Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is Enterprise Desktop Support Technicians (EDSTs). These technicians provide Tier 2 support to users with domain-joined computers running the Windows 11 OS, typically in medium to large enterprise organizations. Overview Important Windows 11 features How these features are used in an Active Directory How to troubleshoot these features This is a 5-day ILT course that is designed to provide you with the knowledge and skills required to support and troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment. 1: Introducing Windows 11 Overview of Windows 11 Recommendations for typical troubleshooting procedures Troubleshooting installation and deployment Introduction to management and troubleshooting tools 2: Administering Windows 11 remotely Using Windows Admin Center Using Windows PowerShell Implementing Remote Management 3: Troubleshooting startup and performing system recovery Recovering Windows 11 Configuring the Registry Troubleshooting Windows 11 startup Implementing and troubleshooting BitLocker Troubleshooting OS service Issues 4: Troubleshooting devices and device drivers Overview of hardware troubleshooting Troubleshooting device drivers 5: Configuring and troubleshooting network connectivity Configuring network connectivity Troubleshooting network connectivity Implementing and troubleshooting name resolution Implementing and troubleshooting remote access 6: Troubleshooting Group Policy Overview of Group Policy Resolve GPO application issues on client devices 7: Configuring and Troubleshooting Security Settings Implementing network security Implementing Windows 11 security features Configuring and troubleshooting user accounts 8: Configuring and Troubleshooting User State Implementing and troubleshooting user state Implementing and troubleshooting Folder Redirection 9: Configuring and Troubleshooting Resource Access Configuring and troubleshooting file access. Configuring and troubleshooting shared folders. Implementing and troubleshooting Work Folders. Managing and troubleshooting printers. Recovering files. 10: Troubleshooting apps Troubleshooting desktop apps Troubleshooting app compatibility Managing UWP apps 11: Monitoring and Maintaining Windows 11 Monitoring Windows 11 Optimizing Windows 11 performance Managing Windows 11 updates
Foundation • Advanced • Masterclass 8 CPD POINTS 1 DAY INTENSIVE COURSE ONLINE or IN-CLINIC NOTE! After booking we will contact you for scheduling the exact course date! Courses dates are subject to change due to mentors availability. We will inform you via email if a date becomes available! Additional information ATTENDANCE ONLINE (theory), IN-CLINIC (Practice) COURSE LEVEL BEGINNER | Foundation Course, INTERMEDIATE | Advanced Course, EXPERT | Masterclass Course, ALL LEVELS 10% OFF
Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls
Duration 5 Days 30 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: Install and configure ESXi hosts Deploy and configure vCenter Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users Create virtual networks using vSphere standard switches and distributed switches Create and configure datastores using storage technologies supported by vSphere Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create content libraries for managing templates and deploying virtual machines Manage virtual machine resource allocation Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion Create and configure a vSphere cluster that is enabled with vSphere High Availability (HA) and vSphere Distributed Resource Scheduler Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to date This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center. Course Introduction Introductions and course logistics Course objectives vSphere and Virtualization Overview Explain basic virtualization concepts Describe how vSphere fits in the software-defined data center and the cloud infrastructure Recognize the user interfaces for accessing vSphere Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs Installing and Configuring ESXi Install an ESXi host Recognize ESXi user account best practices Configure the ESXi host settings using the DCUI and VMware Host Client Deploying and Configuring vCenter Recognize ESXi hosts communication with vCenter Deploy vCenter Server Appliance Configure vCenter settings Use the vSphere Client to add and manage license keys Create and organize vCenter inventory objects Recognize the rules for applying vCenter permissions View vCenter logs and events Configuring vSphere Networking Configure and view standard switch configurations Configure and view distributed switch configurations Recognize the difference between standard switches and distributed switches Explain how to set networking policies on standard and distributed switches Configuring vSphere Storage Recognize vSphere storage technologies Identify types of vSphere