Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security
Be it a career change, an exciting new hobby, perfecting existing skills or simply enhancing professional employment prospects– we help you unlock creativity through our industry aligned all-encompassing Graphic Design Course. " Having done my level 1 and level 2 in graphic design, I felt that I still had gaps in my knowledge and I wasn't comfortable with what I knew. I signed up with Blue Sky Graphics and I am really glad I did. I am definitely better now than when I started and this is all thanks to my tutor and Blue Sky Graphics 🙂 " A Comprehensive Advanced Course The graphic design course is a structured academic and industry aligned advanced course suitable for complete beginners, intermediates or those wanting to improve their existing skill set. The graphic design course is comprehensive and through our teaching methodology is designed to train participants to become professional Graphic Designers. There is an emphasis on corporate illustration, composition, painting and logos as well as advertisement designs while focusing on vectors, lines, features, shapes, and spaces. All this will be integrated into how graphic elements are printed after they are processed in graphic design software for the purpose of visually illustrating emotions and messages. During the course you will be exposed to: advertisements, magazines, newspapers, corporate graphic designs particular to company cultures and brand identity, stationery, letterheads, business cards, logos, books, packaging and much more. The graphic design course teaches you to understand and learn how to operate a labyrinthine yet amazing world of Adobe software. With this software we explore the uses of words, shapes, textures, forms, sizes and colours to communicate by combining ideas and images to make a new concept. Graphic design through common misconception is not just about layout and typography, but much more about ideas behind visual meaning. Graphic design can make a company more successful in the world if it makes communication smart, attractive and able to captivate its audience. Graphic design can effectively be used by businesses to make (or break) their brand identity, increase sales, promote web traffic or promote services and products through advertising on their websites to convey complex data to its readers in a clear way. Elements of graphic design include: Colour, Size, Texture, Line, Shape, Space and, Form. It is important that each element is understood correctly, and this is one of the key principles we teach on our graphic design course. In other terms, graphic design communicates certain ideas or messages through visuals. These visuals can be as simple as a business logo, or as complex as pages of web design. This course goes beyond just the practical side of graphic design and includes the theory and substance behind modern graphic design. Your teacher will guide you on: What salary you can expect at the start of your career? How to get new clients for your business for freelance designers ? How to find work for the new graphic designer starting out in the big world? How to quickly integrate into the graphic design field? How to combine working from home versus working at a studio ? Begin one-to-one online learning with your very own private tutor Interested? Our course is 7 months long, consisting of 1 hour 30 minutes of online one-to-one sessions. When you enrol at Blue Sky Graphics expect at least 90 minutes of class sessions and 2 – 4 hours of homework per week. If we accommodate the course delivery into a shorter time frame, (for e.g. over 4 months instead of 7 months the Flexi 3 doubles from £265.00 to £450.00 over 4 months) the instalment is billed at the delivery rate. The cost of traditional schooling is typically more expensive than online courses, but in the end it all comes down to how good the tutors are. With our online courses you can gain skills that are a necessity for graphic design remotely. That’s right! Learn the skills needed to use Photoshop, Illustrator, InDesign and portfolio! The online courses cost £1799.00 (VAT inclusive) with no extra hidden costs and there are affordable instalment options too. Pay via debit or credit card or use a payment plan. A deposit of £294.00 is required to secure your position.