• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2382 Audit courses

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered Online
£2,380

First Line Management Course

By Dickson Training Ltd

This 2 day course is ideal for Team Leaders and Managers who have had little or no training in the role where they have to lead a team and take on management responsibilities. It will give them confidence and the skills to take decisions and get the best performance from their team. The most popular of our management training courses, the First Line Management course is specifically for people who are new to a management position or who are about to undertake a management position and have had no formal management training. Anyone who is new to a management or supervisory position will benefit from this course. Run over two days, the syllabus of the First Line Management course will cover a wide range of topics to give new or inexperienced managers a firm understanding of the foundations needed to begin their journey as a manager. It includes units on effective communication, managing your team, managing yourself, delegating, setting objectives, effective planning and personal development. Course Syllabus Module OneRole Assessment and Personal Development Planning Understanding roles and responsibilities Outline framework of management Taking the step into management Identifying personal development needs and planning Module TwoEffective Communication Skills Communicating to be effective - how and what to communicate Designing effective questioning techniques and listening actively Non-verbal communication Dealing with, and responding to, differing communication styles Module ThreeManaging Yourself Use of planning tools and techniques Dealing with time stealers and interruptions Learn how to delegate effectively Module FourManaging Your Team Understanding different management styles and how to use them Recognising performance management Setting expectations and clearly defining roles and responsibilities Pinpointing performance and motivating your team/individuals Learning the management actions required to maintain team effectiveness Team dynamics and looking at individual behaviour within teams First Line Management Course Management is the efficient, effective and economic use of resources to achieve results with and through the efforts of other people. Leadership – a definition Inspiring others to follow your lead by creating a compelling vision of the future, whereby targets are not merely achieved, but are surpassed . Leadership – a definition Inspiring others to follow your lead by creating a compelling vision of the future, whereby targets are not merely achieved, but are surpassed . The Role of the First Line Manager as ‘Leader'. First Line Managers have Leadership responsibilities – this is often the biggest challenge for Team Leaders and Supervisors who have to adapt from performing a task to motivating a team. At the beginning of the 21st century, the most powerful sources of growth, employment and wealth creation are found in innovation-driven industries. As a result, organisational leaders face a whole new set of challenges. They have to change and will increasingly need to rely on the knowledge, skills, experience and judgement of all their people. Organisational leaders will need to place less emphasis on traditional structures and control, and concentrate on five key priorities: . Five Key Priorities . using strategic vision to motivate and inspire empowering employees at all levels accumulating and sharing internal knowledge gathering and integrating external information challenging the status quo and enabling creativity Using Strategic Vision. Effective leaders will develop a strategic vision that is clear and compelling, and communicate it in a way that gives a real sense of purpose and direction. A powerful vision is clear about direction and objectives, proactive in its approach, but allows room for flexibility about the means of achievement. A powerful vision is important because it is one way of linking the present to a desirable future. The role of strategic planning is then to map out a path to achieve that vision. However, visionary thinking should not be the exclusive province of the organisation's top executives. Successful leaders will encourage participation in the formulation of a strategic vision that offers different perspectives and encourages commitment. It is also important to empower employees with the responsibility and authority to implement the vision. . Empowering Employees. Some people have proposed the view that the great leader is a great servant [2]. Certainly, many organisations believe that an environment based on trust will produce better results than one of rules, regulation and hierarchy. This means that leaders will increasingly have to respond to their employees' needs and take on some unaccustomed roles, such as coach, teacher, information provider, facilitator, listener or supporter. But for empowerment to work, organisations will have to share information and knowledge far more than they have done in the past. This will certainly include First Line Managers . Challenging the status quo and enabling creativity. There are a number of ways in which effective First Line Managers can challenge the status quo and enable creativity: . Facilitate ‘constructive dissent', i.e. encourage people to question openly a manager's perspective without fear of retaliation. An interesting example of this is at Motorola, where employees can file a ‘minority report' and lodge a different point of view to their immediate First Line Manager on a business issue. Foster a culture that encourages risk-taking. Create a sense of urgency by producing a compelling picture of the risks of not changing. To summarise, successful First Line Managers will be those that are proactive both in facilitating organisational learning and encouraging positive adaptation to external changes. . A 2 day First Line Manager Course will accelerate the process for Team Leaders and Supervisors to reach a high level of competence and confidence in the Leadership role they have . Sample Exercises Our range of bespoke First Line Manager modules works wonders! The course outlines may look as you'd expect - but the content, approach and effect is very much greater than expectations. We have a very large library of innovative exercises that are highly effective in capturing and embedding the learning points in a practical way. Following each exercise - that may be aligned to a 'Financial Theme' - they are debriefed fully and related to how the learning can to be applied back in the work-place. They are also really great fun!! Here are some template modules and sample exercises designed to embed the learning in a motivational and memorable