• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Administration courses in London

We couldn't find any listings for your search. Explore our online options and related educators below to see if they help you.

Know someone teaching this? Help them become an Educator on Cademy.

1...19

Online Options

Show all 3715

Medication Awareness training for Acer Care

5.0(13)

By CH Care Training

Medication Awareness training is mandatory for all staff who are prompting or assisting clients to take their medications. About this event Medication Awareness training is for staff who have had never taken part in Medication training before or staff returning to the profession. By the end of the course, you will be able to: Understand medication types and uses Learn legal and ethical responsibilities Master medication administration procedures Know proper storage and disposal methods Recognize and respond to adverse effects Develop communication and record-keeping skills Apply person-centred approaches Conduct risk assessments. Location for delegates attending in person Online via Teams 0798 999 5180. sales@chcaretraining.co.uk Before you book: Please do not send along staff who have just worked a nightshift or who will be visiting clients immediately before or immediately after a training session. People arriving tired, stressed or late cannot gain the most benefit from a training course. We reserve the right to turn away individuals too exhausted to focus on the training or staff who turn up late for a course and disturb the flow of the proceedings. All CH Care Training courses are fully inclusive, but if you have any concerns about a member of staff's ability to participate because of physical, sensory or learning differences then please let us know in confidence in advance, so that we may make the appropriate adjustments. Cancellations CH Care Training operates a sliding scale of cancellation; If you cancel more than two weeks before the start date of a course, you can ask for a full refund, to change the names of the delegates being sent along, or to transfer a delegate to another training date. If you give less than two weeks but more than one week's notice of cancellation, 50 percent of the booking can be refunded. If you cancel less than a week from the training delivery date we wont be able to refund. There are no refunds for staff who do not turn up on the day of the training course. If CH Care Training needs to change the date or cancel a course for any reason we will give you the maximum notice we can. In exceptional circumstances we may cancel a course due to extreme weather or circumstances at the training venue. You will be offered a full refund or the opportunity to transfer your booking to an alternative date. Please ask your staff to read the following guidance before they attend the course: Arriving at the Venue The course will start promptly so please arrive at least 15 minutes before the start time of the training to allow plenty of time to use the toilet, and be seated ready for the start of the course. You can call Training direct on 0798 999 5180 if you are struggling to arrive on time. Please note that the meeting will be locked to late arrivals 10 minutes after the actual course starts. When you arrive please come into Reception and a member of staff will come to book you in prior to directing you to the training room. This room is located on the ground floor and is wheelchair accessible. Covid-Secure Premises Please do not attend the course if you have symptoms of Covid or are feeling unwell. During the course As this is a working environment please ensure you allow the necessary time and focus to get the best from the material being presented. Please bring pen and paper to make notes during the course. Our training sessions are fun and very interactive. We will encourage plenty of comments, points of view and the sharing of lived experiences. Delegates should not share any sensitive information about a client or organisation. Our session agreement asks delegates to maintain confidentiality about individuals and organisations and to respect the views of others on the course. All CH Care Training courses are inclusive, but if you have any concerns about your ability to participate, such as sensory or learning differences then please let the Trainer know in confidence before the start of a course, so that they may make the appropriate adjustments. If the course contains practical elements such as Moving & Handling or First Aid, then please wear appropriate clothing to take part in these activities. You will be asked confidentially if you have any health concerns that could prevent you from taking part in the practical activities. Please let a Trainer know if you have any concerns about taking part in the practical courses. Refreshments are provided for free. Please bring a packed lunch for any full-day courses. After the course We will email you a pdf of the course once the training has finished and we have checked that everyone was able to join. If your Manager booked you onto the course using your work or personal email, or if you book yourself onto a course, you will receive the pdf directly. If your Manager booked you onto the course using your organisation’s email address a copy of the course will be available on request from your Manager. We will also email a link to an online evaluation and we ask that you please fill this in and return it to us so that we can continue to improve our services. All of our evaluations are gathered anonymously. If you have any questions, please contact Training on 0798 999 5180 or email sales@chcaretraining.co.uk.

Medication Awareness training for Acer Care
Delivered Online
£35

Jiwsi Relationships and Sex Education Training (Nov 24)

5.0(2)

