• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

44 Educators providing Courses delivered Online

Carre's Grammar School

carre's grammar school

Sleaford

I am delighted to welcome you to Carre’s Grammar School, which is an over-subscribed selective Academy in the market town of Sleaford and a founding partner of the Robert Carre Trust. We have 800 students on roll; boys only 11-16, and co-educational in the Sixth Form. The school has long been synonymous with excellence and the school’s reputation for providing a first rate all-round education for local students has been strengthened even further over recent years. Our academic results speak for themselves while our achievements in Sport, Music and other activities are outstanding. We have been recognised as a Good school with Outstanding features by Ofsted and were delighted with this outcome, which recognised the strengths of the school and supported our own perceived areas for improvement. We have been recognised as one of the top schools in the country based on our performance in the last few years, and students have regularly accepted offers for Oxbridge and the top Universities, whilst others have gone onto apprenticeships or employment. It is our ambition that Carre’s students should leave school with an enthusiasm for learning which will last them a lifetime. By encouraging creativity and originality alongside honesty, sensitivity and compassion we believe that our students will develop the capacity to meet the challenges of the modern world and lead happy and fulfilling lives. The friendly, cheerful atmosphere of the school helps our students enjoy learning and, as they grow into young men and women, we enable them to take increasing responsibility for themselves and for others around them. Learning can only take place successfully in a caring and orderly community and we provide an environment in which the young people are expected to work hard and share in the ethos and values of the school. Our expectations of behaviour are high and we aim to support each child through their school career so that they make the best of their talents. We are committed to the belief that it is very important to offer as many opportunities as possible to our students to gain experience from learning outside the classroom. An extensive array of enrichment and extra-curricular activities is offered. Partnerships have been developed locally, nationally and internationally which extend opportunities for all. At best, the website only gives you a flavour of this remarkable school, a school proud of its heritage yet excited by its continued development, growth and innovation, so I invite you to visit us to fully appreciate what the school offers.

London Centre For Addictions

london centre for addictions

London

An exclusive and independent rehab centre for the treatment of addictions and associated mental health issues The Haynes Clinic is a private rehabilitation centre for the treatment of alcohol, gambling and drug addiction. Drug addiction encompasses all so-called ‘recreational’ drugs (cocaine, ketamin, GBL, GHB, heroin and cannabis, for example). It also includes prescription medication for those with concerns about their use of drugs such as codeine, diazepam and other benzodiazepines, pregabalin, gabapentin and sleeping tablets. The centre provides detox and counselling with a view to you becoming entirely abstinent from alcohol and drugs. The counselling will also cover how to deal with stress, anxiety and depression – feelings that are often associated with addiction and other compulsive behaviours. Most of the rehab treatment is focused around group therapy as this has been proven to be most effective in helping addicts and alcoholics into recovery. There will also be some one to one counselling to cover individual goals and anything of particular sensitivity. All clients at The Haynes Clinic will have a consultation with our consultant psychiatrist on admission. She will prescribe any detox medication required and oversee your medical needs during your stay. Your stay here can be entirely private without it being revealed to your own GP and being on your medical notes – or we can liaise with your GP if you prefer. If we need to be in touch with your GP – or any other professional outside the confines of the treatment centre – this will always be with your consent. We also involve your family and those closest to you in your treatment. We ask the people who care about you to tell us about your behaviour and how it has affected them. We also offer them family counselling if they need support as a result of your addiction. The treatment centre is located in a tranquil, rural setting in Bedfordshire. We aim to make your stay as comfortable as possible while getting you well. All clients at the centre have their own bedrooms in a home comfort setting. Some have en suite facilities. All are good sized well appointed rooms with a double bed. We take account of your choices when ordering in the food for your stay though once you are feeling physically better, your rehab experience will include taking on responsibilities such as helping to prepare meals and keeping your environment clean and tidy. Some people need to relearn these skills; others can share their experience, helping their peers to learn – which itself boosts self-esteem.

