Duration 4 Days 24 CPD hours This course is intended for This course is intended for both novice and experienced SharePoint users who wish to make full use of SharePoint Online. Overview #NAME? This course delivers the complete site owner story from start to finish in an engaging and practical way to ensure you have the confidence to plan and create new sites or manage your existing sites in SharePoint Online. Your goal is to learn how to make SharePoint online relevant to your team by using a sites functionality to help you share information and collaborate with your colleagues. During the class, you will also learn best practices and ?what not to do? as you watch live, interactive demonstrations and put theory into practice with hands on exercises in SharePoint Online. 1 - An Introduction to SharePoint Online Introducing Office 365 and SharePoint Getting started with Office 365 The cloud revolution Login to Office 365 What is Office 365 Using the app launcher What is SharePoint Office 365 settings Introducing Office 365 Groups Delve Ownership and Access OneDrive 2 - Creating Sites Planning your sites Create new subsites The Office 365 tenant Site templates Web addresses Apply a them Site collections Building your navigation Create a new site Delete subsites Team site navigation User interface: classic vs modern Site contents: classic vs modern Where does classic come from? 3 - Creating and Managing Web Pages The types of pages found in SharePoint Classic SharePoint pages Modern SharePoint pages How to use classic team site pages Create news and site pages Review features of publishing sites Web parts Save, publish, share and delete pages Communication sites 4 - Working with Apps An introduction to apps Co-authoring Marketplace apps Check In ? Out Adding apps to a site Edit and view file properties Create and manage columns Quick edit view Public and personal views File commands Managing app settings Copy link and Share Content approval Folders Major and minor versioning The recycle bin Document sets Alerts Working with files in a library OneDrive sync Create, Upload and edit files Working with classic lists 5 - Building processes with Flow and PowerApps What are business processes? Design and publish a Flow Classic tools for designing processes Getting started with PowerApps in SharePoint Design and test a classic workflow Enhance data capture with PowerApps Getting started with Flow in SharePoint Test a Flow and PowerApps enriched list 6 - Customizing Security Office 365 Group access Share a file Updating Office 365 Group Security Remove a user Managing access to SharePoint Customizing SharePoint security New sites private vs public Create permission levels and groups Setup access requests Security inheritance Share a site Security best practices 7 - Working with Search Delve Search tips An introduction to SharePoint search Accessing classic search Search in folders, libraries and sites Promoted results Search results 8 - Enterprise Content Management Managed metadata service Information management policies An introduction to content types The records center Create and manage content type In-place records management Deploy content types The content organizer Using content types in apps Durable links The content type hub
Duration 3 Days 18 CPD hours This course is intended for This course is for Network Engineers looking to specialize in Azure networking solutions. An Azure Network engineer designs and implements core Azure networking infrastructure, hybrid networking connections, load balance traffic, network routing, private access to Azure services, network security and monitoring. The azure network engineer will manage networking solutions for optimal performance, resiliency, scale, and security. This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, Hybrid Networking connections, load balancing traffic, network routing, private access to Azure services, network security and monitoring. Learn how to design and implement a secure, reliable, network infrastructure in Azure and how to establish hybrid connectivity, routing, private access to Azure services, and monitoring in Azure. Prerequisites Prerequisite courses (or equivalent knowledge and hands-on experience): AZ-104T00 - Microsoft Azure Administrator 1 - Introduction to Azure Virtual Networks Explore Azure Virtual Networks Configure public IP services Design name resolution for your virtual network Enable cross-virtual network connectivity with peering Implement virtual network traffic routing Configure internet access with Azure Virtual NAT 2 - Design and implement hybrid networking Design and implement Azure VPN Gateway Connect networks with Site-to-site VPN connections Connect devices to networks with Point-to-site VPN connections Connect remote resources by using Azure Virtual WANs Create a network virtual appliance (NVA) in a virtual hub 3 - Design and implement Azure ExpressRoute Explore Azure ExpressRoute Design an ExpressRoute deployment Configure peering for an ExpressRoute deployment Connect an ExpressRoute circuit to a virtual network Connect geographically dispersed networks with ExpressRoute global reach Improve data path performance between networks with ExpressRoute FastPath Troubleshoot ExpressRoute connection issues 4 - Load balance non-HTTP(S) traffic in Azure Explore load balancing Design and implement Azure load balancer using the Azure portal Explore Azure Traffic Manager 5 - Load balance HTTP(S) traffic in Azure Design Azure Application Gateway Configure Azure Application Gateway Design and configure Azure Front Door 6 - Design and implement network security Get network security recommendations with Microsoft Defender for Cloud Deploy Azure DDoS Protection by using the Azure portal Deploy Network Security Groups by using the Azure portal Design and implement Azure Firewall Secure your networks with Azure Firewall Manager Implement a Web Application Firewall on Azure Front Door 7 - Design and implement private access to Azure Services Explain virtual network service endpoints Define Private Link Service and private endpoint Integrate private endpoint with DNS Integrate your App Service with Azure virtual networks 8 - Design and implement network monitoring Monitor your networks using Azure monitor Monitor your networks using Azure network watcher
£ 12.50 per session A series of hourly small group sessions where we look at different aspects of Word Alternatively, we can do you one-to-one sessions, either via virtual classroom or in person at our training course. These are £30 per hour, or £125 for 5-hour blocks.
