Duration 4 Days 24 CPD hours This course is intended for The audience for this course is data professionals managing data and databases who want to learn about administering the data platform technologies that are available on Microsoft Azure. This course is also valuable for data architects and application developers who need to understand what technologies are available for the data platform with Azure and how to work with those technologies through applications. This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases. Prerequisites In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses: AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - Prepare to maintain SQL databases on Azure Describe Microsoft Intelligent Data Platform roles Understand SQL Server in an Azure virtual machine Design Azure SQL Database for cloud-native applications Explore Azure SQL Database Managed Instance 2 - Deploy IaaS solutions with Azure SQL Explain IaaS options to deploy SQL Server in Azure Understand hybrid scenarios Explore performance and security Explain high availability and disaster recovery options 3 - Deploy PaaS solutions with Azure SQL Explain PaaS options for deploying SQL Server in Azure Explore single SQL database Deploy SQL database elastic pool Understand SQL database hyperscale Examine SQL managed instance Describe SQL Edge 4 - Evaluate strategies for migrating to Azure SQL Understand compatibility level Understand Azure preview features Describe Azure database migration options 5 - Migrate SQL workloads to Azure SQL databases Choose the right SQL Server Instance option in Azure Migrate SQL Server to Azure SQL Database offline Migrate SQL Server to Azure SQL Database online Load and move data to Azure SQL Database 6 - Migrate SQL workloads to Azure Managed Instances Evaluate migration scenarios to SQL Database Managed Instance Migrate to SQL Database Managed Instance Load and Move data to SQL Database Managed Instance 7 - Configure database authentication and authorization Describe Active Directory and Azure Active Directory Describe authentication and identities Describe Security Principals Describe database and object permissions Identify authentication and authorization failures 8 - Protect data in-transit and at rest Explore Transparent Data Encryption Configure server and database firewall rules Explain object encryption and secure enclaves Enable encrypted connections Describe SQL injection Understand Azure Key Vault 9 - Implement compliance controls for sensitive data Explore data classification Explore server and database audit Implement Dynamic Data Masking Implement Row Level security Understand Microsoft Defender for SQL Explore Azure SQL Database Ledger Implement Azure Purview 10 - Describe performance monitoring Describe performance monitoring tools Describe critical performance metrics Establish baseline metrics Explore extended events Describe Azure SQL Insights Explore Query Performance Insight 11 - Configure SQL Server resources for optimal performance Explain how to optimize Azure storage for SQL Server virtual machines Describe virtual machine resizing Optimize database storage Control SQL Server resources 12 - Configure databases for optimal performance Explore database maintenance checks Describe database scoped configuration options Describe automatic tuning Describe intelligent query processing 13 - Explore query performance optimization Understand query plans Explain estimated and actual query plans Describe dynamic management views and functions Explore Query Store Identify problematic query plans Describe blocking and locking 14 - Evaluate performance improvements Describe wait statistics Tune and maintain indexes Understand query hints 15 - Explore performance-based design Describe normalization Choose appropriate data types Design indexes 16 - Automate deployment of database resources Describe deployment models in Azure Automate deployment by using Azure Resource Manager templates and Bicep Automate deployment by using PowerShell Automate deployment by using Azure CLI 17 - Create and manage SQL Agent jobs Create a SQL Server maintenance plan Describe task status notifications 18 - Manage Azure PaaS tasks using automation Explore Elastic jobs Understand Azure Automation Build an automation runbook Automate database workflows by using Logic Apps Monitor automated tasks 19 - Describe high availability and disaster recovery strategies Describe recovery time objective and recovery point objective Explore high availability and disaster recovery options Describe Azure high availability and disaster recovery features for Azure Virtual Machines Describe high availability and disaster recovery options for PaaS