• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

52618 Courses in Edinburgh delivered Online

ITIL 4 Managing Professional - Drive Stakeholder Value (DSV) with Exam

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The target audience include, but is not limited to:   Relationship managers Customer experience (CX) managers Account managers Service delivery managers Service desk managers Service Level Managers Enterprise Architects Service and Solution Architects Business Analysts Product Owners Marketing Managers Project Managers Portfolio Managers Supplier relationship Managers Vendor Managers Contract Managers Customer experience/User experience Designers Consultants Overview The purpose of this course is to give the delegate the understanding to optimize the value of the journey for all stakeholders, for example, to convert opportunity and demand into value and to drive stakeholder value. Engagement is important in the optimization of service value because, as ITIL Foundation explained, service value is co-created through the involvement of users, customers, sponsors, service providers, or any other stakeholder. This course introduces ways and methods to drive stakeholder value and encourage stakeholders contribute to the creation of service value by exploring the following:   Value propositions Fostering relationships Keeping engagement channels open Shaping demand Designing service offerings Aligning and agreeing expectations Co-creating service experiences Realizing value This course covers key topics such as SLA design, multi-supplier management, communication, relationship management, CX and UX design, customer journey mapping, and more. It will provide candidates with the tools to increase stakeholder satisfaction which is integral to business success in the current competitive landscape. The associated certification exam voucher is included with this course. As an ITIL© Accredited Training Organization of PeopleCert, all students attending this training will be provided with the exam voucher as a part of delivery. How customer journeys are designed Understand the concept of the customer journey Understand the ways of designing and improving customer journeys How to target markets and stakeholders Understand the characteristics of markets Understand marketing activities and techniques Know how to describe customer needs and internal and external factors that affect these Know how to identify service providers and explain their value propositions How to foster stakeholder relationships Understand the concepts mutual readiness and maturity Understand the different supplier and partner relationship types, and how these are managed Know how to develop customer relationships Know how to analyze customer needs Know how to use communication and collaboration activities and techniques Know how the ?Relationship management? practice can be applied to enable and contribute to fostering relationships Know how the ?Supplier management? practice can be applied to enable and contribute to supplier and partner relationships management How to shape demand and define service offerings Understand methods for designing digital service experiences based on value driven, data driven and user centered service design Understand approaches for selling and obtaining service offerings Know how to capture, influence and manage demand and opportunities Know how to collect, specify and prioritize requirements from a diverse range of stakeholders Know how the ?Business analysis? practice can be applied to enable and contribute to requirement management and service design How to align expectations and agree details of services Know how to plan for value co-creation Know how to negotiate and agree service utility, warranty and experience Know how the ?Service level management? practice can be applied to enable and contribute to service expectation management How to onboard and offboard customers and users Understand key transition, onboarding and offboarding activities Understand the ways of relating with users and fostering user relationships Understand how users are authorized and entitled to services Understand different approaches to mutual elevation of customer, user and service provider capabilities Know how to prepare onboarding and offboarding plans Know how to develop user engagement and delivery channels Know how the ?Service Catalogue management? practice can be applied to enable and contribute to offering user services Know how the ?Service Desk? practice can be applied to enable and contribute to user engagement How to act together to ensure continual value co-creation Understand how users can request services Understand methods for triaging of user requests Understand the concept of user communities Understand methods for encouraging and managing customer and user feedback Know how to foster a service mindset (attitude, behavior and culture) Know how to use different approaches to provision of user services Know how to seize and deal with customer and user ?moments of truth? Know how the ?Service request management? practice can be applied to enable and contribute to service usage How to realize and validate service value Understand methods for measuring service usage and customer and user experience and satisfaction Understand charging mechanisms Know how to assess service value realization Know how to prepare to evaluate and improve the customer journey Know how the ?Portfolio management? practice can be applied to enable and contribute to service value realization ITIL© is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. The Swirl logo? is a trade mark AXELOS Limited used, under permission of AXELOS Limited. All rights reserved. IT Infrastructure Library© is a registered trade mark of the AXELOS Limited used, under permission of AXELOS Limited. All rights reserved. Additional course details:Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 Nexus Humans ITIL 4 Specialist Drive Stakeholder Value (DSV) with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ITIL 4 Specialist Drive Stakeholder Value (DSV) with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ITIL 4 Managing Professional - Drive Stakeholder Value (DSV) with Exam
Delivered OnlineFlexible Dates
£2,385