datastores Describe Fibre Channel components and addressing Describe iSCSI components and addressing Configure iSCSI storage on ESXi Create and manage VMFS datastores Configure and manage NFS datastores Deploying Virtual Machines Create and provision VMs Explain the importance of VMware Tools Identify the files that make up a VM Recognize the components of a VM Navigate the vSphere Client and examine VM settings and options Modify VMs by dynamically increasing resources Create VM templates and deploy VMs from them Clone VMs Create customization specifications for guest operating systems Create local, published, and subscribed content libraries Deploy VMs from content libraries Manage multiple versions of VM templates in content libraries Managing Virtual Machines Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances Migrate VMs using vSphere vMotion Describe the role of Enhanced vMotion Compatibility in migrations Migrate VMs using vSphere Storage vMotion Take a snapshot of a VM Manage, consolidate, and delete snapshots Describe CPU and memory concepts in relation to a virtualized environment Describe how VMs compete for resources Define CPU and memory shares, reservations, and limits Deploying and Configuring vSphere Clusters Create a vSphere cluster enabled for vSphere DRS and vSphere HA View information about a vSphere cluster Explain how vSphere DRS determines VM placement on hosts in the cluster Recognize use cases for vSphere DRS settings Monitor a vSphere DRS cluster Describe how vSphere HA responds to various types of failures Identify options for configuring network redundancy in a vSphere HA cluster Recognize vSphere HA design considerations Recognize the use cases for various vSphere HA settings Configure a vSphere HA cluster Recognize when to use vSphere Fault Tolerance Managing the vSphere Lifecycle Enable vSphere Lifecycle Manager in a vSphere cluster Describe features of the vCenter Update Planner Run vCenter upgrade prechecks and interoperability reports Recognize features of vSphere Lifecycle Manager Distinguish between managing hosts using baselines and managing hosts using images Describe how to update hosts using baselines Describe ESXi images Validate ESXi host compliance against a cluster image and update ESXi hosts Update ESXi hosts using vSphere Lifecycle Manager Describe vSphere Lifecycle Manager automatic recommendations Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware
Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-002, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management. Overview After completing this course, you will be able to plan, conduct, analyze, and report on penetration tests, including the ability to: Plan and scope penetration tests. Conduct passive reconnaissance. Perform non-technical tests to gather information. Conductive active reconnaissance. Analyze vulnerabilities. Penetrate networks. Exploit host-based vulnerabilities. Test applications. Complete post-exploit tasks. Analyze and report pen test results. Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. 1 - Outline Lesson 1: Scoping Organization/Customer Requirements Lesson 2: Defining the Rules of Engagement Lesson 3: Footprinting and Gathering Intelligence Lesson 4: Evaluating Human and Physical Vulnerabilities Lesson 5: Preparing the Vulnerability Scan Lesson 6: Scanning Logical Vulnerabilities Lesson 7: Analyzing Scanning Results Lesson 8: Avoiding Detection and Covering Tracks Lesson 9: Exploiting the LAN and Cloud Lesson 10: Testing Wireless Networks Lesson 11: Targeting Mobile Devices Lesson 12: Attacking Specialized Systems Lesson 13: Web Application-Based Attacks Lesson 14: Performing System Hacking Lesson 15: Scripting and Software Development Lesson 16: Leveraging the Attack: Pivot and Penetrate Lesson 17: Communicating During the PenTesting Process Lesson 18: Summarizing Report Components Lesson 19: Recommending Remediation Lesson 20: Performing Post-Report Delivery Activities Additional course details: Nexus Humans CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The NCSP® Foundation accredited (APMG International), certified (NCSC/GCHQ-UK) and recognized (DHS-CISA-USA) certification course introduces business, technology, auditing, and management professionals to the fundamentals of digital business, its risks, and the NIST Cybersecurity Framework's role in helping organizations manage and mitigate digital risk. This course also introduces candidates to an Affordable, Pragmatic, and Scalable Digital Value Management System (DVMS) Create, Protect, and Deliver (CPD) model designed to enable any size organization to quickly adopt and adapt the frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory) and cyber threat landscape changes. The DVMS enables enterprises to become adaptive, cyber-resilient organizations capable of creating, protecting, and delivering trusted digital business value to their stakeholders.
