Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
With over 140 clients, from FTSE 100 companies to small SMEs, from publishing to transport services, from central Government to Parish Council, we are well placed to provide GDPR consultancy services to all businesses, local authorities and charities.
The IT System Support Technician (Online Virtual Classroom) Course will equip candidates with the skills and knowledge to competently carry out routine customer support to a range of Computer users, communicate effectively with support managers, supporting colleagues and external clients.
A day of Data Governance, support, networking, and answering your questions. Join me for my 1 Day Data Governance Mastermind where you get allocated time to get specific advice on your current Data Governance challenges and get the chance to network with others in similar situations.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for anybody interested in learning what is Azure Services, considering a job or career in Azure Services, or considering obtaining a Microsoft certification in Azure Services Overview Upon successful completion of this course, students will be aware of the key topics and concepts taught in the full two-day AZ-900T00 Microsoft Azure Fundamentals Course. This course is a robust introduction to key topics and concepts in the full two-day AZ-900T00: Microsoft Azure Fundamentals course.ÿ The 2-day AZ-900T00 course includes hands-on labs and is the core foundation class that many other Azure courses build off. Core Azure Concepts Introduction to Azure fundamentals Azure fundamental concepts Core Azure architectural components Overview of Core Azure Services Azure database and analytics services Azure compute services Azure Storage services Azure networking services Overview of Core Solutions and Management Tools on Azure Artificial Intelligence Monitoring service for visibility, insight, and outage mitigation Introduction to tools used to manage and configure your Azure environment Azure IoT service for your application Overview of General Security and Network Security Features Protect against security threats on Azure Secure network connectivity on Azure Overview of Identity, Governance, Privacy, and Compliance Features Examine privacy, compliance, and data protection standards on Azure Overview of Azure Cost Management and Service Level Agreements Manage your Azure costs Azure services, SLAs, and service lifecycle
Duration 2 Days 12 CPD hours This course is intended for Operators and application owners who are responsible for deploying and managing policies for multiple Kubernetes clusters across on-premises and public cloud environments. Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create access, image registry, network, security, quota, and custom policies Connect your on-premises vSphere with Tanzu Supervisor cluster to VMware Tanzu Mission Control Create, manage, and backup Tanzu Kubernetes clusters Perform cluster inspections Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply access, image registry, network, security, quota, and custom policies to Kubernetes environments. For cluster provisioning and management, the course focuses on deploying, upgrading, backing up and monitoring Kubernetes clusters on VMware vSphere© with Tanzu. Given the abstractions of VMware Tanzu Mission Control, the learnings should be transferrable to public cloud. Introducing VMware Tanzu Mission Control VMware Tanzu Mission Control Accessing VMware Tanzu Mission Control VMware Cloud? services access control VMware Tanzu Mission Control architecture Cluster Management Attached clusters Management clusters Provisioned clusters Cluster inspections Data protection VMware Tanzu© Observability? by Wavefront VMware Tanzu© Service Mesh? Policy Management Policy management Access policies Image registry policies Network policies Security policies Quota policies Custom policies Policy insights
Computer Science GCSE Syllabus The GCSE Computer Science Tutor Syllabus is designed to provide tutors in England with a comprehensive framework for teaching the GCSE Computer Science curriculum effectively. This syllabus aims to equip tutors with the necessary knowledge and skills to support students in their understanding and application of core computer science concepts. Module 1: Introduction to Computer Science - Overview of computer science and its relevance in today's world - Understanding the components of a computer system - Introduction to algorithms and problem-solving techniques - Exploration of programming languages and their uses Module 2: Computer Hardware - Understanding the main components of a computer system, including CPU, memory, and storage devices - Exploring input and output devices and their functionalities - Understanding the role of operating systems and software in computer systems Module 3: Software Development - Introduction to programming concepts and languages (e.g., Python or Java) - Understanding variables, data types, and operators - Building algorithms and logical reasoning skills - Introduction to flowcharts and pseudocode - Implementation of simple programs and debugging techniques Module 4: Data Representation - Understanding binary, hexadecimal, and denary number systems - Representation of text, images, and sound using binary - Introduction to data compression and encryption techniques Module 5: Computer Networks - Understanding the basics of computer networks, including LAN, WAN, and the Internet - Introduction to network topologies, protocols, and security - Exploring the impact of digital communication on society Module 6: Cybersecurity and Ethical Issues - Understanding the importance of cybersecurity and data protection - Introduction to common threats and vulnerabilities - Exploring ethical issues related to computer science, such as privacy and intellectual property rights Module 7: Algorithms and Programming Techniques - Advanced programming concepts, including conditionals, loops, and functions - Introduction to sorting and searching algorithms - Exploring data structures, such as arrays and lists Module 8: System Architecture - Understanding the structure and function of a CPU - Introduction to memory hierarchy and cache - Exploring the Von Neumann architecture and its limitations Module 9: Computational Thinking and Problem Solving - Advanced problem-solving techniques using computational thinking - Introduction to algorithms for complex problems - Exploring algorithmic efficiency and optimization techniques Module 10: Exam Preparation and Revision - Reviewing key concepts covered throughout the syllabus - Practicing past exam questions and providing guidance on exam techniques - Supporting students with exam preparation strategies Please note that the duration and depth of each module can vary depending on the level of expertise required and the specific needs of the learners. Additionally, it's important to adapt the curriculum to the learners' proficiency levels, whether they are A Level/GCSE students or adult learners with different experience levels.