way:- Sample 'ice-breaker' Exercise - Number Crunch The team must be effectively led and motivated to work as one to reach their objective of visiting each location in a short period of time. Debrief - Leadership and co-ordination, strategy and planning, adapting approach, decision making & control Sample Exercise - Through the Hoop Taking the full team through the 'hoop' within the 'stretching' time limit is likely to exceed the group's own self-limitations. Time ManagementSample Exercise - Cones This task requires the team to take a numbered tower of 5 cones from point 'A' to 'B' in a specific order; this will have to meet the criteria outlined in the brief. The option of 'C' is vital to achieve the results. Debrief: Stepping back for overview Planning disciplines Time-budgeting Skills audit for delegation Handling ConflictSample Exercise - Cave Rescue Requires that the group make some difficult choices and then hold a press conference to justify their decisions while under scrutiny and criticism. This also displayed some required leadership learning; notably that a unified leadership team is crucial to gain commitment and confidence and also how vital it is to plan for any communication that will involve some sort of conflict. Handling Conflict and maintaining control in a professional manner are key debriefing points from this exercise. Communication, Negotiation & InfluenceSample Exercise - Red & White There is a specific time managed agenda and itinerary, which puts the group under pressure. The key challenge is for the sub-groups to maximise the commercial value from the task, however there is always a great danger that the individuals attempt to gain financial progress at the expense of the other group! Debriefing Points: Engaging the other group to 'buy-in' to collaboration Commercial consequences when collaboration is lacking or difficult Effective communication and influence across barriers Global Thinking & Business Mind-setSample Exercise - Dragon's Den The delegation is split into 2 -3 groups - each with a specific product or service to win the Dragons' investment. (A specialised Toy; A unique Team Building Training programme; An eBook Library; An innovative soft-ware package for the Retail Industry Sector. They have to also present to the Dragon's Den their business case for feedback and negotiate with the Dragons to gain either an 'I'm in' or an 'I'm out' reply. Debrief: Global business potential Supply Chain appreciation Commercial framework Performance ManagementSample Exercise - Juggling The group will be asked to set their own team target of how many 'issues' (balls) they can manage at one time. This involves devising a sequence between the group to achieve maximum results without making any mistakes. We introduce different balls which represent different degrees of complexity, challenging the group's preparation and approach to a variety 'team members' needs. Debrief: How to maintain focus when pressure is applied Ensuring effective communication Clarifying the approach for dealing with the unexpected Setting expectations and reviewing delivery Treating every team member as an individual Prioritisation & OrganisationSample Exercise - Labyrinth This activity requires the group to solve a number of tasks through verbal communication only, but they will be forbidden to write any information down or make any gestures using their hands. They will each be provided with a great deal of different pieces of data that has to be assimilated within an increasingly pressurised time-scale. The material also contains distracting and misleading 'red-herrings'. The task requires delegates to keep focussed on the 'critical path' and be very organised in order to meet the dead-line. Debrief: Rigour of planning - SMART Prioritising through ambiguity Time budgeting Assigning roles & responsibilities to break down volume of material The value of keeping accurate records In-House & Classroom Courses Available Online We have developed an alternative to traditional face-to-face training that continues to provide a full learning experience, and allows delegates to learn effectively whilst self-isolating from home. This is how it looks: Delegates booked on Classroom and In-House courses will continue to have access to their trainer online throughout the days that the course is booked to run. Prior to a delegate's course start date, they will be enrolled on our e-learning platform (in partnership with BCF Group) for the course they are booked on to. They will also be given contact information for their trainer, and details of how to access the online workshops. Delegates will not require any special IT equipment. A desktop computer, laptop, tablet, or a mobile phone with internet and audio capability is all that is required. Delegates taking ILM Qualifications will then proceed to the book review, video review and work based assignments with 12 months tutor support as appropriate, and in line with our previous arrangements. We hope you agree that this blended learning experience represents the safest way to continue supporting our clients and delegates during the Coronavirus disruption. In-House Courses This is our own management training course which has been developed and refined over the many years we have been providing it to delegates from organisations in virtually every industry. This means that the course syllabus is flexible and can be tailored to the specific requirements of a new first line manager or managers, making it ideal for companies or organisations who require an in-house first line management training course which is attended by a number of current or potential managers. Scheduled Courses A one day version of this First Line Management course is available as an Open Course delivered at our partner, the BCF's Training suites in Nottingham and Reading from the following scheduled dates... Classroom Course - Nottingham (NG12 4DG) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. Cost: £595 + vat 16 October 2023 09 January 2024 11 March 2024 Classroom Course - Reading (RG41 5QS) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. Cost: £595 + vat 07 December 2023 15 February 2024 14 May 2024 Zoom™ Course Attending a course via Zoom videoconferencing gives you all of the benefits of classroom training without the need to leave your home or office. You still benefit from a real tutor facilitating the programme, and the content is exactly the same. Cost: £495 + vat 11 September 2023 04 December 2023 13 March 2024 Dickson Training Ltd Founded in 1985 in Yorkshire, we have built an impressive and loyal client base. Our partnerships are built by consistently delivering outstanding development solutions and working in close collaboration with our clients, resulting in us becoming a leading UK and international training provider.

