• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

23112 Business courses

MySQL Course Intermediate, 3 DAYS

4.6(12)

By PCWorkshops

Practical MySQL Course Intermediate, to leave you fully conversant with queries, DML and DDL statements. Hands-on, Practical MySQL Course Intermediate. PCWorkshops MySQL Course Intermediate Certificate. Max 4 people per course, we keep it personalised.

MySQL Course Intermediate, 3 DAYS
Delivered Online
£600

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered Online
£2,380

Festive Online Networking & Social Event

5.0(1)

By Let’s Do Business Group

December is a great time to network and socialise with your peers. This informal event is designed to extend your entrepreneurial ecosystem.

Festive Online Networking & Social Event
Delivered Online
FREE

Magical Christmas with Includes Us 2

By includesustoo

Join us for a Magical Christmas filled with festive joy and wonder! Step into our enchanting Winter Wonderland and enjoy an afternoon of holiday magic with your family. The day will be filled with: Live music from the talented September Project, filling the air with Christmas cheer. A special visit from Father Christmas in his magical grotto, where children can share their holiday wishes. Delicious treats like mince pies, mulled wine, and hot chocolate to warm your hearts. Storytime with Mrs. Claus, where she will share heart warming Christmas tales by the fireplace. A Mini Christmas Market offering unique handcrafted gifts and fun craft activities for all ages. Plus, don’t miss the chance to enter our Christmas Raffle for a chance to win some fantastic festive prizes! We will be holding 2 sessions: 4pm to 6pm and 7pm to 9pm. This magical event is the perfect way to celebrate the holiday season with family and friends. We can’t wait to see you there and make some Christmas memories together! *We are aware this is an expensive time of year so we have reduced the children's tickets from £15 each to £10 each after the first 2 children*

Magical Christmas with Includes Us 2
Delivered In-Person in Ashford + more
£3 to £15

BCS International Diploma in Business Analysis - Start Today!

5.0(12)

By Duco Digital Training

Duco Digital Training's self study BCS International Diploma in Business Analysis course will help build your career as a business analyst, business architect, data analyst, enterprise analyst, management consultant...

BCS International Diploma in Business Analysis - Start Today!
Delivered Online On Demand12 days
£4,549

Video Marketing For Telecoms (FREE Webinar)

5.0(1)

By Clockwork Eye Video Training

"Learn video marketing essentials for the telecoms sector—discover what content to create, how to make it on a budget, and where to use it for maximum impact."

Video Marketing For Telecoms (FREE Webinar)
Delivered in person or Online
FREE

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered Online
£1,995

55123 Writing Reports with Report Builder and SSRS Level 1

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course are persons who are new to reporting with Microsoft© SQL Server© Report Builder and SSRS, persons who are transitioning from another reporting software application, and persons who are existing Report Builder and SSRS report authors. Overview Navigate the Report Builder Environment. - Create table reports. - Format reports. - Create basic and complex expressions. - Group report data. - Create matrix reports. - Sort and filter data. - Summarize data with charts. - Print and export reports. In this course, students will continue their learning on the foundations of report writing with Microsoft© SQL Server© Report Builder and SSRS. Prerequisites ?Familiarity with Windows. ?Creating and navigating folders. ?Opening programs. ?Manipulating windows. ?Copying and pasting objects. ?Formatting text. ?Saving files. 1 - Exploring the Report Builder Environment Introducing the Report Builder Environment Working with Existing Reports Lab 1: Exploring the Report Builder Application 2 - Adding Data to Table Reports Create Report Data Sources Create Report Datasets Work with the Tablix Data Region Create a Table Report Lab 1: Creating Table Reports 3 - Formatting Data and Creating Expressions in Reports Formatting Reports Sorting and Filtering Report Data Adding Data to a Dataset Creating Simple Expressions Creating Complex Expressions Lab 1: Formatting Reports 4 - Grouping Report Data Group Data in Reports Group Data Using an Expression Creating Subgroups and Group Aggregates Lab 1: Creating Reports with Groups and Aggregates 5 - Matrix Reports Creating and Modifying Matrix Data Regions Creating and Modifying Column Groups Lab 1: Creating Matrix Reports 6 - Charts Create and Modify Chart Wizard Reports Add Charts to Existing Reports Modify Charts in Reports Lab 1: Creating Charts and Chart Reports 7 - Printing and Exporting Reports Print Features and Print Options Export Reports Lab 1: Printing and Exporting Reports