By Cwmni Addysg Rhyw - Sex Education Company

Free relationships and sex education training for professionals working in North Wales. Cwmni Addysg Rhyw - Sex Education Company has been commissioned to deliver relationships and sex education (RSE) training to BCUHB staff and partner organisations in North Wales. The aim of this training is to increase confidence and skills to work more effectively with issues concerning sexual health and vulnerable young people. 'The best training I have ever attended!' 'Fun & informative' Attend the first day of the course if you simply want to update your RSE information and attend both days if you want to gain skills and confidence in delivering RSE to individuals or groups. Day one Vulnerable clients Attitudes and values in relation to practice The law and sex Key sexual health issues, including safer sex Gender identity and sexual orientation Communication and sexual health Relevant resources Day two - Additional second day/module for delivering RSE Assessing learning needs Developing purpose and learning outcomes Managing safety and boundary issues Planning, delivering and evaluating sessions Each day will run from 9.30am to 4.30pm via Teams or Zoom. For more information and/or to be added to our mailing list contact Mel Gadd mel@sexeducationcompany.org Terms & conditions: Cwmni Addysg Rhyw facilitates externally funded training to staff that work in the public, private, voluntary and independent sectors. There is significant investment of resources in terms of time, planning and budget to deliver this service and due to repeated incidents of non-attendance without notice it has now become necessary to introduce a charging policy for cancellation and non attendance. Although this course is free of charge to attend we will charge late cancellation administration fees as follows: No notification of non-attendance - £50, less than 48 hours notice of non-attendance £30, Less than 1 weeks notice of non-attendance £25. By registering on the course you agree to these charges on late cancellation or failure to attend. As we usually have a reserve list for our courses we ask you to only book on the course if you can attend the whole day. Arriving late or leaving early will be classed as non-attendance and may be charged as such. We will be delivering this training via Teams or Zoom. It is your responsibility to ensure you can use the platform before booking. If you are unable to access the training on the day because you can't access the platform this will be classed as non attendance and will be charged as such. If you want to check that you can access the training via teams/zoom before booking please contact us. We are happy to set up a quick call for you to check access.

Jiwsi Relationships and Sex Education Training (Nov 24)
Delivered Online
FREE

Oracle SQL Fundamentals, 3 Days

4.6(12)

By PCWorkshops

At this Oracle SQL Fundamentals course, we cover SQL queries, group by's , aggregates, joins, date-functions, String Functions, Random Functions, Math Functions, Insert, update and delete, Creating and changing tables, sub-queries in detail, views, stored procedures, custom functions, and table variables. Course level is beginners to intermediate.

Oracle SQL Fundamentals, 3 Days
Delivered Online + more
£750

Smart Property Business Builder

By Property SQ2

Build a smarter property business. Entrepreneurial Property Strategies. Treat property like a business and supercharge your investment returns.

