• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1143 Administrative Assistant courses in Cardiff delivered Online

Complete Guide to Adobe Lightroom Classic CC & CC - Photo Editing Masterclass

5.0(1)

By Course Gate

Learn to make your raw images more beautiful and appealing with a few simple tricks and easy to follow instructions! This photo editing course aims at providing you with a complete guideline to edit photos in Adobe Lightroom Classic CC and Adobe Lightroom CC. With this course, you will discover engaging lessons that incorporate Adobe Lightroom Classic CC, Adobe Lightroom CC, and Adobe Lightroom CC on a smartphone. Each and every topic of this course is presented in an easy to grasp manner. You will also develop your skills by learning a range of Photoshop techniques such as adjustment and white balance, vibrant and colour strength and many more. On completion, you will be able to manipulate images according to the need and create eye-catching photographs for branding and marketing. Work with this popular program to its full potential, whether you are using Lightroom Classic CC, Lightroom CC or Lightroom on the smartphone! Who is the course for? This course is ideal for those wanting to improve their base skills in office administrative tasks This course would be ideal for people who want to start working as a receptionist, office administrator, office manager, administrative assistant or secretary Entry Requirement for this photo editing course: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. CPD Certificate from Course Gate  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Module: 01 0 Lightroom Course Promo 00:02:00 0.1 Promo for Lightroom CC Course 00:02:00 0.1 Promo Video Lightroom Classic CC Course 00:02:00 1.1 Course Introduction 00:03:00 1.1 Into Video 00:02:00 1.1 Intro Video V2 00:04:00 Module: 02 2.1 Importing 00:08:00 2.2 Organizing with Collections 00:07:00 2.4 Face Tagging 00:03:00 Module: 03 3.1 Enhancing Eyes 00:06:00 3.1 Crop and Rotate in Lightroom Classic CC 00:05:00 3.2 Whitening Teeth 00:03:00 3.2 Crop and Straighten 00:11:00 3.3 Exposure in Lightroom Classic CC 00:06:00 3.3 Smoothing Skin 00:02:00 3.4 Color and Saturation in Lightroom Classic CC 00:09:00 3.4 Removing Wrinkles 00:07:00 3.5 Enhancing Lips & Changing Lip Color 00:04:00 3.5 Presence Clarity and Saturation Jon 00:05:00 3.5 Sharpening and Noise Reduction in Lightroom Classic CC 00:07:00 3.6 Cheek Enhancements and Face Contouring 00:05:00 3.6 Tone Curve 00:07:00 3.6 Vignettes, Grain and Dehaze in Lightroom Classic CC 00:06:00 3.7 Exporting in Lightroom Classic CC 00:10:00 3.7 full portrait editing techniques 00:11:00 3.7 HSL 00:07:00 3.8 Lens Corrections in Lightroom Classic CC 00:05:00 3.9 Split Tone in Lightroom Classic CC 00:05:00 3.10 Removing Blemishes with the Heal and Clone Tools in Lightroom Classic CC 00:08:00 3.11 Graduated, Radial and Brush Adjustments in Lightroom Classic CC 00:10:00 3.12 Adjustment Brush Presets in Lightroom Classic CC 00:03:00 3.12 Calibrate Your Camera Profile 00:08:00 3.13 