Celebrate the season with us at our Festive Wishing Wreath Workshop, led by renowned artist and spiritual guide Eugenia Rosa, on Saturday 7th December from 4-6 PM at the Art & Spirituality Centre in Edinburgh. Eugenia brings a rich background in both art, ritual, and folk traditions to infuse her workshops with meaning and magic. With her gentle guidance, you’ll create your own unique wreath using natural greenery, colourful decorations, and personal touches that reflect your hopes for the coming season. Why make a wreath? In Celtic tradition, wreaths symbolise the cycle of life, honouring nature’s eternal rhythms as we embrace winter’s darker days and welcome the returning light. Crafted with intention, a wreath can act as a circle of protection, warmth, and blessing for the home, making it a perfect seasonal ritual. What to Expect: Create a Unique Festive Décor Piece: With a range of natural materials provided, you’ll have the chance to design a truly one-of-a-kind wreath that captures your spirit and seasonal intentions. Relaxing and Fun: Take time out from the holiday hustle to immerse yourself in a cosy, creative environment with like-minded community members. Personal & Symbolic Touches: Bring along any personal items, such as small trinkets, ribbons, or symbols, to weave into your wreath, making it even more meaningful. Eugenia will share tips on selecting symbolic materials, the history of wreath-making, and how you can incorporate personal intentions to bring good fortune, warmth, and peace into your home. Spaces are limited, please book early. This class is sponsored by The Volant Charitable Trust Small Grants Programme, administered by Foundation Scotland. It is FREE and is aimed at WOMEN only from ETHNIC MINORITY BACKGROUNDS living in Edinburgh as per this funding application . This means “international”, from every foreign country. (Irish, any other white background, mixed ethnic, Asian/Asian British, Black/African/Caribbean, Black British, Arabic or other ethic groups) However we do welcome locals too so just sign up. We prioritize the area of Gorgie-Dalry-Saughton where our studio is based. By attending this class you release the teacher, Giada Gaslini and Art and Spirituality Cic, from any liability arising out of any personal injuries, emotional or physical release, death, expectations of results, theft in the venue or damages that may happen to people and objects while attending.
Duration 1 Days 6 CPD hours This course is intended for This course is suitable for IT personnel who are just beginning to work with Azure. This audience wants to learn about our offerings and get hands-on experience with the product. This course primarily uses the Azure portal and command line interface to create resources and does not require scripting skills. Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator. This course combines lecture, demonstrations, and hands-on labs. This course will also help prepare someone for the AZ-900 exam. This course will provide foundational level knowledge on cloud concepts; core Azure services; and Azure management and governance features and tools. Prerequisites There are no prerequisites for taking this course. Familiarity with cloud computing is helpful, but isn't necessary. 1 - Describe cloud computing What is cloud computing Describe the shared responsibility model Define cloud models Describe the consumption-based model 2 - Describe the benefits of using cloud services Describe the benefits of high availability and scalability in the cloud Describe the benefits of reliability and predictability in the cloud Describe the benefits of security and governance in the cloud Describe the benefits of manageability in the cloud 3 - Describe cloud service types Describe Infrastructure as a Service Describe Platform as a Service Describe Software as a Service 4 - Describe the core architectural components of Azure What is Microsoft Azure Get started with Azure accounts Describe Azure physical infrastructure Describe Azure management infrastructure 5 - Describe Azure compute and networking services Describe Azure Virtual Machines Describe Azure Virtual Desktop Describe Azure Containers Describe Azure Functions Describe application hosting options Describe Azure Virtual Networking Describe Azure Virtual Private Networks Describe Azure ExpressRoute Describe Azure DNS 6 - Describe Azure storage services Describe Azure storage accounts Describe Azure storage redundancy Describe Azure storage services Identify Azure data migration options Identify Azure file movement options 7 - Describe Azure identity, access, and security Describe Azure directory services Describe Azure authentication methods Describe Azure external identities Describe Azure conditional access Describe Azure role-based access control Describe zero trust model Describe defense-in-depth Describe Microsoft Defender for Cloud 8 - Describe cost management in Azure Describe factors that can affect costs in Azure Compare the Pricing and Total Cost of Ownership calculators Describe the Microsoft Cost Management tool Describe the purpose of tags 9 - Describe features and tools in Azure for governance and compliance Describe the purpose of Microsoft Purview Describe the purpose of Azure Policy Describe the purpose of resource locks Describe the purpose of the Service Trust portal 10 - Describe features and tools for managing and deploying Azure resources Describe tools for interacting with Azure Describe the purpose of Azure Arc Describe Azure Resource Manager and Azure ARM templates 11 - Describe monitoring tools in Azure Describe the purpose of Azure Advisor Describe Azure Service Health Describe Azure Monitor Additional course details: Nexus Humans AZ-900T00 Microsoft Azure Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-900T00 Microsoft Azure Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design. Overview At Course Completion: - Features and functions of Group Policy - Use Group Policy management tools to manage security policies - Design a Group Policy infrastructure - Group Policy processing architecture - Back up, restore, import, and copy Group Policy Objects through the Group Policy - Management Console - Use Windows PowerShell to manage Group Policy - Implement security using Group Policy - Configure the desktop environment with Group Policy - Configure roaming profiles and Folder Redirection - Assign and publish software packages - Implement AppLocker and software restriction policies - Create and deploy Administrative Templates - Configure Group Policy preferences In this course, you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server 2016 and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks, implement administrative and security templates, and determine best practices when deploying software packages. 1 - Introduction to Configuration Management Configuration Management Overview Configuration Management Using Group Policy Group Policy Features Introduced with Later Versions of Windows Using Windows PowerShell in the Configuration Management Process 2 - Using Group Policy Management Tools Local and Domain Policies Using Group Policy Management Console Understanding Group Policy Refresh 3 - Designing a Group Policy Infrastructure Design Stages for a Group Policy Infrastructure Planning your Group Policy Design Designing Your Group Policy Solution Deploying Your Group Policy Solution Managing Your Group Policy Solution 4 - Understanding the Architecture of Group Policy Processing Group Policy Components in AD DS Understanding the Group Policy Deployment Order Modifying Group Policy Processing 5 - Troubleshooting and Backing Up GPOs Using Group Policy Troubleshooting Tools Integration of RSoP Functionality Group Policy Logging Options Backing Up, Restoring, Importing, and Copying GPOs Building Migration Tables 6 - Securing Windows Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Windows Firewall with Advanced Security Implementing Domain Security Security Policy Options for Window Client and Windows Server 7 - Implementing Application Security Using Group Policy Managing UAC Settings Defending Against Malware Using AppLocker to Restrict Software Implementing Windows App Security Settings 8 - Configuring the Desktop Environment with Group Policy Exploring Script Types and Controlling Script Execution Defining the Desktop, Start Menu, and Taskbar Settings Defining the Control Panel Settings Defining the Windows Components Settings Configuring the Printer Management and Pruning Settings Defining the Network Settings Discovering the new Group Policy Settings 9 - Implementing User State Virtualization Configuring Folder Redirection Managing Offline Files Implementing User Experience Virtualization OneDrive for Business 10 - Assigning and Publishing Software Packages Using MSI Packages to Distribute Software Using Group Policy as a Software Deployment Method Deploying Software Setting Up Distribution Points Using the Systems Center Configuration Manager to Distribute Software 11 - Configuration Management with Windows PowerShell Introducing Windows PowerShell Using Windows PowerShell Writing PowerShell Scripts Windows PowerShell Library for Group Policy Windows PowerShell-Based Logon Scripts 12 - Implementing PowerShell Desired State Configuration Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configure Preference Settings 13 - Configuring Group Policy Preferences Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configuring Preferences Settings Additional course details: Nexus Humans 50255 Managing Windows Environments with Group Policy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 50255 Managing Windows Environments with Group Policy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for existing IT professionals who have some networking knowledge and experience and are looking for a single course that provides insight into core and advanced networking technologies in Windows Server. This audience would typically include: Network administrators who are looking to reinforce existing skills and learn about new networking technology changes and functionality in Windows Server. System or Infrastructure Administrators with general networking knowledge who are looking to gain core and advanced networking knowledge and skills on Windows Server. Overview Plan and implement an IPv4 network. Implement Dynamic Host Configuration Protocol (DHCP). Implement IPv6. Implement Domain Name System (DNS). Implement and manage IP address management (IPAM). Plan for remote access. Implement DirectAccess. Implement virtual private networks (VPNs). Implement networking for branch offices. Configure advanced networking features. Implement Software Defined Networking. 