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: -Experience with Windows networking technologies and implementation. - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - Review Windows PowerShell Learn about Windows PowerShell Get familiar with Windows PowerShell applications Identify factors to install and use Windows PowerShell Configure the Windows PowerShell console Configure the Windows PowerShell Integrated Scripting Environment (ISE) Use Visual Studio Code with PowerShell 2 - Understand the command syntax in Windows PowerShell Discover the structure of PowerShell cmdlets Discover the parameters for using PowerShell cmdlets Review the tab completion feature in PowerShell Display the About files content in PowerShell 3 - Find commands and Get-Help in Windows PowerShell Define modules in PowerShell Find cmdlets in PowerShell Use command aliases in PowerShell Use Show-Command and Get-Help in PowerShell Interpret the help file contents and update the local help content in PowerShell 4 - Manage Active Directory Domain Services using PowerShell cmdlets Manage user accounts in PowerShell Manage groups and group memberships in PowerShell Manage computer accounts in PowerShell Manage organizational units and Active Directory objects in PowerShell 5 - Manage network service settings for Windows devices using PowerShell cmdlets Manage IP addresses in PowerShell Manage IP routing in PowerShell Manage DNS clients in PowerShell Manage Windows Firewall settings in PowerShell 6 - Manage Windows Server settings using PowerShell cmdlets Automate management tasks using the Group Policy management cmdlets Manage server roles and services using PowerShell cmdlets Manage Hyper-V Virtual Machines using PowerShell cmdlets Manage Internet Information Services using PowerShell cmdlets 7 - Manage settings for a local Windows machine using PowerShell cmdlets Manage Windows 10 using PowerShell Manage permissions with PowerShell 8 - Understand the Windows PowerShell pipeline Review Windows PowerShell pipeline and its output Discover object members in PowerShell Control the formatting of pipeline output 9 - Select, sort, and measure objects using the pipeline Sort and group objects by property in the pipeline Measure objects in the pipeline Select a set of objects in the pipeline Select object properties in the pipeline Create and format calculated properties in the pipeline 10 - Filter objects out of the pipeline Learn about the comparison operators in PowerShell Review basic filter syntax in the pipeline Review advanced filter syntax in the pipeline Optimize the filter performance in the pipeline 11 - Enumerate objects in the pipeline Learn about enumerations in the pipeline Review basic syntax to enumerate objects in the pipeline Review advanced syntax to enumerate objects in the pipeline 12 - Send and pass data as output from the pipeline Write pipeline data to a file Convert pipeline objects to other forms of data representation in PowerShell Control additional output options in PowerShell 13 - Pass pipeline objects Pipeline parameter binding Identify ByValue parameters Pass data by using ByValue Pass data by using ByPropertyName Identify ByPropertyName parameters Use manual parameters to override the pipeline Use parenthetical commands Expand property values 14 - Connect with data stores using PowerShell providers Define Windows PowerShell providers Review the built-in providers in PowerShell Access provider help in PowerShell 15 - Use PowerShell drives in PowerShell Explain PowerShell drives in PowerShell Use PowerShell drive cmdlets in PowerShell Manage the file system in PowerShell Manage the registry in PowerShell Work with certificates in PowerShell Work with other PowerShell drives in PowerShell 16 - Review CIM and WMI Review architecture of CIM and WMI Review repositories in CIM and WMI Locate online class documentation by using CIM and WMI cmdlets 17 - Query configuration information by using CIM and WMI List local repository namespaces and classes by using CIM and WMI Query instances by using commands and WMI Query Language Connect to remote computers by using CIM and WMI cmdlets Query repository classes from remote computers by using CIMSession objects 18 - Query and manipulate repository objects by using CIM and WMI methods Discover methods of repository objects by using CIM and WMI Locate class methods and documentation by using CIM and WMI Invoke methods of repository objects by using CIM and WMI 19 - Manage variables in Windows PowerShell scripts Define variables in Windows PowerShell scripts Create variable names in Windows PowerShell scripts Assign values and types to variables in Windows PowerShell scripts Identify the methods and