DP-203T00 Data Engineering on Microsoft Azure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is data professionals, data architects, and business intelligence professionals who want to learn about data engineering and building analytical solutions using data platform technologies that exist on Microsoft Azure. The secondary audience for this course includes data analysts and data scientists who work with analytical solutions built on Microsoft Azure. In this course, the student will learn how to implement and manage data engineering workloads on Microsoft Azure, using Azure services such as Azure Synapse Analytics, Azure Data Lake Storage Gen2, Azure Stream Analytics, Azure Databricks, and others. The course focuses on common data engineering tasks such as orchestrating data transfer and transformation pipelines, working with data files in a data lake, creating and loading relational data warehouses, capturing and aggregating streams of real-time data, and tracking data assets and lineage. Prerequisites Successful students start this course with knowledge of cloud computing and core data concepts and professional experience with data solutions. AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - Introduction to data engineering on Azure What is data engineering Important data engineering concepts Data engineering in Microsoft Azure 2 - Introduction to Azure Data Lake Storage Gen2 Understand Azure Data Lake Storage Gen2 Enable Azure Data Lake Storage Gen2 in Azure Storage Compare Azure Data Lake Store to Azure Blob storage Understand the stages for processing big data Use Azure Data Lake Storage Gen2 in data analytics workloads 3 - Introduction to Azure Synapse Analytics What is Azure Synapse Analytics How Azure Synapse Analytics works When to use Azure Synapse Analytics 4 - Use Azure Synapse serverless SQL pool to query files in a data lake Understand Azure Synapse serverless SQL pool capabilities and use cases Query files using a serverless SQL pool Create external database objects 5 - Use Azure Synapse serverless SQL pools to transform data in a data lake Transform data files with the CREATE EXTERNAL TABLE AS SELECT statement Encapsulate data transformations in a stored procedure Include a data transformation stored procedure in a pipeline 6 - Create a lake database in Azure Synapse Analytics Understand lake database concepts Explore database templates Create a lake database Use a lake database 7 - Analyze data with Apache Spark in Azure Synapse Analytics Get to know Apache Spark Use Spark in Azure Synapse Analytics Analyze data with Spark Visualize data with Spark 8 - Transform data with Spark in Azure Synapse Analytics Modify and save dataframes Partition data files Transform data with SQL 9 - Use Delta Lake in Azure Synapse Analytics Understand Delta Lake Create Delta Lake tables Create catalog tables Use Delta Lake with streaming data Use Delta Lake in a SQL pool 10 - Analyze data in a relational data warehouse Design a data warehouse schema Create data warehouse tables Load data warehouse tables Query a data warehouse 11 - Load data into a relational data warehouse Load staging tables Load dimension tables Load time dimension tables Load slowly changing dimensions Load fact tables Perform post load optimization 12 - Build a data pipeline in Azure Synapse Analytics Understand pipelines in Azure Synapse Analytics Create a pipeline in Azure Synapse Studio Define data flows Run a pipeline 13 - Use Spark Notebooks in an Azure Synapse Pipeline Understand Synapse Notebooks and Pipelines Use a Synapse notebook activity in a pipeline Use parameters in a notebook 14 - Plan hybrid transactional and analytical processing using Azure Synapse Analytics Understand hybrid transactional and analytical processing patterns Describe Azure Synapse Link 15 - Implement Azure Synapse Link with Azure Cosmos DB Enable Cosmos DB account to use Azure Synapse Link Create an analytical store enabled container Create a linked service for Cosmos DB Query Cosmos DB data with Spark Query Cosmos DB with Synapse SQL 16 - Implement Azure Synapse Link for SQL What is Azure Synapse Link for SQL? Configure Azure Synapse Link for Azure SQL Database Configure Azure Synapse Link for SQL Server 2022 17 - Get started with Azure Stream Analytics Understand data streams Understand event processing Understand window functions 18 - Ingest streaming data using Azure Stream Analytics and Azure Synapse Analytics Stream ingestion scenarios Configure inputs and outputs Define a query to select, filter, and aggregate data Run a job to ingest data 19 - Visualize real-time data with Azure Stream Analytics and Power BI Use a Power BI output in Azure Stream Analytics Create a query for real-time visualization Create real-time data visualizations in Power BI 20 - Introduction to Microsoft Purview What is Microsoft Purview? How Microsoft Purview works When to use Microsoft Purview 21 - Integrate Microsoft Purview and Azure Synapse Analytics Catalog Azure Synapse Analytics data assets in Microsoft Purview Connect Microsoft Purview to an Azure Synapse Analytics workspace Search a Purview catalog in Synapse Studio Track data lineage in pipelines 22 - Explore Azure Databricks Get started with Azure Databricks Identify Azure Databricks workloads Understand key concepts 23 - Use Apache Spark in Azure Databricks Get to know Spark Create a Spark cluster Use Spark in notebooks Use Spark to work with data files Visualize data 24 - Run Azure Databricks Notebooks with Azure Data Factory Understand Azure Databricks notebooks and pipelines Create a linked service for Azure Databricks Use a Notebook activity in a pipeline Use parameters in a notebook Additional course details: Nexus Humans DP-203T00 Data Engineering on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-203T00 Data Engineering on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-203T00 Data Engineering on Microsoft Azure
Delivered OnlineFlexible Dates
£2,380

Vray for Maya Essentials Course

By ATL Autocad Training London

Why Choose Vray for Maya Essentials Course?  Learn V-Ray's power for stunning 3D visualizations. In design and architecture, it's essential for effective idea communication, offering an intuitive interface and efficient rendering, ensuring faster images and animations. Click here for more info: Website Duration: 10 hours Training Approach: 1-To-1 Sessions. Schedule: Customize your schedule by pre-booking a convenient hour of your choice, available Mon to Sat between 9 am and 7 pm. Module 1: Introduction to Vray for Maya (2 hours) Understand the significance of Vray and its integration with Maya. Installation and setup of Vray for Maya. Familiarize with the Vray interface, workflow, and materials overview. Module 2: Lighting with Vray (2 hours) Explore various lighting techniques in Vray. Understand different Vray lights and their settings. Master the creation and control of Vray sun, sky, dome lighting, and IES lights. Learn efficient lighting workflows with Vray. Module 3: Vray Camera (2 hours) Grasp Vray camera settings and exposure control. Work with Vray depth of field and create camera animations. Understand Vray frame buffer functionalities. Module 4: Vray Materials (2 hours) Explore Vray materials, realistic material creation, and custom material libraries. Utilize Vray material overrides for enhanced customization. Module 5: Vray Rendering and Post Production (2 hours) Dive into Vray rendering settings and techniques for both images and animations. Enhance post-production skills using Photoshop and Vray frame buffer. Learn the art of compositing Vray render elements and utilizing Vray denoiser. Additional Topics Covered: Global Illumination in VRay: Exploring techniques such as Irradiance Map, Light Cache, Quasi-Monte Carlo/Brute Force, and Environmental Lighting. Image Sampling: Understanding Fixed, Adaptive QMC, and Adaptive Subdivisions for optimal rendering quality. VRay Lights: Mastering Plane Light, Dome Light, Sphere Light, VRay Sun, VRay Shadow, Image-Based Lighting HDRI, and Object-Based Lighting. VRay Camera: Manipulating Focal Length, Film Speed, and Shutter Speed for precise camera control. VRay Materials: Customizing Diffuse Color, Reflection, Refraction, and Blurry Reflections for lifelike material creation. Rendering Test Scenes: Practical application by rendering interior and exterior scenes for a hands-on learning experience. V-Ray-Maya Trial  https://www.chaos.com Master Vray for Maya to create high-quality renders. Apply various lighting techniques for realistic and visually appealing scenes. Control Vray camera settings and create dynamic shots. Create and customize realistic Vray materials for 3D scenes. Optimize rendering settings for high-quality output. Enhance renders with post-production techniques in Photoshop. Establish an efficient workflow with Vray in Maya. Gain hands-on experience and access valuable resources for further practice. Vray Proficiency: Master Vray tools, interface, and workflows in Maya for advanced 3D visualization. Advanced Lighting Skills: Expertise in diverse lighting techniques, including Vray sun, sky, and IES lights. Camera Control: Proficient manipulation of Vray camera settings, exposure, and animations. Material Customization: Create and customize realistic materials, utilizing custom libraries and overrides. Rendering Excellence: Skills in rendering images and animations, post-production, and compositing techniques. Global Illumination Mastery: Understand advanced global illumination methods for realistic scene lighting. Potential Jobs: 3D Lighting Artist: Specialize in illuminating scenes for films, games, or animations. 3D Visualization Specialist: Create realistic architectural or product visualizations. 3D Rendering Specialist: Focus on rendering high-quality images and animations. 3D Animator: Animate scenes within the context of realistic lighting. 3D Modeler: Develop detailed 3D models, ensuring realistic rendering. Visualization Consultant: Provide expert advice on visualization techniques. Freelance Vray Artist: Work independently on diverse projects, rendering scenes with exceptional realism. Expert Guidance: Receive guidance from certified tutors and industry professionals, benefitting from their deep expertise and practical insights. They will share valuable tips and techniques to enhance your rendering skills. Flexible Learning: Choose between in-person or live online sessions, tailored to your preference and location. Schedule training at your convenience, available Monday to Sunday, 9 am to 8 pm. Lifetime Assistance: Access lifetime email support, ensuring continuous guidance even after course completion. Our dedicated team is committed to addressing your queries and helping you overcome challenges. Unlock Your Potential: Enroll in our V-Ray for Maya Training Course to harness the power of this industry-leading rendering engine. Elevate your visual effects and animation skills, unleashing your creativity with stunning and lifelike renders.

Vray for Maya Essentials Course
Delivered in London or OnlineFlexible Dates
£432

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered OnlineFlexible Dates
£2,380

Certified TIA-942 Design Consultant (CTDC)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Participants must possess a valid data centre training certificate such as CDCP or any other approved equivalent. Please submit a copy of your certificate for verification upon registration for the CTDC course. Overview After completion of the course the participant will be able to:1. Learn to properly comprehend and apply the ANSI/TIA-942 Standard requirements and guidelines2. Understand the proper intent of the ANSI/TIA-942 Standard to avoid both over- and/or under-investment3. Align the selection of redundancy levels and infrastructure investments to the business requirements.4. Understand the criteria and requirements for a high-availability data centre design and how to effectively establish the data centre from the perspective of the ANSI/TIA-942 Standard5. Understand how the ANSI/TIA-942 Standard relates to various worldwide standards This course, the participant will learn how to design an ANSI/TIA-942 compliant data centre. It will provide a clear understanding of the requirements of the ANSI/TIA-942 Standard and possible implementation variations. Introduction to Data Centre Facilities About the ANSI/TIA-942 Life of the ANSI/TIA-942 Standard Relation to other standards Architectural Electrical Mechanical Telecommunication Areas under scope High level redundancy definitions Redundancy options (N, N+1 etc.) Fault tolerant Concurrent maintainability Compartmentalisation Examples of redundancy levels Data Centre Space PlanningData Centre TopologiesRecommendations for Energy EfficiencyArchitectural Site selection Parking Multi-tenant building Building construction Vapor barrier Roofing Floor loading Raised flooring Suspended/drop ceiling Hanging load Seismic Building Security & Safety Security CCTV Staffing Bullet/ballistic proofing Lighting Safety - Signage Building and Room Access Security checkpoints Entry lobby Doors and windows Exit corridors Shipping and receiving areas Room/Area Design Requirements Administrative offices Security offce Operations centre Restroom and break room UPS/Battery rooms Generator and fuel storage area Computer room Electrical Utility power - Substation - Feed requirements - Self-generation HT/HV switch gear Generator and fuel supply LT/LV switch gear - ATS - Alternatives to ATS UPS and batteries PDU STS Grounding Surge protection EPO Central power monitoring Load banks Testing Equipment maintenance - Preventive maintenance - Facility training programs Mechanical Environmental design - Temperature and humidity requirements - Contamination - Sources - Clean air - Pressurisation - Radio sources - Vibration - Water ingress Water cooled systems - Heat rejection - Chilled water system - Condenser water? - Make up water Air cooled systems HVAC control systems Plumbing - Pipe routing Fire suppression Water leak detection Telecommunications Network topology Redundancy level design Media and connectors Cabling pathways Detailed cabling design considerations Administration and labeling Cable testing Data centre fabrics Exam: Certified TIA-942 Design Consultant Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified TIA-942 Design Consultant (CTDC)
Delivered OnlineFlexible Dates
£2,400

The Hot Directors Live Training Course

4.0(1)

By JJFILMworks London Ltd Film School

Unlock Your Filmmaking Potential with Taraq Qureshi** Discover the art of filmmaking with Taraq Qureshi, an acclaimed British producer, director, and actor. With over 20 years of experience in the film industry and a unique perspective as a disabled filmmaker, Taraq brings a wealth of knowledge and passion to his teaching. **About Taraq Qureshi:** - **Seasoned Filmmaker**: With over two decades of experience, Taraq has produced and directed numerous feature films and short films. His journey began in community theatre with a year-long course accredited by Middlesex University London in 1999. - **Industry Leader**: Founder and artistic director of the "Golden Nugget International Film Festival," which has been running for six years. In 2023, Taraq also founded the "Global Film Producers Alliance" (www.gfa.com), a platform dedicated to connecting and supporting film producers worldwide. - **Innovative Storyteller**: Taraq's notable projects include "Strictly Salsa - The Beginning," "The Chosen Ones," and "Do Not Enter." His work is marked by a deep passion for storytelling and a commitment to creating both commercially successful and niche market films. - **Mentor and Educator**: As an acting teacher, creative executive, and development coordinator, Taraq has inspired countless aspiring filmmakers to pursue their dreams and achieve success in the industry. **Why Learn from Taraq?** - **Expert Guidance**: Gain insights from a seasoned professional with a proven track record in the film industry. - **Unique Perspective**: Learn from Taraq's experiences as a disabled filmmaker, providing a fresh and inclusive approach to storytelling. - **Hands-On Learning**: Benefit from practical, real-world advice and techniques that you can apply to your own filmmaking projects. - **Community and Support**: Join a network of passionate filmmakers and industry professionals through Taraq's initiatives, including the "Golden Nugget International Film Festival" and the "Global Film Producers Alliance." **Enroll Now and Transform Your Filmmaking Journey!** Don't miss this opportunity to learn from one of the industry's most respected and innovative filmmakers. Enroll in Taraq Qureshi's online teaching course today and take the first step towards realizing your filmmaking dreams. #Master the Art of Film Directing: Enroll in Our Comprehensive 10-Day Course!** Are you passionate about storytelling? Do you dream of bringing your cinematic visions to life? Our 10-day course on Feature Film Directing is your gateway to mastering the craft and making your mark in the film industry! #### **Course Highlights:** 🎬 **Expert Instruction:** Learn from seasoned directors and industry professionals. 📜 **Script Analysis:** Break down screenplays and develop compelling characters. 🎥 **Visual Storytelling:** Master cinematography, shot composition, and visual style. 👥 **Actor Collaboration:** Discover techniques for casting and directing actors. 🎨 **Production Design:** Create immersive sets, props, and costumes. 🎧 **Sound and Music:** Enhance your film with expert sound design and music. ✂️ **Editing Mastery:** Gain hands-on experience in editing and post-production. 📣 **Marketing and Distribution:** Learn to promote and distribute your film successfully. 🌟 **Final Project:** Showcase your skills with a short film project and receive valuable feedback. #### **Who Should Enroll:** - Aspiring Directors - Film Students - Storytellers and Creatives - Film Enthusiasts #### **Why Choose Our Course:** - **Intensive Learning:** Each 90-minute session is packed with valuable insights and practical exercises. - **Hands-On Experience:** Apply what you learn with real-world projects and interactive sessions. - **Networking Opportunities:** Connect with fellow filmmakers and industry experts. - **Flexible Schedule:** Designed to fit into your busy lifestyle. #### **Ready to Start Your Directing Journey?** Don't miss this opportunity to turn your passion for film into a rewarding career. Enroll now and take the first step towards becoming a masterful film director! --- *Limited seats available. Sign up today to secure your spot!