Sophro By Nature

sophro by nature

I'm a mum of two, and a certified Relaxation & Sophrology Therapist based in Kings Heath and Stirchley in Birmingham, UK -consulting online and in-person, in French and English, for stress & anxiety management, pregnancy and birth preparation, children, sleep issues, mindset coaching and self-development, and life transitions and challenges. ‍ My Approach ‍ Sophro by Nature was born from my passion for People and Nature, and my desire to promote a healthier and deeper connection between our body and mind, and the world around us. Sophro comes from the Greek "Sos" and "Phren" meaning awareness/balance of the Body-mind connection, and "by Nature" refers to the fact that this connection/awareness is natural - but with life's busyness we tend to forget about it. It also refers to my passion for bringing therapy to the outdoors. ‍ I use relaxation therapy along a holistic therapeutic method - called sophrology - that combines classic relaxation techniques with mindset coaching, and which blends the best of Western science (hypnotherapy, positive & behavioural psychology, relaxation techniques, guided imagery, counselling skills) and Eastern traditions (mindfulness, yoga, breathing, visualisation, meditation) to balance the body-mind connection and provide a more serene approach to life challenges. (see FAQ for more info on Sophrology). ‍ All the techniques I use are advocated for by the NHS on their website and have been shown to be effective by research studies - my own background is grounded in science with a (honour) MSc in Environmental Studies and Ecotourism from Edinburgh Napier University. I've also spent over 400 hours in training and supervised therapy for two years in a state-accredited school in France to become a Relaxation and Sophrology Therapist :) ‍ About Me After I became a mum for the first time in the US, I was looking for a new way of being a working mother. When we moved to Luxembourg, I set up a project coming from my heart: working with children and families. This led me to create my own Professional Training Center in Language Development and Nature Education in Luxembourg. Thanks to this experience, I've worked with people of all ages, walks of life, cultures and nationalities - parents and babies, young children with special needs, mums and dads to be, grandparents, language therapists, and early-years educators. ‍ Working with parents and children also naturally led me to understand the importance of a healthy lifestyle, general well-being, and stress management. This is what started my life-long mission, and prompted me to train as a Relaxation and Sophrology Therapist: to provide support and ways to alleviate stress-related issues that I witnessed - much too often - in people's daily lives. My own experience living and working in various countries with different cultures expanded my cultural and diversity sensitivity - this is why I chose to specialise in children, families, and especially expatriates/immigrants and Third Culture Kids. What I love most about my work is the flexible and therapeutic nature of the methods I use; one day I can prepare a pregnant mum for birth and dealing with pain and fear, the day after I can help a child deal with stress and anxiety, the next day I can help a client improve sleep issues, and the following day I can provide emotional and pain relief to someone going through chemotherapy... It is never boring and always feels so rewarding! As a holistic practitioner, I enjoy taking into account all aspect of your life(style), so that I can provide tools and techniques to empower but also lead to another way of being yourself - a happier and healthier self :) I've always be a Nature lover (I was a Climbing Instructor and trained in Primitive Skills and Nature Education too), and I combine this important value of mine with relaxation and sophrology when I design sessions for my clients, as I firmly believe that the natural world - our world - is a great source of appeasement. In my spare time, I enjoy running, gardening, spending time in Nature, photography, reading, crafting with my kids, and experimenting with fermented food.

Ksenia Belash

ksenia belash

It’s a pleasure to greet you in my virtual home:) Meeting someone for the first time can feel a little awkward. As a way of introduction, let me share a few random and not so random facts about me: I spent a big chunk of my childhood daydreaming, journeying through whimsical worlds, exploring subtle energies and noticing things that other people strangely wouldn’t notice. I wrote my first poem at the age of 6. This is also when I experienced myself as a cloud during my first ever meditation, guided by my grand dad. One of my favourite treasures was a blue crystal ball that my mum brought home from a lab she worked at - it seemed to have come from a different dimension. For a long time, I made myself believe these things were silly and meaningless. These days, I cherish the magical, the whimsical, the weird and believe the sense of WONDER to be a potent medicine for the soul that I am privileged to share with others. Up until the age of 9, if I closed my eyes, I could see people’s emotional states as auras of different colours. I developed my own colour coding system to identify what was going on - it was quite accurate. Unfortunately, I don’t see auras anymore, but I get a lot of subtle information through my body sensations. Whenever I speak to someone, a whole big experience unfolds within me and, over the years, through studies of the nervous system and what not, I have developed a way of making quite a good sense of it. It is a huge resource that I bring into my work with people. I also see images and metaphors that come seemingly out of nowhere and bring insights into things. I am currently 38. Most people assume I am younger and it can feel mischievously delicious to see them acting in alignment with this assumption without breaking the illusion. I currently live in London, am planning to move to Portugal, was born and raised in Russia and my roots are mainly from Ukraine. I speak seven languages and know both the curses and the gifts of not having one single place of belonging. I came to the UK when I was 20 to study hospitality and tourism management…only to realise, a couple of years later, that my heart longs to create and express itself, not manage. So I got my BA, completed my internship in a Central London office and went on to pursue photography and other visual arts for many years to come. It is only recently that I have connected my early interest in hospitality with what I currently do - which hosting spaces where people can really land and feel at home, in connection with their body, soul and spirit. I spent many years of my life in a relationship that felt utterly destructive to my soul. In 2015, I felt desperate and went to see a therapist. I thought this work was useless and nothing would help. In 2016, I went through a painful separation and then divorce. At that time, I was also feeling completely lost professionally. This period felt like the dark night of the soul, but I have eventually managed to come through, with a different understanding of myself, my strength, my needs and things I stand for in this world. What felt like hell, turned out to be the beginning of my healing journey. A BIT ABOUT MY HEALING JOURNEY Having grown up in an environment where emotional depth, sensitivity to nuance, authentic self-expression and creative ways were not exactly appreciated, I know very well what it's like to feel different, misunderstood, not sure where and if I can ever belong. For many, many years, I believed that something was deeply wrong with and broken about me and how I am. No matter how much I tried, how much I pushed to change myself, I struggled to fit into the loud, noisy, rushing, linear, rationality-oriented world that at times didn't make any sense. Like so many other sensitive souls, I have developed my own ways of coping and fitting in - like hiding bits of myself that I deemed ugly, scary or uncool, swallowing my truth, hiding my thoughts and feelings even from myself to the extent of losing any sense of boundaries, disconnecting from my body and intuition, anxiously chasing after the next new thing and external validation, not giving myself any space to breathe and listen to my inner voice. Living like this was painful and at some point became intolerable, so I reached out for help. In the course of my own healing journey, one of the many things I have discovered that the belief that something was fundamentally wrong and broken about me, was just that - a belief, not a curse that determined how I lived my life. I have also discovered that the most healing thing was not this or that tool, modality or approach. It was not even a cognitive understanding of why things happened. What my inner system and the young parts of my psyche deeply needed in order to heal was an attuned relational space, where I was loved for who I was and allowed to go at my own pace and be fully me, with all of my feelings of brokenness, sadness, envy, confusion, darkness, guilt, lostness, anger, heartbreak, as well as joy, excitement, dreaminess, hope and pride and a myriad of other feelings. What my parts needed, were to be seen and consistently met with acceptance, love, warm curiosity, compassion and understanding by another human being. In the process, I have also discovered the power of connecting with my intuitive body wisdom and befriending my nervous system and what is often referred to as somatic intelligence - a resource I never knew was available to me. As a result, rigid ways of being/thinking/reacting that have felt like "just who I am", started to soften, release and transform, while my sense of authentic self, personal power, self-trust, boundaries and capacity to feel and handle difficult emotions, without becoming overwhelmed, has been steadily growing. Offering healing spaces like that and supporting others like myself on their journeys of growth and healing, has become my passion and vocation.