Agile is not what you do, Agile is what you become! An introduction to the essentials of Agile Scrum as a delivery method. The same learning objectives as used in central government & public sector digital delivery projects. Agile is not what you do, Agile is what you become! Since 2012, all government departments have been required to use the Agile approach to project management, to build and run new digital services. As you begin your Agile journey, one of your first challenges will be understanding the rules and roles that support Agile delivery, some of the most frequently asked questions are "Which Agile framework is applicable to our business operating model?" or, "Is the Project Manager role equivalent to that of theProduct Owner?" and, "What does a Scrum Master do?" A strong corporate culture not accustomed to the Agile mindset can also be a difficult environment in which to implement Agile methods. In some cases, the company’s culture and practices may reward non-Agile milestones while inadvertently discouraging Agile success. This intensive two-day training course combines PowerPoint presentations, informal discussions and practical exercises to introduce you to Agile Scrum as a Delivery Method, without the impending pressure of having to pass a formal certification examination. Previous experience of Agile delivery is not a pre-requisite to attending this course, although it is assumed delegates have previously attended the Primer course, or have some understanding of Agile Scrum terms and practices. This course, designed by Agile Scrum practitioners and coaches with specialist experience of working on GDS (Government Digital Service) Service Standards compliant government and public sector projects has been accredited by The CPD Certification Service and is now available outside its usual central government and public sector digital delivery setting. Who this course is for Service and Programme Managers If you are a Service Manager or Programm Manager who wants to explore the benefits of transitioning to Agile ways of working and want to understand how your existing business processes and resource landscape will fit into an Agile delivery model, then this course aims to provide you with enough information to enable you to make an informed decision. Career ambitions If you are new to Agile and your intention is to pursue a career either as an Agile Scrum Master or Agile Product Owner, you will hopefully be provided with enough knowledge to enable you to determine which role best suits your Agile career ambitions. Frequently Asked Questions How this course differs from other Agile courses Delegates will learn the 'How', not just the 'What'! This course has been designed by highly experienced Agile practitioners and coaches with specialist real-life experience of working on GDS (Government Digital Service) Service Design Standard projects. Delegates will find that the learning objectives are significantly more detailed than with other Agile courses which only focus on teaching the learning objectives of The Scrum Guide. Delegates must take the certification assessment. No! During enrolment, delegates can opt out of taking the C-ASDM certification assessment. The online Agile Scrum as a Delivery Method – Essentials course quiz is optional Absolutely! Delegates are provided access to the online Agile knowledge quiz which accompanies the Agile Scrum as a Delivery Method – Essentials course. The quiz helps delegates gauge their level of attainment but is entirely optional. Delegates can take the certification assessment without enrolling on the course. Yes! Delegates with existing Agile project delivery experience can choose to take the certification assessment without enrolling on the course. I will receive my certificate as soon as I have completed the course You will initially receive an Assessment Completion report after completing the assessment. The report details the certification status: 'Pass' or 'Fail', and includes information on which questions were answered incorrectly. Your certificate is issued by the CPD Certification Service approximately four-to six-weeks after successfully completing and passing the C-ASDM Certification Assessment. A CPD certification is recognised by employers Yes! CPD certification is recognised by private and public sector employers, and in central government departments as a valuable way to evaluate the skills of an individual, and the quality of the learning activities. Listing your CPD certification as well as the number of CPD Points you have achieved on your CV is essentially showcasing your achievements in continuing your professional development. One CPD Point is equivalent to an hour of training CPD points are units that quantify time, and the quality of learning and development activities. Delegates will earn 3 CPD Points upon successful completion of the C-ASDM Certification Assessment or 13 CPD Points after completing the two-day course. My CPD certificate will expire after three years Your certificate will not expire however, best practice suggests a renewal after three years. You can do this by enrolling on the C-ASDM course to ensure your knowledge of Agile as a Delivery Method is up to date. Service features Two-day Agile Scrum training course The course uses eCommerce and other Business Case examples for context Optional online CPD certification assessment Optional Agile knowledge quiz to help delegates gauge level of attainment Online Retrospective feedback to enable continuous course improvements. Service benefits Delegates will understand the concepts and benefits of Agile Scrum development Scrum team roles and role accountabilities INVEST-compliant User Stories and BDD formatted Acceptance Criteria Agile approach to incremental project delivery Agile artefacts and Agile reports (burn-down & burn-up charts) Agile Events & Scrum rules Comparison: Agile methodologies (Lean, XP, SAFe & Scrum) Use of Kanban for workflow management Government Digital Service (GDS) Service Standards and Service Assessment Be able to communicate the ideals of Agile to stakeholders Service Agenda General knowledge Agile Delivery 101 Scrum process and sprints Applicability of Scrum Agile Manifesto Scrum roles and accountabilities Overview of Scrum roles (Core & Ancillary) Scrum Master role and role responsibilities Scrum Product Owner role and role responsibilities Scrum team Scrum events Sprint Planning Daily Scrums Sprint Reviews Sprint Retrospectives Scrum artefacts Product Backlog Sprint Backlog Increments Scrum Reports Burn-down and Burn-up Charts Scaling Scrum Working with multiple Scrum teams Working with distributed Scrum teams GDS (Government Digital Service) Service Standards Service Assessments Risks and challenges Risks and challenges of transitioning to Agile delivery Frequently asked questions Discussion on frequently asked Agile questions Agile knowledge quiz Examples of the multiple-choice questions in the optional online quiz On-going support Email support No Telephone support No Webchat support No Online support No Community Support Yes! Delegates are offered access to our private online 'Community of Agile Scrum Practitioners'. Delegates who achieve the pass mark for CPD certification are additionally offered access to our private 'Certified Scrum Practitioners’ Guild', a private Slack community of like-minded Agile professionals.
