• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1202 Educators providing Enterprise courses delivered Online

Standout Programmes

standout programmes

London

Penny started her career as a corporate lawyer at City firm Freshfields. On a career break she became involved as a volunteer in her local prison which led her to train as a tutor with Prison Fellowship and lead the restorative justice based Sycamore Tree programme in HMP Wandsworth for 12 years. She was involved in rolling out Sycamore Tree in HMP Bronzefield and HMP Pentonville and also has experience of tutoring the course with people in prison long term. Penny was a Trustee of Prison Fellowship for several years and acted as Interim CEO in 2015. Penny has also volunteered with the Prison Reform Trust, supporting work around mental health and criminal justice issues. She has a Masters degree in Criminology and Criminal Justice from King’s College London and believes in second chances and releasing potential. Andy Bater, Head of Operations Andy joined the StandOut team in October 2022 from a community organisation based in Holborn. With a background in project and operations management working with various large corporate organisations, he brings his breadth of experience and knowledge to StandOut. Despite his career achievements, Andy would much rather talk about his time being a mature student in Canada, starting a wellbeing and employment social enterprise and especially about rugby, boxing and the Andrew Kaufman book 'All My Friends are Superheroes’. Rich McStraw, Fundraising Manager Rich joined us in April 2022 from Clinks, the infrastructure organisation for the voluntary sector working in criminal justice. He spent the last three years as Clinks’ Fundraising Officer, and prior to this worked as a freelance fundraiser and sales manager for renewable heating systems. He has previous experience of fundraising regulation and compliance, sales and marketing, and developing training programmes. Louise Harbert, Communications Officer Louise is passionate about supporting people with lived experience to share their stories. Before joining the StandOut team, she worked for a health charity to amplify the voices of volunteers and shine a light on health inequalities. A strong believer in social justice, Louise is determined to change the narrative around prison leavers, and is excited to contribute to StandOut’s development and growth as our first full-time comms officer. Alex Rose, Coaching Manager Alex joined the team in April 2018 from Prospects where he was a National Careers Service advisor. Previously he worked as a behaviour change manager and an achievement coach working on gang prevention and exit programmes. Alex is passionate about helping people who have been in prison back into work and recently completed his OCR Level 6 Diploma in Career Guidance & Development. Amrit Hunjan, Lead Coach HMP Wandsworth Amrit joined the StandOut team in September 2019 having previously worked as part of a council multi-disciplinary team working collectively to improve the well-being, participation and attainment of young people in mainstream education. Amrit connected with StandOut whilst volunteering with the youth mentoring service Trailblazers at HMP Wandsworth and she is passionate about using a relational approach to build confidence and unlock potential. Amy Young, StandOut Coach HMP Wandsworth Amy joined StandOut in November 2022 after completing an English Literature degree at KCL. During and following her degree she voluntarily set up Shakespeare and poetry workshops in HMP Brixton, believing in the power of arts in Criminal Justice. She found she facilitated enlightening and illuminating conversations, using literary themes to generate powerful reflections and increased emotional awareness. She looks forward to coaching at Wandsworth and supporting trainees with a holistic approach, offering guidance and practical help post-release. Hannah Jolley, Lead Coach HMP Pentonville Hannah joined StandOut in February 2022. Prior to this, she was Lead Coach on the Spear Programme, supporting young people who face barriers to employment and also coached corporate delegates on various topics. Hannah graduated from Durham University with BA Criminology, and spent time volunteering with vulnerable people in prison at HMP Durham. She is passionate about reducing reoffending rates, through showing that there is hope and are opportunities out there for those leaving prison. Erin Crombie, Lead StandOut Coach Erin discovered StandOut in 2018 whilst completing her Masters in Criminological Research at the University of Cambridge, when she carried out an evaluation of the charity for her dissertation. On graduating, Erin joined the education department in HMP Pentonville as a Student Support Worker, whilst maintaining contact with StandOut