properties of variables in Windows PowerShell scripts Use string variables and methods in Windows PowerShell scripts Use date variables and methods in Windows PowerShell scripts 20 - Work with arrays and hash tables in Windows PowerShell scripts Define an array in Windows PowerShell scripts Work with array lists in Windows PowerShell scripts Define hash tables in Windows PowerShell Scripts Work with hash tables in Windows PowerShell scripts 21 - Create and run scripts by using Windows PowerShell Review Windows PowerShell scripts Modify scripts in the PowerShell Gallery Create scripts using Windows PowerShell Review the PowerShellGet module in Windows PowerShell Run scripts and set the execution policy in Windows PowerShell Review Windows PowerShell and AppLocker Sign the scripts digitally in Windows PowerShell 22 - Work with scripting constructs in Windows PowerShell Review and use the ForEach loop in Windows PowerShell scripts Review and use the If construct in Windows PowerShell scripts Review and use the Switch construct in Windows PowerShell scripts Review the For construct in Windows PowerShell scripts Review other loop constructs in Windows PowerShell scripts Review Break and Continue in Windows PowerShell scripts 23 - Import data in different formats for use in scripts by using Windows PowerShell cmdlets Use the Get-Content command in Windows PowerShell scripts Use the Import-Csv cmdlet in Windows PowerShell scripts Use the Import-Clixml cmdlet in Windows PowerShell scripts Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - Use methods to accept user inputs in Windows PowerShell scripts Identify values that might change in Windows PowerShell scripts Use the Read-Host cmdlet in Windows PowerShell scripts Use the Get-Credential cmdlet in Windows PowerShell scripts Use the Out-GridView cmdlet in Windows PowerShell scripts Pass parameters to a Windows PowerShell script 25 - Troubleshoot scripts and handle errors in Windows PowerShell Interpret error messages generated for Windows PowerShell commands Add output to Windows PowerShell scripts Use breakpoints in Windows PowerShell scripts Interpret error actions for Windows PowerShell commands 26 - Use functions and modules in Windows PowerShell scripts Review functions in Windows PowerShell scripts Use variable scope in Windows PowerShell scripts Create modules in Windows PowerShell scripts Use the dot sourcing feature in Windows PowerShell 27 - Manage single and multiple computers by using Windows PowerShell remoting Review the remoting feature of Windows PowerShell Compare remoting with remote connectivity Review the remoting security feature of Windows PowerShell Enable remoting by using Windows PowerShell Use one-to-one remoting by using Windows PowerShell Use one-to-many remoting by using Windows PowerShell Compare remoting output with local output 28 - Use advanced Windows PowerShell remoting techniques Review common remoting techniques of Windows PowerShell Send parameters to remote computers in Windows PowerShell Set access protection to variables, aliases, and functions by using the scope modifier Enable multi-hop remoting in Windows PowerShell 29 - Manage persistent connections to remote computers by using Windows PowerShell sessions Review persistent connections in Windows PowerShell Create and manage persistent PSSessions by using Windows PowerShell Disconnect PSSessions by using Windows PowerShell Review the feature of implicit remoting in Windows PowerShell 30 - Review Azure PowerShell module Review Azure PowerShell Review the benefits of the Azure PowerShell module Install the Azure PowerShell module Migrate Azure PowerShell from AzureRM to Azure Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - Review the features and tools for Azure Cloud Shell Review the characteristics of Azure Cloud Shell Review the features and tools of Azure Cloud Shell Configure and experiment with Azure Cloud Shell 32 - Manage Azure resources with Windows PowerShell Create a new Azure virtual machine by using Windows PowerShell commands Manage Azure virtual machines by using Windows PowerShell commands Manage Azure related storage by using Azure PowerShell Manage Azure subscriptions by using Azure PowerShell 33 - Manage users, groups, and licenses in Microsoft Entra ID by using Windows PowerShell Review benefits to manage Microsoft 365 services by using Windows PowerShell Connect to the Microsoft 365 tenant by using Windows PowerShell Manage users in Microsoft 365 by using Windows PowerShell Manage groups in Microsoft 