Smart Property Business Builder
Delivered Online + more
£997

AZ-040T00 Automating Administration with Powershell

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: -Experience with Windows networking technologies and implementation. - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - Review Windows PowerShell Learn about Windows PowerShell Get familiar with Windows PowerShell applications Identify factors to install and use Windows PowerShell Configure the Windows PowerShell console Configure the Windows PowerShell Integrated Scripting Environment (ISE) Use Visual Studio Code with PowerShell 2 - Understand the command syntax in Windows PowerShell Discover the structure of PowerShell cmdlets Discover the parameters for using PowerShell cmdlets Review the tab completion feature in PowerShell Display the About files content in PowerShell 3 - Find commands and Get-Help in Windows PowerShell Define modules in PowerShell Find cmdlets in PowerShell Use command aliases in PowerShell Use Show-Command and Get-Help in PowerShell Interpret the help file contents and update the local help content in PowerShell 4 - Manage Active Directory Domain Services using PowerShell cmdlets Manage user accounts in PowerShell Manage groups and group memberships in PowerShell Manage computer accounts in PowerShell Manage organizational units and Active Directory objects in PowerShell 5 - Manage network service settings for Windows devices using PowerShell cmdlets Manage IP addresses in PowerShell Manage IP routing in PowerShell Manage DNS clients in PowerShell Manage Windows Firewall settings in PowerShell 6 - Manage Windows Server settings using PowerShell cmdlets Automate management tasks using the Group Policy management cmdlets Manage server roles and services using PowerShell cmdlets Manage Hyper-V Virtual Machines using PowerShell cmdlets Manage Internet Information Services using PowerShell cmdlets 7 - Manage settings for a local Windows machine using PowerShell cmdlets Manage Windows 10 using PowerShell Manage permissions with PowerShell 8 - Understand the Windows PowerShell pipeline Review Windows PowerShell pipeline and its output Discover object members in PowerShell Control the formatting of pipeline output 9 - Select, sort, and measure objects using the pipeline Sort and group objects by property in the pipeline Measure objects in the pipeline Select a set of objects in the pipeline Select object properties in the pipeline Create and format calculated properties in the pipeline 10 - Filter objects out of the pipeline Learn about the comparison operators in PowerShell Review basic filter syntax in the pipeline Review advanced filter syntax in the pipeline Optimize the filter performance in the pipeline 11 - Enumerate objects in the pipeline Learn about enumerations in the pipeline Review basic syntax to enumerate objects in the pipeline Review advanced syntax to enumerate objects in the pipeline 12 - Send and pass data as output from the pipeline Write pipeline data to a file Convert pipeline objects to other forms of data representation in PowerShell Control additional output options in PowerShell 13 - Pass pipeline objects Pipeline parameter binding Identify ByValue parameters Pass data by using ByValue Pass data by using ByPropertyName Identify ByPropertyName parameters Use manual parameters to override the pipeline Use parenthetical commands Expand property values 14 - Connect with data stores using PowerShell providers Define Windows PowerShell providers Review the built-in providers in PowerShell Access provider help in PowerShell 15 - Use PowerShell drives in PowerShell Explain PowerShell drives in PowerShell Use PowerShell drive cmdlets in PowerShell Manage the file system in PowerShell Manage the registry in PowerShell Work with certificates in PowerShell Work with other PowerShell drives in PowerShell 16 - Review CIM and WMI Review architecture of CIM and WMI Review repositories in CIM and WMI Locate online class documentation by using CIM and WMI cmdlets 17 - Query configuration information by using CIM and WMI List local repository namespaces and classes by using CIM and WMI Query instances by using commands and WMI Query Language Connect to remote computers by using CIM and WMI cmdlets Query repository classes from remote computers by using CIMSession objects 18 - Query and manipulate repository objects by using CIM and WMI methods Discover methods of repository objects by using CIM and WMI Locate class methods and documentation by using CIM and WMI Invoke methods of repository objects by using CIM and WMI 19 - Manage variables in Windows PowerShell scripts Define variables in Windows PowerShell scripts Create variable names in Windows PowerShell scripts Assign values and types to variables in Windows PowerShell scripts Identify the methods and properties of variables in Windows PowerShell scripts Use string variables and methods in Windows PowerShell scripts Use date variables and methods in Windows PowerShell scripts 20 - Work with arrays and hash tables in Windows PowerShell scripts Define an array in Windows PowerShell scripts Work with array lists in Windows PowerShell scripts Define hash tables in Windows PowerShell Scripts Work with hash tables in Windows PowerShell scripts 21 - Create and run scripts by using Windows PowerShell Review Windows PowerShell scripts Modify scripts in the PowerShell Gallery Create scripts using Windows PowerShell Review the PowerShellGet module in Windows