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server. This course will help them update their knowledge and skills related to storage and compute for Windows Server. Overview Prepare and install Windows Server and plan a server upgrade and migration strategy. Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes. Describe enterprise storage solutions, and select the appropriate solution for a given situation. Implement and manage Storage Spaces and Data Deduplication. Install and configure Microsoft Hyper-V, and configure virtual machines. Deploy, configure, and manage Windows and Hyper-V containers. Describe the high availability and disaster recovery technologies in Windows Server. Plan, create, and manage a failover cluster. Implement failover clustering for Hyper-V virtual machines. Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation. Create and manage deployment images. Manage, monitor, and maintain virtual machine installations. This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites A basic understanding of networking fundamentals. An awareness and understanding of security best practices. An understanding of basic Active Directory concepts. Basic knowledge of server hardware. Experience supporting and configuring Windows client operating systems such as Windows 10 or Windows 11. 1 - Installing, upgrading, and migrating servers and workloads Introducing Windows Server Preparing and installing Server Core Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models 2 - Configuring local storage Managing disks in Windows Server Managing volumes in Windows Server 3 - Implementing enterprise storage solutions Overview of DAS, NAS, and SANs Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet Understanding iSNS, DCB, and MPIO Configuring sharing in Windows Server 4 - Implementing Storage Spaces and Data Deduplication Implementing Storage Spaces Managing Storage Spaces Implementing Data Deduplication 5 - Installing and configuring Hyper-V and virtual machines Overview of Hyper-V Installing Hyper-V Configuring storage on Hyper-V host servers Configuring networking on Hyper-V host servers Configuring Hyper-V virtual machines Managing virtual machines 6 - Deploying and managing containers Overview of containers in Windows Server Deploying Windows Server and Hyper-V containers Installing, configuring, and managing containers by using Docker 7 - High availability and disaster recovery Defining levels of availability Planning high availability and disaster recovery solutions with Hyper-V virtual machines Backing up and restoring by using Windows Server Backup High availability with failover clustering in Windows Server 8 - Implementing failover clustering Planning a failover cluster Creating and configuring a new failover cluster Maintaining a failover cluster Troubleshooting a failover cluster Implementing site high availability with stretch clustering 9 - Implementing failover clustering with Windows Server Hyper-V Overview of the integration of Hyper-V with failover clustering Implementing Hyper-V VMs on failover clusters Key features for VMs in a clustered environment 10 - Implementing Network Load Balancing Overview of NLB Configuring an NLB cluster Planning an NLB implementation 11 - Creating and managing deployment images Introduction to deployment images Creating and managing deployment images by using MDT Virtual machine environments for different workloads 12 - Managing, monitoring, and maintaining virtual machine installations WSUS overview and deployment options Update management process with WSUS Overview of Windows PowerShell DSC Overview of Windows Server monitoring tools Using Performance Monitor Monitoring event logs
Join the Scrum.org accredited Live Virtual Class - Professional Scrum Product Owner I™ training (PSPO) to master the fundamentals of Product Ownership. Learn how to take your understanding of Scrum frameworks and apply it to maximise product value. Course Description The Professional Scrum Product Owner (PSPO) course goes beyond requirement writing and Product Backlog management. It equips Product Owners with a comprehensive understanding of product management needed to drive value from their products. The PSPO course is Scrum.org certified and delivered by our professional Scrum trainers. We combine real world industry experience with a hands-on practical approach, the result of which is a 98% first-time pass rate. Say goodbye to PowerPoint and join our interactive PSPO training course to gain key practical skillsets and learn how how to implement frameworks immediately to deliver tangibel