365 by using Windows PowerShell Manage roles in Microsoft 365 by using Windows PowerShell Manage licenses in Microsoft 365 by using Windows PowerShell 34 - Manage Exchange Online by using Windows PowerShell Connect to Exchange Online by using Windows PowerShell Manage mailboxes in Exchange Online by using Windows PowerShell Manage resources in Exchange Online by using Windows PowerShell Manage admin roles in Exchange Online by using Windows PowerShell 35 - Manage SharePoint Online by using Windows PowerShell Install and connect to SharePoint Online Management Shell by using Windows PowerShell Manage SharePoint Online users and groups by using Windows PowerShell Manage SharePoint sites by using Windows PowerShell Manage SharePoint Online external user sharing by using Windows PowerShell 36 - Manage Microsoft Teams by using Windows PowerShell Review Microsoft Teams PowerShell module Install the Microsoft Teams PowerShell module Manage teams with Microsoft Teams PowerShell module 37 - Create and manage background jobs using Windows PowerShell Define the types of background jobs in Windows PowerShell Start remote jobs and CIM/WMI jobs in Windows PowerShell Monitor jobs in Windows PowerShell Retrieve results for running jobs in Windows PowerShell 38 - Create and manage scheduled jobs using Windows PowerShell Create and run Windows PowerShell scripts as scheduled tasks Define scheduled jobs in Windows PowerShell Create job option and job trigger objects in Windows PowerShell Create and register a scheduled job in Windows PowerShell Retrieve the results from a scheduled job in Windows PowerShell
Total GPRS training course description GPRS is a packet switched access mode for GSM systems, which will enable more efficient use of the radio resources leading to increased data speeds and capacity. It is an important migration step toward 3G networks. This course provides a detailed analysis of the workings and implications of GPRS. What will you learn Explain what GPRS is. Describe the GPRS protocol stack. Describe the GPRS architecture Total GPRS training course details Who will benefit: Anyone who needs to know more about GPRS. Prerequisites: Total GSM Duration 2 days Total GPRS training course contents GPRS network architecture Review of GSM architecture, the new network entities required for GPRS. How the existing GSM network entities needs to be upgraded. How GPRS roaming will work. How intra and inter PLMNs work together. How billing works in the GPRS network. IP over GPRS Brief review of IP, IP stack over GPRS, IP addressing in GPRS, DHCP, GPRS configuration for IP. IP packet flows. WAP and GPRS. GPRS interfaces Messaging scenarios used over the GPRS Gb, Gs and Gp Interfaces. How the handset performs a GPRS attach and detach. GPRS roaming and how it works. Links used between GPRS Roaming Exchanges (GRX). GPRS terminal attach message flow in the NSS, PDP context message flow in the NSS, GPRS paging message flow, GPRS terminal detach message flow. GPRS protocol stack The components of the protocol stack. How each component works. How encapsulated packets are sent. How each component links to the next component. GPRS air interface The new GPRS channels required. How the new channels work. How to map GPRS logical channels onto physical channels. How they enable session activation. The difference between master PDCHs and slave PDCHs. GPRS terminals The 3 classes of terminal available. How the handset performs a GPRS attach and detach.
Duration 2 Days 12 CPD hours This course is intended for Professionals who want to develop or strengthen their leadership position will benefit from this course. Overview Enhance your leadership effectiveness through your message Communicate with greater openness and authenticity Craft compelling messages that connect people to purpose Engage, motivate, and inspire others to embrace change Apply your leadership voice to increase your impact and influence Leaders inspire followership in others. Whether speaking conversationally or presenting before a group, a powerful leadership message delivered with impact and focused on the needs of the audience, can motivate and energize others. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Leading with Authenticity Adopting a Structured Approach Linking Authenticity and Awareness Enhancing Self-Awareness Applying the Johari Window 2. Your Leadership Voice Becoming an Authentic Leader Assessing Key Competencies Defining Your Leadership Purpose 3. A Compelling Vision Crafting Your Vision for Change Clarifying Goals and Outcomes 4. Crafting Your Message Speaking with Credibility, Emotion, and Logic Leading from Anywhere Applying Techniques for Engaging Others Engaging Through Storytelling 5. Delivering Your Message Bridging Different Thinking Flexing Communication Styles Adjusting for Style and Impact 6. Reviewing Your Results Reviewing and Adjusting Taking an Iterative Approach Repeating, Reiterating, and Building Support