in a voluntary capacity. She joined StandOut at the beginning of 2020 and is now in a new role leading our expansion to a third prison. Erin’s favourite thing about working for StandOut is seeing the trainees’ confidence grow over the duration of the Phase 1 course and getting to celebrate their achievements. Louisa Laven, Lead Community Coach Louisa joined the StandOut team in November 2020. Prior to this she was on the Unlocked Graduates Programme, working as a frontline prison officer for two years while completing a Masters in MSc Leadership and Custodial Environments. Louisa loved the relational and support aspect of the officer role, but wanted to move into the charity sector and focus on the critical resettlement period after prison. She is enthusiastic about helping people leaving prison to get back on their feet and build towards a positive future. Iona Warren, Community Coach Iona joined the StandOut team in September 2022 after spending two years as a prison officer on the Unlocked Graduates programme. Whilst working in a women's prison, she completed a Masters in Applied Custodial Leadership, writing a dissertation on the women's experience of trauma informed practice in their establishment. She loved building relationships with the women on her landing, and relished the opportunity to support them whilst in custody. She is particularly excited to now be working with those transitioning into the community, and is passionate and motivated to see them thrive. StandOut Trustees Joe Froud, Chair Joe is the co-founder of Paloma Capital LLP, a London based real estate private equity business that was established in 2015. Paloma raises equity from foundations and endowments, pensions funds and family offices and invests in UK commercial real estate projects. Prior to this he was the founder and Managing Partner of Columbus Capital Management LLP, a real estate private equity joint venture that he established with Schroders plc in 2008. Joe is married with four children and lives in West London. Liz Delacave, Trustee Liz Delacave is a leadership consultant, experienced in training leaders, developing teams and coaching individuals to excel. She studied Engineering Science at the University of Oxford, worked in Citibank’s global commercial and investment banks, becoming chief of staff for Citibank’s European Private Bank. While Divisional Finance Director of a multinational engineering company, she was responsible for managing a global change programme. As a Non-Executive Director, she has helped turn around an underperforming NHS Foundation Trust hospital in East Anglia. Liz has advised a number of charities, including the International Federation of the Red Cross in Geneva and Prison Fellowship. Marion Peters, Trustee Marion Peters studied English Literature at Reading University before joining the Post Office fast track graduate management scheme. After 4 years in marketing and development roles Marion entered the charitable sector, working for international and small local charities in a generalist capacity. Marion has led client service teams, HR departments and spearheaded major fundraising projects and most recently worked as CEO of a heritage almshouse. Since stepping down from this role, Marion has continued to offer her operational and organisational skills to not for profit organisations on a voluntary basis. Passionately committed to the Justice System, Marion has been a volunteer within Her Majesty’s Court Services for over 20 years and is a great believer that where we have come from does not determine who we are. Joseph Ewing, Trustee Joseph studied Politics, Philosophy and Economics at Oxford University, has worked in a range of research, campaigning and public affairs roles - including three and a half years in public affairs at Cancer Research UK - and now works in policy at the Academy of Medical Sciences. His work includes policy development, advocacy and strategy. He became a trustee in April 2019 and is still inspired by StandOut’s belief in people. StandOut Consultants Jo Fellows, Programme and Coaching Consultant, Co Founder Jo's background is in group facilitation and project management and she has extensive experience leading employability services for those with additional barriers to employment. Her experience includes 4 years working with the award winning Spear course, partnering with IBM through her work with City Gateway and designing a 1-1 service for those leaving custody or care. Jo is passionate about equipping people coming up for release with the tools, skills and confidence to step into sustainable and fulfilling work. Jo has a Postgraduate Diploma in Voluntary Sector Management from CASS Business School. Jo co-founded StandOut with Penny and now supports StandOut as a consultant bringing her expertise in programme design and coaching skills.

