• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

415 Courses in Cardiff delivered Live Online

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered OnlineFlexible Dates
£2,380

Legionella Responsible Person Course Online

By Airborne Environmental Consultants Ltd

Legionella Responsible Person Online is suitable for any persons wanting to gain an understanding of Legionella and how to prevent or control the risk of exposure to Legionella bacteria.

Legionella Responsible Person Course Online
Delivered in Manchester + 1 more or OnlineFlexible Dates
£150

M.D.D SAVE MY MARRIAGE PACKAGE (COUPLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

7 sessions 2 separately 5 sessions with coach Marriage counselling Resolve arguments and problems Strengthen marriage One growth arena per session Emotional intelligence training Love, respect, communication training Trust and loyalty strengthening Couples improvement programme MDD Modern EFT techniques Prevent a breakup Enhance love and satisfaction in your relationship 1 hour x 5 https://relationshipsmdd.com/product/save-my-marriage-package/

M.D.D SAVE MY MARRIAGE PACKAGE (COUPLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£850

Leading People through Change: In-House Training

By IIL Europe Ltd

Leading People through Change: In-House Training Research shows that 70% of change initiatives fail in large organizations. The largest factor contributing to this failure rate is leadership - the inability to plan and lead people through change. In many change situations, tremendous focus is put on strategy, processes, and systems, while the issue of changing people's behavior is assumed it will 'just happen'. In this interactive course, you will learn why the people side of change is crucial. We will begin by understanding why and how people resist change, and how important it is to become strong and effective change champions. Next, we will focus on critical change management practices - creating our vision of the future state, planning for acceptance in our change audience and stakeholders, mitigating threats, and capitalizing on opportunities. We will use metrics to plan, show progress, and confirm success. Lastly, we will focus on the need to reinforce and sustain change, and to prevent relapse to old ways and methods. What you will Learn At the end of this program, you will be able to: Realize the nature of change and describe how resistance manifests in people Compare prevalent change models and categorize their similarities Identify and rate the skills, traits, and behaviors of effective change champions Envision the future state and assess stakeholders Plan for change communication, training, and risks Evaluate change effectiveness using feedback and metrics Develop reinforcement practices for benefits and communication Foundation Concepts What is Change? Resistance to Change Common Change Management Theories Becoming a Change Champion Plan Envisioning the future state Planning for people Change management plan Do Change communication Training Piloting Risks Study Feedback Metrics Variance analysis Act Benefits realization Change sustainment Reinforcement messaging and communications

Leading People through Change: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,295

ICA International Diploma in Governance, Risk and Compliance

By International Compliance Association

ICA International Diploma in Governance, Risk and Compliance New technologies are changing the role of a compliance professional. Fintech and Regtech are now embedded in compliance lexicon, but what do the terms mean, and what are the practical impacts, both positive and negative, that we need to understand and manage? The ICA International Diploma in Governance, Risk and Compliance helps you to answer these questions and apply the answers directly within your organisation. Gain a broad understanding of the regulatory environment as well as the specialist skills and knowledge to be able to identify and manage key regulatory risks today and in the future. Get to grips with the nuances of the regulatory environment and the impact to your organisation. Understand why promoting a positive compliance culture is not just good for compliance but good for business. Explore how to maximise the benefits of emerging technologies. Develop your inter-personal skills so you can be the best Compliance Manager. Learn from the experiences of compliance professionals from other firms and sectors and share ideas. This governance, risk and compliance course is awarded in association with Alliance Manchester Business School, the University of Manchester. Benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Completion of this training course will provide participants with the following professional qualification: ICA Diploma in Governance, Risk and Compliance. In addition, participants will be entitled to use the following designation 'Dip (Comp).' These qualifications are awarded in association with Alliance Manchester Business School, the University of Manchester. What will you learn? Understanding governance, risk and regulatory compliance Why we need to understand the regulated environment Why are governance and culture essential for effective regulatory compliance risk management? The role of the compliance department and the compliance professional Risk management as the key to effective compliance Case Studies

ICA International Diploma in Governance, Risk and Compliance
Delivered OnlineFlexible Dates
£3,900

Legionella Awareness Course

By Airborne Environmental Consultants Ltd

Legionella awareness is suitable for any persons wanting to gain an understanding of Legionella and how to prevent or control the risk of exposure to Legionella bacteria. The main subject areas of the course are: What Legionella is Obligations under current Health & Safety legislation and ACoP L8 System hygiene Assessing and managing risk Outbreaks Hot and cold water systems Risks in other types of water systems Multiple choice test (if required).

Legionella Awareness Course
Delivered in Manchester + 1 more or OnlineFlexible Dates
£70