This course is intended for Beginner-Moderate exposure is recommended for this course. The topics covered are cumulative in nature, and they require minimal understanding of email applications and composition. Overview The objective of the course is to give students the information needed to create emails that are written in a succinct, effective, and user-friendly manner. Students will learn how to set up an email subject, salutation, and will then work on how to write a credible email. In this course, students will learn about e-mail policies and learn how to write professional e-mail memos that convey appropriate messages. 1 - E-mail basics E-mail characteristics Writing online versus on paper Understanding the advantages and disadvantages of e-mail Understanding the cultural significance of e-mail E-mail programs Using an e-mail program to send e-mail When to use e-mail Communicating by e-mail Understanding when to avoid using e-mail Writing an e-mail message Using the MAIL acronym 2 - E-mail policies Company policies Avoiding improper e-mail messages Ensuring employee compliance to e-mail policies Copyright laws, viruses, and liability Avoiding copyright infringement Avoiding viruses Identifying e-mail liability 3 - E-mail features and security Features of an e-mail program Using attachments Using priority labels and signature files Features of an e-mail program Using attachments Using priority labels and signature files Discussing e-mail program options Securing e-mail Using encryption and digital signatures Using passwords 4 - E-mail messages Message headers Using headers E-mail message body Including proper greeting Structuring an e-mail message Closing an e-mail message 5 - E-mail effectiveness E-mail recipients Considering the factors that determine e-mail writing Anticipating recipient reaction Message management Managing your e-mail effectively 6 - Netiquette guidelines Netiquette style Using proper tone Following formatting guidelines Emoticons and abbreviations Using emoticons and electronic abbreviations 7 - Composing online correspondence Online communication Achieving the objective of the message Language and punctuation Improving online writing style Using punctuation correctly Efficient writing habits Constructing sentences Constructing paragraphs Editing e-mail messages
Course Objectives At the end of this course you will be able to: Understand the Outlook interface Send and receive email messages Organise email messages Manage their calendar Manage their contacts Work with tasks and notes Customise Outlook ' 1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Getting Started With Outlook Navigate the Outlook Interface Perform Basic Email Functions Use Outlook Help Composing Messages Create an Email Message Check Spelling and Grammar Format Message Content Attach Files and Items Enhance an Email Message Manage Automatic Message Content Reading and Responding to Messages Customise Reading Options Work with Attachments Manage Your Message Responses Managing Your Messages Manage Messages Using Tags, Flags, and Commands Organise Messages Using Folders Managing Your Calendar View the Calendar Manage Appointments Manage Meetings Print Your Calendar Managing Your Contacts Create and Update Contacts View and Organise Contacts Working With Tasks and Notes Create and manage Tasks Create and manage Notes Customising the Outlook Environment Customise the Outlook Interface Create and Manage Quick Steps Who is this course for? Who is this course for? This course is intended for the user who needs to learn how to use Microsoft Outlook to compose and send email, schedule appointments and manage contact information. Requirements Requirements General knowledge of the Windows OS