Nick Dale Photography

nick dale photography

Here’s a brief biographical profile and outline of my photography career. If you want to see a few pictures of me, click here. If you have any questions, just click the chat button or get in touch at nick@nickdalephotography.com or on +44 7942 800921 . Photographer | Writer | Speaker | Teacher | Judge I dreamed of becoming a photographer when I was 15, but my mother wanted me to go to Oxford instead! I ended up reading English at Oxford and working as a strategy consultant for a few years before retiring at the age of 29. I then travelled round the world for seven years, doing four ski seasons and working on an internet start-up in San Francisco before finally returning to London in 2005. At that point, consulting work felt too stressful, so I decided to go 'quality of life'. I'm now a private tutor and international award-winning wildlife photographer. I became a tutor in 2009 when I happened to read an article in the paper called 'Ten Ways to Beat the Recession', and I started taking pictures again when I received a random email inviting me to go on safari and climb Mount Kenya. I've been a wildlife photographer since 2013, taking pictures in 26 countries on all seven continents and winning various awards including the Sunday Times/Audley Travel Big Shot. I spend a lot of time in Africa, and I’ve been on over 300 game drives and boat rides there. I’ve also worked as a Resident Photographer at various safari lodges: 2019: Klein’s Camp, Serengeti Under Canvas, Grumeti Serengeti Tented Camp and Cottar’s 1920s Safari Camp 2020: Gabus Game Ranch and Etosha National Park in Namibia 2022: Ol Jogi in Kenya and Muchenje in Botswana. I'm always happy to answer questions from guests, whether it’s about camera settings, the rules of composition or just identifying all the different species of wildlife. Back at camp, I'll give the odd talk on camera technique, give feedback on their images and show them some of my own. Maybe I’ll see you out there…! Artist’s Statement I have a passion for wildlife, and I want to celebrate all its facets in my photography, including power, beauty, cuteness and humour. These are the qualities I want to share with people. I’m not a conservationist, so I don’t take pictures of endangered animals to put on posters for Greenpeace or Friends of the Earth. I take them because I love close encounters with the natural world, and I want to share the excitement, relaxation, tenderness and wonder they evoke. I started out taking 'portraits' of animals. That was all very well, and a lion might look beautiful sitting on the African savannah at sunset, but there isn't much energy in that sort of picture. What I try to do now is to focus on action shots. I still take portraits - and sometimes I don't have a choice! - but my ideal image is much more likely to be a cheetah chasing down a Thomson’s gazelle than a bird sitting on a branch! My favourite animals are the predators, and the advantage of a long lens is that it can create the impression of being right up close and personal with some pretty dangerous beasts. It’s that sense of excitement that I try to capture in my work, and I'm happy to use whatever technology I can find to do the job. Cameras 2 x Sony a1 mirrorless cameras 2 x Sony VGC-4EM Vertical Grip for A1 2 x Sony 160GB TOUGH CFexpress Type A Flash Memory Cards Lenses Sony FE 12-24 mm f/2.8 G Master lens Sony FE 24-70 mm f/2.8 G Master lens Sony FE 70-200 mm f/2.8 G Master OSS II lens Sony FE 400 mm f/2.8 G Master lens Sony FE 600 mm f/4 G Master lens Sony SEL E Mount 14TC 1.4x Teleconverter - White Sony SEL E Mount 20TC 2x Teleconverter - White All that, combined with the wonders of Lightroom and Topaz Labs, gives me the best possible chance to show off the wonders of Nature. Contact If you’d like to hire me for a talk, a lesson, a photo shoot or a safari, please contact me on +44 7942 800921 or at nick@nickdalephotography.com. 99 Ormonde Court Upper Richmond Road London SW15 6TR Mobile: +44 7942 800921 Skype: nicholas_dale Facebook: facebook.com/nickdalephotography Flickr: flickr.com/photos/nickdalephotography Instagram: instagram.com/nickdalephotography LinkedIn: linkedin.com/company/nickdalephotography Pinterest: pinterest.com/nickdalephotography Twitter: twitter.com/nickdale_photo YouTube: youtube.com/@nickdalephotography View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize Donations If you’d like to support my photographic career by making a donation, please click the button below. DONATE Sales Sold over 25,000 images to buyers including National Geographic, Africa Geographic, BBC Wildlife Magazine, The Evening Standard, The Daily Telegraph, The Guardian, Daily Mail Online, The Sun, The Sunday Express, The Times and Lonely Planet. Sold my best-selling shot of a jumping Adélie penguin over 2,000 times - and it even appeared on a poster inside the hero's locker on the US TV show Atypical! Provided the cover photo for SMT magazine. Sold 65 fine art prints to private collectors around the world. Sold over 1,000 copies of my Expert Photography ebooks on Social Success Strategies and Wonderful Wildlife. Sold over 200 greeting cards and postcards at various exhibitions, Gerhold in Putney and Willow Bough Tea Rooms. Worked for clients including a tennis club, a milliner, a local councillor, a tuition agency and a procurement consultancy. Publications Wrote ebooks on wildlife photography and social media for Expert Photography, books on Predators & Prey, India, Antarctica and a local wedding, plus Resident Photographer: Tanzania & Kenya. Wrote articles for Expert Photography, Fusion Art, Outdoor Photography, Wildlife Photographic, PhotoPXL, Clipping Path Creative and SLR Lounge. Interviewed by Fusion Art for A Day in the Life. Posted articles, images and videos online: Nick Dale Photography website: 1.0k unique monthly visitors Facebook: 4.1k followers, 22.0k engagement, 700.6k people reached, 1.1m impressions (last 28 days) Instagram: 322 