Duration 4 Days 24 CPD hours This course is intended for The App Maker builds solutions to simplify, automate, and transform tasks and processes for themselves and their team where they have deep expertise in the solution business domain. They have basic data modeling, user experience design, requirements analysis, and process analysis skills. The App Maker creates and enforces business processes, structures digital collection of information, improves efficiency of repeatable tasks, and automates business processes. The App Maker uses the Maker tools of Power Platform to solve business problems. They may use advanced features of Microsoft apps and third-party productivity tools. The App Maker is aware of the capabilities and limitations of available tools and understands how to apply them. The App Maker is self-directed, and solution focused. They may not have formal IT training but are comfortable using technology to solve business problems with a personal growth mindset. They understand the operational need and have a vision of the desired outcome. They approach problems with phased and iterative strategies. This course will teach you how to build apps with low-code techniques to simplify, automate, and transform business tasks and processes using Microsoft Power Platform. This course contains a 1-day Applied Workshop. This workshop will allow you to practice your App Maker skills by creating an end-to-end solution to solve a problem for a fictitious company. The solution will include a Microsoft Dataverse database, Power Apps canvas app, and Power Automate flows. 1 - Get started with Microsoft Power Platform for app makers Identify components Create apps Get started with Microsoft Dataverse Work with Copilot in Microsoft Power Platform 2 - Create tables in Dataverse Table characteristics Table relationships Dataverse logic and security Dataverse auditing Dual-write vs. virtual tables 3 - Create and manage columns within a table in Dataverse Define columns in Microsoft Dataverse Column types in Microsoft Dataverse Add a column to a table Primary name column Restrictions that apply to columns in a table Create an auto numbering column Create an alternate key 4 - Load/export data and create data views in Dataverse View data in a table Create or edit views of data in a table Dataverse data import options Load data into a table Dataverse data export options Export Add, update, or delete data in a table by using Excel Import data using Power Query 5 - Export data from Dataverse and use Microsoft Excel to edit records Export data to Excel Edit and update data in Excel 6 - Get started with Microsoft Dataverse for Teams Dataverse for Teams vs Dataverse Provision your first Dataverse environment Create your first table to store data 7 - Build your first app with Power Apps and Dataverse for Teams Create your first app with the hero template Customize your app with Power Apps Studio Publish your app Install template apps 8 - Build your first workflow with Power Automate and Dataverse for Teams Types of workflows that Power Automate can build in Dataverse Schedule a flow 9 - Create reports with Power BI and Dataverse for Teams Connect to and transform Dataverse for Teams data from Power BI Create a Power BI report Publish the report Share the data 10 - Get started building with Power BI Use Power BI Building blocks of Power BI Tour and use the Power BI service 11 - Explore what Power BI can do for you What can I do with the Power BI service as a consumer? View content in the Power BI service Collaborate and share in Power BI Find and view dashboards and reports 12 - Create and manage workspaces in Power BI Distribute a report or dashboard Monitor usage and performance Recommend a development life cycle strategy Troubleshoot data by viewing its lineage Configure data protection 13 - Manage semantic models in Power BI Use a Power BI gateway to connect to on-premises data sources Configure a semantic model scheduled refresh Configure incremental refresh settings Manage and promote semantic models Troubleshoot service connectivity Boost performance with query caching (Premium) 14 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 15 - Implement row-level security Configure row-level security with the static method Configure row-level security with the dynamic method 16 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 17 - Secure, publish, and share data in Power BI Share and use reports in Power BI Row-level security Publish a report to a Power BI workspace Share reports and user experience Protect data in Power BI Data refresh and alerts 18 - Embed Power BI content Embed Power BI reports Embed other Power BI content types Optimize the embedding experience 19 - How to build your first model-driven app with Dataverse Model-driven apps, powered by Microsoft Dataverse Explore sample apps 20 - Get started with model-driven apps in Power Apps Introducing model-driven apps Components of model-driven apps Design model-driven apps Incorporate business process flows 21 - Configure forms, charts, and dashboards in model-driven apps Forms overview Form elements Configure multiple forms Use specialized form components Configure views overview Configure grids Create and edit views Configure charts overview Dashboards overview Use interactive streams and tiles 22 - Manage Dynamics 365 model-driven app settings and security Configure role-based security Manage teams and business units Explore settings and customizations 23 - Use specialized components in a model-driven form Create business process flows Embed a canvas app in a model-driven form Add a timeline in a model-driven form Create a report in a model-driven form 24 - Get started with Power Apps canvas apps Start Power Apps Power Apps data sources Use Power Apps with Power Automate and Power BI Designing a Power Apps app 25 - Customize a canvas app in Power Apps Improve your app by making basic customizations Explore controls and screens in canvas apps 26 - How to build the User Interface in a canvas app in Power Apps Use themes to quickly change the appearance of your app Brand a control Icons Images Personalization Build for phones or tablets 27 - Navigation in a canvas app in Power Apps Understanding navigation The Navigate and Back functions More ways to use the Navigate function 28 - Manage apps in Power Apps Power Apps review 29 - Build a mobile-optimized app from Power Apps Learn about mobile-optimized apps Identify components to make a canvas app mobile-optimized Create a mobile-optimized app that uses responsive designs Identify performance considerations for a mobile-optimized canvas app 30 - Use and understand Controls in a canvas app in Power Apps Core properties of controls Entering and displaying data with text controls Additional controls for enhancing your app's usability Media Modern controls Work with component libraries 31 - Create formulas to change properties in a Power Apps canvas app Formulas overview Use a formula to modify the format of controls Use formulas to perform calculations Use a control to modify the property of other controls Conditional formatting Functions for validating data 32 - Use imperative development techniques for canvas apps in Power Apps Imperative versus declarative development The three types of variables in Power Apps Global variables Contextual variables Collections Additional variable concepts 33 - Manage apps in Power Apps Power Apps review 34 - Create formulas to change properties in a Power Apps canvas app Formulas overview Use a formula to modify the format of controls Use formulas to perform calculations Use a control to modify the property of other controls Conditional formatting Functions for validating data 35 - Create formulas to change behaviors in a Power Apps canvas app Formulas and functionality Understanding true and false Understanding control behaviors and actions Performing multiple actions in a formula Control the display mode through a formula Use controls and functions to create a dynamic formula 36 - Author a basic formula that uses tables and records in a Power Apps canvas app Records and tables Using the Table function Store a table Filter your table Use the lookup function to return a record Additional table functions 37 - Build a canvas app for a real estate solution with Copilot in Power Apps 38 - Get started with Power Automate Introducing Power Automate Create your first flow Troubleshoot flows 39 - Build approval flows with Power Automate Provide solutions to real-world scenarios. 