Range Masks in Lightroom Classic CC 00:05:00 3.13 Range Masks in Lightroom Classic CC 00:05:00 Module: 04 4.1 Full Edit - Car 00:15:00 4.1 The Adjustment Brush 00:04:00 4.1 Using, Creating, and Importing Presets 00:05:00 4.2 Color Profiles 00:04:00 4.2 Full Edit - Starry Sky 00:10:00 4.2 Radial Filter 00:03:00 4.3 Full Edit - Woman and Dog 00:15:00 4.3 Graduated Filter 00:05:00 4.3 Speed Up Your Editing Workflow 00:04:00 4.4 Full Edit - Snowy Landscape 00:11:00 4.4 Panorama 00:04:00 4.4 Spot Healing Brush 00:05:00 4.5 Full Edit - Icy River 00:12:00 4.5 HDR 00:03:00 4.6 Automatically Fix Exposure & White Balance 00:02:00 4.6 Full Edit - Surfs Up 00:10:00 4.7 Full Edit - Wildlife Bird 00:15:00 4.8 Full Edit - Roses are Red 00:11:00 Module: 05 5.1 Enhance Eyes and Change Eye Color 00:08:00 5.1 Exporting Photos from Lightroom 00:09:00 5.2 Adding a Watermark Lightroom 00:04:00 5.2 Whitening Teeth 00:03:00 5.3 Smoothing Skin 00:02:00 5.4 Removing Wrinkles 00:05:00 5.5 Enhancing Lips & Changing Lipstick Color 00:03:00 5.6 Enhancing Cheeks _ Face Contouring 00:08:00 5.7 Full Portrait Edit 00:07:00 Module: 06 6.1 Moonscape 00:11:00 6.1 Portrait of a Woman 00:20:00 6.2 Landscape Editing 00:07:00 6.2 Night Edit 00:15:00 6.3 Long Exposure 00:14:00 6.3 Ocean Flash Portrait 00:09:00 6.4 Group Photo Edit 00:16:00 6.4 Product Photo 00:12:00 6.5 Nature 00:09:00 6.5 Portrait With No Flash 00:05:00 6.6 Action 00:08:00 6.6 Lightroom To Match Color For Corporate Branding Images 00:06:00 6.7 Landscape 00:12:00 6.8 Travel 00:13:00 6.9 Couples Portrait 00:18:00 6.10 Architecture Photo 00:18:00 6.11 Aerial Photo 00:09:00 6.12 Street Photo 00:14:00 6.13 Macro Photo 00:10:00 6.14 Pet Photo 00:10:00 6.15 Maternity Couple Photo 00:12:00 6.16 Interior Nursery 00:13:00 6.17 Portrait of a Man 00:19:00 6.18 Sports Photo 00:10:00 Module: 07 7.1 Intro To Lightroom Mobile 00:03:00 7.1 The Map Module 00:04:00 7.2 Syncing Lightroom Mobile 00:08:00 7.2 The Book Module 00:10:00 7.3 Edit Lightroom Mobile 00:09:00 7.3 The Slideshow Module 00:10:00 7.4 Lightroom Mobile Organizing and Sharing 00:05:00 7.4 The Print Module 00:08:00 7.5 The Web Module 00:06:00 Module: 08 8.1 Conclusion and Thank You 00:02:00 8.1 Using Lightroom Presets 00:04:00 8.2 Installing Lightroom Presets 00:03:00 Module: 09 9.1 Calibrate Your Monitor 00:03:00 9.2 Color Checker Passport 00:10:00 9.3 Tablets 00:08:00 9.4 Catalogues 00:11:00 9.5 Brighten and Whiten Teeth and Eyes 00:04:00 9.6 Remove Wrinkles in Lightroom 00:05:00 9.7 Create a Panorama in Lightroom 00:03:00 9.8 Remove Red-Eye 00:01:00 9.9 Soften Skin in Lightroom 00:03:00 9.10 Reduce Noise in Your Photos 00:05:00 Module: 10 10.1 Google NIK 00:17:00 Module: 11 11.1 full lightroom session workflow 00:07:00 Module: 12 12.1 Conclusion 00:01:00 Resources Resources - Complete Guide to Adobe Lightroom Classic CC & CC - Photo Editing Masterclass 00:00:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Complete Guide to Adobe Lightroom Classic CC & CC - Photo Editing Masterclass
Delivered Online On Demand13 hours 40 minutes
£11.99