55343A is the Community Courseware equivalent of retired Legacy Course 20741BC - Networking with Windows Server 2016. This 5-day classroom-based course provides the fundamental networking skills required to deploy and support Windows Server in most organizations. It covers IP fundamentals, remote access technologies, and more advanced content including Software Defined Networking. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. Prerequisites In addition to professional experience, students who attend this training should already have the following technical knowledge: Experience working with Windows Server Knowledge of the Open Systems Interconnection (OSI) model Understanding of core networking infrastructure components and technologies such as cabling, routers and switches Familiarity with networking topologies and architectures such as local area networks (LANs), wide area networks (WANs) and wireless networking Some basic knowledge of the TCP/IP protocol stack, addressing and name resolution Experience with and knowledge of virtualization Hands-on experience working with the Windows client operating systems such as Windows 10 or Windows 11 1 - Planning and implementing an IPv4 network Planning IPv4 addressing Configuring an IPv4 host Managing and troubleshooting IPv4 network connectivity 2 - Implementing DHCP Overview of the DHCP server role Deploying DHCP Managing and troubleshooting DHCP 3 - Implementing IPv6 Overview of IPv6 addressing Configuring an IPv6 host Implementing IPv6 and IPv4 coexistence Transitioning from IPv4 to IPv6 4 - Implementing DNS Implementing DNS servers Configuring zones in DNS Configuring name resolution between DNS zones Configuring DNS integration with Active Directory Domain Services (AD DS) Configuring advanced DNS settings 5 - Implementing and managing IPAM Overview of IPAM Deploying IPAM Managing IP address spaces by using IPAM 6 - Remote access in Windows Server Overview of remote access Implementing the Web Application Proxy 7 - Implementing DirectAccess Overview of DirectAccess Implementing DirectAccess by using the Getting Started Wizard Implementing and managing an advanced DirectAccess infrastructure 8 - Implementing VPNs Planning VPNs Implementing VPNs 9 - Implementing networking for branch offices Networking features and considerations for branch offices Implementing Distributed File System (DFS) for branch offices Implementing BranchCache for branch offices 10 - Configuring advanced networking features Overview of high performance networking features Configuring advanced Microsoft Hyper-V networking features 11 - Implementing Software Defined Networking Overview of SDN. Implementing network virtualization Implementing Network Controller
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who are responsible for planning, configuring, and managing an Office 365 environment. Students who attend this course are expected to have a fairly broad understanding of several on-premises technologies such as Domain Name System (DNS) and Active Directory Domain Services (AD DS). In addition, they should have a general understanding of Microsoft Exchange Server, Microsoft Teams, and Microsoft SharePoint. Overview Plan and provision Office 365 Manage Users and Groups in Office 365 Deploy and Configure Tools and Applications for Office 365 Plan and Manage Exchange Online Plan and Manage SharePoint Online Plan and Manage Microsoft Teams Plan and Manage other Office 365 Services Implement Security and Compliance in Office 365 Report, Monitor and Troubleshoot Office 365 This five-day course describes how to set up, configure and manage an Office 365 tenant including identities, and the core services of Microsoft 365. In this five-day course, you will learn how to plan the configuration of an Office 365 tenant including integration with existing user identities; plan, configure and manage core services; and report on key metrics. Although this course and the associated labs are written for Office 365 with Windows 11, the skills taught will also be backwards compatible with Windows 10. This course is based on the features available in the Office 365 E3 license as these are the core features in Office 365 and Microsoft 365 plans. 1 - Planning and Provisioning Office 365 Overview of Office 365 Core Services of Office 365 Requirements for an Office 365 Tenant Planning a Pilot and Deployment Creating an Office 365 Tenant Adding Custom Domains and Managing DNS Settings Lab: Provisioning Office 365 2 - Managing Users and Groups in Office 365 Managing User Accounts and Licences Managing Passwords and Authentication Create and Managing the Different Types of Groups in Office 365 Managing Users and Groups with PowerShell Managing Users and Groups in the Azure AD Admin Center Role Based Access and Administrative Roles Planning and Configuring Directory Synchronization Lab: Managing Users and Groups in Office 365 Lab: Planning and Configuring Directory Synchronisation 3 - Deploying and Configuring Tools and Applications for Office 365 Planning Network Configuration