PowerShell Run scripts and set the execution policy in Windows PowerShell Review Windows PowerShell and AppLocker Sign the scripts digitally in Windows PowerShell 22 - Work with scripting constructs in Windows PowerShell Review and use the ForEach loop in Windows PowerShell scripts Review and use the If construct in Windows PowerShell scripts Review and use the Switch construct in Windows PowerShell scripts Review the For construct in Windows PowerShell scripts Review other loop constructs in Windows PowerShell scripts Review Break and Continue in Windows PowerShell scripts 23 - Import data in different formats for use in scripts by using Windows PowerShell cmdlets Use the Get-Content command in Windows PowerShell scripts Use the Import-Csv cmdlet in Windows PowerShell scripts Use the Import-Clixml cmdlet in Windows PowerShell scripts Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - Use methods to accept user inputs in Windows PowerShell scripts Identify values that might change in Windows PowerShell scripts Use the Read-Host cmdlet in Windows PowerShell scripts Use the Get-Credential cmdlet in Windows PowerShell scripts Use the Out-GridView cmdlet in Windows PowerShell scripts Pass parameters to a Windows PowerShell script 25 - Troubleshoot scripts and handle errors in Windows PowerShell Interpret error messages generated for Windows PowerShell commands Add output to Windows PowerShell scripts Use breakpoints in Windows PowerShell scripts Interpret error actions for Windows PowerShell commands 26 - Use functions and modules in Windows PowerShell scripts Review functions in Windows PowerShell scripts Use variable scope in Windows PowerShell scripts Create modules in Windows PowerShell scripts Use the dot sourcing feature in Windows PowerShell 27 - Manage single and multiple computers by using Windows PowerShell remoting Review the remoting feature of Windows PowerShell Compare remoting with remote connectivity Review the remoting security feature of Windows PowerShell Enable remoting by using Windows PowerShell Use one-to-one remoting by using Windows PowerShell Use one-to-many remoting by using Windows PowerShell Compare remoting output with local output 28 - Use advanced Windows PowerShell remoting techniques Review common remoting techniques of Windows PowerShell Send parameters to remote computers in Windows PowerShell Set access protection to variables, aliases, and functions by using the scope modifier Enable multi-hop remoting in Windows PowerShell 29 - Manage persistent connections to remote computers by using Windows PowerShell sessions Review persistent connections in Windows PowerShell Create and manage persistent PSSessions by using Windows PowerShell Disconnect PSSessions by using Windows PowerShell Review the feature of implicit remoting in Windows PowerShell 30 - Review Azure PowerShell module Review Azure PowerShell Review the benefits of the Azure PowerShell module Install the Azure PowerShell module Migrate Azure PowerShell from AzureRM to Azure Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - Review the features and tools for Azure Cloud Shell Review the characteristics of Azure Cloud Shell Review the features and tools of Azure Cloud Shell Configure and experiment with Azure Cloud Shell 32 - Manage Azure resources with Windows PowerShell Create a new Azure virtual machine by using Windows PowerShell commands Manage Azure virtual machines by using Windows PowerShell commands Manage Azure related storage by using Azure PowerShell Manage Azure subscriptions by using Azure PowerShell 33 - Manage users, groups, and licenses in Microsoft Entra ID by using Windows PowerShell Review benefits to manage Microsoft 365 services by using Windows PowerShell Connect to the Microsoft 365 tenant by using Windows PowerShell Manage users in Microsoft 365 by using Windows PowerShell Manage groups in Microsoft 365 by using Windows PowerShell Manage roles in Microsoft 365 by using Windows PowerShell Manage licenses in Microsoft 365 by using Windows PowerShell 34 - Manage Exchange Online by using Windows PowerShell Connect to Exchange Online by using Windows PowerShell Manage mailboxes in Exchange Online by using Windows PowerShell Manage resources in Exchange Online by using Windows PowerShell Manage admin roles in Exchange Online by using Windows PowerShell 35 - Manage SharePoint Online by using Windows PowerShell Install and connect to SharePoint Online Management Shell by using Windows PowerShell Manage SharePoint Online users and groups by using Windows PowerShell Manage SharePoint sites by using Windows PowerShell Manage SharePoint Online external user sharing by using Windows PowerShell 36 - Manage Microsoft Teams by using Windows PowerShell Review Microsoft Teams PowerShell module Install the Microsoft Teams PowerShell module Manage teams with Microsoft Teams PowerShell module 37 - Create and manage background jobs using Windows PowerShell Define the types of background jobs in Windows PowerShell Start remote jobs and CIM/WMI jobs in Windows PowerShell Monitor jobs in Windows PowerShell Retrieve results for running jobs in Windows PowerShell 38 - Create and manage scheduled jobs using Windows PowerShell Create and run Windows PowerShell scripts as scheduled tasks Define scheduled jobs in Windows PowerShell Create job option and job trigger objects in Windows PowerShell Create and register a scheduled job in Windows PowerShell Retrieve the results from a scheduled job in Windows PowerShell

