Establish a wellbeing-centric culture at your organisation using the latest research and best practices.
Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle. The CIPM is the world's first and only certification in privacy program management. When you earn a CIPM, it shows that you don't just know privacy regulations-you know how to make it work for your organization. In other words, you're the go-to person for day-to-day operations when it comes to privacy. Developed in collaboration with the law firms, Bird and Bird, Field Fisher, Wilson/Sonsini and Covington and Burling, the CIPM encompasses pan-European and national data protection laws, key privacy terminology and practical concepts concerning the determination of control measures designed to protect personal data and trans-border data flows. About This Course Delivered in a modular format, the course covers; Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management. Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks. Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy. Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments. Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation. Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten. Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs. Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design. Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach. Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance The CIPM body of knowledge outlines all the concepts and topics that you need to know to become certified. The exam blueprint gives you an idea of how many questions from each topic area you can expect on the exam. Prerequisites There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site What's Included? Breakfast, Lunch and refreshments (Classroom based courses only) The Official Study Guide (Privacy Programme Management - Third Edition)* Official Exam Q&A's* Official Practice Exam Participant Guide* 1 years membership of the IAPP The Exam Fees * In electronic format for Live Online and hard copy for Classroom delegates Who Should Attend? The CIPM is ideal for IT and information security leaders responsible for developing Data Protection frameworks and applying best practice, including those in the following positions: Data Analysts Cyber Security Analysts and Managers Aspiring Data Protection Officers IT Managers Accreditation Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.
PMI-ACP® Exam Prep: In-House Training This course builds on the candidates' practical experience of Agile in the workplace to equip them with the broad range of knowledge and skills required for the PMI® Agile Certification exam. It will follow the PMI® requirements and reference the suggested reading list, including the Agile Practice Guide, but will not be limited to those areas. Within the profession and discipline of project management, Agile continues to develop as a significant and important aspect of bringing change to an organization. Where the products of change must be delivered to the business 'on time,' Agile is often the chosen methodology. In addition to equipping candidates for the PMI® Agile Certification examination, this course will also support candidates in taking a more informed and effective role in Agile projects. It will also enable them to take a significant role in encouraging and enabling the organization to become or develop as an Agile environment. What you will Learn You will learn how to: Appreciate the wider aspects of Agile project management tools and techniques Integrate various disciplines within Agile Tailor / customize Agile to suit the needs of different projects Prepare yourself for the PMI® Agile Certification examination Getting Started Introductions Agenda Expectations Foundation Concepts Defining 'Traditional' Project Management Project management parameters The 'traditional' approach to the parameters Strengths and weaknesses of the traditional approach Defining 'Agile' Project Management Project management parameters revisited The 'agile' approach to the parameters Strengths and weaknesses of agile Managing projects with traditional and agile methods Can the two approaches co-exist? Leveraging the benefits of both methods Options for using both methods on a project Avoiding the elephant traps Key aspects of the PMI® Agile Certified Practitioner (PMI-ACP)® Handbook Overview Eligibility requirements Exam information Exam Blueprint Continuing certification requirements Key aspects of the PMI Agile Certification Examination Content Outline Introduction Agile exam content outline Tools and techniques Knowledge and skills Domains and tasks (not examined) An Introduction to Agile and Implementing Agile Definable work vs. high-uncertainty work Project factors that influence tailoring The Agile Manifesto and 12 Principles Agile mindset Agile domains and tasks Agile Tools and Techniques Related to PM 'Hard Skills' Planning, monitoring, and adapting The need for planning, monitoring, and adapting The Agile approach to planning and plans The Agile planning tools and techniques The Agile monitoring tools and techniques The Agile approach to adapting Product quality A definition of 'product quality' Setting the standard for product quality Agile tools and techniques for achieving product quality Risk management A definition of 'risk' What is 'at risk'? The acceptability of risks The Agile