accounts engaged, 2.6k accounts reached, 14.4k total followers (last 30 days) LinkedIn: 492 connections Pinterest: 399 followers, 64k impressions, 2.4k engagements, 49k total audience, 1.8k engaged audience (last 30 days) Twitter: 18 followers YouTube: 50.1k subscribers, 205k watch hours and seven videos with more than a million views - (here, here, here, here, here, here and here). Awards Shoot The Frame’s October 2022 and May 2020 Shoot The Wild competitions The Best Modern and Contemporary Artists Prize 2022 The Faces of Peace Art Prize 2022 Tailor-Made Tour Company of the Year 2022 for England in the Travel & Hospitality Awards International Prize Leonardo da Vinci - The Universal Artist 2022 ATIM's Top 60 Masters for 2022 (see magazine feature on p25 and video starting at 26:26) Wildlife category in the Professional Photographer of the Year 2021 Best International Wildlife Photographer 2021 in the Southern Enterprise Awards hosted by SME News 2021 LUX Life Photography Coach of the Year - UK National Geographic: Photo of the Day award twice (here and here), both images being chosen for the Daily Dozen and Best of Photo of the Day 2017 and winning over 25,000 likes on Instagram Monthly finalist in the Greatest Maasai Mara Photographer of the Year 2021 Gold in the Animal Portrait category of the 2020 World Nature Photography Awards Sunday Times/Audley Travel Big Shot competition Wildlife Series in the 15th Pollux Awards/The Worldwide Photography Gala Awards Best of Contest in 35 Awards’ Wildlife: Mammals competition Guru’s Top Pick in the Gurushots Up Close with Birds challenge Best of Show in Grey Cube Gallery's Nature exhibition (see video) February 2020 Arthola competition Wildlife Worldwide Photography Competition 2019 (Animal Action category) Fusion Art: Artist Spotlight (Photography & Digital) in April 2020 (see video) and Best in Show at the 3rd Annual Animal Kingdom Art Exhibition (see video) Art Room Gallery: Nature competition (see video) Exodus Travels Monthly Photo Competition The Societies of Photographers: Gold Awards in the Wildlife, Nature and The Natural World categories Society of International Nature & Wildlife Photographers (SINWP): In the Wild Photography Competition (leading to stories in The Times, Express, The Sun, The Daily Star and the Mail Online, followed by an interview on London Live!) Various: Picture Frames Express's All Creatures Great and Small plus BBC Wildlife, Chiiz, Digital Photographer, Dodho, Wild Planet and Outdoor Photography competitions ePHOTOzine: two Daily Competitions, two Photos of the Week, 10 Editor’s Choice, 26 Highly Commended, 19 Guest Editor, 119 Readers' Choice and 213 User Awards Exodus Travels: 2018 calendar (February image) Facebook groups EP Cover Photo of the Week and Admin’s Choice from Expert Photography Photo of the Day and Photo of the Week for the International Photography Group Photo of the Day and Administrator’s Choice for Light and Shade Top Post of the Day from Nature & Creativity Cover Page and Weekly Contest for Nature Photography Administrator Choice for Photographers of the World Photo of the Week for Photography Certificate of Excellence, Weekly Contest, Cover Page and Admin Choice for the Professional Photographers Community Faunistic Selection for Renaissance Photography Top of the Day, Photo of the Day and Cracker of the Day for Save Earth Admin’s Choice from Superb Photography Cover photo for Wildlife & Nature Photography Certificate of Excellence from World Photographer - Wonderful Photography Magazine Award for World’s Top Photographers Instagram: Featured photo for @wildlifeplanet.ig, Featured Artist for @all_animals_addiction and @raw_africa_ and Daily Features for @instaperfect_capture, @wildlife__perfection, @OnlyAfrica, @kings_animals_love and Bonvac_Fauna Artist of the Week for Artlimes, Photographer of the Month for Picture Frames Express, Artist in Focus for LUMIarts and featured in Pond5’s Instagram Takeover and the May 2020, January 2021 February 2021 and March 2021 APÉRO catalogues. Exhibitions Chosen to take part in the Butterfly Effect online art exhibition put on by Contemporary Art Curator Magazine. Held solo exhibitions at the Norman Plastow Gallery in Wimbledon Village, Lumi Arts in Pimlico and 508 King's Road, where I am an artist-in-residence. Took part in Glaziers' Art Fair, Parallax Art Fair, PhotoX Awards 2018 at the Menier Gallery and various group shows at 508 King's Road and Gabriel Fine Arts. Took part in the Indian Photography Festival Exhibition and see | me exhibitions on Facebook and in New York. Was chosen for the online art galleries at Art Bridge, Artfinder, Art Gallery, Arthola, The Art Online Gallery, Artlimes, Printscapes and Saatchi Art. Sold six prints of a leopard at Greatest Maasai Mara Photographer of the Year exhibitions in Melbourne, Brisbane, Cape Town, Atlanta, Dallas and Johannesburg. Other Worked as Resident Photographer at Klein’s Camp, Serengeti Under Canvas, Grumeti Serengeti Tented Camp and Cottar’s 1920s Safari Camp in Africa for four months in 2019. Worked as Resident Photographer at Gabus Game Ranch in 2020. Gave talks for The Societies of Photographers, on two Antarctic cruise ships and at The Athenaeum Club, Grumeti Serengeti Tented Camp, Cottar’s 1920s Safari Camp, the SW19 Women's Institute, the Putney Women’s Institute, Malden Camera Club, Watford Camera Club, Putney Library, the London Institute of Photography and Beckenham Photographic Society. Helped judge the 2019 Canary Wharf Wildlife Photography Competition. Ran photography workshops at Canary Wharf and Putney Library. Gave private lessons to various amateur photographers. Recorded six wildlife photography videos with Coinaphoto, covering Africa, Asia, Europe, North America, South America and the polar regions. Had my work reviewed by Anthony Morganti on YouTube Became lifetime member of the Circle for the Foundation of the Arts (CFA). Joined the Society of International Nature and Wildlife Photographers in October 2013.