Level 2 Safeguarding and Prevent - CPD Certified

5.0(3)

By School Of Health Care

Safeguarding: Level 2 Safeguarding and Prevent Course Online Introducing Safeguarding: Level 2 Safeguarding and Prevent Course "Empowering the Next Generation" Online course! Anyone who wants to work in local authorities, schools, colleges, uniformed services, or health and social care must understand safeguarding and the prevention duty, as well as how to incorporate these principles into their daily work practices. This Safeguarding: Level 2 Safeguarding and Prevent Course will increase your understanding of safeguarding and the Prevent duty, the responsibilities and procedures involved, and how to effectively raise concerns. The Safeguarding: Level 2 Safeguarding and Prevent Course covers extremism, British values, cyberbullying, and online grooming. Through this Safeguarding: Level 2 Safeguarding and Prevent Course, you will also learn the meanings of the terms "radicalization," "extremism," and "terrorism," as well as how to effectively comply with the Prevent duty. Why choose this Safeguarding: Level 2 Safeguarding and Prevent Course from the School of Health Care? Self-paced Safeguarding: Level 2 Safeguarding and Prevent Course, access available from anywhere in the world. High-quality study materials that are easy to understand. Safeguarding: Level 2 Safeguarding and Prevent Course developed by industry experts. After each module, there will be an MCQ quiz to assess your learning. Assessment results are generated automatically and instantly. 24/7 support is available via live chat, phone call, or email. Free PDF certificate after completing the Safeguarding: Level 2 Safeguarding and Prevent Course. Main Course: Level 2 Certificate in Understanding Safeguarding and Prevent Free Courses included with Safeguarding: Level 2 Safeguarding and Prevent Course Course 01: Level 2 Certificate in Preparing to Work in Adult Social Care Course 02: Safer Recruitment Training Course [ Note: Free PDF certificate as soon as completing the Safeguarding: Level 2 Safeguarding and Prevent Course] Safeguarding: Level 2 Safeguarding and Prevent Course Online This Safeguarding: Level 2 Safeguarding and Prevent Course consists of 03 modules. Course Curriculum of Safeguarding: Level 2 Safeguarding and Prevent Course Module 01: Understanding the Prevent Duty Module 02: Understanding Safeguarding Module 03: Understanding Online Safety Assessment Method of Safeguarding: Level 2 Safeguarding and Prevent Course After completing Safeguarding: Level 2 Safeguarding and Prevent Course, you will get quizzes to assess your learning. You will do the later modules upon getting 60% marks on the quiz test. Apart from this, you do not need to sit for any other assessments. Certification of Safeguarding: Level 2 Safeguarding and Prevent Course After completing the Safeguarding: Level 2 Safeguarding and Prevent Course, you can instantly download your certificate for FREE. The hard copy of the certification will also be delivered to your doorstep via post, which will cost £13.99. Who is this course for? Safeguarding: Level 2 Safeguarding and Prevent Course Online This Safeguarding: Level 2 Safeguarding and Prevent Course is suitable for those who want to better understand safeguarding and the Prevent duty, the responsibilities and procedures involved, and how to raise concerns effectively. Special Note: Our Level 2 Safeguarding and Prevent Course is not a regulated course. If you prefer to get qualified, you can look at the following options: NCFE CACHE Level 2 Certificate in Understanding Safeguarding and Prevent Level 2 Protecting Children and Young People (RQF) Level 3 Designated Safeguarding Lead Training (RQF) Requirements Safeguarding: Level 2 Safeguarding and Prevent Course Online To enrol in this Safeguarding: Level 2 Safeguarding and Prevent Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Safeguarding: Level 2 Safeguarding and Prevent Course. Be energetic and self-motivated to complete our Safeguarding: Level 2 Safeguarding and Prevent Course. Basic computer Skill is required to complete our Safeguarding: Level 2 Safeguarding and Prevent Course. If you want to enrol in our Safeguarding: Level 2 Safeguarding and Prevent Course, you must be at least 15 years old. Career path Safeguarding: Level 2 Safeguarding and Prevent Course Online After completing this Safeguarding: Level 2 Safeguarding and Prevent Course, candidates may pursue a career in: Local Government Administrative Assistant (£17,500 to £24,500) Higher Education Lecturer (£33,000 to £54,000) Social Worker (£24,000 to £40,000)