AZ-040T00 Automating Administration with Powershell
Delivered Online
£2,975

VIRTUAL DENTAL NURSING DIPLOMA

4.4(67)

By London Waterloo Academy

Our Virtual (via Zoom) course provide the same high-quality tuition as our classroom-based sessions. Quarterly meetings will take place at the Academy Dental Nursing Diploma with National Examining Board for Dental Nurses (NEBDN) is an internationally recognised qualification that will allow you to work as a Dental Nurse in hospitals, NHS and private dental practices. Successful completion of Dental Nursing Diploma course will enable you to register as a Dental Care Professional with the General Dental Council (GDC) and practice as a qualified Dental Nurse. Discover the exciting world of dental nursing and be a part of a growing field that offers endless opportunities for growth and development. How will you learn? In addition to our traditional class-based tuition, we also offer Virtual (via Zoom) Learning courses to cater to different learning preferences. Our Virtual Learning courses provide the same high-quality tuition as our classroom-based sessions. To participate, you will need a laptop, PC, smart phone or tablet with a built-in or external camera and microphone. From the comfort of your own home, you will have the opportunity to communicate with your tutor and classmates through video chat, using your phone or computer camera. This allows for seamless interaction, discussions, and collaborative learning. Quarterly meetings at the Academy To ensure a well-rounded learning experience, you will be required to attend face-to-face lessons at the Academy on a quarterly basis, which means every three months. These sessions serve several important purposes: Practical Units: Some aspects of the course require hands-on practical training. The face-to-face lessons will cover these practical units, allowing you to gain valuable experience and apply the knowledge you have acquired during the virtual learning sessions. Tests and Mock Exams: These assessments are important for evaluating your progress, identifying areas for improvement, and preparing you for the final exams. The Academy will provide a controlled and supervised environment to ensure the integrity and fairness of these assessments. Attending quarterly face-to-face lessons provides a balanced approach to your learning journey. It combines the convenience and flexibility of virtual learning with the benefits of in-person interactions, practical training, and assessments. By participating in these sessions, you will have the opportunity to reinforce your knowledge, receive personalized feedback, and build a stronger connection with your tutor and classmates. The Academy is dedicated to supporting your growth and success in dental nursing field, and the face-to-face lessons are an integral part of that commitment. Being a Dental Nurse can be an exciting and fulfilling career that allows you to make a positive impact on people’s lives while enjoying a variety of work and opportunities to learn and grow. You’ll get to work with an amazing dental team and get to know patients, helping them to feel at ease and comfortable during their visit. You’ll be the one behind the scene making sure everything runs smoothly, and you’ll be the one that patients will turn to for assistance. You’ll also get to be a part of the latest advancements in dental technology and treatment. And on top of all that, you get to have a flexible schedule and a good earning potential, with the potential to advance in your career. All in all, being a dental nurse is one of the most exciting and fulfilling career that you can have, and you’ll get to leave work every day knowing you’ve made a real difference in the lives of others. The course is delivered by Team of Dental Professionals who are examiners, dentists and experienced Dental tutors with years of experience in teaching Dentistry. Dental Nurses are involved in a wide range of procedures, from routine check-ups to complex surgeries, which can make the job interesting and varied. Patient-centered care: Dental Nurses have a direct impact on the patient’s experience and can make a positive difference in people’s lives by providing them with quality care. Professional development: Dental Nurses have the opportunity to continue their education and expand their skills, leading to advancement and new opportunities in the field. No previous experience required – we will teach you from A to Z. Do you need a job? Yes, you will have 3 months’ time from the start of your course to find a placement. The Academy provides a list of Private and NHS Dental Surgeries, who are regularly contacting us when looking for more Trainee Dental Nurses, so you can contact them directly as a registered student at the Academy. This is a paid job, unless you would like to work voluntary for personal reasons. We also provide a reference letter to the employee in case you need it. The course is ideal for you if: You are looking for a qualification that leads to employment You intend to participate within dentistry and make a positive contribution to the dental health You wish to learn how to maintain high standards of hygiene, cleanliness, health & safety You enjoy interacting with multidisciplinary team and different people The curriculum is based on the GDC (General Dental Council) registration requirements for dental nurses. It sets out the knowledge, skills and behavioural requirements that should be developed and demonstrated. These are set out in terms of professional competencies, with the assessment method clearly outlined (e.g. how the skills and knowledge will be assessed in the final examinations – via written questions such as multiple choice (MCQ) or extended matching questions (EMQ) or via Objective Structured Clinical Examinations – OSCEs). We are proud to announce that our Dental Nursing students has the highest examination pass rate in OSCE examinations! Free services– workshops, mock exams, eRoE marking and internal moderation. Earn while you learn could be another benefit for doing this course. We provide a list of Private Surgeries who have been working with us for the last 14 years and looking to recruit more Trainee Dental Nurses. Working together – At our Dental Department, we prioritise working together with our learners every step of the way. We firmly believe in providing unwavering support, equipping you with the necessary tools, skills, and assistance to ensure your success. We take immense pride in the achievements of our students, with a long list of graduates boasting remarkable success stories. Our commitment to your success serves as the foundation for our own accomplishments What Can You Expect to Earn as a Dental Nurse? Compared to other caring professions, Dental Nursing is well paid and offers plenty of opportunity for continued training and development. This is great for those looking on a the long-term plan for their career and those who wish to work their way up the ladder through continued learning, experience & hard work. Trainee Dental Nurse salary for standard working week will be around £23,000 per annum. Average wage for a qualified Dental Nurses between £40,417 to £42,350 p.a. When are the exams? There are two exams: 1. Multiple choice theory exam. November and March. 2. Practical exam. January and June. Record of Experience (eROE) To be eligible to sit your first exam, you have to complete your electronic Record of Experience (eROE). The eROE has to be submitted to your tutor by 31st Jan for March exam, and 31st August for November exam. London Waterloo Academy supports Mouth Cancer Research Foundation and encouraging learners to raise the awareness and participate in annual 10k walk. Study mode – virtual (via Zoom) live stream lessons combined with a quarterly meetings Saturday/Sunday at the Academy Duration – 1 year (part time) Virtual (via Zoom) classes – once a week Quarterly meetings at the Academy – date are discussed with the group in advance Next Intake/start dates (please choose one for your course to start): 21 September 2024, Saturday classes from 9am to 11am Registration fee – £300 (includes: administration, workshops, mock exams, RoE marking, internal moderation of RoE) Tuition Fees – £1,400 (we offer payment plan, and accept instalments) Exam fee – £510 will be charged at the point of candidate registration with NEBDN One day introduction course – for those who are considering/not sure whether to step up into the Dental Industry £50.00 Call us +44 (0) 7484 014980 or email to info@waterlooacademy.co.uk or Facebook – London Waterloo Academy Office location: The Foundry, 156 Blackfriars Rd, London SE1 8EN (Southwark Station (2-3 min walk) and Waterloo/Blackfriars Station (10 min walk))