Courses matching "Enterprise"

Show all 1226

55238 SharePoint Online for Administrators

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for Administrators who need to setup, configure and manage SharePoint Online as part of their Office 365 Administration. Overview After completing this course, students will gain the skills to: - Understand the architecture of SharePoint Online - Have knowledge of all the components in SharePoint Online - Have on hands on experience configuring the components of SharePoint Online - Have hands on experience configuring the options - Work with Site Collections and storage options - Manage user profiles and social profiling - Understand and configure data connectivity in SharePoint Online - Build a taxonomy structure - Understand and configure Search in SharePoint Online - Configure and deploy apps - Understand and define Enterprise content management and data loss prevention. - Configure additional options and features in SharePoint Online such as Information Rights Management This course will introduce the audience to SharePoint Online Administration in Office 365 and explain and demonstrate the configuration options for SharePoint Online. The course is appropriate for existing SharePoint on-premises administrators and new administrators to Office 365 who need to understand how to correctly setup SharePoint Online for their company. The course will also help SharePoint on-premise administrators understand the differences between SharePoint on-premises and SharePoint Online. 1 - INTRODUCTION TO OFFICE 365 AND SHAREPOINT ONLINE Introduction to the Office 365 Administration Center Configure Reporting Accessing SharePoint management tools Accessing security and compliancy Managing Office 365 and SharePoint Online with PowerShell Comparing On Premises SharePoint with SharePoint Online User identity in Office 365 and SharePoint Online Manging user domains Building Hybrid scenarios OneDrive and Sites redirection Yammer redirection Understand hybrid search Hybrid business data connectivity Hybrid taxonomy 2 - WORKING WITH SITE COLLECTIONS Introduction to classic and modern admin centers Creating Site Collections Defining ownership and security for site collections Configuring Storage Configure External Access to site collections Recovering site collections Configure external sharing Managing site collections with PowerShell 3 - MANAGING USER PROFILES Overview of the profile service Defining profile properties Map profile properties to a term store Creating custom profile properties Managing audiences Creating audiences Managing user profile policies Configure trusted my site host locations Configure preferred search center locations Defining read access permission levels Configuring newsfeed options Setup email notifications Configure my site cleanup 4 - WORKING WITH DATA CONNECTIONS Introduction to Data Connections Overview of PowerApps, Flow and PowerBi Overview of the business connectivity service Introduction to BDC definition files Creating BDC definition files Introduction to the secure store service Configuring the secure store service Creating secure store target application settings Configure connections to cloud services Configure connections to on-premises services Tools to build data connections Creating external content types Building external lists using external data 5 - MANAGING THE TERM STORE Overview of the term store Understanding terms and life cycle management Creating term groups Creating the term store Creating Term Sets in the UI Creating Term Sets via importing via a CSV Creating terms in the UI Creating terms via PowerShell and CSOM Manage terms with synonyms and pinning Configure delegated administration 6 - CONFIGURING SEARCH An Introduction to the search service Classic versus Modern search experience Understanding Managed Properties Create Managed Properties Manage Authoritative pages Understand Result sources Create and configure result sources Understand Query rules Promoting results through query rules Remove search results from the index Exporting search configurations Importing search configurations 7 - CONFIGURING APPS An Introduction to Apps Understanding the App Catalog Building the App catalog Adding Apps to the catalog Add Apps to your SharePoint sites Adding Apps via the marketplace store Manage App licensing Configure store access settings Monitoring app usage 8 - ENTERPRISE CONTENT MANAGEMENT IN SHAREPOINT ONLINE An Introduction to ECM in SharePoint Online Components of ECM Office 365 versus classic compliancy Understanding In-Place records management Configure In-Place records management Understanding the records center Build and configure a records center Understanding the compliancy policy center Build a compliancy policy center and configure policies Discover the security and compliancy center Configure an eDiscovery center Build an eDiscovery case Understand data loss prevention Build a data loss prevention policy and query Working with classification and data governance 9 - MANAGE OPTIONS FOR SHAREPOINT ONLINE Configure OneDrive features Configure use of Yammer or Newsfeeds Understand Information Rights Management Configure Information Rights Management Define site classification options Understand early release options for Office 365 Configure Early release options for your Office 365 tenant Manage Access Control Additional course details: Nexus Humans 55238 SharePoint Online for Administrators training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55238 SharePoint Online for Administrators course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55238 SharePoint Online for Administrators
Delivered Online + more
£1,785