55123 Writing Reports with Report Builder and SSRS Level 1
Delivered Online
£1,190

Online MA Business of Motorsport

5.0(1)

By National Motorsport Academy

Motorsport is as much a business as it is a sport. Our new master’s programme will provide students with a broad range of modules which examine the national and international aspects of the industry from a commercial perspective. From governance, structure and international sports law, through to the importance and interdependence of commercial rights holders, promoters, manufacturer, teams, sponsors and the role played by the media, this course is aimed at enhancing the professional and career prospects of those with an aspiration of working within this exciting and challenging global industry. Our programme will help you to develop as professionals with a strong grounding in ethics and a clear sense of how motorsport relates to various cultures, stakeholders and the sectors it interacts with.

Online MA Business of Motorsport
Delivered OnlineFlexible Dates
£10,750 to £14,950

Business Intelligence

By IIL Europe Ltd

Business Intelligence Business Intelligence (BI) refers to a set of technology-based techniques, applications, and practices used to aggregate, analyze, and present business data. BI practices provide historical and current views of vast amounts of data and generate predictions for business operations. The purpose of Business Intelligence is the support of better business decision making. This course provides an overview of the technology and application of BI and how it can be used to improve corporate performance. What you will Learn You will learn how to: Specify a data warehouse schema Identify the data and visualization to be used for data mining and Business Intelligence Design a Business Intelligence user interface Getting Started Introductions Agenda Expectations Foundation Concepts The challenge of decision making What is Business Intelligence? The Business Intelligence value proposition Business Intelligence taxonomy Business Intelligence management issues Sources of Business Intelligence Data warehousing Data and information Information architecture Defining the data warehouse and its relationships Facts and dimensions Modeling, meta-modeling, and schemas Alternate architectures Building the data warehouse Extracting Transforming Loading Setting up the data and relationships Dimensions and the Fact Table Implementing many-to-many relationships in data warehouse Data marts Online Analytical Processing (OLAP) What is OLAP? OLAP and OLTP OLAP functionality Multi-dimensions Thinking in more than two dimensions What are the possibilities? OLAP architecture Cubism Tools OLAP variations - MOLAP, ROLAP, HOLAP BI using SOA Applications of Business Intelligence Applying BI through OLAP Enterprise Resource Planning and CRM Business Intelligence and financial information Business Intelligence User Interfaces and Presentations Data access Push-pull data access Types of decision support systems Designing the front end Presentation formats Dashboards Types of dashboards Common dashboard features Briefing books and scorecards Querying and Reporting Reporting emphasis Retrofitting Talking back Key Performance Indicators Report Definition and Visualization Typical reporting environment Forms of visualization Unconstrained views Data mining What is in the mine? Applications for data mining Data mining architecture Cross Industry Standard Process for Data Mining (CISP-DM) Data mining techniques Validation The Business Intelligence User Experience The business analyst role Business analysis and data analysis Five-step approach Cultural impact Identifying questions Gathering information Understand the goals The strategic Business Intelligence cycle Focus of Business Intelligence Design for the user Iterate the access Iterative solution development process Review and validation questions Basic approaches Building ad-hoc queries Building on-demand self-service reports Closed loop Business Intelligence Coming attractions - future of Business Intelligence Best practices in Business Intelligence

Business Intelligence
Delivered In-Person in LondonFlexible Dates
£1,495