deployments Explore an IaaS high availability and disaster recovery solution Describe hybrid solutions 20 - Explore IaaS and PaaS solutions for high availability and disaster recovery Describe failover clusters in Windows Server Configure Always-on availability groups Describe temporal tables in Azure SQL Database Describe active geo-replication for Azure SQL Database Explore auto-failover groups for Azure SQL Database and Azure SQL Managed Instance 21 - Back up and restore databases Back up and restore SQL Server running on Azure virtual machines Back up a SQL Server virtual machine Back up and restore a database using Azure SQL Database Additional course details: Nexus Humans DP-300T00: Administering Microsoft Azure SQL Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-300T00: Administering Microsoft Azure SQL Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Prerequisites Before attending this course, students must have previous experience deploying or administering Azure resources and conceptual knowledge of: Azure Active Directory Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability AZ-104T00 - Microsoft Azure Administrator 1 - Design governance Design for governance Design for management groups Design for subscriptions Design for resource groups Design for resource tags Design for Azure Policy Design for role-based access control (RBAC) Design for Azure landing zones 2 - Design an Azure compute solution Choose an Azure compute service Design for Azure Virtual Machines solutions Design for Azure Batch solutions Design for Azure App Service solutions Design for Azure Container Instances solutions Design for Azure Kubernetes Service solutions Design for Azure Functions solutions Design for Azure Logic Apps solutions 3 - Design a data storage solution for non-relational data Design for data storage Design for Azure storage accounts Design for data redundancy Design for Azure Blob Storage Design for Azure Files Design for Azure managed disks Design for storage security 4 - Design a data storage solution for relational data Design for Azure SQL Database Design for Azure SQL Managed Instance Design for SQL Server on Azure Virtual Machines Recommend a solution for database scalability Recommend a solution for database availability Design security for data at rest, data in motion, and data in use Design for Azure SQL Edge Design for Azure Cosmos DB and Table Storage 5 - Design data integration Design a data integration solution with Azure Data Factory Design a data integration solution with Azure Data Lake Design a data integration and analytic solution with Azure Databricks Design a data integration and analytic solution with Azure Synapse Analytics Design strategies for hot, warm, and cold data paths Design an Azure Stream Analytics solution for data analysis 6 - Design an application architecture Describe message and event scenarios Design a messaging solution Design an Azure Event Hubs messaging solution Design an event-driven solution Design a caching solution Design API integration Design an automated app deployment solution Design an app configuration management solution 7 - Design authentication and authorization solutions Design for identity and access management (IAM) Design for Microsoft Entra ID Design for Microsoft Entra business-to-business (B2B) Design for Azure Active Directory B2C (business-to-customer) Design for conditional access Design for identity protection Design for access reviews Design service principals for applications Design managed identities Design for Azure Key Vault 8 - Design a solution to log and monitor Azure resources Design for Azure Monitor data sources Design for Azure Monitor Logs (Log Analytics) workspaces Design for Azure Workbooks and Azure insights Design for Azure Data Explorer 9 - Design network solutions Recommend a network architecture solution based on workload requirements Design patterns for Azure network connectivity services Design outbound connectivity and routing Design for on-premises connectivity to Azure Virtual Network Choose an application delivery service Design for application delivery services Design for application protection services 10 - Design a solution for backup and disaster recovery Design for backup and recovery Design for Azure Backup Design for Azure blob backup and recovery Design for Azure files backup and recovery Design for Azure virtual machine backup and recovery Design for Azure SQL backup and recovery Design for Azure Site Recovery 11 - Design migrations Evaluate migration with the Cloud Adoption Framework Describe the Azure migration framework Assess your on-premises workloads Select a migration tool Migrate your structured data in databases Select an