55399 Implementing and Managing Microsoft Intune

By Nexus Human

Duration 3 Days 18 CPD hours This three-day instructor-led course is aimed at modern device management professionals looking to manage their enterprise devices using Microsoft Intune. This course will cover Enrolment, Application Management, Endpoint Security and Windows Autopilot as well as Azure Active Directory Conditional Access and Identity Protection. The delegates will learn how to enroll devices, deploy applications and manage them to maximize user productivity and device security. 1: Introduction to Microsoft Intune Mobile Device Management Microsoft Intune Azure Active Directory AAD Identity Protection AAD Conditional Access 2: Microsoft Intune Device Management Enrolling Devices Device Compliance Device Profiles Device Updates 3: Microsoft Intune Application Management Application Management Deploying Applications Application Configuration Managing Applications Policy Sets and Guided Scenarios 4: Microsoft Intune Endpoint Security Security Baselines and tasks Antivirus Disk Encryption Firewall Atack Surface reduction Endpoint detection and response Account Protection 5: Deploying Windows with Windows Autopilot Windows Autopilot overview Preparing for Windows Autopilot deployment Deploying Windows 11 using Windows Autopilot 6: Microsoft Intune Additional and Premium Features Remote Help Tunnel for Mobile Application Management Endpoint Privilege Management Advanced Endpoint Analytics Additional course details: Nexus Humans 55399 Implementing and Managing Microsoft Intune training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55399 Implementing and Managing Microsoft Intune course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55399 Implementing and Managing Microsoft Intune
Delivered Online + more
£1,785