VIRTUAL DENTAL NURSING DIPLOMA
Delivered Online + more
£50 to £1,400

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. Prerequisites Experience with managing Windows Server operating system and Windows Server workloads in on-premises scenarios, including AD DS, DNS, DFS, Hyper-V, and File and Storage Services Experience with common Windows Server management tools (implied in the first prerequisite). Basic knowledge of core Microsoft compute, storage, networking, and virtualization technologies (implied in the first prerequisite). Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts Basic experience with implementing and managing IaaS services in Microsoft Azure Basic knowledge of Azure Active Directory Experience working hands-on with Windows client operating systems such as Windows 10 or Windows 11 Basic experience with Windows PowerShell 1 - Introduction to AD DS Define AD DS Define users, groups, and computers Define AD DS forests and domains Define OUs Manage objects and their properties in AD DS 2 - Manage AD DS domain controllers and FSMO roles Deploy AD DS domain controllers Maintain AD DS domain controllers Manage the AD DS Global Catalog role Manage AD DS operations masters Manage AD DS schema 3 - Implement Group Policy Objects Define GPOs Implement GPO scope and inheritance Define domain-based GPOs Create and configure a domain-based GPO Define GPO storage Define administrative templates 4 - Manage advanced features of AD DS Create trust relationships Implement ESAE forests Monitor and troubleshoot AD DS Create custom AD DS partitions 5 - Implement hybrid identity with Windows Server Select a Microsoft Entra integration model Plan for Microsoft Entra integration Prepare on-premises Active Directory for directory synchronization Install and configure directory synchronization with Microsoft Entra Connect Implement Seamless Single Sign-On Enable Microsoft Entra login in for Windows VM in Azure Describe Microsoft Entra Domain Services Implement and configure Microsoft Entra Domain Services Manage Windows Server 2019 in a Microsoft Entra Domain Services environment Create and configure a Microsoft Entra Domain Services instance Join a Windows Server VM to a managed domain 6 - Deploy and manage Azure IaaS Active Directory domain controllers in Azure Select an option to implement directory and identity services using Active Directory Domain Services in Azure Deploy and configure Active Directory Domain Services domain controllers in Azure VMs Install a replica Active Directory domain controller in an Azure VM Install a new Active Directory forest on an Azure VNet 7 - Perform Windows Server secure administration Define least privilege administration Implement delegated privileges Use privileged access workstations Use jump servers 8 - Describe Windows Server administration tools Explore Windows Admin Center Use Server Manager List Remote Server Administration Tools Use Windows PowerShell Use Windows PowerShell to remotely administer a server 9 - Perform post-installation configuration of Windows Server List the available post-installation configuration tools Configure Server Core using Sconfig Use DSC to configure Windows Server Perform post-installation configuration with Windows Admin Center Configure a server with answer files 10 - Just Enough Administration in Windows Server Explain the concept of Just Enough Administration (JEA) Define role capabilities for a JEA endpoint Create a session configuration file to register a JEA endpoint Describe how JEA endpoints work to limit access to a PowerShell session Create and connect to a JEA endpoint Demonstration: Connect to a JEA endpoint 11 - Administer and manage Windows Server IaaS Virtual Machine remotely Select the appropriate remote administration tool Manage Windows Virtual Machines with Azure Bastion Create an Azure Bastion host Configure just-in-time administration 12 - Manage hybrid workloads with Azure Arc Describe Azure Arc Onboard Windows Server instances Connect hybrid machines to Azure from the Azure portal Use Azure Arc to manage Windows Server instances Restrict access with RBAC 13 - Configure and manage Hyper-V Define Hyper-V Define Hyper-V Manager Configure Hyper-V hosts using best practices Configure Hyper-V networking Assess advanced Hyper-V networking features Define nested virtualization 14 - Configure and manage Hyper-V virtual machines List the virtual machine configuration versions List the virtual machine generation versions List available VHD formats and types Create and configure VMs Determine storage options for VMs Define shared VHDs and VHD Sets Implement guest clusters using shared VHDX 15 - Secure Hyper-V workloads Define guarded fabric Define the Host Guardian Service Explore TPM-trusted attestation Define KPS Determine key features of shielded VMs Compare encryption-supported and shielded VMs in a guarded fabric Implement a shielded VM 16 - Run containers on