online storage migration tool for unstructured data Migrate offline data 12 - Introduction to the Microsoft Azure Well-Architected Framework Azure Well-Architected Framework pillars Cost optimization Operational excellence Performance efficiency Reliability Security 13 - Microsoft Azure Well-Architected Framework - Cost Optimization Develop cost-management discipline Design with a cost-efficiency mindset Design for usage optimization Design for rate optimization Monitor and optimize over time 14 - Microsoft Azure Well-Architected Framework - Operational excellence Embrace DevOps culture Establish development standards Evolve operations with observability Deploy with confidence Automate for efficiency Adopt safe deployment practices 15 - Microsoft Azure Well-Architected Framework - Performance efficiency Negotiate realistic performance targets Design to meet capacity requirements Achieve and sustain performance Improve efficiency through optimization 16 - Microsoft Azure Well-Architected Framework - Reliability Design for business requirements Design for resilience Design for recovery Design for operations Keep it simple 17 - Microsoft Azure Well-Architected Framework - Security Plan your security readiness Design to protect confidentiality Design to protect integrity Design to protect availability Sustain and evolve your security posture 18 - Getting started with the Microsoft Cloud Adoption Framework for Azure Customer narrative Common blockers 19 - Prepare for successful cloud adoption with a well-defined strategy Customer narrative Capture strategic motivation Define objectives and key results Evaluate financial considerations Understand technical considerations Create a business case 20 - Prepare for cloud adoption with a data-driven plan Customer narrative 21 - Choose the best Azure landing zone to support your requirements for cloud operations Customer narrative Common operating models Design areas for Azure landing zones Design principles for Azure landing zones Journey to the target architecture Choose an Azure landing zone option Deploy the Azure landing zone accelerator Enhance your landing zone 22 - Migrate to Azure through repeatable processes and common tools Customer narrative Migration process Migration tools Common tech platforms 23 - Address tangible risks with the Govern methodology of the Cloud Adoption Framework for Azure Customer narrative Govern methodology Corporate policies Governance disciplines Deploy a cloud governance foundation The Cost Management discipline 24 - Ensure stable operations and optimization across all supported workloads deployed to the cloud Establish business commitments Deploy an operations baseline Protect and recover Enhance an operations baseline Manage platform and workload specialization 25 - Innovate applications by using Azure cloud technologies Follow the innovation lifecycle Azure technologies for the build process Infuse your applications with AI Azure technologies for measuring business impact Azure technologies for the learn process 26 - Prepare for cloud security by using the Microsoft Cloud Adoption Framework for Azure Customer narrative Methodology Security roles and responsibilities Simplify compliance and security Simplify security implementation Security tools and policies Additional course details: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Foundation course includes Management, Operations, Developers, QA and Testing professionals such as: Individuals involved in IT development IT operations or IT service management. Individuals who require an understanding of DevOps principles. IT professionals working within, or about to enter, an Agile Service Design Environment The following IT roles: Automation Architects, Application Developers, Business Analysts, Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Consultants, DevOps Engineers, Infrastructure Architect, Integration Specialists, IT Directors, IT Managers, IT Operations, IT Team Leaders, Lean Coaches, Network Administrators, Operations Managers, Project Managers, Release Engineers, Software Developers, Software Tester/QA, System Administrators, Systems Engineers, System Integrators, Tool Providers. Overview The learning objectives for DevOps Foundation include an understanding of: DevOps objectives and vocabulary Benefits to the business and IT Principles and practices including Continuous Integration, Continuous Delivery, testing, security and the Three Ways DevOps relationship to Agile, Lean and ITSM Improved workflows, communication and feedback loops Automation practices including deployment pipelines and DevOps toolchains Scaling DevOps for the enterprise Critical success factors and key performance indicators