Duration 5 Days 30 CPD hours This course is intended for Microsoft Dynamics 365 Finance and Operations Apps Developers Overview By the end of this course, you will learn to develop fully realized solutions by using standardized application coding patterns. In this course, you will learn the tasks needed to fulfill the role of developer in Dynamics 365 Finance and Operations Apps. The Dynamics 365 for Finance and Operations (FO) developer is a key technical resource that implements and extends the application to meet the requirements of the business. Module 1: Overview & Architecturen Explore the ecosystem and main components Explore the technical architecture Explore design and deployment considerations Module 2: Developer Tools Manage implementations by using Lifecycle Services Manage source code by using version control Customize by using Visual Studio Module 3: Solution Design Implement application lifecycle management Module 4: AOT Elements Build extended data types and enumerations Build tables Build forms and optimize form performance Create classes Create other user interface elements Module 5: Code Development & Testing Explore the test framework and use tools Get started with development using X++ Develop object-oriented code Use RSAT tool Module 6: Data Migration Prepare data for migration Module 7: Frameworks Introduction Explore extensions and the extension framework Extend elements SysOperationSandbox framework Summary Module 8: Integration Identify data integration patterns and scenarios Implement data integration concepts and solutions Implement the data management package API Data integrations Integrate with Microsoft Azure Connecting to Power Platform services Consume business events Integrate Finance and Operations apps with Microsoft Dataverse Module 9: Reporting Explore the reporting tools Build reports Build workspaces Manage data sources with external data stores Module 10: Security & Performance Work with performance and monitoring tools Implement role-based security Apply basic performance optimization techniques Additional course details: Nexus Humans MB-500T00 Dynamics 365 - Finance and Operations Apps Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-500T00 Dynamics 365 - Finance and Operations Apps Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for IT Professionals who expect to or who have recently transitioned into a management role will benefit from this course. Overview Make a smooth transition into management Develop your authentic leadership style Engage and empower staff to achieve excellence Build high-performing, collaborative teams Apply delegation best practices Attract and retain great staff From developing an inspiring vision and empowering members to reach it, to meeting deadlines, and evaluating results. This course will teach students the skills and behaviors needed to successfully transition into an IT manager role. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Making the Transition into Leadership Defining Success Developing Leadership Competencies Acting as Leader, Liaison, Figurehead. Monitor, Disseminator, and Spokesperson Allocating Resources Acting Entrepreneurially Negotiating and Handling Disturbances 2. Building Trust, Engagement and Involvement Applying SCARF Leading by Example with the 5 Components of Emotional Intelligence - Self-Awareness, Self-Regulation, Motivation, Empathy, and Social Skill Engaging, Involving, and Motivating Others The 4 Disciplines of Motivation - Behavioral, Cognitive, Psychodynamic, and Humanistic Working with Differing Personality Styles Developing Your Leadership Psychological Toolkit Discovering and Meeting Stakeholder Expectations 3. Collaboration & Teams Creating, Facilitating, and Maintaining Teams Building a Team through Culture, Human to Human Relationships, Effective Communication, and Setting and Meeting Goals & Objectives Modern, Autonomous, Self-Organizing, and Cross-Functional Teams 4. Building People with Challenging Work Willingness to Delegate Delegating Successfully - Preparing and Researching, Clarifying the Intent of the Task, Planning Your Delegation, Delegating Responsibility and Empowering Your Staff to Take Action, and Providing Ongoing Support and Oversight 5. Attracting and Keeping Great People Managing Performance Knowing Your Staff Checking Assumptions Engaging Your Team Leading and Coaching for Success Managing Disruption