results. Embrace a product-focused mindset over project-oriented thinking. Bridge business strategy to product execution with Scrum. Recognise the Product Owner's role as an Agile Product Manager. Master Scrum Principles and Empiricism. Understand Product Owner responsibilities within the Scrum Team. Align the team with business strategy, product vision, Product Goal, and Sprint Goal. Communicate business strategy, product vision, and Product Goal effectively. Learn techniques for Product Backlog Management, Release Management, and Forecasting. Identify valuable metrics for tracking value creation and successful product delivery. Employ techniques to engage stakeholders, customers, and Scrum Team members effectively. Why Train With Us? Develop and solidify your knowledge of the Scrum Framework and the accountabilities of being a product owner with our immersive two-day online PSPO course through instruction and team-based exercises. Led by experienced industry professionals and supportive Professional Scrum Trainers & Product Owners, we go beyond powerpoint to offer engaging, hands-on learning experiences. From debunking myths to empowering your Scrum Teams with the right practices, we'll be with you every step of the way - from learning to passing the test and implementing it seamlessly into your job context. Who Should Attend This Course? Ideal for students across industries dealing with complex problem-solving, the Professional Scrum Product Owner course targets three key groups: Aspiring Product Owners seeking to start their career in the field. Experienced Product Owners aiming to enhance their understanding and address misconceptions about Scrum and the Product Owner role. Scrum Masters desiring to become effective coaches for Product Owners, gaining valuable insights from the course. Your Professional Scrum Trainer Meet Jay, founder of Fractal Systems and a dedicated Professional Scrum Trainer. With over 20 years of experience in team and leadership roles, Jay is well-versed in delivering continuous value. His unique teaching approach involves zero PowerPoint and instead relies on engaging, experience-based sessions using techniques from Liberating Structures and Neuro Linguistic Programming. Jay's expertise lies in business transformations, offering training, mentoring, coaching, and consulting to foster success through collaborative efforts. Rapid learning and practical application are the hallmarks of his approach. Jay & the entire Fractal team are invested in your learning journey and are here to support you from start to end, including offering additional valuable support: Free practice assessments for certification success Free resource bundle to master Scrum Free exam revision sheets Free access to an exam simulator Free exam coaching sessions for first-time success Free 1:1 coaching to excel at work Our Clients Our Testimonials
SAFe® DevOps: In-House Training This course provides a comprehensive overview for understanding the DevOps skills needed to accelerate time-to-market by improving the flow of value through the Continuous Delivery Pipeline. You will map the current value stream through the delivery pipeline from idea to cash and identify practices that will eliminate bottlenecks to flow. The course will build an understanding of the complete flow of value from Continuous Exploration to Continuous Integration, Continuous Deployment, and Release on Demand. What you will Learn After attending the class, attendees should be able to: Explain how DevOps enables strategic business objectives Apply a CALMR approach to DevOps to avoid automating broken processes Understand how successful DevOps requires continuous exploration, continuous integration, continuous deployment, and the ability to release to end users on demand Incorporate continuous testing and continuous security into the delivery pipeline Use value-stream mapping to measure flow and identify bottlenecks in the end-to-end delivery process Select DevOps skills and tools strategically for the fastest, most compelling results Prioritize DevOps solutions and investments for the greatest economic benefit Design and implement a multi-phased DevOps transformation plan tailored to their organization Work with all roles and levels in the organization to continually optimize the value stream Introducing DevOps Mapping your Continuous Delivery Pipeline Gaining alignment with Continuous Exploration Building quality with Continuous Integration Reducing time-to-market with Continuous Deployment Delivering Business Value with Release on Demand Taking action