tools and techniques for managing risks Agile Tools and Techniques Related to PM 'Soft Skills' The difference between PM 'hard and soft' skills Communications The importance of communications Forms of agile communications Communications within the project Communications from the project Communications to the project Making communications the cultural norm Interpersonal Skills Defining and understanding management Defining and understanding leadership Defining and understanding servant leadership Delegating vs. empowering Playing to people's strengths Overcoming the roadblocks Core Agile Tools and Techniques The philosophy of core Agile tools and techniques Agile estimation Will traditional forms of estimating work for agile? The relationship between estimating and guessing The relationship between estimating and sizing The where, who, and how of agile estimating Agile analysis and design Product analysis and design from a user point of view Product analysis and design from a supplier point of view Product analysis and design from an agile project point of view Value-Based Agile Tools and Techniques The role of value-based tools and techniques in bridging traditional PM with Agile Value-based prioritization Value-based prioritization and agile projects Investment appraisal methods Regulatory driven Customer driven Ranking methods (MMF, MoSCoW) Metrics What should we measure / track? Methods of measuring / tracking Adding value with metrics Process Improvement Value-stream analysis Value-stream mapping Agile Knowledge and Skills Context of Agile Knowledge and Skills vis-Ã -vis Agile Tools and Techniques Agile Knowledge and Skills Process focused People focused Product focused Project focused Exam Preparation and Course Closure The application process - where are you now? The 'Exam-Focused Journal' - what you still have to do Further preparation - self-study schedule Exam topic review Practice exam Practice exam debrief Course closure
Today, every individual and organisation is a publisher. You want everyone in your organisation to be a potential ambassador. And every employee has something to gain from raising their profile and showcasing their expertise. An effective content strategy allows you to deliver compelling stories to your audience in the most seamless way possible to make an emotional connection. This requires a mix of passion for the subject matter, a deep relationship with your audience, robust production processes, and the right tools. With a background in journalism and technology, we’ve worked on many projects that combine the two – including overseeing the iPad edition launches for Condé Nast in the UK, product ownership of a Digital Asset Manager for Condé Nast International, and developing and delivering content training for telco VEON. Publishers and brands we’ve worked with include WIRED, Time Out, GQ, Vanity Fair and Vogue – as well as solo entrepreneurs and startups who are trying to cut through the noise and get their message heard. In this course we'll cover the key elements of an effective content strategy: how to plan across multiple platforms, and how to implement your blueprint without exhausting yourself or your team. Sample learning content Session 1: Planning a content strategy Mapping and understanding your audiences. Defining your content objectives, for you or your organisation. Common pitfalls with poorly targeted content. Session 2: A content creation framework Finding ideas to generate a consistent stream of content. Idenitfying angles that will help you stand out from the crowd. Using different formats across multiple channels. Session 3: Keeping it going Simple processes to help hit deadlines and publish regularly. Balancing content creation and content creation. Creating a mix of evergreen and timely content. Session 4: Measurement and iteration Useful (and useless) metrics for content producers. Handling comments and joining the conversation. Iterating your content strategy based on feedback. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people. Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets. Testimonial “The EMpower Network commissioned the content creation workshop to understand how to communicate effectively with a wide range of stakeholders. In light of covid-19, it’s more important than ever to communicate clearly especially as we’ve moved to remote meetings. The workshop was very insightful and Alan was a very engaging speaker making sure all attendees contributed and worked through real-life examples. Attendees praised the usefulness of the workshop and especially liked the content generation framework with one saying 'It has changed the way I think about communicating and given me a toolkit that I will use in both my work and personal projects'.” Shade Nathaniel-Ayodele | EMpower Network, Southwark Council