40 - Build flows to manage user information 41 - Power Automate's deep integration across multiple data sources 42 - Use the Admin center to manage environments and data policies in Power Automate Administer flows Export and import flows Learn how to distribute button flows 43 - Use AI Builder in Power Automate AI Builder in Power Automate saves time Advanced usage of AI Builder in Power Automate 44 - Optimize your business process with process advisor Get familiar with process advisor Create your first recording Edit recordings and group actions Analyze recordings and interpret results Automation recommendations 45 - Optimize your business process with process advisor Get familiar with process advisor Create your first recording Edit recordings and group actions Analyze recordings and interpret results Automation recommendations 46 - Build flows for a real estate solution using Copilot in Power Automate When to use Copilot in Power Automate 47 - Use Dataverse triggers and actions in Power Automate Dataverse triggers Query data Create, update, delete, and relate actions 48 - Create tables in Dataverse Table characteristics Table relationships Dataverse logic and security Dataverse auditing Dual-write vs. virtual tables 49 - Create and manage columns within a table in Dataverse Define columns in Microsoft Dataverse Column types in Microsoft Dataverse Add a column to a table Primary name column Restrictions that apply to columns in a table Create an auto numbering column Create an alternate key 50 - Get started with Power Apps canvas apps Start Power Apps Power Apps data sources Use Power Apps with Power Automate and Power BI Designing a Power Apps app 51 - How to build the User Interface in a canvas app in Power Apps Use themes to quickly change the appearance of your app Brand a control Icons Images Personalization Build for phones or tablets 52 - Get started with Power Automate Introducing Power Automate Create your first flow Troubleshoot flows 53 - Challenge Project - Build a booking requests app with Power Apps and Power Automate Prepare
The Negative Thought Pattern Interrupt does exactly what it says Course curriculum 1 Welcome to the course! Welcome from Simon Lee Maryan, Course Creator What is the Somato-Limbic Metacognitive Process (SLM Process)? CPD Accreditation About the Course Creator How to Navigate this course What Are Your Initial Outcomes SLM Process Course Learning Outcomes Individual Change Readiness Assessment 2 Part 1 - Theory Part 1 - Introduction Video 3 Bonus Module 1: Psychological and Physiological Effects of Stress Lesson BM1.1: Stress and Work Lesson BM1.2: Types of Stress and Causes Lesson BM1.3: Physical Effects of Stress - Musculoskeletal Lesson BM1.4: Physical Effects of Stress - Respiratory Lesson BM 1.5: Physical Effects of Stress - Cardiovascular Lesson BM 1.6: Physical Effects of Stress - Endocrine Lesson BM 1.7: Physical Effects of Stress - Gastrointestinal Lesson BM 1.8: Physical Effects of Stress - Nervous Lesson BM1.9 - Psychological Effects of Stress 4 Bonus Module 2: Psychological and Physiological Effects of Fatigue Lesson BM2.1: Definition of Fatigue Lesson BM2.2: Types of fatigue and Causes Lesson BM2.3: Psychological Effects of Fatigue Lesson BM2.4: Methods to Manage Stress and Fatigue 5 Module 1: Foundation Theory Lesson 1.1: The Principles for SuccessFREE PREVIEW Lesson 1.2: Creating Outcomes with Positive Effect Lesson 1.3: Setting an Intervention Up For Success Lesson 1.4: Cause and Effect Lesson 1.5: The Mind-Body Connection Lesson 1.6: Neurological Connections Lesson 1.7: The Presuppositions for Life Module 1 Assessment 6 Module 2: Communication Principles and Skills Module 2: Introduction Video Lesson 2.1: A Communication Model Lesson 2.2: Observing Body Language and Non-Verbal Communication Lesson 2.2.1: Behavioural Profiling Aide Memoire Lesson 2.2.2: Basic Behavioural Profiling Exercises Lesson 2.3: Rapport - What is it, how do we build and maintain it? Lesson 2.4: Our Senses and Language Lesson 2.4.1: Exercise - Sensory Preference Lesson 2.4.1 - Exercise Worksheet Lesson 2.5: Predicate Language Module 2 Assessment 7 Module 3: Eye Movement Patterns Module 3 Introduction Video Lesson 3.1: Eye Movement Pattern Cues Lesson 3.2: How to Elicit Eye Patterns Lesson 3.3: Eye Tracking Exercise Lesson 3.3.1 Eye Tracking Exercise Sheet - PDF Lesson 3.4: Synesthesia Module 3 Assessment 8 Module 4: Submodalities Module 4 Introduction Video Lesson 4.1: Modalities and Submodalities Lesson 4.2: Possible uses for Changing