* 🎥✨ --- ### **Day 1: Introduction to Directing** - **Welcome and Course Overview:** - Introduction to the role of a film director. - Course objectives and expectations. - **History of Film Directing:** - Overview of influential directors and their contributions. - Evolution of directing styles and techniques. --- ### **Day 2: Script Analysis and Development** - **Script Breakdown:** - Understanding the screenplay. - Identifying themes, characters, and plot structure. - **Character Development:** - Techniques for creating and developing characters. - Analyzing character arcs. --- ### **Day 3: Visual Storytelling** - **Cinematography Basics:** - Shot composition and framing. - Camera movements and angles. - **Visual Style:** - Creating a visual style and tone. - Working with a cinematographer. --- ### **Day 4: Working with Actors** - **Casting:** - Techniques for casting the right actors. - Conducting auditions. - **Directing Actors:** - Techniques for effective communication. - Understanding actors' needs and processes. --- ### **Day 5: Production Design** - **Set Design:** - Understanding the importance of production design. - Working with the production designer. - **Props and Costumes:** - The role of props and costumes in storytelling. - Collaborating with the art department. --- ### **Day 6: Sound and Music** - **Sound Design:** - Basics of sound recording and mixing. - Creating an audio landscape. - **Music in Film:** - The role of music in enhancing the narrative. - Working with a composer. --- ### **Day 7: Editing and Post-Production** - **Editing Techniques:** - Understanding the editing process. - Types of cuts and transitions. - **Post-Production Workflow:** - Overview of post-production stages. - Collaborating with editors and post-production teams. --- ### **Day 8: Directing on Set** - **Pre-Production Planning:** - Creating a shooting schedule. - Conducting technical rehearsals. - **On-Set Communication:** - Managing the cast and crew. - Problem-solving on set. --- ### **Day 9: Marketing and Distribution** - **Film Festivals and Markets:** - Overview of film festivals and markets. - Strategies for submitting and promoting films. - **Distribution Channels:** - Understanding traditional and digital distribution. - Creating a distribution plan. --- ### **Day 10: Final Project and Presentation** - **Project Work:** - Finalizing the short film project. - Preparing for the presentation. - **Presentations:** - Screening of short films. - Feedback and discussion. - **Course Wrap-Up:** - Reflecting on the course experience. - Final thoughts and future steps. --- This version is condensed to fit into 90-minute sessions, ensuring each lesson is focused and impactful. Does this meet your expectations? Of course! Here's a revised version of the 10-day course, with 90-minute sessions each day: --- ### **Day 1: Introduction to Directing** - **Welcome and Course Overview:** - Introduction to the role of a film director. - Course objectives and expectations. - **History of Film Directing:** - Overview of influential directors and their contributions. - Evolution of directing styles and techniques. --- ### **Day 2: Script Analysis and Development** - **Script Breakdown:** - Understanding the screenplay. - Identifying themes, characters, and plot structure. - **Character Development:** - Techniques for creating and developing characters. - Analyzing character arcs. --- ### **Day 3: Visual Storytelling** - **Cinematography Basics:** - Shot composition and framing. - Camera movements and angles. - **Visual Style:** - Creating a visual style and tone. - Working with a cinematographer. --- ### **Day 4: Working with Actors** - **Casting:** - Techniques for casting the right actors. - Conducting auditions. - **Directing Actors:** - Techniques for effective communication. - Understanding actors' needs and processes. --- ### **Day 5: Production Design** - **Set Design:** - Understanding the importance of production design. - Working with the production designer. - **Props and Costumes:** - The role of props and costumes in storytelling. - Collaborating with the art department. --- ### **Day 6: Sound and Music** - **Sound Design:** - Basics of sound recording and mixing. - Creating an audio landscape. - **Music in Film:** - The role of music in enhancing the narrative. - Working with a composer. --- ### **Day 7: Editing and Post-Production** - **Editing Techniques:** - Understanding the editing process. - Types of cuts and transitions. - **Post-Production Workflow:** - Overview of post-production stages. - Collaborating with editors and post-production teams. --- ### **Day 8: Directing on Set** - **Pre-Production Planning:** - Creating a shooting schedule. - Conducting technical rehearsals. - **On-Set Communication:** - Managing the cast and crew. - Problem-solving on set. --- ### **Day 9: Marketing and Distribution** - **Film Festivals and Markets:** - Overview of film festivals and markets. - Strategies for submitting and promoting films. - **Distribution Channels:** - Understanding traditional and digital distribution. - Creating a distribution plan. --- ### **Day 10: Final Project and Presentation** - **Project Work:** - Finalizing the short film project. - Preparing for the presentation. - **Presentations:** - Screening of short films. - Feedback and discussion. - **Course Wrap-Up:** - Reflecting on the course experience. - Final thoughts and future steps. --- This version is condensed to fit into 90-minute sessions, ensuring each lesson is focused and impactful. Let me know if there is anything you want help with taraqqureshi@gmail.com