Electrical Generators, Excitation Systems and Governing Systems

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This 5 full-day course provides a comprehensive understanding of the various types of generators, exciters, automatic voltage regulators (AVRs), governing systems, and protective systems. The focus will be on maximizing the efficiency, reliability and longevity of these equipment by providing an understanding of the characteristics, selection criteria, common problems and repair techniques, preventive and predictive maintenance. The emphasis of this course is on protective systems, inspection methods, diagnostic testing, troubleshooting, modern maintenance techniques, refurbishment, rewind and upgrade options, as well as advanced methods for preventing partial discharge and other failures. Training Objectives Equipment Operation: Gain a thorough understanding of the operating characteristics of generators, exciters, AVR's and protective systems Equipment Diagnostics and Inspection: Learn in detail all the diagnostic techniques and inspections required of critical components of generators, exciters, AVR's and protective systems Equipment Testing: Understand thoroughly all the tests required for the various types of generators, exciters, AVR's and protective systems Electrical Generator Protective Systems: Gain a thorough understanding of all Electrical generator protective systems including: all electrical relays, tripping mechanisms, protective systems for negative phase sequence (unbalance loading), loss of excitation, over fluxing protection (over-voltage and underfrequency), reverse power (generator monitoring), over-speeding, pole slipping / out of step (sudden increase in torque or weakness in excitation), Class A protection, Class B protection Equipment Maintenance and Troubleshooting: Determine all the maintenance and troubleshooting activities required to minimize the downtime and operating cost of generators, exciters, AVR's and protective systems Equipment Repair and Refurbishment: Gain a detailed understanding of the various methods used to repair and refurbish generators, exciters, AVR's and protective systems Equipment Rewind and Upgrade Options: Discover all options available to rewind and upgrade the generator rotor and stator to enhance the output and reduce downtime Efficiency, Reliability, and Longevity: Learn the various methods used to maximize the efficiency, reliability, and longevity of generators, exciters, AVR's and protective systems Advanced Methods to Prevent Failure: Gain a thorough understanding of all the methods used to prevent partial discharge, and other failures in generators, exciters, AVR's and protective systems Equipment Sizing: Gain a detailed understanding of all the calculations and sizing techniques used for generators, exciters, AVR's and protective systems Design Features: Understand all the design features that improve the efficiency, reliability of generators, exciters, AVR's and protective systems Equipment Selection: Learn how to select generators, exciters, AVR's and protective systems by using the performance characteristics and selection criteria that you will learn in this course Equipment Enclosures and Sealing Methods: Learn about the various types of enclosures and sealing arrangements used for generators, exciters, AVR's and protective systems Equipment Commissioning: Understand all the commissioning requirements for generators, exciters, AVR's and protective systems Equipment Codes and Standards: Learn all the codes and standards applicable for generators, exciters, AVR's and protective systems Equipment Causes and Modes of Failures: Understand causes and modes of failures of generators, exciters, AVR's and protective systems System Design: Learn all the requirements for designing different types of generators, exciters, AVR's and protective systems Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: ELECTRICAL EQUIPMENT HANDBOOK' published by McGraw-Hill in 2003 (600 pages) Generator Inspection, Testing, Maintenance, Protective Systems and Refurbishment Manual (this manual covers all the inspection and maintenance activities as well as all protective systems required for generators - 400 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Electrical Generators, Excitation Systems and Governing Systems
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

ICA Advanced Certificate in Business Compliance

By International Compliance Association

ICA Advanced Certificate in Business Compliance The ICA Advanced Certificate in Business Compliance has been specifically designed for those working outside financial services. The need for guidance and training in meeting regulatory requirements extends to many industry sectors including oil and gas, aerospace, pharmaceuticals, telecoms, and manufacturing. This course will enable practitioners working in areas such as these to gain knowledge of the essentials of compliance in a practical business context as well as understand the roles of both the compliance function and compliance professionals. The Advanced Certificate will develop the compliance/risk management knowledge and skills of individuals and thereby help to enhance the overall reputation and performance of their firms. Benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Upon successful completion of this course, students will be awarded the ICA Advanced Certificate in Business Compliance and will be able to use the designation - Adv.Cert(Bus.Comp). This qualification is awarded in association with Alliance Manchester Business School, the University of Manchester. What will you learn? The context of compliance and its origins Building an effective control framework The skills needed to be an effective compliance professional Risk management, alert systems and investigations Managing financial crime risk Creating competitive advantage How will you be assessed? Assessed by a one-hour, question-based exam and one research-based assignment

ICA Advanced Certificate in Business Compliance
Delivered OnlineFlexible Dates
£1,950

WORKPLACE PROFESSIONALISM (HARASSMENT LEARNING PROGRAM)

5.0(4)

By Improving Communications Uk

ONLINE CLASS: FOCUSES ON HARASSMENT IN THE WORKPLACE AND HOW TO ADDRESS THE PROBLEM. Harassment doesn’t have to be of a sexual nature – it can include offensive remarks about a person’s gender. For example, anyone could be guilty of harassing another if offensive comments are made about certain group in general. Simple teasing or offhand comments might not be illegal, but harassment is illegal when it creates a hostile or offensive work environment. This workshop teaches how to recognize, understand, and respond to harassment so that you can help to maintain a happy work environment, free from hostility and discomfort. Topics: Harassment Laws: The definition of sexual harassment and quid pro quo. Types of Harassment: Verbal, Non-Verbal, Physical, Psychological (teasing and offhand comments). Creating a happy work environment free from hostility and discomfort. Reporting: What to do when employees witness or experience harassment. Responding: How managers can identify and respond to prohibited conduct. Attendees will be able to: Identify the signs of Harassment and take steps to prevent it, Follow a legal and ethical protocol in responding and reporting it when it is perceived to occur, Involve the correct individuals in being made aware of the occurrence, and Respond appropriately to the situation after it occurs. This workshop is offered in two versions – management-only and staff-only.   Online Format—Workplace Professionalism is a 4-hour interactive virtual class. Register for this class and you will be sent ONLINE login instructions prior to the class date. It was an extreme pleasure to have you as part of the Communication Enhancement Training Program. Your presentation was excellent and well received by the staff. Courtney C. Crouch, Jr., PresidentSelected Funeral and Life Insurance Company

WORKPLACE PROFESSIONALISM (HARASSMENT LEARNING PROGRAM)
Delivered Online + more
£158

Symantec Data Loss Prevention 14.0 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Data Loss Prevention 14.0 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry