Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview
ð» Elevate Your Workspace: Computer Workstation Safety Training Course! ð Are you ready to transform your work environment into a safe, productive, and stress-free haven? Enroll in our Computer Workstation Safety Training Course, a comprehensive program meticulously designed to enhance your well-being, productivity, and cybersecurity in the digital age. Join us on a journey where ergonomic excellence meets digital mastery. ð Module 1: Introduction to Computer Workstation Safety and Posture Commence your journey with Module 1, providing a comprehensive introduction to computer workstation safety and optimal posture. Learn the fundamentals of setting up an ergonomic workspace, minimizing strain, and fostering a posture that promotes comfort and productivity. ð Module 2: Preventing Work-Related Injuries and Organized Workstation Safeguard your health in Module 2, focusing on preventing work-related injuries and maintaining an organized workstation. Explore ergonomic principles to reduce the risk of musculoskeletal issues and learn effective strategies for decluttering and organizing your workspace. ð°ï¸ Module 3: Time Management for Productivity and Managing Digital Overload Master the art of time management in Module 3, dedicated to boosting productivity and managing digital overload. Learn to prioritize tasks, streamline your workflow, and implement effective strategies to conquer the challenges of a digital work environment. ð Module 4: Cybersecurity Best Practices and Maintenance Computer Hardware Secure your digital fortress in Module 4, focusing on cybersecurity best practices and computer hardware maintenance. Explore strategies to safeguard your digital assets, understand the importance of regular hardware maintenance, and ensure the longevity of your computer equipment. Module 5: Electrical Safety Guidelines and Emergency Procedures Ensure a safe working environment with Module 5, dedicated to electrical safety guidelines and emergency procedures. Learn best practices for managing electrical components in your workstation and understand emergency procedures to respond confidently to unexpected events. ð Module 6: Stress Management and Reinforcement Cap off your training with Module 6, where you'll focus on stress management and reinforcement. Explore techniques to manage workplace stress, foster a positive mindset, and reinforce the principles learned throughout the course for sustained well-being. ð Why Choose Our Computer Workstation Safety Training Course? Expert-Led Training: Learn from industry experts and health professionals specializing in workstation safety. Interactive Learning: Engage in practical exercises, ergonomic assessments, and real-world scenarios to apply theoretical knowledge. Holistic Approach: Address physical, digital, and mental well-being for a comprehensive approach to workstation safety. Tailored for Any Industry: Applicable to professionals across various industries, promoting a universal culture of safety and productivity. Don't let your workstation be a source of stress and discomfort! Enroll now in the Computer Workstation Safety Training Course and empower yourself with the knowledge and skills needed to create a workspace that promotes health, productivity, and digital security. Your journey to a safer and more comfortable work environment begins here! ð»â¨ð Course Curriculum Module 1 Introduction to Computer Workstation Safety and Posture. Introduction to Computer Workstation Safety and Posture. 00:00 Module 2 Preventing Work-Related Injuries and Organized Workstation. Preventing Work-Related Injuries and Organized Workstation. 00:00 Module 3 Time Management for Productivity and Managing Digital Overload. Time Management for Productivity and Managing Digital Overload. 00:00 Module 4 Cybersecurity Best Practices and Maintenance Computer Hardware. Cybersecurity Best Practices and Maintenance Computer Hardware. 00:00 Module 5 Electrical Safety Guidelines and Emergency Procedures. Electrical Safety Guidelines and Emergency Procedures. 00:00 Module 6 Stress Management and Reinforcement. Stress Management and Reinforcement. 00:00
Ensure your well-being and productivity with the Computer Workstation Safety Training course. This course provides essential knowledge and practices to maintain a safe and comfortable computer workstation. Learn about ergonomics, preventing repetitive strain injuries (RSI), and eye injuries. Discover the significance of posture and movement, and master stretching and relaxation techniques. Additionally, understand digital security measures to protect your data and privacy while working at your computer. Elevate your workstation experience with this comprehensive training. Learning Outcomes: Comprehend the principles of computer workstation safety. Implement ergonomic adjustments for a comfortable and efficient workstation. Identify and prevent repetitive strain injuries (RSI) through proper practices. Recognize potential eye strain hazards and apply measures to prevent them. Maintain optimal posture and movement for long-term health and productivity. Utilize stretching and relaxation techniques to reduce tension and stress. Implement digital security practices to safeguard personal and professional information. Develop a holistic understanding of computer workstation safety for a healthier work environment. Why buy this Computer Workstation Safety Training? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Computer Workstation Safety Training you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Computer Workstation Safety Training course is ideal for Office workers and professionals spending significant time at computer workstations. Individuals concerned about their health and well-being while using computers. Employers aiming to promote a safe and productive workspace. Students and educators seeking to educate themselves and others on workstation safety. Prerequisites This Computer Workstation Safety Training was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Ergonomics Specialist: £30,000 - £60,000 per year. Occupational Health and Safety Officer: £25,000 - £45,000 per year. Workstation Safety Consultant: Earnings vary based on projects. Physical Therapist specializing in office ergonomics: £35,000 - £60,000 per year. Digital Security Analyst: £35,000 - £55,000 per year. Course Curriculum Module 01: Introduction to Computer Workstation Safety Introduction to Computer Workstation Safety 00:03:00 Module 02: Ergonomics in Computer Workstation Ergonomics in Computer Workstation 00:04:00 Module 03: Preventing Repetitive Strain Injuries (RSI) Preventing Repetitive Strain Injuries (RSI) 00:05:00 Module 04: Preventing Eye Injuries Preventing Eye Injuries 00:04:00 Module 05: Posture and Movement Posture and Movement 00:04:00 Module 06: Stretching and Relaxation Techniques Module 06: Stretching and Relaxation Techniques Stretching and Relaxation Techniques 00:04:00 Module 07: Digital Security Digital Security 00:03:00
Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 is a Cisco ISE training program that discusses the Cisco Identity Services Engine, an identity and access control policy platform that provides a single policy plane across the entire organization, combining multiple services, including authentication, authorization, and accounting (AAA), posture, profiling, device onboarding, and guest management, into a single context-aware identity-based platform. This CCNA course provides students with the knowledge and skills to enforce security posture compliance for wired and wireless endpoints as well as enhance infrastructure security using the Cisco ISE. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization
Duration 5 Days 30 CPD hours This course is intended for network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio This training combines the following classes into one five day workshop, preparing you for the ACCP certification: ACF-Aruba ClearPass Fundamentals IAC-Implementing Aruba ClearPass Overview Ability to setup ClearPass as a AAA server Demostrate Configuration Guest, Ongurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demostrate Scaling and deployment of best practices It prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both modules and labs to teach participants about the major features of the ClearPass portfolio Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web LoginMonitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications Single Sign-On Deployment Options ClearPass Admin Login SSO Access Network SSO ASO-Auto-Sign On Configuration and Demo ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview
This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT's NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy.
Begin a transformative learning experience with 'Back Injury Prevention Strategies for the Workplace,' designed to reshape your understanding of workplace health. This course kicks off with a thorough introduction to the essentials of preventing back injuries, setting a foundation for safer, healthier work practices. It's not just about learning the mechanics; it's about cultivating a mindset of proactive health management in your professional environment. As the course progresses, it delves into identifying risk factors for back injuries, equipping you with the knowledge to spot and mitigate potential hazards before they lead to injury. Journey through practical modules that teach the essentials of maintaining proper posture and safe lifting techniques, vital skills for preserving back health in various occupational settings. The course goes beyond simple guidelines; it provides an in-depth exploration of back-friendly exercises and activities that promote spinal health. Concluding with strategies for injury prevention and creating a safe work environment, this course offers a holistic approach to back care. By the end of this program, you will have the tools and understanding necessary to implement effective back injury prevention measures in your workplace, fostering a culture of health and safety. Learning Outcomes Understand the fundamentals of back injury prevention in the workplace. Identify and assess risk factors contributing to back injuries. Master the principles of maintaining proper posture in work settings. Learn and apply safe lifting techniques to minimize injury risks. Develop strategies for incorporating back-friendly exercises and creating safer work environments. Why choose this Back Injury Prevention Strategies for the Workplace course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Back Injury Prevention Strategies for the Workplace course for? Employees across various sectors seeking to prevent workplace injuries. Health and safety officers in organizations focusing on employee well-being. Managers and supervisors responsible for staff training and safety. Physical therapists and healthcare professionals interested in workplace health. Individuals aiming to learn more about personal back care and injury prevention. Career path Health and Safety Manager: £30,000 - £50,000 Occupational Therapist: £27,000 - £40,000 Workplace Wellness Coordinator: £25,000 - £45,000 Ergonomics Consultant: £28,000 - £55,000 Physical Rehabilitation Specialist: £26,000 - £42,000 Corporate Trainer (Health and Safety): £29,000 - £48,000 Prerequisites This Back Injury Prevention Strategies for the Workplace does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Back Injury Prevention Strategies for the Workplace was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 01: Introduction to Back Injury Prevention Introduction to Back Injury Prevention 00:13:00 Module 02: Identifying Risk Factors for Back Injuries Identifying Risk Factors for Back Injuries 00:13:00 Module 03: Maintaining Proper Posture Maintaining Proper Posture 00:16:00 Module 04: Safe Lifting Techniques Safe Lifting Techniques 00:17:00 Module 05: Back-Friendly Exercises Back-Friendly Exercises 00:15:00 Module 06: Injury Prevention Strategies and Creating a Safe Environment Injury Prevention Strategies and Creating a Safe Environment 00:19:00
Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Ability to setup ClearPass as a AAA server Demonstrate Configuration Guest, OnGurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demonstrate Scaling and deployment of best practices Configure AAA services for both wired and wireless networks Demonstrate the configuration of Aruba Downloadable User Roles. Demonstrate the configuration of Dynamic Segmentation with Aruba switches. This course prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both instructional modules and labs to teach participants about the major features of the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web Login Monitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview Wired Port Authentication 802.1X for access layer switch ports Profiling on Wired Network Configuration of Dynamic Segmentation Aruba Downloadable User Roles Downloadable User Role Enforcement in ClearPass Aruba Controller/Gateway configuration Aruba Switch configuration Troubleshooting