The Hot Directors Live Training Course
Delivered OnlineFlexible Dates
£499

CompTIA A+ Certification (Exams 220-1101 and 220-1102)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted to those seeking A+ Certification and anyone in these roles: IT Support Specialist Helpdesk Technician Field Technician Tier I Support Specialist Desktop Support Specialist Associate Network Engineer Systems Support Technician Junior Systems Administrator Overview At completion of this course, you will be able to: Install and configure end-user devices and software Address connectivity problems Perform basic cybersecurity mitigations Troubleshoot common problems to diagnose and resolve issues Demonstrate basic knowledge of scripting, the cloud, and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today?s core technologies from security to networking to virtualization and more. CompTIA A+ is the industry standard for launching IT careers into today?s digital world. This course, prepares you for the CompTIA A+ Certification exams 220-1101 and 220-1102. Lesson 1: Installing Motherboards and Connectors Topic 1A: Explain Cable Types and Connectors Topic 1B: Install and Configure Motherboards Topic 1C: Explain Legacy Cable Types Lesson 2: Installing System Devices Topic 2A: Install and Configure Power Supplies and Cooling Topic 2B: Select and Install Storage Devices Topic 2C: Install and Configure System Memory Topic 2D: Install and Configure CPUs Lesson 3: Troubleshooting PC Hardware Topic 3A: Apply Troubleshooting Methodology Topic 3B: Configure BIOS/UEFI Topic 3C: Troubleshoot Power and Disk Issues Topic 3D: Troubleshoot System and Display Issues Lesson 4: Comparing Local Networking Hardware Topic 4A: Compare Network Types Topic 4B: Compare Networking Hardware Topic 4C: Explain Network Cable Types Topic 4D: Compare Wireless Networking Types Lesson 5: Configuring Network Addressing and Internet Connections Topic 5A: Compare Internet Connection Types Topic 5B: Use Basic TCP/IP Concepts Topic 5C: Compare Protocols and Ports Topic 5D: Compare Network Configuration Concepts Lesson 6: Supporting Network Services Topic 6A: Summarize Services Provided by Networked Hosts Topic 6B: Compare Internet and Embedded Appliances Topic 6C: Troubleshoot Networks Lesson 7: Summarizing Virtualization and Cloud Concepts Topic 7A: Summarize Client-Side Virtualization Topic 7B: Summarize Cloud Concepts Lesson 8: Supporting Mobile Devices Topic 8A: Set Up Mobile Devices and Peripherals Topic 8B: Configure Mobile Device Apps Topic 8C: Install and Configure Laptop Hardware Topic 8D: Troubleshoot Mobile Device Issues Lesson 9: Supporting Print Devices Topic 9A: Deploy Printer and Multifunction Devices Topic 9B: Replace Print Device Consumables Topic 9C: Troubleshoot Print Device Issues Lesson 10: Configuring Windows Topic 10A: Configure Windows User Settings Topic 10B: Configure Windows System Settings Lesson 11: Managing Windows Topic 11A: Use Management Consoles Topic 11B: Use Performance and Troubleshooting Tools Topic 11C: Use Command-line Tools Lesson 12: Identifying OS Types and Features Topic 12A: Explain OS Types Topic 12B: Compare Windows Editions Lesson 13: Supporting Windows Topic 13A: Perform OS Installations and Upgrades Topic 13B: Install and Configure Applications Topic 13C: Troubleshoot Windows OS Problems Lesson 14: Managing Windows Networking Topic 14A: Manage Windows Networking Topic 14B: Troubleshoot Windows Networking Topic 14C: Configure Windows Security Settings Topic 14D: Manage Windows Shares Lesson 15: Managing Linux and macOS Topic 15A: Identify Features of Linux Topic 15B: Identify Features of macOS Lesson 16: Configuring SOHO Network Security Topic 16A: Explain Attacks, Threats, and Vulnerabilities Topic 16B: Compare Wireless Security Protocols Topic 16C: Configure SOHO Router Security Topic 16D: Summarize Security Measures Lesson 17: Managing Security Settings Topic 17A: Configure Workstation Security Topic 17B: Configure Browser Security Topic 17C: Troubleshoot Workstation Security Issues Lesson 18: Supporting Mobile Software Topic 18A: Configure Mobile OS Security Topic 18B: Troubleshoot Mobile OS and App Software Topic 18C: Troubleshoot Mobile OS and App Security Lesson 19: Using Support and Scripting Tools Topic 19A: Use Remote Access Technologies Topic 19B: Implement Backup and Recovery Topic 19C: Explain Data Handling Best Practices Topic 19D: Identify Basics of Scripting Lesson 20: Implementing Operational Procedures Topic 20A: Implement Best Practice Documentation Topic 20B: Use Proper Communication Techniques Topic 20C: Use Common Safety and Environmental Procedures

CompTIA A+ Certification (Exams 220-1101 and 220-1102)
Delivered OnlineFlexible Dates
£2,475

European Data Protection & Privacy Programme Management - DPO Ready

By Training Centre

  European Data Protection   Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.   The training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program. Privacy Programme Management   Principles of Privacy Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organisation through process and technology-regardless of jurisdiction or industry.   The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Manager (CIPM) certification programme. Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle.  About This Course   Delivered in a modular format, this four day course covers   Days 1 & 2   Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework.  Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories.  Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors.  Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities.  Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor.  Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches.  Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer.  Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations.  Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance.  Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing.    Days 3 & 4   Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management.  Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks.  Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy.  Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments.  Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation.  Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten.  Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs.  Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design.  Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach.  Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP SITE What's Included?   1 years membership of the IAPP Breakfast, Lunch, mid-morning and afternoon snacks, teas, coffees Official Study Guides* Official Participant Guides* Official Exam Q&A's* Both exam fees * In electronic format for Live Online and hard copy for Classroom delegates     Who Should Attend?   This course is suitable for aspiring Data Protection Officers, as well as Information Security Managers, Lawyers, Data Managers, Analysts and Risk Teams. Provided by Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

European Data Protection & Privacy Programme Management - DPO Ready
Delivered OnlineFlexible Dates
£2,750

Digital Banking Diploma - CPD Certified

4.5(3)

By Studyhub UK

24 Hour Flash Deal **25-in-1 Digital Banking Diploma Mega Bundle** Digital Banking Diploma Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Digital Banking Diploma package online with Studyhub through our online learning platform. The Digital Banking Diploma bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Digital Banking Diploma course provides complete 360-degree training on Digital Banking Diploma. You'll get not one, not two, not three, but twenty-five Digital Banking Diploma courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Digital Banking Diploma courses are yours for as long as you want them once you enrol in this course This Digital Banking Diploma Bundle consists the following career oriented courses: Course 01: Digital Banking Course 02: Investment Banking Operations Professional Course 03: International Banking: Global Operations and Cross-Border Transactions Course 04: Corporate Finance: Working Capital Management Course 05: FinTech Course 06: Financial Modeling Course for a Non-Finance Background Course 07: Fundamentals of Corporate Finance Course 08: Capital Budgeting & Investment Decision Rules Course 09: Corporate Finance: Profitability in a Financial Downturn Course 10: Raise Money and Valuation for Business Course 11: Credit Control and Compliance Training Course 12: Financial Risk Management: Strategies for Success Course 13: Debt Management, Assessment, Financing & Counselling Course 14: Financial Investigator Course 15: Advanced Tax Accounting Course 16: Tax Strategy and Financial Planning for Beginners Course 17: Demystifying Depreciation Accounting: Financial Insights Course 18: Mastering Partnership Accounting: Financial Strategies and Reporting Course 19: Economics Diploma Course 20: Business Strategy Planning Course 21: Leadership & Management Training Course 22: Negotiation Skills Course 23: Finance for Non-finance Managers Certification Course 24: Personal Financial Management & Wellness Course 25: Excel: Top 50 Microsoft Excel Formulas in 50 Minutes! The Digital Banking Diploma course has been prepared by focusing largely on Digital Banking Diploma career readiness. It has been designed by our Digital Banking Diploma specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Digital Banking Diploma Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Digital Banking Diploma bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Digital Banking Diploma Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Digital Banking Diploma Elementary modules, allowing our students to grasp each lesson quickly. The Digital Banking Diploma course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Digital Banking Diploma bundle, you really hit the jackpot. Here's what you get: Step by step Digital Banking Diploma lessons One to one assistance from Digital Banking Diplomaprofessionals if you need it Innovative exams to test your knowledge after the Digital Banking Diplomacourse 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all twenty-five Digital Banking Diploma courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Digital Banking Diploma certificate and transcript on the next working day Easily learn the Digital Banking Diploma skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Digital Banking Diploma training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Digital Banking Diploma Requirements To participate in this Digital Banking Diploma course, all you need is - A smart device A secure internet connection And a keen interest in Digital Banking Diploma Career path You will be able to kickstart your Digital Banking Diploma career because this course includes various courses as a bonus. This Digital Banking Diploma is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Digital Banking Diploma career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free

Digital Banking Diploma - CPD Certified
Delivered Online On Demand6 days
£279

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380