia (Cartier) Pty Ltd: FPSO Jabiru Venture FPSO Challis Venture Onshore OIM Australian FPSO Management Pty. Ltd. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.