The ISO 9001 Lead Auditor training enables you to develop the necessary expertise to perform a Quality Management System (QMS) audit by applying widely recognized audit principles, procedures and techniques. About This Course During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and the certification process according to ISO/IEC 17021-1. Based on practical exercises, you will be able to master the audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution. After acquiring the necessary expertise to perform this audit, you can sit for the exam and gain "Certified ISO 9001 Lead Auditor' credential. By holding this Certificate,, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices. Learning objectives Understand the operations of a Quality Management System (QMS) based on ISO 9001 Acknowledge the correlation between ISO 9001 and other standards and regulatory frameworks Understand the auditor's role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011 Learn how to lead an audit and audit team Learn how to interpret the requirements of ISO 9001 in the context of a QMS audit Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011 Educational approach This training is based on both theory and best practices used in QMS audits Lecture sessions are illustrated with practical questions and examples Practical exercises include examples and case study discussions Practice tests are similar to the Certification Exam Prerequisites A fundamental understanding of ISO 9001 and comprehensive knowledge of audit principles. What's Included? Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Guides The Exam Who Should Attend? Auditors seeking to perform and lead Quality Management System (QMS) certification audits Managers or consultants seeking to master a Quality Management System audit process Individuals responsible for maintaining conformance with QMS requirements Technical experts seeking to prepare for a Quality Management System audit Expert advisors in Quality Management Accreditation Our Guarantee We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Provided by This course is Accredited by NACS and Administered by theIECB
Better relationships intensive training programme One on one dating coaching Better relationships programme and Relationship assessment overview 5 Day Holiday in mystery 5 star location (Clear mind and relaxation) 2 day therapy in 5 star Luxury London hotel Luxury spa retreat and treatment by celebrity facialist World famous celebrity dentist teeth whitening treatment Free M.D.D Membership for 1 year Assess your love life and enjoy a vacation and bespoke luxury package created by your M.D.D date coach to tailor to your specific needs and problem areas enjoy a first-class experience and let the M.D.D help you embrace a new and bright future and assist you with a beautiful transition to the love life you desire and a happier, confident, enriched mind.Let all your strengths and abilities be harnessed to propel you to great success with this intensive package Price on application https://relationshipsmdd.com/product/m-d-d-premier-vip-coaching-package/
These qualifications are designed for Directors and Senior Managers who have the authority across organisational and personal inspiration to translate organisational strategy into effective performance. The qualifications require directors and senior managers to build on their skills in strategic direction and leadership and to focus on the requirements of inter-organisational strategy. Equivalent to a Doctorate in Management, this Level 8 Strategic Direction and Leadership course is designed for Directors and Senior Managers with responsibility for developing and implementing ethical and performance-driven strategy across multiple organisations, leading by example to inspire teams and provide clear direction. CMI qualifications at RQF Level 8 portray practice skills and competencies that are rated in academic terms as being comparable to Doctoral Degrees and Vocational Qualifications at Level 8. Study method Online, self-paced Duration 9 months Access to content Access until course completion Qualification CMI Level 8 Diploma In Strategic Direction and Leadership CPD 670 CPD hours / points Additional info Exam(s) / assessment(s) is included in price Tutor is available to students How Will I Benefit? The CMI Level 8 Strategic Direction and Leadership will develop the advanced skills and knowledge that you need to lead transformational strategic change within your organisation(s), accelerating performance in multiple settings Apply the tools, models and theories directly to real-life work-based problems and see the benefits in your organisation This CMI distance learning course will demonstrate to current and prospective employers your capabilities, ambition and commitment to professional development Achieve the highest level of strategic learning, significantly improving your career prospects and earning power CMI Level 8 Diploma in Strategic Direction and Leadership Learners need to complete all Group A units and any combination of units to a minimum of 7 credits from Group B. Learners need it complete a total of 67 credits to achieve this qualification. The Total Qualification Time is 670 hours, including 210 Guided Learning Hours. UNIT NUMBER UNIT NAME CREDITS GLH TUT Group A Unit 8001V1 Personal development as a strategic leader 10 30 100 Unit 8002V1 Collective strategy development 10 30 100 Unit 8003V1 Inter-organisational strategic planning 10 30 100 Unit 8004V1 Inter-organisational strategic direction 10 30 100 Unit 8005V1 Strategic communication 10 30 100 Unit 8006V1 Strategic culture 10 30 100 Group B Unit 7013V1 Strategic leadership 7 30 70 Unit 7014V1 Strategic leadership practice 7 30 70 NB - If you have achieved either of the Group B Units as part of a Level 7 qualification you do not have to repeat them. Who is this course for? This qualification is not aimed at managers aspiring to a senior management role it is targeted at individuals already employed in a strategic leadership position for a minimum of 3 years. Requirements Ability to complete assignments at post-graduate level. All Learners must hold a Level 7 or equivalent qualification. At least 3 years’ experience at strategic level as a senior manager. Career path This qualification can significantly improve your career prospects, promotional prospects, salary, self-confidence and self-esteem as a senior manager and leader.
Duration 2 Days 12 CPD hours This course is intended for The primary audiences for this course are quality directors and quality assurance managers, managers responsible for the governance of an enterprise and management of its risks, technical experts, project managers and consultants, internal auditors, compliance officers and virtually anybody involved in ANSI/TIA-942 compliance certification related projects either from an end-user or vendor perspective. Participants must hold a valid CTDC certificate in order to be able to register for the CTIA class. Overview After completion of the course the participant will be able to: 1. Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself 2. Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines 3. Facilitate and support the external audit to ANSI/TIA-942 4. Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and _nal certification 5. Facilitate surveillance and recertification audits This intensive course builds further on the technical understanding of the standard acquired in the CTDC© (Certified TIA-942 Design Consultant) course. Fundamental concepts and process of an internal audit Terms and de_nitions Difference between an internal and external auditor Audit principles Auditor competency requirements Managing an audit programme Establishing the audit objectives Establishing the audit programme Planning the audit Planning the schedule Resource planning Tools/equipment required Document requirements - Design documents - Process documents - Declarations Conducting the audit Conducting an opening meeting Conducting the audit Interviews Document review Facility review Typical non-conformities - Architectura - Electrica - Mechanical - Telecommunications Preparing the audit conclusions Conducting the closing meeting Preparing and distributing the audit report Audit report requirements Classification of non-conformities Typical format of an audit report Following up on the audit The CAR ? Corrective Action Report Evaluation of the Corrective Action Report Requesting a formal external auditIssuing a conformity certificate Requirements of the certificate Registration of the certificate Surveillance auditsRecertification auditsExam: Certified TIA-942 Internal Auditor) Actual course outline may vary depending on offering center. Contact your sales representative for more information. Additional course details: Nexus Humans Certified TIA-942 Internal Auditor (CTIA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified TIA-942 Internal Auditor (CTIA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
UNIX shell programming training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the UNIX system. UNIX shell programming training course details Who will benefit: Programmers developing programs under UNIX. Anyone working with XML. Administrators Support personnel who wish to find out more about the workings of UNIX or write simple utility programs. Prerequisites: UNIX fundamentals Some programming experience would be useful although not essential. Duration 2 days UNIX shell programming training course contents Review of UNIX fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. What is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters 0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command, The if statement, while loops, for loops, The case statement, Special characters, Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database The tput comand Avanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.