Submodalities and How to Elicit Them Lesson 4.3: Using Submodalities for Change Lesson 4.3.1: Exercise - Submodality Change Video: How to use the Submodality Checklist Lesson 4.3.2: Submodality Checklist PDF Module 4 Assessment 9 Module 5: The Limbic System, Memory and Brain Activity Module 5: Introduction Video Lesson 5.1: How the Limbic System Affects Memory Lesson 5.1.1: Memory Graphics - Downloads Lesson 5.2: Perceptual Blindness and Conscious Overload Lesson 5.3: Brain Activity and Brain Waves Lesson 5.4: Circadian Rhythm Lesson 5.4.1: Exercise Worksheet - Sleep Diary Lesson 5.5:Ultradian Rhythm Module 5 Assessment 10 Module 6: Influences on Your State of Mind, Emotions, Beliefs and Decisions Module 6: Introduction Video Lesson 6.1: Influences on Your State of Mind Lesson 6.2: Emotional Response vs Decisions Lesson 6.3: Beliefs Lesson 6.4: Identifying Limiting Beliefs Lesson 6.4.1: Exercise Worksheet - Identify Your Limiting Beliefs Lesson 6.5: Limiting Beliefs - Framing Principle, Frame of Reference Lesson 6.5.1: Reframing, Schemas, Meaning Lesson 6.5.2 - Exercise Worksheet - Identify Your Frames of Reference, Schemas and Meaning Lesson 6.6: Values Lesson 6.6.1: Values Exercise Video Explanation Lesson 6.6.1 - Values Exercise WorkSheet Lesson 6.6.2: Beliefs Behind Your Values Video Explanation Lesson 6.6.2 - Exercise Worksheet 2 - Beliefs Behind Your Values Module 6 Assessment 11 Module 7:The Logical Levels Model for Personal Change Module 7: Introduction Video Lesson 7.1: An Introduction to the Logical Levels Model Lesson 7.2: Logical Levels - Environment Lesson 7.3: The logical Levels - Behaviour Lesson 7.4: The Logical Levels - Capability Lesson 7.5: The Logical Levels Model - Beliefs and Values Lesson 7.6: The Logical Levels Model - Identity Lesson 7.7: The Logical Levels Model - Purpose Video Explanation of Personal Exploration Exercise Lesson 7.8: Personal Exploration Exercise - PDF Module 7 Assessment 12 Module 8: Behavioural Change Module 8: Introduction Video Lesson 8.1: The Behavioural Change Learning Cycle Behavioural Change Learning Cycle - Video Explanation Behavioural Change Learning Cycle PDF Lesson 8.2: The Intentional Change Model Lesson 8.2.1: Reflective Exercise - Who Helped Me and Who Tried Lesson 8.3: The Intentional Change Model Cont. Module 8 Assessment 13 Part 2 - Techniques Part 2 - Techniques Introduction 14 Module 9: Negative Thought Pattern Interrupt Lesson 9.1: Negative Thought Pattern Interrupt - What Is It? Lesson 9.2: NTPI - The Process Overview Lesson 9.3: NTPI - The Process in Detail Lesson 9.4: NTPI - Live Video Demo with Client Lesson 9.5: NTPI Assignment 15 Module 10: The Whole Brain State Lesson 10.1: The Whole Brain State (WBS) - Description Lesson 10.2: WBS - The Process Lesson 10.3: The Whole Brain State - Live Video Demo with Client Lesson 10.4: Whole Brain State Assignment 16 Module 11: Anchoring Lesson 11.1: Brief History of Anchoring Lesson 11.2: Uses of Anchoring Lesson 11.3: 5 Keys to Anchoring - ITURN Lesson 11.4: The Anchoring Process Lesson 11.4.1: Icarus Anchoring Process - PDF Download Lesson 11.5: Anchoring - Live Video Demo with Client Lesson 11.6: Anchoring Assignment Lesson 11.7: How to Bring all Three Techniques Together 17 Module 12: Eye Patterning and Re-imprinting Lesson 12.1: What Is Eye Patterning and Re-Imprinting Lesson 12.2: What Are Memories & Imprints & How Are They Created? Lesson 12.3: Brick Walls and Feeling Stuck Lesson 12.4: Eye Patterning and Re-imprinting Process Lesson 12.5: EPRI - Live Video Demo with Client Lesson 12.6: Eye Patterning and Re-imprinting Assignment 18 Module 13: Swish Pattern Lesson 13.1: The Swish Pattern Lesson 13.2: Keys To Successful SWISH Patterns Lesson 13.3: SWISH Pattern Guide Script 19 Module 14: Purpose Lesson 14.1: Purpose Lesson 14.2: Your Purpose Statement - Exercise Worksheet 20 Module 15: Case Studies Assignment Lesson 15.1 - Case Study Assignment Lesson 15.2: Sample Case Studies and Informed Consent Form 21 Bonus Module 3: Personal Needs Lesson B3.1: How are Your Personal Needs Being Fulfilled? Lesson B3.1 - Exercise Worksheet - Hierarchy of Needs 22 Next steps More resources for you Before you go...Please leave us your thoughts on your experience of this course. This is invaluable to us as it means you are helping us to continuously improve our courses as we learn from you.
Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code
Highlights of the Course Course Type: Self-Paced Online Learning Accreditation: AQA Qualification: Nationally Recognised Qualification Study Materials: High-Quality E-Learning Study Materials Certificate: Certificate upon passing the official exam Access: 1 Year Access Tutor Support- Paid Tutor Support Customer Support: 24/7 live chat available What you will learn from this course? Upon successful completion of this GCSE English Language Course, you will be able to: Develop the skill of reading a variety of excellent literature swiftly, clearly, and with connections between the books, you are reading. Acquire the skills necessary to read critically, then use what you learn from in-depth reading to improve and inform your own writing. Understand how to properly use standard English while writing in a concise and persuasive way. Develop key skills to spell, punctuate, and apply grammar correctly Become familiar with grammatical concepts, spoken and written language conventions, and a wide vocabulary, and put these abilities to use GCSE English Language Course This GCSE English Language Course is accredited by AQA and regulated by Ofqual, making it a nationally recognised credential that will improve your CV and set you apart from the competition. Through this course, you will improve your speaking, listening, reading, and writing abilities, which will aid you in showcasing a strong command of the language. Towards the end of this course, You will have the knowledge and abilities necessary to succeed in your official exam and land a job in the relevant field. Who is this Course for? The following individuals may benefit from this GCSE English Language Course: University and job applicants Anyone who wants to receive a higher grade in their GCSE Engish Anyone interested to build a career in this sector Anyone planning to pursue English language at University or A level Anyone trying to increase their chances of landing a job Anyone who wants to work in the publishing, journalism, or teaching fields Anyone who desires to develop their English Communication skills Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Eligibility Requirements This GCSE English Language Course has no academic prerequisites and is open to students from all academic disciplines. You must, however, first complete an initial assessment as well as a diagnostic evaluation in order for us to ascertain your progression level and discover any weak areas before we can create an individualised learning plan for you. All course learning resources will be made available to you after successfully completing this assessment, and you will have a year to view them at your convenience. Career Path This GCSE English Language Course will provide you with a fresh opportunity to enter the relevant job market and successfully escalate to advanced vocational study. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Assessment Procedure Students must complete a variety of interactive online examinations at the conclusion of each module to evaluate the understanding and skills they are learning in this GCSE English Language Course. These assessments also determine if students can demonstrate these skills effectively. At the end of the module, you can also keep track of your progress and regularly check your score. Upon successfully completing this course, you can schedule your official exam by contacting us at [email protected]. There are two paper-based assessments and a spoken language task in the AQA-accredited GCSE English Language. Assessment Format of Paper 1 Concepts covered: Reading (literature fiction text) and writing (descriptive or narrative writing) Exam time: 1 Hour 45 minutes written exam Total marks: 80 Total weight: 50% of GCSE Question format: Short question, long question and extended writing question Assessment Format of Paper 2 Concepts covered: Reading (nonfiction text and literature fiction text) and writing (presenting a viewpoint) Exam time: 1 Hour 45 minutes written exam Total marks: 80 Total weight: 50% of GCSE Question format: Short question, long question and extended writing question Non- Assessment âSpoken Languageâ Section Students will have the opportunity to showcase their speaking and listening abilities during this assessment. Skills tested: Presenting, responding to questions and feedback, and use of Standard English Total Marks: Marked by the teacher Total Weight: separate endorsement (0% weighting of GCSE) This GCSE English Language Course - AQA English Language Online is accredited by AQA and regulated by Ofqual. What is AQA? AQA, a well-known awarding body, sets standards, administers exams at the GCSE, AS, and A Level in a variety of areas, and grants qualifications to peruse a desired career. More than half of the GCSE and A-level exams that are taken and graded in the UK each year are administered by AQA. Additionally, employers and institutions all across the world highly respect these credentials. Benefits of AQA This qualification is recognised in the UK and across the world It is valued by employers all over the world Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market What is Ofqual? Qualifications, exams, and assessments are governed in England by Ofqual (The Office of Qualifications and Examinations Regulation). They are in charge of identifying the knowledge, skills, and understanding that students have displayed, and also ensuring that all the assessments and exams reveal what a student has accomplished. Benefits of Ofqual Regulation This regulation is valued internationally Created in accordance with specific national standards Designed in collaboration with industry to guarantee their suitability. Accurately reflect the knowledge, abilities, and understanding that the learners have shown. Candidates who have obtained a qualification that is governed by Ofqual are seen with greater confidence by employers. Course Curriculum Paper 1: Explorations in Creative Reading and Writing Reading Reading Identify Explicit Information Q1 - Identify Explicit Information 00:00:00 Assessment - Identify Explicit Information 00:10:00 Analysing Writers' Use of Language 1) Analysing a writer_s use of language 00:00:00 2) Further examples of analysing a writer_s use of language 00:00:00 Assessment - Analysing Writers' Use of Language 00:24:00 Structure 1) What do we mean by structure 00:00:00 2) How writers use structure 00:00:00 3) An example of structure in action 00:00:00 Assessment - Structure 00:24:00 Evaluating Writers' Methods 1) Evaluating a writer_s methods 00:00:00 Assessment - Evaluating Writers' Methods 00:16:00 Writing 1) Descriptive Writing - The Basic Techniques 00:00:00 2) Writing a description suggested by a picture 00:00:00 3) Creating a good story opening 00:00:00 Assessment - Writing 00:10:00 Paper 2: Writers' Viewpoints and Perspectives Reading Identify and Interpret Explicit and Implicit Information and Ideas Q1 - Identify Explicit and Implicit Evidence 00:12:00 Assessment - Identify and Interpret Explicit and Implicit Information and Ideas 00:06:00 Synthesising and Summarising 1) Synthesising and Summarising 00:11:00 Assessment - Synthesising and Summarising 00:10:00 How does the Writer use Language? How Does the Writer Use Language 00:11:00 Assessment - How does the Writer use Language 00:14:00 Comparing Viewpoints and Perspectives Comparing Viewpoints and Perspectives 1 00:11:00 Comparing Viewpoints and Perspectives 2 00:11:00 Comparing Viewpoints and Perspectives 3 00:11:00 Assessment - Comparing Viewpoints and Perspectives 00:10:00 Writing Assessment - Writing 00:20:00 Feedback Feedback 00:00:00 06) Writing Example and Revision Tasks for Question 5 00:13:00 01) Different writing tasks for Question 5 00:00:00 02) Writing to Argue or Persuade 00:00:00 03) Planning and Writing an Article 00:11:00 Writing a Speech and Expressing Opinions 00:11:00
Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who want to become more rational and disciplined thinkers. Overview Upon successful completion of this course, students will boost their performance with an increase in their decision-making ability. In this course, students will learn develop their ability to analyze and evaluate information. 