First Line Management Course
Delivered in Nottingham + 1 more or Online
£495 to £595

ISO 14298:2021 Security Printing Lead Implementer

5.0(1)

By Cognicert Limited

The “ISO 14298:2021 Lead Implementer Course” is designed to provide participants with the knowledge and skills necessary to lead the implementation of a Security Printing Management System based on ISO 14298:2021. This comprehensive course covers the key principles, requirements, and best practices for establishing and maintaining an effective security printing management system. Participants will learn how to develop, implement, and manage processes that comply with the ISO 14298 standard.

ISO 14298:2021 Security Printing Lead Implementer
Delivered in London or Online
£1,750

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online
£3,395

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online + more
£2,475

ISO 42001 Artificial Intelligence Lead Auditor Course

5.0(1)

By Cognicert Limited

The “ISO 42001:2023 Lead Auditor Course” integrates the principles of ISO 42001:2023, the International Standard for Artificial Intelligence Management, with the methodologies outlined in ISO 19011:2018, the Guidelines for Auditing Management Systems. The course equips participants with the skills and knowledge required to lead Artificial Intelligence audits effectively, ensuring compliance with ISO 42001:2023, and applies the principles of ISO 17011:2017 for conformity assessment bodies.

ISO 42001 Artificial Intelligence Lead Auditor Course
Delivered Online & In-Person in London
£1,200

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered Online
£2,380

Internal Audit Skills

By Imperial Academy

Level 5 QLS Endorsed Course | CPD & CiQ Accredited | Audio Visual Training | Free PDF Certificate | Lifetime Access

Internal Audit Skills
Delivered Online On Demand
£100

Internal Audit Training

5.0(10)

By Apex Learning

Give a compliment to your career and take it to the next level. This Internal Audit Training bundle will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate your skills for your next promotion, this Internal Audit Training bundle will help you stay ahead of the pack. Throughout the Internal Audit Training programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in the relevant job sector. Along with this Internal Audit Training course, you will get 10 premium courses, an originalhardcopy, 11 PDF certificates (Main Course + Additional Courses) Student ID card as gifts. This Internal Audit Training Bundle Consists of the following Premium courses: Level 2 Microsoft Office Essentials Microsoft Teams Leadership & Management Diploma Working from Home Essentials Mental Health and Working from Home Online Meeting Management Effective Communication Skills Time Management Report Writing Emotional Intelligence and Human Behaviour Take this course anywhere and at any time. Don't let your lifestyle limit your learning or your potential. Experienced tutors and mentors will be there for you whenever you need them, and solve all your queries through email and chat boxes. Learning Outcomes: Fully understand the purpose and requirements of an internal audit Learn all processes needed to perform an internal audit Develop methods to apply useful technology and measures to an audit Work out the best way to identify and control risk in operations Acquire the ability to perform employee interviews intuitively Obtain the capability to produce an incisive and accurate final report Adhere to accepted and recognised UK Internal Audit Standards Become a trusted and reliable auditor in your chosen sector and much more... Benefits you'll get choosing Apex Learning: One payment, but lifetime access to 11 CPD courses Certificates, student ID for the title course included in a one-time fee Full tutor support available from Monday to Friday Free up your time - don't waste time and money travelling for classes Accessible, informative modules taught by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills Gain valuable knowledge without leaving your home Curriculum: ***Internal Audit Training Diploma*** Module 01: Auditing as a Form of Assurance Module 02: Internal Audit Procedures Module 03: Technology-based Internal Audit Module 04: Internal Control and Control Risk Module 05: Audit Interviews Module 06: Reporting Audit Outcome Module 07: UK Internal Audit Standards Module 08: Career as an Auditor How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 45 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Internal Audit Training bundle. Requirements This Internal Audit Training course has been designed to be fully compatible with tablets and smartphones. Career path Internal Auditor - £30-50k/year. External Auditor - £35-50k/year. Audit Manager - £40-70k/year. Risk Manager - £40-70k/year. Compliance Officer - £30-50k/year. Fraud Investigator - £25-45k/year. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Leadership and InfluencingSkills) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The de.livery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost

Internal Audit Training
Delivered Online On Demand
£53

SEO Audit with Screaming Frog

By iStudy UK

Learn how to find broken links, bad tags and many more uses of SEO audit tool through our SEO Audit with Screaming Frog course. The lucid contents of the course teach you how an audit tool exponents your whole site and create a spreadsheet of all your pages. Teaching you the basic function of SEO tools, it enables you how to recognize duplicate content, issue a report, create XML sitemaps, scrutinize broken backlinks, and fix site errors. It also guides you to learn a webpage crawling, and Frog SEO Spider using system to create a list of your internal pages. Frog SEO tracks the crawl level, keyword elements, export your data to spreadsheet, measure file size, justify page depth, find replica pages with duplicate content and organize outlinks and inlinks to any given URL. What you'll learn You'll learn the basics to SEO (Search Engine Optimization) You'll learn how to how to use Screaming Frog SEO Spider You'll learn how to perform an SEO Audit You'll learn how to analyze broken backlinks You'll learn how to identify duplicate content You'll learn how to fix site errors You'll learn how to issue a report You'll learn how to crawl a website You'll learn how to examine the .htaccess for issues & compatability You'll learn how to analyse page data like titles, meta & descriptions You'll learn how to generate XML sitemaps You'll learn how to meta robots text You'll learn how to audit hreflang attributes Requirements You should know how to use a PC at a beginner level Screaming Frog SEO Spider (FREE Version at least) Who is the target audience? Online Marketers Everyone with a Website SEO Marketers & Engineers Brick & Mortar Businesses Everyone with a Product Video Producers who want to rank their videos higher in Google Link Builders Bloggers Content Creators who want to get more traffic from their work Module: 01 Starting Your SEO Audit 00:47:00 SEO Audit Software Walkthrough 01:02:00 Keyword Planner 00:08:00 Free Keyword Research Tool 00:06:00 Paid Keyword Research Tool 00:07:00 Module: 02 WordPress Fastest Cache Settings 00:05:00 Yoast Real-Time Analysis for Any Site 00:02:00 WordPress Cache Speed Test 00:01:00 Real-Time Ranking Case Study 00:08:00 All In One SEO Plugin 00:03:00 Course Certification

SEO Audit with Screaming Frog
Delivered Online On Demand2 hours 29 minutes
£25

Educators matching "Audit"

Show all 230
Sales Skills Audit Ltd

sales skills audit ltd

Sales Skills Audit operates worldwide with a suite of market-leading sales skills assessment tools to improve sales performance. We are the only assessment approved by the global sales qualification accrediting body, the ISM Education, and our assessments are the only ones built on peer-reviewed UK Government National Occupational Standards for Sales. This means they work and are fully valid. Open an account for immediate access to all of our market-leading sales performance tools: • Sales skills assessments ranging from 10 to 30 minutes, fully validated • Sales E-learning modules, aligned to our assessments for targeted training • Recruiting sales executives? Let us help you hire better-skilled sales executives " A very easy-to-use, insightful survey methodology that helped us to put a line in the sand from which to plan a strategy for sales development going into what will no doubt be a challenging new year." Brian Tobin Head of Learning and Development, Lavendon Group " We found the SSA assessment to be of high validity and consistent with individual sales performance. The 5 modules covered almost all of the key areas in sales competency and the team reports offered a very clear comparison for both individuals as well as identifying team strengths and weaknesses. It can be used for sales talent screening during both interview and personnel development processes." Rachel Zhang | 张晓东 HR Department Manager, VNU Exhibitions Asia "Without doubt, the best set of profiling questions I have completed (and I’ve done some American formats). If anything, gave you the chance to set an aspiration target, really good." MH, Sales Manager, The Jelf Group PLC