PMI-ACP® Exam Prep: Virtual In-House Training This course builds on the candidates' practical experience of Agile in the workplace to equip them with the broad range of knowledge and skills required for the PMI® Agile Certification exam. It will follow the PMI® requirements and reference the suggested reading list, including the Agile Practice Guide, but will not be limited to those areas. Within the profession and discipline of project management, Agile continues to develop as a significant and important aspect of bringing change to an organization. Where the products of change must be delivered to the business 'on time,' Agile is often the chosen methodology. In addition to equipping candidates for the PMI® Agile Certification examination, this course will also support candidates in taking a more informed and effective role in Agile projects. It will also enable them to take a significant role in encouraging and enabling the organization to become or develop as an Agile environment. What you will Learn You will learn how to: Appreciate the wider aspects of Agile project management tools and techniques Integrate various disciplines within Agile Tailor / customize Agile to suit the needs of different projects Prepare yourself for the PMI® Agile Certification examination Getting Started Introductions Agenda Expectations Foundation Concepts Defining 'Traditional' Project Management Project management parameters The 'traditional' approach to the parameters Strengths and weaknesses of the traditional approach Defining 'Agile' Project Management Project management parameters revisited The 'agile' approach to the parameters Strengths and weaknesses of agile Managing projects with traditional and agile methods Can the two approaches co-exist? Leveraging the benefits of both methods Options for using both methods on a project Avoiding the elephant traps Key aspects of the PMI® Agile Certified Practitioner (PMI-ACP)® Handbook Overview Eligibility requirements Exam information Exam Blueprint Continuing certification requirements Key aspects of the PMI Agile Certification Examination Content Outline Introduction Agile exam content outline Tools and techniques Knowledge and skills Domains and tasks (not examined) An Introduction to Agile and Implementing Agile Definable work vs. high-uncertainty work Project factors that influence tailoring The Agile Manifesto and 12 Principles Agile mindset Agile domains and tasks Agile Tools and Techniques Related to PM 'Hard Skills' Planning, monitoring, and adapting The need for planning, monitoring, and adapting The Agile approach to planning and plans The Agile planning tools and techniques The Agile monitoring tools and techniques The Agile approach to adapting Product quality A definition of 'product quality' Setting the standard for product quality Agile tools and techniques for achieving product quality Risk management A definition of 'risk' What is 'at risk'? The acceptability of risks The Agile tools and techniques for managing risks Agile Tools and Techniques Related to PM 'Soft Skills' The difference between PM 'hard and soft' skills Communications The importance of communications Forms of agile communications Communications within the project Communications from the project Communications to the project Making communications the cultural norm Interpersonal Skills Defining and understanding management Defining and understanding leadership Defining and understanding servant leadership Delegating vs. empowering Playing to people's strengths Overcoming the roadblocks Core Agile Tools and Techniques The philosophy of core Agile tools and techniques Agile estimation Will traditional forms of estimating work for agile? The relationship between estimating and guessing The relationship between estimating and sizing The where, who, and how of agile estimating Agile analysis and design Product analysis and design from a user point of view Product analysis and design from a supplier point of view Product analysis and design from an agile project point of view Value-Based Agile Tools and Techniques The role of value-based tools and techniques in bridging traditional PM with Agile Value-based prioritization Value-based prioritization and agile projects Investment appraisal methods Regulatory driven Customer driven Ranking methods (MMF, MoSCoW) Metrics What should we measure / track? Methods of measuring / tracking Adding value with metrics Process Improvement Value-stream analysis Value-stream mapping Agile Knowledge and Skills Context of Agile Knowledge and Skills vis-Ã -vis Agile Tools and Techniques Agile Knowledge and Skills Process focused People focused Product focused Project focused Exam Preparation and Course Closure The application process - where are you now? The 'Exam-Focused Journal' - what you still have to do Further preparation - self-study schedule Exam topic review Practice exam Practice exam debrief Course closure
About this Training Course The industry is surrounded with examples of poor Turnarounds, which have injured people and damaged businesses. If Turnarounds are not properly planned, managed and controlled, companies run the risks of serious safety and budget penalties, costly schedule delays and negative impacts on customers. As a consequence, operators are starting to explore Turnaround best practices and establish a more robust methodology. Turnarounds are the highest risk activity that we routinely perform in the industry, but they are also an area of massive variability in approach and outcome. Central to the variability is a lack of written methodologies and training - there are around 1,000 times as many books on maintenance as there are on turnaround management. All too often companies see Turnarounds as something to be survived and therefore it is no surprise that most Turnarounds fail. This 4 full-day course is based upon the Carcharodon 'Best of the Best' model of excellence for shutdown management with inputs from people who have done it from