for Office 365 Tools and Applications Using the Office Configuration Tool Click to Run Installation Use and Control Managing Centralized Deployment of Tools, Applications and Add-ins Reporting Lab: Deploying and Configuring Tools and Applications for Office 365 4 - Planning and Managing Exchange Online What is Exchange Online Managing Exchange Online Mailboxes Managing Office 365 Groups in Exchange Online Configuring Exchange Online Permissions Managing Exchange Online using PowerShell Plan and Configure Mail Flow Plan and Configure Email Protection Lab: Planning and Managing Exchange Online 5 - Planning and Managing SharePoint Online What is SharePoint Online Understanding the relationship between SharePoint, OneDrive, Teams, and Office 365 Groups SharePoint Online Architecture Configure SharePoint Online Configure and Control External Sharing Managing SharePoint Online Site Collections Managing SharePoint Online using PowerShell Lab: Planning and Managing SharePoint Online 6 - Planning and Managing Microsoft Teams What is Microsoft Teams How Microsoft Teams integrates with other Office 365 Services Create and Manage Organization Wide Settings Create, Manage and Assign Microsoft Teams Policies Plan and Configure External and Guest Access Managing Microsoft Teams using PowerShell Lab: Planning and Managing Microsoft Teams 7 - Planning and Managing Other Office 365 Services Yammer Planner Visio Bookings Delve Forms Power Platform Stream Sway Viva Scheduler Add-ins, including Find Time and Junk Reporter Lab: Planning and Managing Office 365 Services 8 - Security and Compliance in Office 365 Overview of Security and Compliance Features in Office 365 Extending Security and compliance Features with Additional Licences Using the Microsoft Defender Portal and Secure Score Using the Office 365 Compliance Portal and Compliance Score Plan and Configure Retention Labels and Policies Plan and Configure Data Loss Prevention Policies Create and Assign Sensitivity Labels Configure Safe Attachments and Safe Links Policies Plan and Configure Multi Factor Authentication Lab: Configure Security and Compliance in Office 365 9 - Reporting, Monitoring and Troubleshooting Office 365 Monitoring Office 365 Service Health Troubleshooting Administrative Access in Office 365 Troubleshoot Directory Synchronization Troubleshooting Exchange Online Troubleshooting SharePoint Online Troubleshooting Microsoft Teams Troubleshooting Office 365 Security and Compliance Lab: Reporting, Monitoring and Troubleshooting in Office 365
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of Reconnaissance Incidents Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of System Hacking Attacks Assess the Impact of Web-Based Attacks Assess the Impact of Malware Assess the Impact of Hijacking and Impersonation Attacks Assess the Impact of DoS Incidents Assess the Impact of Threats to Mobile Security Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES Assess Command and Control Techniques Assess Persistence Techniques Assess Lateral Movement and Pivoting Techniques Assess Data Exfiltration Techniques Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION Implement a Vulnerability Management Plan Assess Common Vulnerabilities Conduct Vulnerability Scans Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE Deploy a Security Intelligence Collection and Analysis Platform Collect Data from Network-Based Intelligence Sources Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA Use Common Tools to Analyze Logs Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS Analyze Incidents with Windows-Based Tools Analyze Incidents with Linux-Based Tools Analyze Malware Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS Deploy an Incident Handling and Response Architecture Mitigate Incidents Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS Apply a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES Remediate Identity and Access Management Issues Implement Security During the SDLC Additional course details: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The target audience include, but is not limited to: Relationship managers Customer experience (CX) managers Account managers Service delivery managers Service desk managers Service Level Managers Enterprise Architects Service and Solution Architects Business Analysts Product Owners Marketing Managers Project Managers Portfolio Managers Supplier relationship Managers Vendor Managers Contract Managers Customer experience/User experience Designers Consultants Overview The purpose of this course is to give the delegate the understanding to optimize the value of the journey for all stakeholders, for example, to convert opportunity and demand into value and to drive stakeholder value. Engagement is important in the optimization of service value because, as ITIL Foundation explained, service value is co-created through the involvement of users, customers, sponsors, service providers, or any other stakeholder. This course introduces ways and methods to drive stakeholder value and encourage stakeholders contribute to the creation of service value by exploring the following: Value propositions Fostering relationships Keeping engagement channels open Shaping demand Designing service