Windows Server Define containers List the differences between containers and VMs Define Windows Server and Hyper-V containers and isolation modes Explore Docker Prepare a Windows Server 2019 host for container deployment Security, Storage, and Networking with Windows containers 17 - Orchestrate containers on Windows Server using Kubernetes Define orchestration Define Kubernetes Deploy Kubernetes resources Create a Kubernetes cluster on Windows Define Azure Arc Connect an Azure Arc-enabled Kubernetes cluster to Azure Arc 18 - Plan and deploy Windows Server IaaS Virtual Machines Describe Azure compute Describe Virtual Machine storage Deploy Azure Virtual Machines Create a windows Virtual Machine using the portal Create a windows Virtual Machine using Azure CLI Deploy Azure Virtual Machines using templates Describe additional management optimization options 19 - Customize Windows Server IaaS Virtual Machine images Create a generalized image Create a new Virtual Machine from a managed image Create a managed image of a generalized virtual machine in Azure Create a Virtual Machine from a managed image Implement Azure Image Builder Create a windows Virtual Machine using Azure Image Builder template Create a Windows Virtual Machine with Azure Image Builder using PowerShell 20 - Automate the configuration of Windows Server IaaS Virtual Machines Describe Azure Automation Implement Azure Automation with DSC Remediate noncompliant servers Describe Custom Script Extensions Configure a Virtual Machine by using DSC 21 - Deploy and manage DHCP Use DHCP to simplify IP configuration Install and configure the DHCP role Configure DHCP options Configure DHCP scopes Select DHCP high availability options Implement DHCP Failover 22 - Implement Windows Server DNS Explore the DNS architecture Work with DNS zones and records Install and configure the DNS role Implement DNS forwarding 23 - Implement IP Address Management Define IP Address Management Deploy IP Address Management Administer IP Address Management Configure IP Address Management options Manage DNS zones with IP Address Management Manage DHCP servers with IP Address Management Use IP Address Management to manage IP addressing 24 - Implement remote access Examine the remote access options in Windows Server Select and set up VPNs Use NPS to create and enforce network access policies Plan and implement NPS Deploy a PKI for remote access Use WAP as a reverse web proxy 25 - Implement hybrid network infrastructure Describe Azure network topologies Implement Azure VPN options Create a route-based VPN gateway using the Azure portal Implement Azure ExpressRoute Configure Azure Virtual WAN Implement DNS in hybrid environments 26 - Implement DNS for Windows Server IaaS VMs Understand Azure DNS Implement Azure DNS Create an Azure DNS zone and record using the Azure portal Implement DNS with Azure IaaS virtual machines Implement split-horizon DNS in Azure Troubleshoot DNS 27 - Implement Windows Server IaaS VM IP addressing and routing Implement a virtual network Implement IaaS VM IP addressing Assign and manage IP addresses Configure a private IP address for a virtual machine using the Azure portal Create a virtual machine with a static public IP address using the Azure portal Implement IaaS virtual machine IP routing Implement IPv6 for Windows Server IaaS virtual machines 28 - Manage Windows Server file servers Define the Windows Server file system List the benefits and uses of File Server Resource Manager Define SMB and its security considerations Configure SMB protocol Define Volume Shadow Copy Service 29 - Implement Storage Spaces and Storage Spaces Direct Define the Storage Spaces architecture and its components List the functionalities, benefits, and use cases of Storage Spaces Implement Storage Spaces List the functionalities, components, benefits, and use cases of Storage Spaces Direct Implement Storage Spaces Direct 30 - Implement Windows Server Data Deduplication Define the architecture, components, and functionality of Data Deduplication Define the use cases and interoperability of Data Deduplication Implement Data Deduplication Manage and maintain Data Deduplication 31 - Implement Windows Server iSCSI List the functionalities, components, and use cases of iSCSI List the considerations for implementing iSCSI Implement iSCSI Configure high availability for iSCSI 32 - Implement Windows Server Storage Replica List the functionalities and components of Storage Replica Examine the prerequisites for implementing Storage Replica Implement Storage Replica by using Windows Admin Center Implement Storage Replica by using Windows PowerShell 33 - Implement a hybrid file server infrastructure Describe Azure File services Configure Azure Files Configure connectivity to Azure Files Describe Azure File Sync Implement Azure File Sync Deploy Azure File Sync Deploy Azure File Sync 2 Manage cloud tiering Migrate from DFSR to Azure File Sync

