• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9342 Courses delivered Online

55342 Supporting and Troubleshooting Windows 11

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is Enterprise Desktop Support Technicians (EDSTs). These technicians provide Tier 2 support to users with domain-joined computers running the Windows 11 OS, typically in medium to large enterprise organizations. Overview Important Windows 11 features How these features are used in an Active Directory How to troubleshoot these features This is a 5-day ILT course that is designed to provide you with the knowledge and skills required to support and troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment. 1: Introducing Windows 11 Overview of Windows 11 Recommendations for typical troubleshooting procedures Troubleshooting installation and deployment Introduction to management and troubleshooting tools 2: Administering Windows 11 remotely Using Windows Admin Center Using Windows PowerShell Implementing Remote Management 3: Troubleshooting startup and performing system recovery Recovering Windows 11 Configuring the Registry Troubleshooting Windows 11 startup Implementing and troubleshooting BitLocker Troubleshooting OS service Issues 4: Troubleshooting devices and device drivers Overview of hardware troubleshooting Troubleshooting device drivers 5: Configuring and troubleshooting network connectivity Configuring network connectivity Troubleshooting network connectivity Implementing and troubleshooting name resolution Implementing and troubleshooting remote access 6: Troubleshooting Group Policy Overview of Group Policy Resolve GPO application issues on client devices 7: Configuring and Troubleshooting Security Settings Implementing network security Implementing Windows 11 security features Configuring and troubleshooting user accounts 8: Configuring and Troubleshooting User State Implementing and troubleshooting user state Implementing and troubleshooting Folder Redirection 9: Configuring and Troubleshooting Resource Access Configuring and troubleshooting file access. Configuring and troubleshooting shared folders. Implementing and troubleshooting Work Folders. Managing and troubleshooting printers. Recovering files. 10: Troubleshooting apps Troubleshooting desktop apps Troubleshooting app compatibility Managing UWP apps 11: Monitoring and Maintaining Windows 11 Monitoring Windows 11 Optimizing Windows 11 performance Managing Windows 11 updates

55342 Supporting and Troubleshooting Windows 11
Delivered Online
£2,975

Sexual Violence, Sexual Harassment and Harmful Sexual Behaviour

By Brightcore Consultancy

This masterclass will focus on supporting Key Safeguarding staff in understanding the current context around SVSH and HSB in your setting.

Sexual Violence, Sexual Harassment and Harmful Sexual Behaviour
Delivered Online + more
£80

BRCGS Food Safety Issue 9 - For Sites (2 Days)

5.0(2)

By Ask Sonia Limited

Official BRCGS Food Safety Issue 9 course. Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS Food Safety Issue 9 - For Sites (2 Days)
Delivered Online + more
£570

GIRLS’ EMOTIONAL NEEDS

By Inclusive Solutions

This workshop gives an opportunity to focus on the emotional needs of girls and how to meet these. We lift the lid on a less well explored inclusion issue, meeting the emotional needs of girls. Everyone knows a girl or woman. They may be pupil, daughter, sister, parent or partner. Course Category Meeting emotional needs Behaviour and Relationships Inclusion Early Years Description This workshop gives an opportunity to focus on the emotional needs of girls and how to meet these. We lift the lid on a less well explored inclusion issue, meeting the emotional needs of girls. Everyone knows a girl or woman. They may be pupil, daughter, sister, parent or partner. Girls will often withdraw, attack or even hurt themselves when under emotional stress and this is not always obvious in the way it is with boys. 1 in 4 women experience domestic violence and every week 2 women are killed by a current or ex partner. Whilst the world assumes girls have no problems processing their emotions, we lift the lid on this and question what is really happening for girls this century? Testimonials Learning Objectives Increased understanding of girls’ emotional needs Access to a wider range of practical strategies to impact on meeting emotional and behaviour problems Deeper understanding of core values surrounding inclusion Opportunity to reflect on professional attitudes and behaviour towards girls and their emotional challenges New skills and processes to make girls’ inclusion and achievement more successful Who Is It For ? Early years and school based practitioners Key workers Teaching Assistants with support roles Heads and deputies SENCOs Advanced skills teachers Primary and secondary classroom teachers Parents Local Authority support services Course Content The course explores the questions : Is there an invisible problem with girls? What can we do to meet the emotional needs of girls? What helps? What should our priority be with girls? This workshop will explore: Cultural and historical expectations of girls in our society Shared experiences of teaching and parenting girls Circle of Courage as a way of understanding emotional needs Fathers, mothers and daughters Solution Circle Problem Solving around girls’ needs What girls really need If you you want something similar, but not gender specific try: FRESH APPROACHES TO BEHAVIOUR AND RELATIONSHIPS or you may like: RESTORATIVE INTERVENTIONS