1...345

Courses matching "sensitivity"

Show all 211

Real Estate Financial Modelling School

4.3(5)

By Bayfield Training

This week long CPD accredited training is ideal for those Real Estate professionals, who are looking to bolster the DCF modelling skills. This course covers Real Estate Investment, Development, Finance & Risk.

Real Estate Financial Modelling School
Delivered in person or Online + more
£4,600

Real Estate Analyst (Investment Cash Flow Modelling in Excel)

4.3(5)

By Bayfield Training

The Real Estate Analyst course has been taught non-stop to global real estate firms over the last 25 years, and is without doubt the core financial modelling training in your career portfolio. Whether you have an upcoming financial modelling test for a new job or an APC exam, the Real Estate Analyst course is the choice for you.

Real Estate Analyst (Investment Cash Flow Modelling in Excel)
Delivered in person or Online + more
£1,750

SQL Intermediate Course, 3 Days

4.6(12)

By PCWorkshops

This Practical SQL course, is designed make you fully conversant with queries, DML and DDL statements. Hands-on, Practical SQL course. You will get the PCWorkshops SQL Course Certificate. Max 4 people per course, to keep it personalised.

SQL Intermediate Course, 3 Days
Delivered Online + more
£600

Real Estate Modelling Masterclass (Advanced Cash Flow Modelling)

4.3(5)

By Bayfield Training

This course is intended to the most ambitious modellers in the property industry who would like to be fully proficient in building complex real estate models.

Real Estate Modelling Masterclass (Advanced Cash Flow Modelling)
Delivered in person or Online + more
£1,500

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online
£2,975

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered Online
£2,380

Increasing Social Sensitivity in the Workplace

5.0(1)

By Enspark

Discover the power of social sensitivity in the workplace, a vital skill that enables you to understand and respect your colleagues' emotions, needs, and perspectives. This course provides actionable insights on cultivating social sensitivity to boost communication, empathy, and collaboration within your team. Develop the skills to build strong relationships, resolve conflicts, and foster a more cohesive and productive work environment, ultimately leading to improved teamwork and overall workplace success. Learning Objectives Define how social sensitivity in the workplace determines a group's ability to reach their goals.;Implement practical strategies for improving social sensitivity within oneself and among team members to enhance overall team success.;Identify the three key factors associated with a group's collective intelligence including the role of social sensitivity, balanced participation in conversations, and gender diversity.

Increasing Social Sensitivity in the Workplace
Delivered Online On Demand5 minutes
£4.95

Private Coaching Session: Your Sensitivity and Giftedness as Unique Treasures

By Christina Mantradevi Kircher

In a personal session of 60 min. there is space for any transformation you would love to achieve. If you have questions, especially those realated to your sensitivity or giftednesss, and want to open the space of spiritual guidance, for healing and clearing, this session could assist you deeply and with long-term effects on your development. It will be held online via Zoom - and you are most welcome!

Private Coaching Session: Your Sensitivity and Giftedness as Unique Treasures
Delivered OnlineFlexible Dates
£100

Understanding Key Principles of Real Estate Modelling (Advanced Theoretical Course)

4.3(5)

By Bayfield Training

On this course, we will use case studies to enhance the delegates understanding of Real Estate financial appraisals, and help them fully appreciate the theory behind the numbers.

Understanding Key Principles of Real Estate Modelling (Advanced Theoretical Course)
Delivered in person or Online + more
£950

55354 Administering Office 365

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who are responsible for planning, configuring, and managing an Office 365 environment. Students who attend this course are expected to have a fairly broad understanding of several on-premises technologies such as Domain Name System (DNS) and Active Directory Domain Services (AD DS). In addition, they should have a general understanding of Microsoft Exchange Server, Microsoft Teams, and Microsoft SharePoint. Overview Plan and provision Office 365 Manage Users and Groups in Office 365 Deploy and Configure Tools and Applications for Office 365 Plan and Manage Exchange Online Plan and Manage SharePoint Online Plan and Manage Microsoft Teams Plan and Manage other Office 365 Services Implement Security and Compliance in Office 365 Report, Monitor and Troubleshoot Office 365 This five-day course describes how to set up, configure and manage an Office 365 tenant including identities, and the core services of Microsoft 365. In this five-day course, you will learn how to plan the configuration of an Office 365 tenant including integration with existing user identities; plan, configure and manage core services; and report on key metrics. Although this course and the associated labs are written for Office 365 with Windows 11, the skills taught will also be backwards compatible with Windows 10. This course is based on the features available in the Office 365 E3 license as these are the core features in Office 365 and Microsoft 365 plans. 1 - Planning and Provisioning Office 365 Overview of Office 365 Core Services of Office 365 Requirements for an Office 365 Tenant Planning a Pilot and Deployment Creating an Office 365 Tenant Adding Custom Domains and Managing DNS Settings Lab: Provisioning Office 365 2 - Managing Users and Groups in Office 365 Managing User Accounts and Licences Managing Passwords and Authentication Create and Managing the Different Types of Groups in Office 365 Managing Users and Groups with PowerShell Managing Users and Groups in the Azure AD Admin Center Role Based Access and Administrative Roles Planning and Configuring Directory Synchronization Lab: Managing Users and Groups in Office 365 Lab: Planning and Configuring Directory Synchronisation 3 - Deploying and Configuring Tools and Applications for Office 365 Planning Network Configuration for Office 365 Tools and Applications Using the Office Configuration Tool Click to Run Installation Use and Control Managing Centralized Deployment of Tools, Applications and Add-ins Reporting Lab: Deploying and Configuring Tools and Applications for Office 365 4 - Planning and Managing Exchange Online What is Exchange Online Managing Exchange Online Mailboxes Managing Office 365 Groups in Exchange Online Configuring Exchange Online Permissions Managing Exchange Online using PowerShell Plan and Configure Mail Flow Plan and Configure Email Protection Lab: Planning and Managing Exchange Online 5 - Planning and Managing SharePoint Online What is SharePoint Online Understanding the relationship between SharePoint, OneDrive, Teams, and Office 365 Groups SharePoint Online Architecture Configure SharePoint Online Configure and Control External Sharing Managing SharePoint Online Site Collections Managing SharePoint Online using PowerShell Lab: Planning and Managing SharePoint Online 6 - Planning and Managing Microsoft Teams What is Microsoft Teams How Microsoft Teams integrates with other Office 365 Services Create and Manage Organization Wide Settings Create, Manage and Assign Microsoft Teams Policies Plan and Configure External and Guest Access Managing Microsoft Teams using PowerShell Lab: Planning and Managing Microsoft Teams 7 - Planning and Managing Other Office 365 Services Yammer Planner Visio Bookings Delve Forms Power Platform Stream Sway Viva Scheduler Add-ins, including Find Time and Junk Reporter Lab: Planning and Managing Office 365 Services 8 - Security and Compliance in Office 365 Overview of Security and Compliance Features in Office 365 Extending Security and compliance Features with Additional Licences Using the Microsoft Defender Portal and Secure Score Using the Office 365 Compliance Portal and Compliance Score Plan and Configure Retention Labels and Policies Plan and Configure Data Loss Prevention Policies Create and Assign Sensitivity Labels Configure Safe Attachments and Safe Links Policies Plan and Configure Multi Factor Authentication Lab: Configure Security and Compliance in Office 365 9 - Reporting, Monitoring and Troubleshooting Office 365 Monitoring Office 365 Service Health Troubleshooting Administrative Access in Office 365 Troubleshoot Directory Synchronization Troubleshooting Exchange Online Troubleshooting SharePoint Online Troubleshooting Microsoft Teams Troubleshooting Office 365 Security and Compliance Lab: Reporting, Monitoring and Troubleshooting in Office 365

55354 Administering Office 365
Delivered Online
£2,975