Real-life examples and results The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organizational success. Learners will gain an understanding of DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation to improve the flow of work between software developers and IT operations professionals. This course prepares you for the DevOps Foundation (DOFD) certification. Exploring DevOps Defining DevOps Why Does DevOps Matter? Core DevOps Principles The Three Ways The First Way The Theory of Constraints The Second Way The Third Way Chaos Engineering Learning Organizations Key DevOps Practices Continuous Testing, Integration, Delivery, Deployment Site Reliability & Resilience Engineering DevSecOps ChatOps Kanban Business and Technology Frameworks Agile ITSM Lean Safety Culture Learning Organizations Continuous Funding Culture, Behaviors & Operating Models Defining Culture Cultural Debt Behavioral Models Organizational maturity models Automation & Architecting DevOps Toolchains CI/CD Cloud, Containers, and Microservices AI and Machine Learning Automation DevOps Toolchains Measurement, Metrics, and Reporting The Importance of Measurement DevOps Metrics - Speed, Quality, Stability, Culture Change lead/cycle time Value Driven Metrics Sharing, Shadowing and Evolving DevOps in the Enterprise Roles DevOps Leadership Organizational Considerations Getting Started Challenges, Risks, and Critical Success Factors Additional course details: Nexus Humans DevOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The Forensic Analysis Bootcamp is an 8-week deep-dive into forensic equity analysis, featuring a 90-minute Zoom workshop each week. The content includes extensive use of real-life case studies and covers stocks spanning a wide range of sectors and regions. You will learn how companies manipulate expenses and inflate profits, how to spot balance sheet issues, weaknesses of the cash flow statement and issues and more.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Security IT business-level professionals interested in cloud security practices Security professionals with minimal to no working knowledge of AWS Overview Assimilate Identify security benefits and responsibilities of using the AWS Cloud Describe the access control and management features of AWS Explain the available methods for providing encryption of data in transit and data at rest when storing your data in AWS. Describe how to secure network access to your AWS resources Determine which AWS services can be used for monitoring and incident response This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization. Prerequisites Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts 1 - Security on AWS Security design principles in the AWS Cloud AWS Shared Responsibility Model 2 - Security OF the Cloud AWS Global Infrastructure Data center security Compliance and governance 3 - Security IN the Cloud ? Part 1 Identity and access management Data protection essentials Lab 01 ? Introduction to security policies 4 - Security IN the Cloud ? Part 2 Securing your infrastructure Monitoring and detective controls Lab 02 ? Securing VPC resources with Security Groups 5 - Security IN the Cloud ? Part 3 DDoS mitigation Incident response essentials Lab 03 ? Remediating issues with AWS Config Conformance Packs 6 - Course Wrap Up AWS Well-Architected tool overview Next Steps Additional course details: Nexus Humans AWS Security Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Do you want to prepare for your dream job but strive hard to find the right courses? Then, stop worrying, for our strategically modified IT Support Technical Skills Bootcamp bundle will keep you up to date with the relevant knowledge and most recent matters of this emerging field. So, invest your money and effort in our 40 course mega bundle that will exceed your expectations within your budget. The IT Support Technical Skills Bootcamp related fields are thriving across the UK, and recruiters are hiring the most knowledgeable and proficient candidates. It's a demanding field with magnitudes of lucrative choices. If you need more guidance to specialise in this area and need help knowing where to start, then StudyHub proposes a preparatory bundle. This comprehensive IT Support Technical Skills Bootcamp bundle will help you build a solid foundation to become a proficient worker in the sector. This IT Support Technical Skills Bootcamp Bundle consists of the following 30 CPD Accredited Premium courses - Course 01 :IT Support Technician Course 02 :Network Security and Risk Management Course 03 :CompTIA Network Course 04 :Information Management Course 05 :Web Application Penetration Testing Course Course 06 :CompTIA Cloud+ (CV0-002) Course 