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure
Delivered Online
£2,380

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - Explaining the OSI and TCP/IP Models Topic A: Explain OSI Model Layers Topic B: Explain the TCP/IP Suite 2 - Explaining Properties of Network Traffic Topic A: Explain Media Types and Access Methods Topic B: Deploy Ethernet Standards Topic C: Configure and Monitor Network Interfaces 3 - Installing and Configuring Switched Networks Topic A: Install and Configure Hubs and Bridges Topic B: Install and Configure Switches Topic C: Compare and Contrast Network Topologies Topic D: Compare and Contrast Network Types 4 - Configuring IP Networks Topic A: Configure IPv4 Addressing Components Topic B: Test IP Interfaces with Command Line Tools Topic C: Configure IPv4 Subnets Topic D: Configure Private and Public IPv4 Addressing Schemes Topic E: Configure IPv6 Addressing Components Topic F: Configure DHCP Services 5 - Installing and Configuring Routed Networks Topic A: Explain Characteristics of Routing Topic B: Install and Configure Routers 6 - Configuring and Monitoring Ports and Protocols Topic A: Explain the Uses of Ports and Protocols Topic B: Use Port Scanners and Protocol Analyzers Topic C: Explain the Use of Name Resolution Services Topic D: Configure DNS and IPAM Services 7 - Explaining Network Application and Storage Services Topic A: Explain the Uses of Network Applications Topic B: Explain the Uses of Voice Services and Advanced Networking Devices Topic C: Explain the Uses of Virtualization and Network Storage Services Topic D: Summarize the Concepts of Cloud Services 8 - Monitoring and Troubleshooting Networks Topic A: Monitor Network Interfaces and Logs Topic B: Explain Network Troubleshooting Methodology Topic C: Troubleshoot Common Network Services Issues 9 - Explaining Networking Attacks and Mitigations Topic A: Summarize Common Networking Attacks Topic B: Explain the Characteristics of VLANs Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - Installing and Configuring Security Devices Topic A: Install and Configure Firewalls and Proxies Topic B: Explain the Uses of IDS/IPS and UTM 11 - Explaining Authentication and Access Controls Topic A: Explain Authentication Controls and Attacks Topic B: Explain the Uses of Authentication Protocols and Directory Services Topic C: Explain the Uses of Port Security and NAC Topic D: Implement Network Device Hardening Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - Deploying and Troubleshooting Cabling Solutions Topic A: Deploy Structured Cabling Systems Topic B: Deploy Twisted Pair Cabling Solutions Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions Topic D: Deploy Fiber Optic Cabling Solutions 13 - Implementing and Troubleshooting Wireless Technologies Topic A: Install and Configure Wireless Technologies Topic B: Troubleshoot Wireless Performance Issues Topic C: Secure and Troubleshoot Wireless Connectivity 14 - Comparing and Contrasting WAN Technologies Topic A: Compare and Contrast WAN Core Service Types Topic B: Compare and Contrast WAN Subscriber Service Types Topic C: Compare and Contrast WAN Framing Service Types Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - Using Remote Access Methods Topic A: Use Remote Access VPNs Topic B: Use Remote Access Management Methods 16 - Identifying Site Policies and Best Practices Topic A: Manage Networks with Documentation and Diagrams Topic B: Summarize the Purposes of Physical Security Devices Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online + more
£2,475

55371 Windows Server Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Information Technology (IT) Professionals who have some experience working with Windows Server and are looking for a single five-day course that covers core administration components and technologies in Windows Server. This course also helps server administrators from previous Windows Server versions to update their knowledge and skills related to Windows Server. The course is also for individuals from a service desk role who wish to transition into server maintenance. This five-day instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server in most organizations. Module 1: Windows Server Administration Overview  Introducing Windows Server Windows Server Core Overview Windows Server administration principles and tools overview Module 2: Identity Services in Windows Server  AD DS Overview Deploying Windows Server domain controllers Azure AD overview Implementing Group Policy Active Directory Certificate Services overview Module 3: Network Infrastructure services in Windows Server  Deploying and managing DHCP Deploying and managing DNS service Deploying and managing IPAM Remote Access Services in Windows Server Module 4: File Servers and Storage management in Windows Server  Volumes and File Systems in Windows Server Implementing sharing in Windows Server Implementing Storage Spaces in Windows Server Implementing Data Deduplication Implementing iSCSI Deploying Distributed File System Module 5: Hyper-V virtualization and containers in Windows Server  Hyper-V in Windows Server Configuring VMs Securing virtualization in Windows Server Containers in Windows Server Overview of Kubernetes Module 6: High Availability in Windows Server Planning for failover clustering implementation Creating and configuring failover cluster Overview of stretch clusters High availability and disaster recovery solutions with Hyper-V VMs Module 7: Disaster recovery in Windows Server Hyper-V Replica Backup and restore infrastructure in Windows Server Module 8: Windows Server security Credentials and privileged access protection Hardening Windows Server JEA in Windows Server Securing and analyzing SMB traffic Windows Server update management Module 9: RDS in Windows Server Overview of RDS Configuring a session-based desktop deployment Overview of personal and pooled virtual desktops Module 10: Remote access and web services in Windows Server Implementing VPNs Implementing Always On VPN Implementing NPS Implementing Web Server in Windows Server Module 11: Server and performance monitoring in Windows Server  Overview of Windows Server monitoring tools Using Performance Monitor Monitoring event logs for troubleshooting Module 12: Upgrade and migration in Windows Server AD DS migration Storage Migration Service Windows Server migration tools Additional course details: Nexus Humans 55371 Windows Server Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55371 Windows Server Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55371 Windows Server Administration
Delivered Online
£2,975

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online
£2,975