Level 2 Safeguarding and Prevent - CPD Certified
Delivered Online On Demand20 hours
£12

English Grammar, Spelling, and Punctuation

By IOMH - Institute of Mental Health

Overview of English Grammar, Spelling, and Punctuation Good writing is an important skill that helps you communicate clearly and confidently. In today’s job market, being able to write well is a must. Employers often look for people who can use correct English Grammar, Spelling, and Punctuation. In fact, 86% of UK businesses say that poor grammar and spelling affect how they see job applicants. About 44% even say it can lead to an automatic rejection. This means that improving your writing can help you stand out from others. This English Grammar, Spelling, and Punctuation course will help you improve your writing in simple and easy steps. You will learn the rules of grammar, how to use punctuation properly, and how to spell words correctly. You will also learn how to write clear sentences and avoid common mistakes. Each part of the course is designed to help you build your skills, one topic at a time. Whether you are new to writing or want to improve your current skills, this course is a great place to start. Over 200,000 people work in the UK publishing industry, where good writing is used every day. But strong English Grammar, Spelling, and Punctuation skills are not just for writers. This course is helpful for anyone who writes emails, reports, or documents. Learn the key parts of writing and improve your English Grammar, Spelling, and Punctuation today. Learning Outcomes By the end of this English Grammar, Spelling, and Punctuation course, you will be able to: Understand and use the basic rules of English grammar. Write correct and clear sentences. Form questions properly in your writing. Use punctuation marks and capital letters the right way. Improve your spelling with simple tips and practice. Spot and fix common grammar and spelling mistakes. Who is this course for? This English Grammar, Spelling, and Punctuation course is a great choice for: Students who want to write better for school or university. People whose first language is not English and want to write better for work or study. Office workers who need to write clear and mistake-free emails or reports. Writers and content creators who want to polish their grammar, spelling, and punctuation. Anyone who wants to write clearly and avoid common writing mistakes. Process of Evaluation After studying the English Grammar, Spelling, and Punctuation Course, your skills and knowledge will be tested with an MCQ exam or assignment. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the English Grammar, Spelling, and Punctuation Course, you can order your CPD Accredited Digital / PDF Certificate for £5.99. (Each) Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. (Each) Shipping Charges: Inside the UK: £3.99 International: £10.99 Requirements You don't need any educational qualification or experience to enrol in the English Grammar, Spelling, and Punctuation course. Career Path This English Grammar, Spelling, and Punctuation course can help you move towards jobs such as: Copy Editor – £25,000 to £40,000 per year Content Writer – £22,000 to £35,000 per year Administrative Assistant – £20,000 to £30,000 per year Proofreader – £23,000 to £38,000 per year Editorial Assistant – £18,000 to £28,000 per year Course Curriculum Module 01: Introduction to the Course Introduction to the Course 00:04:00 Module 02: The Basics of Grammar The Basics of Grammar 00:07:00 Module 03: The Basics of Sentence The Basics of Sentence 00:04:00 Module 04: Structure of Sentence Structure of Sentence 00:08:00 Module 05: Question Question 00:04:00 Module 06: Punctuation & Capitalisation Punctuation & Capitalisation 00:00:00 Module 07: Spelling Spelling 00:10:00 Module 08: Common Mistakes & Ways to Improve Common Mistakes & Ways to Improve 00:10:00

English Grammar, Spelling, and Punctuation
Delivered Online On Demand47 minutes
£11.99

Professional Diplomatic Protocol Management

5.0(10)

By GBA Corporate

Overview The protocol is one of the most modern terms in terms of language but very old in terms of history as the word protocol is a development of the word of the conventions and understandings this is in the world of politics and at the international level, but within the field of business management has become the formulation of protocols is one of the important and necessary skills and very necessary for people who wish to They must take administrative duties. Through this course, we are going to introduce the rules and practices of gentle behaviour, the best practices for communication with others, and good reception, since all such related matters represent a large portion of our personality.