the trenches along with some of the world's most experienced shutdown specialists. All this experience has been condensed into a core methodology - our blueprint for success. It converts Turnarounds from a high-risk nuisance to a business opportunity. It has been used on multiple sites around the world, has been the basis of two books and is also supplemented by a roadmap for building and controlling a successful Turnaround. This is a certificate course where participants will have the option to participate for a short exam on the final day of the course to gain a Certificate in Advanced Turnaround, Shutdown & Outage Management from petroEDGE and the Academy of Turnarounds Operations and Maintenance. The purpose of this course is to equip the participants on the use of the Model of Excellence for Turnarounds and the principles of Challenge Planning to equip attendees with an advanced approach to Turnaround Management. The course is backed by real situations, high levels of interaction, group exercises and multiple case studies. It will explore the underlying mechanisms and levers that shape a Turnaround to demonstrate why we sometimes succeed or fail and introduce new conceptual approaches that can increase our chances of succeeding. Training Objectives Upon completion of this course, the participants will be able to: Position Turnarounds as part of an overall strategy of improving business performance. Build the best Turnaround team possible from available resources. Help senior management build effective steering teams. Reduce the downtime associated with turnarounds while simultaneously improving safety performance. Use the Model of Excellence to analyse their own performance, explain key principles to others and build a detailed methodology of their own. Maximise the benefits of planning and preparation through a proactive challenge planning process where the participants will build a Turnaround from the ground up from concept to execution and review. Target Audience This course has been researched and developed for Experienced Managers, Superintendents, Supervisors, Engineers, Planners, Team Leaders and Coordinators of: Shutdowns/Turnarounds Maintenance Engineering Reliability Plant Outage Asset Management Operations/Audit Safety Course Level Basic or Foundation Trainer Your expert course leader is a highly experienced facilitator in maintenance improvement, change management, continuous improvement and capability development as a management coach and trainer. He has a strong focus on people with an emphasis on developing people and the practicalities of improving maintenance performance rather than just the theory. He has worked internationally across Europe, America, the Middle East and Africa with extensive experience in Oil and Gas, the Chemicals sector and manufacturing as well as working with clients in Steel and Power Generation. As a result, he can bring best practice from a wide variety of sources. He spent the first fifteen years of his career as a specialist trainer working for companies such as Lloyds British Training Services and Rolls Royce. He then went on to work as a Principal consultant for ABB consulting for 15 years. During this time, he refined some of the established improvement tools including how and when to apply them for maximum impact whilst still continuing to develop and deliver training in support of this. Recent work has included improvements to the Work Order to Work Execution processes of Engineering departments and focused on Reliability, Planning and Scheduling. This ongoing field experience has helped him test and refine specialist training in a number of areas. He has been able to use his own experience to contribute with other maintenance specialists to the Carcharodon models of excellence. Its methodologies are recognised as 'Best of the Best' standards providing the inspiration for two books, projects that have won awards such as the prodigious UK Chemical Industries annual Excellence in Engineering award and form the basis of this training. He was recently awarded a national award as coach of the year. He uses the same skills to ensure that he does not just preach maintenance best practice, he discusses it, explains it and ensures that delegates have a much more personal and flexible experience. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Introducing the “How to Keep a Relationship Strong and Happy” Package: Your Blueprint for Long-lasting Love, Respect, and Happiness Are you looking to build a solid foundation and keep your relationship thriving with love, respect, and happiness? Miss Date Doctor is delighted to present our exclusive “How to Keep a Relationship Strong and Happy” package. Designed to provide you with the essential tools and guidance, this comprehensive relationship coaching program will empower you to create a lasting and fulfilling bond with your partner. With our package, you’ll learn invaluable strategies to foster respect, effectively manage conflicts, maintain physical and emotional intimacy, cultivate empathy, and nurture love. We understand that every relationship is unique, which is why our experienced relationship coaches will tailor their expertise to address your specific needs and goals. Why should you invest in the “How to Keep a Relationship Strong and Happy” package? Because a strong and happy relationship requires effort, commitment, and the right