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online
£2,975

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online + more
£2,475

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online + more
£2,975

55341 Installation, Storage, and Compute with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server. This course will help them update their knowledge and skills related to storage and compute for Windows Server. Overview Prepare and install Windows Server and plan a server upgrade and migration strategy. Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes. Describe enterprise storage solutions, and select the appropriate solution for a given situation. Implement and manage Storage Spaces and Data Deduplication. Install and configure Microsoft Hyper-V, and configure virtual machines. Deploy, configure, and manage Windows and Hyper-V containers. Describe the high availability and disaster recovery technologies in Windows Server. Plan, create, and manage a failover cluster. Implement failover clustering for Hyper-V virtual machines. Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation. Create and manage deployment images. Manage, monitor, and maintain virtual machine installations. This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites A basic understanding of networking fundamentals. An awareness and understanding of security best practices. An understanding of basic Active Directory concepts. Basic knowledge of server hardware. Experience supporting and configuring Windows client operating systems such as Windows 10 or Windows 11. 1 - Installing, upgrading, and migrating servers and workloads Introducing Windows Server Preparing and installing Server Core Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models 2 - Configuring local storage Managing disks in Windows Server Managing volumes in Windows Server 3 - Implementing enterprise storage solutions Overview of DAS, NAS, and SANs Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet Understanding iSNS, DCB, and MPIO Configuring sharing in Windows Server 4 - Implementing Storage Spaces and Data Deduplication Implementing Storage Spaces Managing Storage Spaces Implementing Data Deduplication 5 - Installing and configuring Hyper-V and virtual machines Overview of Hyper-V Installing Hyper-V Configuring storage on Hyper-V host servers Configuring networking on Hyper-V host servers Configuring Hyper-V virtual machines Managing virtual machines 6 - Deploying and managing containers Overview of containers in Windows Server Deploying Windows Server and Hyper-V containers Installing, configuring, and managing containers by using Docker 7 - High availability and disaster recovery Defining levels of availability Planning high availability and disaster recovery solutions with Hyper-V virtual machines Backing up and restoring by using Windows Server Backup High availability with failover clustering in Windows Server 8 - Implementing failover clustering Planning a failover cluster Creating and configuring a new failover cluster Maintaining a failover cluster Troubleshooting a failover cluster Implementing site high availability with stretch clustering 9 - Implementing failover clustering with Windows Server Hyper-V Overview of the integration of Hyper-V with failover clustering Implementing Hyper-V VMs on failover clusters Key features for VMs in a clustered environment 10 - Implementing Network Load Balancing Overview of NLB Configuring an NLB cluster Planning an NLB implementation 11 - Creating and managing deployment images Introduction to deployment images Creating and managing deployment images by using MDT Virtual machine environments for different workloads 12 - Managing, monitoring, and maintaining virtual machine installations WSUS overview and deployment options Update management process with WSUS Overview of Windows PowerShell DSC Overview of Windows Server monitoring tools Using Performance Monitor Monitoring event logs

55341 Installation, Storage, and Compute with Windows Server
Delivered Online
£2,975

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered Online
£2,037

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - Explaining the OSI and TCP/IP Models Topic A: Explain OSI Model Layers Topic B: Explain the TCP/IP Suite 2 - Explaining Properties of Network Traffic Topic A: Explain Media Types and Access Methods Topic B: Deploy Ethernet Standards Topic C: Configure and Monitor Network Interfaces 3 - Installing and Configuring Switched Networks Topic A: Install and Configure Hubs and Bridges Topic B: Install and Configure Switches Topic C: Compare and Contrast Network Topologies Topic D: Compare and Contrast Network Types 4 - Configuring IP Networks Topic A: Configure IPv4 Addressing Components Topic B: Test IP Interfaces with Command Line Tools Topic C: Configure IPv4 Subnets Topic D: Configure Private and Public IPv4 Addressing Schemes Topic E: Configure IPv6 Addressing Components Topic F: Configure DHCP Services 5 - Installing and Configuring Routed Networks Topic A: Explain Characteristics of Routing Topic B: Install and Configure Routers 6 - Configuring and Monitoring Ports and Protocols Topic A: Explain the Uses of Ports and Protocols Topic B: Use Port Scanners and Protocol Analyzers Topic C: Explain the Use of Name Resolution Services Topic D: Configure DNS and IPAM Services 7 - Explaining Network Application and Storage Services Topic A: Explain the Uses of Network Applications Topic B: Explain the Uses of Voice Services and Advanced Networking Devices Topic C: Explain the Uses of Virtualization and Network Storage Services Topic D: Summarize the Concepts of Cloud Services 8 - Monitoring and Troubleshooting Networks Topic A: Monitor Network Interfaces and Logs Topic B: Explain Network Troubleshooting Methodology Topic C: Troubleshoot Common Network Services Issues 9 - Explaining Networking Attacks and Mitigations Topic A: Summarize Common Networking Attacks Topic B: Explain the Characteristics of VLANs Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - Installing and Configuring Security Devices Topic A: Install and Configure Firewalls and Proxies Topic B: Explain the Uses of IDS/IPS and UTM 11 - Explaining Authentication and Access Controls Topic A: Explain Authentication Controls and Attacks Topic B: Explain the Uses of Authentication Protocols and Directory Services Topic C: Explain the Uses of Port Security and NAC Topic D: Implement Network Device Hardening Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - Deploying and Troubleshooting Cabling Solutions Topic A: Deploy Structured Cabling Systems Topic B: Deploy Twisted Pair Cabling Solutions Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions Topic D: Deploy Fiber Optic Cabling Solutions 13 - Implementing and Troubleshooting Wireless Technologies Topic A: Install and Configure Wireless Technologies Topic B: Troubleshoot Wireless Performance Issues Topic C: Secure and Troubleshoot Wireless Connectivity 14 - Comparing and Contrasting WAN Technologies Topic A: Compare and Contrast WAN Core Service Types Topic B: Compare and Contrast WAN Subscriber Service Types Topic C: Compare and Contrast WAN Framing Service Types Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - Using Remote Access Methods Topic A: Use Remote Access VPNs Topic B: Use Remote Access Management Methods 16 - Identifying Site Policies and Best Practices Topic A: Manage Networks with Documentation and Diagrams Topic B: Summarize the Purposes of Physical Security Devices Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online + more
£2,475