Professional Diplomatic Protocol Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Office Management and Effective Communication Skills

5.0(10)

By GBA Corporate

Overview This Course is specially designed to enhance communication skills and gain advanced skills in office management. It will help identify key features of the role and will navigate through all the components and techniques for operating an efficient support team. This course will update your interpersonal skills, communication skills and other skills required to have effective office management and gain advanced administrative skills.

Office Management and Effective Communication Skills
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

CCNP core

5.0(3)

By Systems & Network Training

CCNP training course description The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You'll learn to implement security principles within an enterprise network and how to overlay network design using solutions such as SDAccess and SD-WAN. Course content includes 3 days of self-study material. This course helps you prepare for the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam What will you learn Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Prepare you prepare to take the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam CCNP training course details Who will benefit: Mid-level network engineers, Network administrators, Network support technicians, Help desk technicians. Prerequisites: Implementation of Enterprise LAN networks. Basic understanding of Enterprise routing and wireless connectivity, and Python scripting Duration 5 days CCNP training course content Cisco Enterprise Network Architecture: Access, distribution, core in the hierarchical network. Cisco Switching Paths: Switching mechanisms, TCAM, CAM, process switching, fast switching, and CEF. Implementing Campus LAN Connectivity: Troubleshoot L2 connectivity using VLANs and trunkingBuilding Redundant Switched Topology: STP Implementing Layer 2 Port Aggregation Troubleshoot link aggregation using Etherchannel EIGRP Implement and optimize OSPFv2/v3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4/v6 Implement EBGP interdomain routing, path selection, and single and dual-homed networkingImplementing Network Redundancy: HSRP and VRRP Implement static and dynamic NAT Virtualization Protocols and TechniquesVPNs and Interfaces: Overlay technologies such as VRF, GRE, VPN, and LISP Wireless Principles: RF, antenna characteristics, and wireless standards.Wireless Deployment: Models available, autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture Wireless Roaming and Location ServicesWireless AP Operation: How APs communicate with WLCs to obtain software, configurations, and centralized managementWireless Client Authentication: EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various available tools Troubleshoot networks using services such as NTP, SNMP, Cisco IP SLAs, NetFlow, and Cisco IOS EEM Explain network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshootingMulticast Protocols: IGMP v2/v3, PIM DM/SM and RPs Introducing QoS: Concepts and features. Implementing Network Services: Secure administrative access for Cisco IOS devices using CLI access, RBAC, ACL, and SSH, and device hardening concepts to secure devices from less secure applications Using Network Analysis ToolsInfrastructure Security: Scalable administration using AAA and the local database, features and benefits Enterprise Network Security Architecture: VPNs, content security, logging, endpoint security, personal firewalls, and other security features. Automation and Assurance with Cisco DNA Center: Purpose, function, features, and workflow. Intent-Based Networking, for network visibility, proactive monitoring, and application experienceCisco SD-Access Solution: Nodes, fabric control plane, and data plane, VXLAN gatewaysCisco SD-WAN Solution: Components and features of Cisco SD-WAN solutions, including the orchestration, management, control, and data planesBasics of Python Programming: Python components and conditionals with script writing and analysis Network Programmability: NETCONF and RESTCONF APIs in Cisco DNA Center and vManage Labs: Investigate the CAM. Analyze CEF. Troubleshoot VLAN and Trunk Issues. Tuning STP and Configuring RSTP. Configure MSTP. Troubleshoot EtherChannel. Implement Multi-area OSPF. Implement OSPF Tuning. Apply OSPF Optimization. Implement OSPFv3. Configure and Verify Single-Homed EBGP. Implementing HSRP. Configure VRRP. Implement NAT. Configure and Verify VRF. Configure and Verify a GRE Tunnel. Configure Static VTI Point-to-Point Tunnels. Configure Wireless Client Authentication in a Centralized Deployment. Troubleshoot Wireless Client Connectivity Issues. Configure Syslog. Configure and Verify Flexible NetFlow. Configuring Cisco IOS EEM. Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug. Configure and Verify Cisco IP SLAs. Configure Standard and Extended ACLs. Configure Control Plane Policing. Implement Local and Server-Based AAA. Writing and Troubleshooting Python Scripts. Explore JSON Objects and Scripts in Python. Use NETCONF Via SSH. Use RESTCONF with Cisco IOS XE.