knowledge. Here’s how our package can help: Cultivating Respect: Respect forms the foundation of any healthy relationship. Our package will guide you on how to establish mutual respect, communicate effectively, and create a safe and supportive environment where both partners feel valued and appreciated. By learning the principles of respect, you’ll build a strong bond that withstands the test of time. Conflict Management Strategies: Conflicts are inevitable in any relationship, but how you handle them can make all the difference. Our expert coaches will teach you effective conflict resolution techniques, helping you navigate disagreements with grace and understanding. By learning healthy communication styles and negotiation skills, you’ll resolve conflicts while strengthening your connection. Maintaining Physical and Emotional Intimacy: Physical and emotional intimacy are essential for a thriving relationship. Our package will provide you with practical tips and guidance to keep the spark alive, reignite passion, and deepen your emotional connection. You’ll explore techniques to enhance intimacy, explore each other’s needs and desires, and create a satisfying and fulfilling bond. Cultivating Empathy and Understanding: Empathy is the key to fostering understanding and compassion in your relationship. Our coaches will guide you through exercises and techniques to enhance empathy, helping you better understand your partner’s perspective, needs, and emotions. By cultivating empathy, you’ll foster a deeper connection and create a harmonious and supportive partnership. Nurturing Love and Connection: Love is a journey that requires nurturing and continuous effort. Our package will provide you with the tools and strategies to keep the love alive. You’ll explore ways to express love and appreciation, create shared experiences, and maintain a sense of adventure and excitement. Together, we’ll ensure that your relationship remains vibrant and filled with joy. Continuous Support and Guidance: Throughout your journey, our dedicated relationship coaches will provide ongoing support and guidance. You’ll have access to personalized advice, resources, and strategies to address any challenges that may arise. With our support, you’ll feel confident in navigating the ups and downs of your relationship and maintaining a strong and happy partnership. Invest in the “How to Keep a Relationship Strong and Happy” package from Miss Date Doctor today and embark on a transformative journey towards building a lasting and fulfilling relationship. Discover the secrets to love, respect, happiness, and connection that will enrich your lives for years to come. Contact Miss Date Doctor now to book your package and create a relationship that stands the test of time. Happiness and fulfillment await you and your partner. Don’t wait—start building the love you deserve today! 4 x 1 hour session https://relationshipsmdd.com/product/how-to-keep-a-relationship-strong-and-happy-package/
Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Immerse will enrich your understanding of the interplay of yin & yang, the elements that make up everything in the universe - water, wood, fire, earth, metal - and what it means to be a fully expressed human being. You are invited to look deep within and engage consciously without.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for administrators who install, manage, and monitor IBM© DataPower Gateway Appliances. The course is also relevant for developers who administer appliances. Overview Configure an appliance for its initial deployment Download and upgrade the firmware on the DataPower appliances Create and manage user accounts, groups, and domains Configure Secure Sockets Layer (SSL) to and from DataPower Appliances Troubleshoot and debug services by using the problem determination tools, logs, and probes that are provided with the DataPower appliance Configure logging of messages to external locations IBM© DataPower Gateway Appliances are network devices that help secure, integrate, and optimize access to web, web services, mobile, and API workloads. Through instructor-led lectures and hands-on lab exercises, you learn how to run various administrative procedures, from initial installation and setup through ongoing maintenance of the appliances in production. You learn about the available management interfaces, such as the command-line interface (CLI), Web Management graphical interface, and XML Management Interface. You also learn how to use these interfaces to run various administrative tasks, such as upgrading firmware, running backup and restore operations, and configuring user accounts and domains. The course includes some information on upgrading firmware and working with DataPower hardware appliances. Course introductionDataPower deployment environmentsInitial setupManaging firmwareExercise: Upgrading image firmwareDataPower administration overviewUsing CLI and the XML Management Interface to configure appliance accessExercise: Using the CLI and the XML Management Interface to manage DataPower appliancesDataPower services overviewUsing the Web Management Blueprint Console to configure appliance accessTroubleshootingExercise: Using the troubleshooting tools to debug errorsDataPower cryptographic tools and SSL setupExercise: Securing connections with SSLLogging and log targetsExercise: Logging to an external systemCourse summary