RESILIA™ Foundation: Virtual In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Duration 2 Days 12 CPD hours Overview Identify and configure basic functions of Tableau. Connect to data sources, import data into Tableau, and save Tableau files Create views and customize data in visualizations. Manage, sort, and group data. Save and share data sources and workbooks. Filter data in views. Customize visualizations with annotations, highlights, and advanced features. Create and enhance dashboards in Tableau. Create and enhance stories in Tableau As technology progresses and becomes more interwoven with our businesses and lives, more and more data is collected about business and personal activities. This era of "big data" has exploded due to the rise of cloud computing, which provides an abundance of computational power and storage, allowing organizations of all sorts to capture and store data. Leveraging that data effectively can provide timely insights and competitive advantage. The creation of data-backed visualizations is a key way data scientists, or any professional, can explore, analyze, and report insights and trends from data. Tableau© software is designed for this purpose. Tableau was built to connect to a wide range of data sources and allows users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Tableau's data connection capabilities and visualization features go far beyond those that can be found in spreadsheets, allowing users to create compelling and interactive worksheets, dashboards, and stories that bring data to life and turn data into thoughtful action. Prerequisites To ensure your success in this course, you should have experience managing data with Microsoft© Excel© or Google Sheets?. Lesson 1: Tableau Fundamentals Topic A: Overview of Tableau Topic B: Navigate and Configure Tableau Lesson 2: Connecting to and Preparing Data Topic A: Connect to Data Topic B: Build a Data Model Topic C: Save Workbook Files Topic D: Prepare Data for Analysis Lesson 3: Exploring Data Topic A: Create Views Topic B: Customize Data in Visualizations Lesson 4: Managing, Sorting, and Grouping Data Topic A: Adjust Fields Topic B: Sort Data Topic C: Group Data Lesson 5: Saving, Publishing, and Sharing Data Topic A: Save Data Sources Topic B: Publish Data Sources and Visualizations Topic C: Share Workbooks for Collaboration Lesson 6: Filtering Data Topic A: Configure Worksheet Filters Topic B: Apply Advanced Filter Options Topic C: Create Interactive Filters Lesson 7: Customizing Visualizations Topic A: Format and Annotate Views Topic B: Emphasize Data in Visualizations Topic C: Create Animated Workbooks Topic D: Best Practices for Visual Design Lesson 8: Creating Dashboards in Tableau Topic A: Create Dashboards Topic B: Enhance Dashboards with Actions Topic C: Create Mobile Dashboards Lesson 9: Creating Stories in Tableau Topic A: Create Stories Topic B: Enhance Stories with Tooltips
SAFe® DevOps: Virtual In-House Training This course provides a comprehensive overview for understanding the DevOps skills needed to accelerate time-to-market by improving the flow of value through the Continuous Delivery Pipeline. You will map the current value stream through the delivery pipeline from idea to cash and identify practices that will eliminate bottlenecks to flow. The course will build an understanding of the complete flow of value from Continuous Exploration to Continuous Integration, Continuous Deployment, and Release on Demand. What you will Learn After attending the class, attendees should be able to: Explain how DevOps enables strategic business objectives Apply a CALMR approach to DevOps to avoid automating broken processes Understand how successful DevOps requires continuous exploration, continuous integration, continuous deployment, and the ability to release to end users on demand Incorporate continuous testing and continuous security into the delivery pipeline Use value-stream mapping to measure flow and identify bottlenecks in the end-to-end delivery process Select DevOps skills and tools strategically for the fastest, most compelling results Prioritize DevOps solutions and investments for the greatest economic benefit Design and implement a multi-phased DevOps transformation plan tailored to their organization Work with all roles and levels in the organization to continually optimize the value stream Introducing DevOps Mapping your Continuous Delivery Pipeline Gaining alignment with Continuous Exploration Building quality with Continuous Integration Reducing time-to-market with Continuous Deployment Delivering Business Value with Release on Demand Taking action