Signalling training course description An intensive course that defines and explores the signalling methods that are to be found in today's telecommunications services. What will you learn Describe the Functionality and Features of Signalling. Describe the Functionality of Analogue & Digital Subscriber Signalling. Describe the various types of signalling used on different network types. Describe the Functionality of Private Network Signalling. Describe the Functionality of Public Network Signalling. Signalling training course details Who will benefit: Personnel involved with systems design, implementation and support. Prerequisites: Telecommunications Introduction Duration 2 days Signalling training course contents Introduction What is Signalling?, Standards, ITU-T Recommendations, Signalling Categories - Supervisory Addressing, E.164, Call Information, Network Management, Network Components, Inband/Outband Switch Signalling, Analogue Vs Digital Signalling. Analogue Subscriber Signalling Analogue Local Loops/Switches/Trunks, Digital Switches/Local Loops, Telephone Handset, Accessing the Local Exchange, Pulse/Tone Dialling. Digital Subscriber Signalling Integrated Digital Access, DASS2 & DPNSS, DASS2 - Call, IMUX, Euro ISDN, Q.931 Call Control, Message Identification, Message Types, Call Establishment Messages, Call Clearing. Network Types Service Types, Circuit Switched, Packet Switched, Signalling Terminology, In-Channel Signalling, G.704, Performance and Quality, Digital Signalling, CAS, CAS Applications, Foreign Exchange, CCS, Break-In/Out Private Network Signalling Types Networking PABXs, Inter PABX Analogue Signalling Methods, E & M, Tone-On-Idle, Inter PABX Digital Signalling Methods, DPNSS, DPNSS Deployment, PABX Support for DPNSS, DPNSS Call, Q.Sig, Q.Sig support/functionality/protocol, Message Overview, Call Establishment. Public Network Signalling SS7, SS7 Operations, SS7 Topology, SSP, STP, SCP, Database Types - CMSDB NP LIDB HLR VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, SS7 addressing, Point Codes, Sub-System, Global Title Addressing and Translation, ANSI PCs, ITU-T PCs, SS7 Protocol Stack, MTP Level 1, MTP Level 2, Flow Control, FISU, LSSU, MSU, MSU SIF, MTP Level 3, SCCP, TCAP, TUP, Facility Format, Main Facilities, Flow Control Negotiation, Closed User Groups, Reverse Charging, Fast Select Facility, Throughput Class Negotiation, Call Barring, On-Line Facility Registration. BTUP, ISDN ISUP, Supplementary Services, ISUP Call - IAM, Progress/Answer/Suspend/ Resume/Release Messages, Intelligent Network (IN) Introduction, IN Evolution, IN Conceptual Model, IN Target Services & Service Features, Service Independent Building Blocks
Course Objectives At the end of this course you will be able to: Customise message settings Organise and locate Outlook messages Set Calendar options Manage their Contacts Work with activities using the Journal and Tasks Share their workspaces Manage their Outlook data files ' 1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Configure Advanced Message Options Delay delivery Insert Advanced Characters and Objects Modify Message Settings, Properties, and Options Use Automatic Replies Advanced Message Management Sort Messages Filter Messages Organise Messages Search Messages Manage Junk Mail Manage Your Mailbox Automate Repetitive Tasks Quick steps Rules Auto Archive Advanced Calendar Management Manage Advanced Calendar Options Create Calendar Groups Manage Meeting Responses Advanced Contact Management Edit an Electronic Business Card Manage Advanced Contacts Options Forward Contacts Export Contacts Managing Activities by Using Tasks and Journal Entries Assign and Manage Tasks Record and Modify Journal Entries Sharing Workspaces with Others Delegate Access to Mail Folders Share Your Calendar Share Your Contacts Managing Outlook Data Files Back Up Outlook Items Change Data File Settings Configuring Email Message Security Settings Who is this course for? Who is this course for? This course is designed for experienced Outlook users who need to increase their efficiency in the usage and manipulation of emails, tasks and the calendar. Requirements Requirements Preferably, delegates would have attended the MS Outlook Introduction course.