1 - GETTING STARTED Icebreaker Housekeeping Items The Parking Lot Workshop Objectives 2 - COMPONENTS OF CRITICAL THINKING Applying Reason Open Mindedness Analysis Logic Case Study 3 - NON-LINEAR THINKING Step Out of Your Comfort Zone Don't Jump to Conclusions Expect and Initiate Change Being Ready to Adapt Case Study 4 - LOGICAL THINKING Ask the Right Questions Organize the Data Evaluate the Information Draw Conclusions Case Study 5 - CRITICAL THINKERS (I) Active Listening Be Curious Be Disciplined Be Humble Case Study 6 - CRITICAL THINKERS (II) Seeing the Big Picture Objectivity Using Your Emotions Being Self-Aware Case Study 7 - EVALUATE INFORMATION Making Assumptions Watch out for Bias Ask Clarifying Questions SWOT Analysis Case Study 8 - BENEFITS OF CRITICAL THINKING Being More Persuasive Better Communication Better Problem Solving Increased Emotional Intelligence Case Study 9 - CHANGING YOUR PERSPECTIVE Limitations of Your Point of View Considering Others Viewpoint Influences on Bias When New Information Arrives Case Study 10 - PROBLEM SOLVING Identify Inconsistencies Trust Your Instincts Asking Why? Evaluate the Solution(s) Case Study 11 - PUTTING IT ALL TOGETHER Retaining Your New Skills Reflect and Learn From Mistakes Always Ask Questions Practicing Critical Thinking Case Study 12 - WRAPPING UP Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations
For those who are looking to get top marks in the Maths 11+ exam Save Your Child’s Spot in the 11+ Maths Advanced Winter Course Tricky Algebra Confusing word problems Topics that really stretch your child Our engaging course doesn’t just teach numbers; Our Maths courses build confidence. This course is perfect for students in Year 5 students who are at "greater depth" and are preparing for their 11+ Exam in 2024. It is complementary to our weekly term-time small group 11+ maths classes We transform 11+ Maths exam prep from a challenge to an exciting adventure, helping your child become a resilient and prepared student. Mathematics can be a battleground for many students, especially when faced with word problems. We understand the fear of numbers, the confusion with multiplication tables, and the frustration of not being able to solve real-world math challenges. Key Details: Duration: 4 hours Official Lesson Start Date: TBD Feb Half term Maths Focus Areas: Algebra, advanced geometry, tricky word problems Group Size: 4 to 8 students For Just £117.00 *save 25% with our Small Business Saturday offer! What our families have to say:
Go from Beginner to Super Advance Level in Machine Learning Algorithms using Python and Mathematical Insights
Level 5 Diploma (FREE QLS Endorsed Certificate) | 11 CPD Courses+11 PDF Certificates | 145 CPD Points | CPD Accredited
Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who desire to supervise others more effectively. Overview Upon successful completion of this course, students will be equipped to supervise others more effectively and efficiently, contributing to job satisfaction and productivity. In this course, students will develop the skills required to be more efficient and proficient supervisors. 1 - GETTING STARTED Icebreaker Housekeeping Items The Parking Lot Workshop Objectives 2 - SETTING EXPECTATIONS Defining the Requirements Identifying Opportunities for Improvement and Growth Setting Verbal Expectations Putting Expectations in Writing 3 - SETTING GOALS Understanding Cascading Goals The SMART Way Helping Others Set Goals 4 - ASSIGNING WORK General Principles The Dictatorial Approach The Apple-Picking Approach The Collaborative Approach 5 - DEGREES OF DELEGATION Level One: Complete Supervision Level Two: Partial Supervision Level Three: Complete Independence 6 - IMPLEMENT DELEGATION Deciding to Delegate To Whom Should You Delegate? Providing Instructions Monitoring the Results Troubleshooting Delegation 7 - PROVIDING FEEDBACK Characteristics of Good Feedback Feedback Delivery Tools Informal Feedback Formal Feedback 8 - MANAGING YOUR TIME The 80/20 Rule Prioritizing with the Urgent-Important Matrix Using a Productivity Journal Using Routines and Rituals to Simplify Your Workday 9 - RESOLVING CONFLICT Using a conflict Resolution Process Maintaining Fairness Seeking help from Within the Team Seeking Help for Outside the Team 10 - TIPS FOR SPECIAL SITUATIONS What to Do If You?ve Been Promoted from within the Team What to Do If You're Leading a Brand New Team What to Do if You're Taking on an Established Team 11 - A SURVIVAL GUIDE FOR THE NEW SUPERVISOR Ask the Right Questions of the Right People Go to Gemba Keep Learning 12 - WRAPPING UP Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations
Level 7 Diploma(FREE QLS Endorsed Certificate)| 11 CPD Courses+11 PDF Certificates| 140 CPD Points|CPD & CiQ Accredited