offerings Aligning and agreeing expectations Co-creating service experiences Realizing value This course covers key topics such as SLA design, multi-supplier management, communication, relationship management, CX and UX design, customer journey mapping, and more. It will provide candidates with the tools to increase stakeholder satisfaction which is integral to business success in the current competitive landscape. The associated certification exam voucher is included with this course. As an ITIL© Accredited Training Organization of PeopleCert, all students attending this training will be provided with the exam voucher as a part of delivery. How customer journeys are designed Understand the concept of the customer journey Understand the ways of designing and improving customer journeys How to target markets and stakeholders Understand the characteristics of markets Understand marketing activities and techniques Know how to describe customer needs and internal and external factors that affect these Know how to identify service providers and explain their value propositions How to foster stakeholder relationships Understand the concepts mutual readiness and maturity Understand the different supplier and partner relationship types, and how these are managed Know how to develop customer relationships Know how to analyze customer needs Know how to use communication and collaboration activities and techniques Know how the ?Relationship management? practice can be applied to enable and contribute to fostering relationships Know how the ?Supplier management? practice can be applied to enable and contribute to supplier and partner relationships management How to shape demand and define service offerings Understand methods for designing digital service experiences based on value driven, data driven and user centered service design Understand approaches for selling and obtaining service offerings Know how to capture, influence and manage demand and opportunities Know how to collect, specify and prioritize requirements from a diverse range of stakeholders Know how the ?Business analysis? practice can be applied to enable and contribute to requirement management and service design How to align expectations and agree details of services Know how to plan for value co-creation Know how to negotiate and agree service utility, warranty and experience Know how the ?Service level management? practice can be applied to enable and contribute to service expectation management How to onboard and offboard customers and users Understand key transition, onboarding and offboarding activities Understand the ways of relating with users and fostering user relationships Understand how users are authorized and entitled to services Understand different approaches to mutual elevation of customer, user and service provider capabilities Know how to prepare onboarding and offboarding plans Know how to develop user engagement and delivery channels Know how the ?Service Catalogue management? practice can be applied to enable and contribute to offering user services Know how the ?Service Desk? practice can be applied to enable and contribute to user engagement How to act together to ensure continual value co-creation Understand how users can request services Understand methods for triaging of user requests Understand the concept of user communities Understand methods for encouraging and managing customer and user feedback Know how to foster a service mindset (attitude, behavior and culture) Know how to use different approaches to provision of user services Know how to seize and deal with customer and user ?moments of truth? Know how the ?Service request management? practice can be applied to enable and contribute to service usage How to realize and validate service value Understand methods for measuring service usage and customer and user experience and satisfaction Understand charging mechanisms Know how to assess service value realization Know how to prepare to evaluate and improve the customer journey Know how the ?Portfolio management? practice can be applied to enable and contribute to service value realization ITIL© is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. The Swirl logo? is a trade mark AXELOS Limited used, under permission of AXELOS Limited. All rights reserved. IT Infrastructure Library© is a registered trade mark of the AXELOS Limited used, under permission of AXELOS Limited. All rights reserved. Additional course details:Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 Nexus Humans ITIL 4 Specialist Drive Stakeholder Value (DSV) with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ITIL 4 Specialist Drive Stakeholder Value (DSV) with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is data professionals, data architects, and business intelligence professionals who want to learn about data engineering and building analytical solutions using data platform technologies that exist on Microsoft Azure. The secondary audience for this course includes data analysts and data scientists who work with analytical solutions built on Microsoft Azure. In this course, the student will learn how to implement and manage data engineering workloads on Microsoft Azure, using Azure services such as Azure Synapse