CCNP core
Delivered in Internationally or OnlineFlexible Dates
£3,697

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered OnlineFlexible Dates
£2,975

50255 Managing Windows Environments with Group Policy

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design. Overview At Course Completion: - Features and functions of Group Policy - Use Group Policy management tools to manage security policies - Design a Group Policy infrastructure - Group Policy processing architecture - Back up, restore, import, and copy Group Policy Objects through the Group Policy - Management Console - Use Windows PowerShell to manage Group Policy - Implement security using Group Policy - Configure the desktop environment with Group Policy - Configure roaming profiles and Folder Redirection - Assign and publish software packages - Implement AppLocker and software restriction policies - Create and deploy Administrative Templates - Configure Group Policy preferences In this course, you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server 2016 and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks, implement administrative and security templates, and determine best practices when deploying software packages. 1 - Introduction to Configuration Management Configuration Management Overview Configuration Management Using Group Policy Group Policy Features Introduced with Later Versions of Windows Using Windows PowerShell in the Configuration Management Process 2 - Using Group Policy Management Tools Local and Domain Policies Using Group Policy Management Console Understanding Group Policy Refresh 3 - Designing a Group Policy Infrastructure Design Stages for a Group Policy Infrastructure Planning your Group Policy Design Designing Your Group Policy Solution Deploying Your Group Policy Solution Managing Your Group Policy Solution 4 - Understanding the Architecture of Group Policy Processing Group Policy Components in AD DS Understanding the Group Policy Deployment Order Modifying Group Policy Processing 5 - Troubleshooting and Backing Up GPOs Using Group Policy Troubleshooting Tools Integration of RSoP Functionality Group Policy Logging Options Backing Up, Restoring, Importing, and Copying GPOs Building Migration Tables 6 - Securing Windows Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Windows Firewall with Advanced Security Implementing Domain Security Security Policy Options for Window Client and Windows Server 7 - Implementing Application Security Using Group Policy Managing UAC Settings Defending Against Malware Using AppLocker to Restrict Software Implementing Windows App Security Settings 8 - Configuring the Desktop Environment with Group Policy Exploring Script Types and Controlling Script Execution Defining the Desktop, Start Menu, and Taskbar Settings Defining the Control Panel Settings Defining the Windows Components Settings Configuring the Printer Management and Pruning Settings Defining the Network Settings Discovering the new Group Policy Settings 9 - Implementing User State Virtualization Configuring Folder Redirection Managing Offline Files Implementing User Experience Virtualization OneDrive for Business 10 - Assigning and Publishing Software Packages Using MSI Packages to Distribute Software Using Group Policy as a Software Deployment Method Deploying Software Setting Up Distribution Points Using the Systems Center Configuration Manager to Distribute Software 11 - Configuration Management with Windows PowerShell Introducing Windows PowerShell Using Windows PowerShell Writing PowerShell Scripts Windows PowerShell Library for Group Policy Windows PowerShell-Based Logon Scripts 12 - Implementing PowerShell Desired State Configuration Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configure Preference Settings 13 - Configuring Group Policy Preferences Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configuring Preferences Settings Additional course details: Nexus Humans 50255 Managing Windows Environments with Group Policy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 50255 Managing Windows Environments with Group Policy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