DevOps Foundation©

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Foundation course includes Management, Operations, Developers, QA and Testing professionals such as: Individuals involved in IT development IT operations or IT service management. Individuals who require an understanding of DevOps principles. IT professionals working within, or about to enter, an Agile Service Design Environment The following IT roles: Automation Architects, Application Developers, Business Analysts, Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Consultants, DevOps Engineers, Infrastructure Architect, Integration Specialists, IT Directors, IT Managers, IT Operations, IT Team Leaders, Lean Coaches, Network Administrators, Operations Managers, Project Managers, Release Engineers, Software Developers, Software Tester/QA, System Administrators, Systems Engineers, System Integrators, Tool Providers. Overview The learning objectives for DevOps Foundation include an understanding of: DevOps objectives and vocabulary Benefits to the business and IT Principles and practices including Continuous Integration, Continuous Delivery, testing, security and the Three Ways DevOps relationship to Agile, Lean and ITSM Improved workflows, communication and feedback loops Automation practices including deployment pipelines and DevOps toolchains Scaling DevOps for the enterprise Critical success factors and key performance indicators Real-life examples and results The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organizational success. Learners will gain an understanding of DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation to improve the flow of work between software developers and IT operations professionals. This course prepares you for the DevOps Foundation (DOFD) certification. Exploring DevOps Defining DevOps Why Does DevOps Matter? Core DevOps Principles The Three Ways The First Way The Theory of Constraints The Second Way The Third Way Chaos Engineering Learning Organizations Key DevOps Practices Continuous Testing, Integration, Delivery, Deployment Site Reliability & Resilience Engineering DevSecOps ChatOps Kanban Business and Technology Frameworks Agile ITSM Lean Safety Culture Learning Organizations Continuous Funding Culture, Behaviors & Operating Models Defining Culture Cultural Debt Behavioral Models Organizational maturity models Automation & Architecting DevOps Toolchains CI/CD Cloud, Containers, and Microservices AI and Machine Learning Automation DevOps Toolchains Measurement, Metrics, and Reporting The Importance of Measurement DevOps Metrics - Speed, Quality, Stability, Culture Change lead/cycle time Value Driven Metrics Sharing, Shadowing and Evolving DevOps in the Enterprise Roles DevOps Leadership Organizational Considerations Getting Started Challenges, Risks, and Critical Success Factors Additional course details: Nexus Humans DevOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevOps Foundation©
Delivered Online
£1,495

Enterprise Risk Management

5.0(10)

By GBA Corporate

Overview With the change in the density of enterprise risk, new risks have emerged, and managing it has become everyone's responsibility. The new Enterprise Risk Management course offers you the exclusive opportunity to learn the concepts and principles of the newly updated ERM framework and to integrate the framework into your organisation's strategy. The course is designed with all the modules to provide you with the knowledge necessary to understand and apply Enterprise Risk Management - Integrating with Strategy and Performance. The ERM framework assists management and boards of directors with their respective duties for managing risk.

Enterprise Risk Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626