Duration 4 Days 24 CPD hours This course is intended for Primary audience: IT administrators, architects, and business leaders who already manage Nutanix clusters in the datacenter, but who would like more in-depth knowledge of Nutanix datacenter administration. Anyone seeking preparation for the Nutanix Platform Professional (NPP) Advanced certification (in development).Secondary audience: Managers and technical staff seeking more detailed information before making a purchase decision. Overview Protect intellectual property and company data to guarantee business continuity with a complete, advanced data protection strategy.Practice advanced datacenter management procedures using hands on labs.Get the most out of Nutanix systems by maximizing configuration and operation for peak efficiency.Validate new skills by preparing for and completing the Nutanix Platform Professional Advanced certification. The Nutanix AAPM Advanced Administration & Performance Management course is an advanced level training program for experienced Nutanix data center administrators, technicians, and support personnel.The course features comprehensive coverage of performance management for Nutanix clusters, including options for performance optimization, troubleshooting issues and tuning. Learn through hands-on labs to monitor system performance, advanced networking and storage to help optimize data center administration.Advanced Administration explains in detail how to use the major Acropolis services such as Acropolis Block Services (ABS) and Acropolis File Services (AFS). The course also explains how to define and manage assets and applications using Calm, including how to connect to clouds, automation of the Life Cycle Management (LCM) application, and how to implement and configure Self Service Portal and governance.Take advantage of Flash mode to improve system performance as well as how to effectively clone and delete VMs, move them between storage containers, and how to manage VMs (tagging, sizing, migration). Performance ManagementManaging Controller VM ServicesAdvanced Virtual Machine AdministrationImplementing Business Continuity/Disaster RecoveryConfiguring Advanced NetworkingCustomizing Security ServicesManaging Acropolis ServicesPrism Central Management
Duration 1 Days 6 CPD hours This course is intended for This course is intended for those persons who will implement, manage and direct mobile asset Initiatives for their organizations. Overview The CMAM course prepares students to implement a foundation of best practice policies and processes whereby mobile assets are controlled. This should lead to savings opportunities, risk mitigation surrounding BYOD and financial responsibility. Students will be able to incorporate mobile asset management and BYOD into their environment, policies and procedures to mitigate risk, increase productivity of employees, and bring value from the mobile asset management program. The IAITAM Certified Mobile Asset Manager (CMAM) course prepares individuals and organizations responsible for the management of mobile devices. Proliferation of mobile devices within the enterprise, whether corporate-owned or BYOD-based, has brought a complexity to ITAM never before seen in IT environments. The course will prepare individuals with the knowledge to manage personnel, policies and processes, the key elements in organizational IT management. This course encompasses both organizational owned assets as well as BYOD (employee-owned). The CMAM course has the IAITAM Best Practice Library as its foundation and encompasses financial viability, risk mitigation, policy enforcement and lifecycle management of mobile assets. Course Outline Mobile Asset Management and ITAM People & Mobile Assets Bring Your Own Device (BYOD) Tools Repository Management Assessment The 12 KPAs and Mobile Asset Management Program Management & Mobility Policy Management & Mobility Communication & Education Management & Mobility Education & Mobility Acquisition Management & Mobility Asset Identification Management & Mobility Legislation & Compliance Management & Mobility Software & Application Licensing Disposal Management & Mobility Documentation Management & Mobility Financial Management & Mobility Vendor Management & Mobility Data Protection
Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction Restoring from Backup Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time Using Secure Restore to prevent the restoration of malware Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios Backup Copy Jobs Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery Utilizing tape jobs, how to create and modify Replication Identify and describe the options available for replication, the use cases and impacts of using Create, modify and delete replication jobs, outline considerations to ensure success Failover Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios Advanced Repository Capabilities Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Ensure scalability by integrating off-site S3 storage Ensure compatibility with existing deduplication appliances Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production Veeam Backup Enterprise Manager Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. Create user and group roles, delegate workloads whilst maintaining data control Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords Veeam ONE Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business Support Locate, migrate or restore backup configuration Identify and locate appropriate support resources Troubleshooting methodology to identify, isolate and remediate support issues Additional course details: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.