Explore ITIL4 Foundation, a comprehensive course delving into modern IT service management practices. Learn key concepts, principles, and processes to enhance organisational efficiency and align IT services with business goals. About this course £519.00 153 lessons Accredited training Certificate of completion included Exam included Course curriculum Module 1 - Introduction1.1 Tutor Introduction1.2 Certifications1.3 Course Features1.4 Why ITIL? Module 2 - Key Concepts2.1 What is a Service?2.2 What is Utility?2.3 What is Warranty?2.4 What are Customers, Users and Sponsors?2.5 What is Service Management?2.6 Creating value with Services2.7 Value & Value Co-creation2.8 What is Value?2.9 Organisations and Stakeholders2.10 Service Providers2.11 Other Stakeholders2.12 Value: Outcome, Cost and Risk2.13 Figure, Balance, Outcomes, Costs, Risks2.14 Outputs and Outcomes2.15 Cost2.16 Risk - Part 12.17 Risk - Part 22.18 Utility & Warranty - Part 12.19 Utility & Warranty - Part 22.20 Services Offerings2.21 Services Relationship2.22 Service Provisions2.23 Services Relationship Model2.24 Goods, Resources & Actions2.25 Products & ServicesTest Your Knowledge Quiz Module 3 - Guiding Principals3.1 Guiding Principles - Introduction Part 13.2 Guiding Principles - Introduction Part 23.3 Guiding Principles - The Key Message is Discussed!3.4 Guiding Principles - Nature, Use & Interaction of the Guiding Principles3.5 Focus on Value - The Key Message Discussed!3.6 Focus on Value - The Service Consumer & What is their Perspective of Value3.7 Focus on Value - The Customer Experience3.8 Focus on Value - How to Apply the Principle!3.9 Start Where You Are - Key Message Discussed!3.10 Start Where Your Are - Assess Where You Are3.11 Start Where You Are - The Role of Measurement3.12 Start Where You Are - How to Apply the Principle!3.13 Progress Iteratively with Feedback - Key Message Discussed!3.14 Progress Iteratively with Feedback - The Role of Feedback3.15 Progress Iteratively with Feedback - Iteration & Feedback Together3.16 Progress Iteratively with Feedback - How to Apply the Principle3.17 Collaborate & Promote Visibility - Key Message Discussed! (Part 1)3.18 Collaborate & Promote Visibility - Key Message Discussed! (Part 2)3.19 Collaborate & Promote Visibility - Key Message Discussed! (Part 3)3.20 Collaborate & Promote Visibility - Whom to Collaborate with (Part 1)3.21 Collaborate & Promote Visibility - Whom to Collaborate with (Part 2)3.22 Collaborate & Promote Visibility - Communication for Improvement3.23 Collaborate & Promote Visibility - Increasing Urgency Through Visibility (Part 1)3.24 Collaborate & Promote Visibility - Increasing Urgency Through Visibility (Part 2)3.25 Collaborate & Promote Visibility - Increasing Urgency Through Visibility (Part 3)3.26 Collaborate & Promote Visibility - How to Apply3.27 Think & Work Holistically - Key Message Discussed! (Part 1)3.28 Think & Work Holistically - Key Message Discussed! (Part 2)3.29 Think & Work Holistically - Key Message Discussed! (Part 3)3.30 Think & Work Holistically - How to Apply the Principle3.31 Optimise & Automate - Key Message Discussed! (Part 1)3.32 Optimise & Automate - The Key Message Discussed! (Part 2)3.33 Optimise & Automate - The Road to Optimisation (Part 1)3.34 Optimise & Automate - The Road to Optimisation (Part 2)3.35 Optimise & Automate - How to Apply the Principle3.36 Keep it Simple and Practical - Key Message Discussed!3.37 Keep it Simple & Practical - How to Apply the Principle3.38 Principle InteractionTest Your Knowledge Quiz Module 4 - 4 Dimensions of Service Management4.1 Introduction4.2 The 4 Dimensions of Service Management4.3 Organisation & People (Part 1)4.4 Organisations & People (Part 2)4.5 Organisation & People (Part 3)4.6 Information & Technology (Part 1)4.7 Information & Technology (Part 2)4.8 Information & Technology (Part 3)4.9 Information & Technology (Part 4)4.10 Partners & Suppliers (Part 1)4.11 Partners & Suppliers (Part 2)4.12 Partners & Suppliers (Part 3)4.13 Partners & Suppliers (Part 4)4.14 Partners & Suppliers (Part 5)4.15 Partners & Suppliers (Part 6)4.16 Value Streams & Processes (Part 1)4.17 Value Streams & Processes (Part 2)4.18 Value Streams & Processes (Part 3)4.19 Value Streams & Processes (Part 4)Test Your Knowledge Quiz Module 5 - The Service Value System5.1 Introduction5.2 Describe the ITIL Service Value System (Part 1)5.3 Describe the ITIL Service Value System (Part 2)5.4 Describe the ITIL Service Value System (Part 3)5.5 Describe the ITIL Service Value System (Part 4)Test Your Knowledge Quiz Module 6 - Service Value Chain and the Service Value Stream 6.1 Learning Objectives 6.2 Service Value Chain Model 6.3 The Interconnected Service Value Chain "elements" 6.4 The Interconnected Service Value Chain "more" 6.5 The Interconnected Service Value Chain "Value Streams" 6.6 The Interconnected Service Value Chain "Steps" 6.7 Plan 6.8 Improve 6.9 Engage 6.10 Design & Transition 6.11 Obtain/Build 6.12 Deliver & Support Test Your Knowledge Quiz ITIL® is a registered trademark of AXELOS Limited, used under permission of AXELOS Limited. The swirl logo ™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.