07 :Learn Ethical Hacking with Kali Linux Course 08 :Web Design (HTML, CSS, Bootstrap) Complete Course Course 09 :Python Course Course 10 :JavaScript Course 11 :ASP.Net MVC and Entity Framework Course Course 12 :Learn Spring & Angular Material with a Full Web Application Course 13 :Typescript Course 14 :U&P AI - Natural Language Processing (NLP) with Python Course 15 :Ruby on Rails Web Application Framework Course 16 :Data Science and Visualisation with Machine Learning Course 17 :SQL For Data Analytics & Database Development Course 18 :PLC Programming Diploma Course 19 :Cisco ASA Firewall Training Course Course 20 :Create Your First Responsive Website Course 21 :C# (C-Sharp) Course 22 :Computer Operating System and Troubleshooting Course 23 :Building Your Own Computer Course Course 24 :It: Ethical Hacking, IT Security and IT Cyber Attacking Course 25: SQL Database Administrator Course 26: MS Word Essentials - The Complete Word Course - Level 3 Course 27: Data Protection (GDPR) Practitioner Course 28: Website Hacking From Scratch Course 29: Diploma in Front-End Web Development (HTML, CSS, & Bootstrap) Course 30: SQL Server 101 : Microsoft SQL Server for Absolute Beginners 10 Extraordinary Career Oriented courses that will assist you in reimagining your thriving techniques- Course 01 :Career Development Plan Fundamentals Course 02 :CV Writing and Job Searching Course 03 :Interview Skills: Ace the Interview Course 04 :Video Job Interview for Job Seekers Course 05 :Create a Professional LinkedIn Profile Course 06 :Business English Perfection Course Course 07 :Networking Skills for Personal Success Course 08 :Boost Your Confidence and Self-Esteem Course 09 :Public Speaking Training Course 10 :Learn to Fight Procrastination Learning Outcome This tailor-made IT Support Technical Skills Bootcamp bundle will allow you to- Uncover your skills and aptitudes to break new ground in the related fields Deep dive into the fundamental knowledge Acquire some hard and soft skills in this area Gain some transferable skills to elevate your performance Maintain good report with your clients and staff Gain necessary office skills and be tech savvy utilising relevant software Keep records of your work and make a report Know the regulations around this area Reinforce your career with specific knowledge of this field Know your legal and ethical responsibility as a professional in the related field This IT Support Technical Skills Bootcamp Bundle resources were created with the help of industry experts, and all subject-related information is kept updated on a regular basis to avoid learners from falling behind on the latest developments. Certification After studying the complete training you will be able to take the assessment. After successfully passing the assessment you will be able to claim all courses pdf certificates and 1 hardcopy certificate for the Title Course completely free. Other Hard Copy certificates need to be ordered at an additional cost of •8. CPD 400 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Ambitious learners who want to strengthen their CV for their desired job should take advantage of the IT Support Technical Skills Bootcamp bundle! This bundle is also ideal for professionals looking for career advancement. Requirements To participate in this course, all you need is - A smart device A secure internet connection And a keen interest in IT Support Technical Skills Bootcamp Career path Upon completing this essential Bundle, you will discover a new world of endless possibilities. These courses will help you to get a cut above the rest and allow you to be more efficient in the relevant fields.
Hands-on 5-day bootcamp in User Experience design for everyone, where we cover an entire design process: days 1 & 2 – UX and UI foundations, day 3 – Prototyping in Figma, days 4 & 5 – Project work
***24 Hour Limited Time Flash Sale*** IT Support Technical Skills Bootcamp Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter As digital transformation accelerates, demand for qualified IT support technicians surges in the UK. The IT industry is booming, with an expected growth of 12% by 2027, creating over 1 million new jobs. Do you have an interest in maintaining networks, securing systems, and providing technical support? This IT Support Technical Skills Bootcamp bundle delivers the well-rounded expertise today's IT teams need. Designed to cater to the needs of both seasoned professionals and aspiring newcomers, our IT Support Technical Skills Bootcamp bundle is a comprehensive programme that will equip you with the essential skills and knowledge you need to succeed. Whether you're looking to advance in your current role or embark on a new career