GIRLS’ EMOTIONAL NEEDS
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

M.D.D MY FAMILY HATES MY PARTNER PACKAGE (FAMILY RELATIONSHIP ISSUES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Support The analysation of options to a resolution Understanding of families perspective Mediation methods Emotional intelligence Compromise methods 6 sessions 1 hour each Implementation of diplomacy tactics Conclusion and 1 session with family member that issue is stemming from 1 free follow up call of 30 mins after package is completed https://relationshipsmdd.com/product/m-d-d-my-family-hates-my-partner-package/

M.D.D MY FAMILY HATES MY PARTNER PACKAGE (FAMILY RELATIONSHIP ISSUES)
Delivered in London or UK Wide or OnlineFlexible Dates
£700

CompTIA Cybersecurity Analyst (CySA+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of Reconnaissance Incidents Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of System Hacking Attacks Assess the Impact of Web-Based Attacks Assess the Impact of Malware Assess the Impact of Hijacking and Impersonation Attacks Assess the Impact of DoS Incidents Assess the Impact of Threats to Mobile Security Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES Assess Command and Control Techniques Assess Persistence Techniques Assess Lateral Movement and Pivoting Techniques Assess Data Exfiltration Techniques Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION Implement a Vulnerability Management Plan Assess Common Vulnerabilities Conduct Vulnerability Scans Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE Deploy a Security Intelligence Collection and Analysis Platform Collect Data from Network-Based Intelligence Sources Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA Use Common Tools to Analyze Logs Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS Analyze Incidents with Windows-Based Tools Analyze Incidents with Linux-Based Tools Analyze Malware Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS Deploy an Incident Handling and Response Architecture Mitigate Incidents Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS Apply a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES Remediate Identity and Access Management Issues Implement Security During the SDLC Additional course details: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cybersecurity Analyst (CySA+)
Delivered Online
£2,475

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered Online
£2,380

Work Personality

By Skillogy International

Your work personality brings together all those parts of you that have an influence on your performance at work. This course examines those qualities of your personality that you consistently demonstrate in your work and by which you become known by your colleagues. The main issue is whether you possess and use those positive qualities normally associated with good performance.

Work Personality
Delivered Online On Demand4 hours
£65 to £85

M.D.D CONTACT MY EX PACKAGE? (ISSUES WITH EX)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Do you have an ex you want to get back with? Would you like someone to mediate between the two of you? Have 3 weekly sessions with a coach let us try and assist you with the issues that caused the breakup and try and get you back together Talk through issues, discuss resolutions to problems Learn how to communicate better and strengthen the relationship (p.s this package is only applicable if both parties are open to trying to resolve this issue) This package is for 3 weeks https://relationshipsmdd.com/product/contact-my-ex-package/

M.D.D CONTACT MY EX PACKAGE? (ISSUES WITH EX)
Delivered in London or UK Wide or OnlineFlexible Dates
£500

Drug and Alcohol Addiction Awareness

By OnlineCoursesLearning.com

Medication and Alcohol Addiction Awareness Certification Medication and liquor habit has developed always pervasive in current culture. There are fluctuating levels of this frequently misjudged jumble, and the capacity to perceive every one of them has gotten progressively significant, particularly in the work environment. Representatives with substance misuse issues tend to be less profitable and produce a lower nature of work. Distinguishing these people and getting them the assistance that they need is fundamental in keeping a solid workplace. Through acclimating yourself and other staff with the notice signs, you can figure out how to rapidly distinguish when an individual might be building up an issue. Notwithstanding, simply monitoring the issue is frequently insufficient, so it is additionally important to find out about the treatment alternatives accessible and how various choices are more material to various issues. This edifying 10 module course will direct your colleagues through all they require to know, to handle this perplexing issue. What's Covered in the Course? Here is a sample of what your staff individuals can hope to cover: What medication and liquor compulsion is and which callings are most in danger; The distinction between the ordinary utilization of liquor and when it is considered to be hazardous; The contrasts between various kinds of medications, both legitimate and unlawful; The most effective method to perceive when somebody is experiencing substance misuse and how to differentiate between various sorts of medications and liquor; The basic fantasies related with substance misuse issues; The legalities encompassing this issue are and the most well-known punishments comparable to medication and liquor enslavement; Why it's so critical to know about dangerous medication and liquor use in the working environment and an organization's lawful commitments, whenever they've discovered that a representative is displaying indications of habit. What are the Benefits of the Course? There are a scope of advantages of effectively finishing this course. These advantages include: Figuring out how to perceive the indications of enslavement and how to move toward the subject with generosity and empathy; Assisting your representatives with distinguishing those battling with substance misuse issues; The capacity to learn at that point and from the spot that best suits them; Upon effective fulfillment of the course, your representatives get an industry-perceived and completely certify accreditation; Representatives can get to the course materials on any gadget they pick, 24 hours every day, 7 days per week.

Drug and Alcohol Addiction Awareness
Delivered Online On Demand
£50