Analytics, Azure Data Lake Storage Gen2, Azure Stream Analytics, Azure Databricks, and others. The course focuses on common data engineering tasks such as orchestrating data transfer and transformation pipelines, working with data files in a data lake, creating and loading relational data warehouses, capturing and aggregating streams of real-time data, and tracking data assets and lineage. Prerequisites Successful students start this course with knowledge of cloud computing and core data concepts and professional experience with data solutions. AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - Introduction to data engineering on Azure What is data engineering Important data engineering concepts Data engineering in Microsoft Azure 2 - Introduction to Azure Data Lake Storage Gen2 Understand Azure Data Lake Storage Gen2 Enable Azure Data Lake Storage Gen2 in Azure Storage Compare Azure Data Lake Store to Azure Blob storage Understand the stages for processing big data Use Azure Data Lake Storage Gen2 in data analytics workloads 3 - Introduction to Azure Synapse Analytics What is Azure Synapse Analytics How Azure Synapse Analytics works When to use Azure Synapse Analytics 4 - Use Azure Synapse serverless SQL pool to query files in a data lake Understand Azure Synapse serverless SQL pool capabilities and use cases Query files using a serverless SQL pool Create external database objects 5 - Use Azure Synapse serverless SQL pools to transform data in a data lake Transform data files with the CREATE EXTERNAL TABLE AS SELECT statement Encapsulate data transformations in a stored procedure Include a data transformation stored procedure in a pipeline 6 - Create a lake database in Azure Synapse Analytics Understand lake database concepts Explore database templates Create a lake database Use a lake database 7 - Analyze data with Apache Spark in Azure Synapse Analytics Get to know Apache Spark Use Spark in Azure Synapse Analytics Analyze data with Spark Visualize data with Spark 8 - Transform data with Spark in Azure Synapse Analytics Modify and save dataframes Partition data files Transform data with SQL 9 - Use Delta Lake in Azure Synapse Analytics Understand Delta Lake Create Delta Lake tables Create catalog tables Use Delta Lake with streaming data Use Delta Lake in a SQL pool 10 - Analyze data in a relational data warehouse Design a data warehouse schema Create data warehouse tables Load data warehouse tables Query a data warehouse 11 - Load data into a relational data warehouse Load staging tables Load dimension tables Load time dimension tables Load slowly changing dimensions Load fact tables Perform post load optimization 12 - Build a data pipeline in Azure Synapse Analytics Understand pipelines in Azure Synapse Analytics Create a pipeline in Azure Synapse Studio Define data flows Run a pipeline 13 - Use Spark Notebooks in an Azure Synapse Pipeline Understand Synapse Notebooks and Pipelines Use a Synapse notebook activity in a pipeline Use parameters in a notebook 14 - Plan hybrid transactional and analytical processing using Azure Synapse Analytics Understand hybrid transactional and analytical processing patterns Describe Azure Synapse Link 15 - Implement Azure Synapse Link with Azure Cosmos DB Enable Cosmos DB account to use Azure Synapse Link Create an analytical store enabled container Create a linked service for Cosmos DB Query Cosmos DB data with Spark Query Cosmos DB with Synapse SQL 16 - Implement Azure Synapse Link for SQL What is Azure Synapse Link for SQL? Configure Azure Synapse Link for Azure SQL Database Configure Azure Synapse Link for SQL Server 2022 17 - Get started with Azure Stream Analytics Understand data streams Understand event processing Understand window functions 18 - Ingest streaming data using Azure Stream Analytics and Azure Synapse Analytics Stream ingestion scenarios Configure inputs and outputs Define a query to select, filter, and aggregate data Run a job to ingest data 19 - Visualize real-time data with Azure Stream Analytics and Power BI Use a Power BI output in Azure Stream Analytics Create a query for real-time visualization Create real-time data visualizations in Power BI 20 - Introduction to Microsoft Purview What is Microsoft Purview? How Microsoft Purview works When to use Microsoft Purview 21 - Integrate Microsoft Purview and Azure Synapse Analytics Catalog Azure Synapse Analytics data assets in Microsoft Purview Connect Microsoft Purview to an Azure Synapse Analytics workspace Search a Purview catalog in Synapse Studio Track data lineage in pipelines 22 - Explore Azure Databricks Get started with Azure Databricks Identify Azure Databricks workloads Understand key concepts 23 - Use Apache Spark in Azure Databricks Get to know Spark Create a Spark cluster Use Spark in notebooks Use Spark to work with data files Visualize data 24 - Run Azure Databricks Notebooks with Azure Data Factory Understand Azure Databricks notebooks and pipelines Create a linked service for Azure Databricks Use a Notebook activity in a pipeline Use parameters in a notebook Additional course details: Nexus Humans DP-203T00 Data Engineering on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-203T00 Data Engineering on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.