Many organizations seek competent auditors to determine whether their policies, procedures, and controls adhere to ISO 37301 requirements. This training course aims to help you complete these tasks successfully and intends to reflect the importance of effective CMS audits. In addition, this training course aims to strengthen your knowledge and skills to plan and carry out CMS audits based on the guidelines for auditing management systems provided in ISO 19011 and the certification process described in ISO/IEC 17021-1. This training course can potentially qualify you to conduct audits on behalf of conformity assessment bodies. The exercises, quizzes, and case studies provided in this training course are designed to help you practice the most important aspects of a CMS audit: ISO 37301 requirements, auditing principles, tools and techniques used to obtain evidence, leading a team of auditors, conducting interviews with auditee, reviewing documented information, drafting nonconformity reports, and preparing the final audit report. After successfully completing the training course, you can sit for the exam and gain the "Certified ISO 37301 Lead Auditor' credential. This credential validates your professional capabilities and demonstrates that you have the knowledge and skills to audit a CMS based on ISO 37301. About This Course This training course enables you to: Understand the main concepts of a compliance management system (CMS) and its processes based on ISO 37301 Acknowledge the relationship between ISO 37301 and other standards and regulatory frameworks Understand the auditor's role in planning, leading, and following up on a CMS audit in accordance with ISO 19011 Interpret the requirements of ISO 37301 in the context of a CMS audit Plan an audit, lead a team of auditors, draft nonconformity reports, and follow up on an audit Act with due professional care during an audit Course Agenda Day 1: Introduction to the compliance management system (CMS) and ISO 37301 Day 2: Audit principles and the preparation for and initiation of an audit Day 3: On-site audit activities Day 4: Closing of the audit and the Exam. Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Prerequisites A fundamental understanding of ISO 37301 requirements (or ISO 19600 guidelines) for a CMS and a comprehensive knowledge of audit principles. What's Included? Certification fees are included in the exam price. Training material of over 450 pages of information and practical examples. An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to participants who have attended the training course. In case of exam failure, the candidate can retake the exam once for free within 12 months following the initial exam date. Who Should Attend? The ISO 37301 Lead Auditor training course is intended for: Auditors seeking to perform and lead CMS audits Managers or consultants seeking to master the CMS audit process Individuals responsible for maintaining conformity to ISO 37301 requirements in an organization Technical experts seeking to prepare for a CMS audit Expert advisors and compliance officers Accreditation Provided by This course is Accredited by NACS and Administered by the IECB.
DASA DevOps Professional: Enable and Scale: In-House Training DevOps embodies both cultural changes and practices through which organizations can facilitate the IT functions of software development (Dev) and software operation (Ops). The DevOps movement advocates automation and phase-based monitoring practices. Its objectives include: Decreasing development cycles · Increasing deployment frequency Improving the reliability of releases Developing a closer alignment with business objectives The DASA DevOps Professional: Enable and Scale course (formerly known as DevOps Practitioner) is designed to provide individuals with the core education necessary to put DevOps into practice. With the help of DevOps theory, pragmatic examples and exercises, and interactive group discussions, the course will help you understand how to apply the necessary skills to practice DevOps. Building on the knowledge learned on theFundamentals course (the 'why'), you will learn the 'how'. The DevOps Professional: Enable and Scale course focuses on improving the skill set of the DASA competency model, which includes competencies like Courage, Teambuilding, DevOps Leadership, and Continuous Improvement. On completion of the DASA DevOps Professional: Enable and Scale training and passing the exam, the certification is awarded. What you will Learn At the end of this program, you will be able to: Explain the importance of DevOps culture and the aspects that can influence it Explain why courage, teambuilding, leadership, and continuous improvement are required in a DevOps environment Explain why courage is essential to enable trust, honesty, and experimentation Identify and evaluate different types of behavior in a DevOps environment Recognize the signals indicating impediments and/or team dysfunctions Describe how to form good DevOps teams and assess their maturity List the effects of happiness and motivation on team performance Identify how leaders encourage feedback and transparency Discuss the factors that leaders can influence to build trust Explain how and why leaders promote a 'safe to fail' environment Analyze value streams to improve throughput and flow Facilitate the tools for continuous improvement: structured problem-solving workshops, Story Mapping sessions, and retrospectives TEAMBUILDING Teambuilding is about understanding the other's point of view, collaboration, mutual accountability, common purpose, and the ability to integrally support the service/product. Design Teams Characteristics of a DevOps team Skills of a DevOps Team Self-organization and autonomy Rules to consider when designing DevOps teams Build Teams Effects of happiness and motivation on performance Feedback Creating high-performance teams Governance Governance within teams and between multiple teams Governance between organizations DevOps contracts DEVOPS LEADERSHIP This module describes how to facilitate teams to high performance, DevOps behavior, transparency, and a service lifecycle mindset. Build Culture Creating the right environment and providing vision and purpose Stimulating the right behavior Servant leadership: giving control, supporting, and inspiring Create Purpose Defining and aligning purpose Purpose of having a purpose Alignment versus autonomy Be a Servant Leader Give control to the team Inspire and support the team Focus on Success Output versus outcome Measuring and steering COURAGE The Courage module is about coaching courageous behavior, proactivity, reflection, trust, open discussions, experimentation, fail fast, and the courage to change. Build Courage The importance of courage Courage in relationship with leadership and feedback Enabling courage at the team level Dealing with failure Think Different Courage day to day Encourage critical thinking Techniques to promote courageous behavior VALUE CUSTOMER-CENTRIC ACTION This module describes the important aspects that are relevant to identify and deliver the required and expected value for all relevant stakeholders. Aspects of Value and Managing Expectations The different aspects of value Stakeholder management Customer collaboration and using customer feedback How to do prioritization CONTINUOUS IMPROVEMENT Continuous improvement describes the importance of a Kaizen mindset, quality at the source, first time right, knowledge-sharing, and the ability to adapt. Build Flow Understanding the importance of flow Using Lean to optimize flow Kaizen as a mindset Radical change versus Kaizen Using Pull to optimize flow Continuous Improvement Tools Kaizen Event Value Stream Mapping Visual Management Retrospective Daily Standup Five Times Why
Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews
Duration 2 Days 12 CPD hours Overview What is JIRA Software? Managing agile projects using JIRA Software Managing project backlog Managing iterations / sprints Managing releases / versions Managing project components Managing security Managing fields and screens Managing custom issue types Viewing various burn-down/burn-up reports This course introduces students to JIRA Software which is one of the most popular agile project management tool. Agile methods help in accelerating the delivery of initial business value. Continuous planning and feedback ensures that value is maximized throughout the development process. JIRA Software lets you manage project backlog, plan and execute sprints, and manage releases. It also lets you view useful reports, such as, velocity, various burndown / burn-up charts. Navigating JIRA Connecting to JIRA Software JIRA Account System Dashboard Sidebars Global Sidebar Search Help Dashboards Projects Boards Issues Project Sidebar Summary Managing Projects What is a Project? What is a Project (Contd.)? Backlog Sprints Versions / Releases Issues What is Component? Project Name and Key Project Key Format Editing Project Key Caveats Editing Project Key Deleting Project Summary Managing Versions What is Version What is Version (Contd.)? Merging Versions Other Version Options Version Fields What is Version? Summary Managing Issues Issues What are Epics? Epics ? Types Creating a new Epic What is a Story? Creating a Story Story Estimation Tasks Sub-tasks Summary Managing Sprints Sprints What is typically done in Sprint Planning? Velocity Agile Board Sprint Naming Convention Sprint Execution Summary Search & Using JQL Search Search Types JQL JQL Examples Sharing search result Save Search and Reuse in a Board Summary Working with JIRA Dashboards and Reports What is a JIRA Dashboard? Creating a JIRA Dashboard Choosing a Dashboard Layout What is a Gadget? Gadgets Available Out-of-the-box Adding a Gadget to a Dashboard Adding a Gadget to a Dashboard (Example Calendar Gadget) Moving a Gadget Removing a Gadget from a Dashboard Viewing Dashboard as a Wallboard Deleting a Dashboard JIRA Reports Generating a JIRA Report Generating a JIRA Report (Example ? Burndown Chart) Viewing the Burndown Chart Report Categories Available Out-of-the-box Agile Reports Issue Analysis Reports Forecast & Management Reports For further details ? Summary Jira Agile Common Jira Software boards Scrum Agility Kanban Scrum vs. Kanban Scrumban History of Kanban Kanban for software teams Kanban boards Kanban boards (Contd.) Kanban cards The benefits of Kanban Planning flexibility Shortened time cycles Fewer bottlenecks Visual metrics Continuous Delivery Kanban ? Kanban backlog Summary Miscellaneous Issue Features Voting Watching an Issue Adding/Removing Labels Linking Issues Linking Issue (Contd.) Commenting on Issue Attaching a File to an Issue Attaching a File to an Issue (Contd.) Cloning (Copying) an Issue Cloning (Copying) an Issue (Contd.) Cloning (copying) an Issue (Contd.) Viewing an Issue?s Change History Viewing an Issue's Change History (Contd. Summary Managing Fields & Screens (OPTIONAL: TIME PERMITTING) Fields OOB Fields Custom Fields Field Type Screens Summary
Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code