journey, this bundle has everything you need to take your professional life to the next level. But that's not all. When you enrol in IT Support Technical Skills Bootcamp Online Training, you'll receive 30 CPD-Accredited PDF Certificates, Hard Copy Certificates, and our exclusive student ID card, all absolutely free. Courses Are Included In this IT Support Technical Skills Bootcamp Career Bundle: Course 01: Advanced Diploma in IT Support Technician at QLS Level 7 Course 02: Network Security and Risk Management Course 03: CompTIA Network Course 04: Information Management Course 05: Web Application Penetration Testing Course Course 06: CompTIA Cloud+ (CV0-002) Course 07: ASP.Net MVC and Entity Framework Course Course 08: Computer Operating System and Troubleshooting Course 09: PLC Programming Diploma Course 10: Learn Spring & Angular Material with a Full Web Application Course 11: SQL Server 101: Microsoft SQL Server for Absolute Beginners Course 12: JavaScript Course 13: Python Course Course 14: Learn Ethical Hacking with Kali Linux Course 15: Building Your Own Computer Course Course 16: Ruby on Rails Web Application Framework Course 17: Create Your First Responsive Website Course 18: Data Science and Visualisation with Machine Learning Course 19: Cisco ASA Firewall Training Course Course 20: SQL For Data Analytics & Database Development Course 21: TypescriptU&P AI - Natural Language Processing (NLP) with Python Course 22:C# (C-Sharp) Course 23:MS Word Essentials - The Complete Word Course - Level 3 Course 24: Web Design (HTML, CSS, Bootstrap) Complete Course Course 25: Website Hacking From Scratch Course 26: Diploma in Front-End Web Development (HTML, CSS, & Bootstrap) Course 27: Data Protection (GDPR) Practitioner Course 28: SQL Database Administrator Course 29: Cisco ASA Firewall Training Course Course 30: IT: Ethical Hacking & IT Security With IT Support Technical Skills Bootcamp, you'll embark on an immersive learning experience that combines interactive lessons with voice-over audio, ensuring that you can learn from anywhere in the world, at your own pace. Learning Outcomes of IT Support Technical Skills Diagnose and troubleshoot IT hardware and software issues. Implement network security best practices and manage risks. Gain industry-recognized CompTIA certifications. Develop web applications using popular frameworks and languages. Automate tasks with scripting and programming skills. Build a strong foundation for further specialization in IT. Enrol in IT Support Technical Skills Bootcamp today and take the first step towards achieving your goals and dreams. Why buy this IT Support Technical Skills Bootcamp? Get a Free CPD Accredited Certificate upon completion of the course Get a free student ID card with this training program The course is affordable and simple to understand This course is entirely online, interactive lesson with voiceover audio Lifetime access to the course materials The training program comes with 24/7 tutor support Start your learning journey straightaway with our IT Support Technical Skills Bootcamp Training! IT Support Technical Skills Bootcamp premium bundle consists of 30 precisely chosen courses on a wide range of topics essential for anyone looking to excel in this field. Each segment of IT Support Technical Skills Bootcamp is meticulously designed to maximise learning and engagement, blending interactive content and audio-visual modules for a truly immersive experience. Certification You have to complete the assignment given at the end of the IT Support Technical Skills Bootcamp course. After passing the course exam You will be entitled to claim a PDF & Hardcopy certificate accredited by CPD Quality standards completely free. CPD 480 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This IT Support Technical Skills Bootcamp course is ideal for: Students seeking mastery in IT Support Technical Skills Bootcamp Professionals seeking to enhance IT Support Technical Skills Bootcamp skills Individuals looking for an IT Support Technical Skills Bootcamp-related career. Requirements This IT Support Technical Skills Bootcamp doesn't require prior experience and is suitable for diverse learners. Career path This IT Support Technical Skills Bootcamp bundle will allow you to kickstart or take your career in the related sector to the next stage. IT Support Specialist Network Administrator Cloud Engineer Web Developer Security Analyst Certificates CPD Accredited Digital certificate Digital certificate - Included CPD Accredited Hard copy certificate Hard copy certificate - Included If you are an international student, then you have to pay an additional 10 GBP for each certificate as an international delivery charge.