50255 Managing Windows Environments with Group Policy
Delivered OnlineFlexible Dates
£2,975

55354 Administering Office 365

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who are responsible for planning, configuring, and managing an Office 365 environment. Students who attend this course are expected to have a fairly broad understanding of several on-premises technologies such as Domain Name System (DNS) and Active Directory Domain Services (AD DS). In addition, they should have a general understanding of Microsoft Exchange Server, Microsoft Teams, and Microsoft SharePoint. Overview Plan and provision Office 365 Manage Users and Groups in Office 365 Deploy and Configure Tools and Applications for Office 365 Plan and Manage Exchange Online Plan and Manage SharePoint Online Plan and Manage Microsoft Teams Plan and Manage other Office 365 Services Implement Security and Compliance in Office 365 Report, Monitor and Troubleshoot Office 365 This five-day course describes how to set up, configure and manage an Office 365 tenant including identities, and the core services of Microsoft 365. In this five-day course, you will learn how to plan the configuration of an Office 365 tenant including integration with existing user identities; plan, configure and manage core services; and report on key metrics. Although this course and the associated labs are written for Office 365 with Windows 11, the skills taught will also be backwards compatible with Windows 10. This course is based on the features available in the Office 365 E3 license as these are the core features in Office 365 and Microsoft 365 plans. 1 - Planning and Provisioning Office 365 Overview of Office 365 Core Services of Office 365 Requirements for an Office 365 Tenant Planning a Pilot and Deployment Creating an Office 365 Tenant Adding Custom Domains and Managing DNS Settings Lab: Provisioning Office 365 2 - Managing Users and Groups in Office 365 Managing User Accounts and Licences Managing Passwords and Authentication Create and Managing the Different Types of Groups in Office 365 Managing Users and Groups with PowerShell Managing Users and Groups in the Azure AD Admin Center Role Based Access and Administrative Roles Planning and Configuring Directory Synchronization Lab: Managing Users and Groups in Office 365 Lab: Planning and Configuring Directory Synchronisation 3 - Deploying and Configuring Tools and Applications for Office 365 Planning Network Configuration for Office 365 Tools and Applications Using the Office Configuration Tool Click to Run Installation Use and Control Managing Centralized Deployment of Tools, Applications and Add-ins Reporting Lab: Deploying and Configuring Tools and Applications for Office 365 4 - Planning and Managing Exchange Online What is Exchange Online Managing Exchange Online Mailboxes Managing Office 365 Groups in Exchange Online Configuring Exchange Online Permissions Managing Exchange Online using PowerShell Plan and Configure Mail Flow Plan and Configure Email Protection Lab: Planning and Managing Exchange Online 5 - Planning and Managing SharePoint Online What is SharePoint Online Understanding the relationship between SharePoint, OneDrive, Teams, and Office 365 Groups SharePoint Online Architecture Configure SharePoint Online Configure and Control External Sharing Managing SharePoint Online Site Collections Managing SharePoint Online using PowerShell Lab: Planning and Managing SharePoint Online 6 - Planning and Managing Microsoft Teams What is Microsoft Teams How Microsoft Teams integrates with other Office 365 Services Create and Manage Organization Wide Settings Create, Manage and Assign Microsoft Teams Policies Plan and Configure External and Guest Access Managing Microsoft Teams using PowerShell Lab: Planning and Managing Microsoft Teams 7 - Planning and Managing Other Office 365 Services Yammer Planner Visio Bookings Delve Forms Power Platform Stream Sway Viva Scheduler Add-ins, including Find Time and Junk Reporter Lab: Planning and Managing Office 365 Services 8 - Security and Compliance in Office 365 Overview of Security and Compliance Features in Office 365 Extending Security and compliance Features with Additional Licences Using the Microsoft Defender Portal and Secure Score Using the Office 365 Compliance Portal and Compliance Score Plan and Configure Retention Labels and Policies Plan and Configure Data Loss Prevention Policies Create and Assign Sensitivity Labels Configure Safe Attachments and Safe Links Policies Plan and Configure Multi Factor Authentication Lab: Configure Security and Compliance in Office 365 9 - Reporting, Monitoring and Troubleshooting Office 365 Monitoring Office 365 Service Health Troubleshooting Administrative Access in Office 365 Troubleshoot Directory Synchronization Troubleshooting Exchange Online Troubleshooting SharePoint Online Troubleshooting Microsoft Teams Troubleshooting Office 365 Security and Compliance Lab: Reporting, Monitoring and Troubleshooting in Office 365

55354 Administering Office 365
Delivered OnlineFlexible Dates
£2,975