• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1234 Enterprise courses delivered Online

Red Hat High Availability Clustering (RH436)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services. Overview Install and configure a Pacemaker-based high availability cluster. Create and manage highly available services. Troubleshoot common cluster issues. Work with shared storage (iSCSI) and configure multipathing. Implement Logical Volume Manager (LVM) in cluster-aware configurations. Configure GFS2 file systems on storage shared by multiple nodes. Deploy reliable, available critical production services in a high availability cluster In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities. You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath. This course is based on Red Hat Enterprise Linux 8.3. Prerequisites Red Hat Certified System Administrator (RHCSA) exam (EX200) and associated courses. Red Hat Cerfitied Engineer (RHCE) exam (EX294) and associated courses. 1 - Creating high availability clusters Create a basic high availability cluster. 2 - Managing cluster nodes and quorum Manage node membership in the cluster and describe how it impacts cluster operation. 3 - Isolating malfunctioning cluster nodes Isolate unresponsive cluster nodes to protect data and recover services and resources after a failure. 4 - Creating and configuring resources Create basic resources and resource groups to provide highly available services. 5 - Troubleshooting high availability clusters Identify, diagnose, and fix cluster issues. 6 - Automating cluster and resource deployment Deploy a new high availability cluster and cluster resources using Ansible automation. 7 - Managing two-node clusters Operate two-node clusters while identifying and avoiding issues specific to a two-node cluster configuration. 8 - Accessing iSCSI storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters. 9 - Accessing storage devices resiliently Configure resilient access to storage devices that have multiple access paths. 10 - Configuring LVM in clusters Select, configure, and manage the correct LVM configuration for use in your cluster. 11 - Providing storage with the GFS2 cluster file system Use the GFS2 cluster file system to simultaneously pProvide tightly coupled shared storage that can be accessed by multiple nodes. 12 - Eliminating single points of failure Identify and eliminate single points of failure in your cluster to decrease risk and increase average service availability. Note: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact a training specialist. Additional course details: Nexus Humans Red Hat High Availability Clustering (RH436) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat High Availability Clustering (RH436) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat High Availability Clustering (RH436)
Delivered OnlineFlexible Dates
Price on Enquiry

The PMO: Business Enabler and Change Agent

By IIL Europe Ltd

The PMO: Business Enabler and Change Agent Corporate entities and government agencies are in the midst of transformational change as a result of business imperatives, regulatory requirements, competitive necessity, mergers & acquisitions, and a plethora of modernizations. PMOs can no longer contribute or even survive under the mantra of Score Keeper and Methodology Advocate. Evolving, successful PMOs are Business Enablers and Change Agents. To remain relevant and continue to add value across the enterprise, PMOs must become part of the fabric of the overall organization. This presentation bridges the gap between the Administrative PMO and the Sustainable and Valued Business Integration PMO. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

The PMO: Business Enabler and Change Agent
Delivered Online On Demand15 minutes
£10

The PMO: Business Enabler and Change Agent

By IIL Europe Ltd

The PMO: Business Enabler and Change Agent Corporate entities and government agencies are in the midst of transformational change as a result of business imperatives, regulatory requirements, competitive necessity, mergers & acquisitions, and a plethora of modernizations. PMOs can no longer contribute or even survive under the mantra of Score Keeper and Methodology Advocate. Evolving, successful PMOs are Business Enablers and Change Agents. To remain relevant and continue to add value across the enterprise, PMOs must become part of the fabric of the overall organization. This presentation bridges the gap between the Administrative PMO and the Sustainable and Valued Business Integration PMO. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

The PMO: Business Enabler and Change Agent
Delivered Online On Demand15 minutes
£10

Linux Security and Hardening, The Practical Security Guide

By Packt

Secure any Linux server from hackers and protect it against hacking. The practical Linux Administration security guide.

Linux Security and Hardening, The Practical Security Guide
Delivered Online On Demand4 hours 15 minutes
£93.99

Cisco Implementing and Administering DNA Center for Assurance v2.0 (IADNACA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: IT Solution Architects Network Security Architects Networking Admin and Operations Networking Field Engineers In this workshop you will learn why we are implementing Assurance, and what does looks like and key features. We will also discuss the Cisco DNA center appliance and workflow and tasks associated with an implementation. Module 1: Introduction to Cisco DNA Center Assurance Introduction to DNA Center System Architecture Key Features and Use Cases Introduction to Cisco ISE and DNAC-ISE integration Module 2: Design Network design options Sites Creating Enterprise and Sites Hierarchy Configuring General Network Settings Loading maps into the GUI IP Address Management Software Image Management ? Lab on Day 5 Network Device Profiles AAA SNMP Syslog IP address pools Creating Enterprise and Guest SSIDs ? Lab on Day 2 Creating the wireless RF Profile Cresting the Guest Portal for the Guest SSIDs Network profiles ? Lab on Day 2 Authentication templates Module 3: Discovery and Provision Device Discovery and Protocols Devices Onboarding Assigning Devices to a site Provisioning device with profiles Plug and Play Templates Templates for Day-0 Templates for Day-N operations Module 4: Monitoring Device, Client, and Application Health DNAC Telemetry Monitoring Network Device Health and Performance Monitoring Wired and Wireless Client Health and Performance Monitoring Application Health and Performance Module 5: Application Visibility and DNAC Integration with Umbrella Monitoring Application Visibility in DNA Center Umbrella Introduction DNA Center Umbrella Integration and Use Cases Module 6: Troubleshooting Issues, Observing Insights and Trends Detect Issues, Insights, and Trends in the Network DNA Center Integration with other tools for Monitoring and Management Module 7: Troubleshooting using Cisco DNA Center Assurance Tools DNAC Assurance Troubleshooting Tools Using Sensor Tests Using Intelligent Capture Spectrum Analysis Module 8: DNAC and Thousand Eyes Introduction to ThousandEyes ThousandEyes Use Cases DNA Center and ThousandEyes Integration Module 9: AI Analytics and Machine Learning in DNA Center Overview of AI Analytics and ML (Machine Learning) DNA Center AI and ML Use Cases Module 10: DNA Center Maintenance DNA Center Reports DNA Center Backup and Restore

Cisco Implementing and Administering DNA Center for Assurance v2.0 (IADNACA)
Delivered OnlineFlexible Dates
Price on Enquiry

Java 9 Masterclass - Beginner to Expert -Updated for 2020

By iStudy UK

If you want to learn Java from not knowing anything to a paid Java Developer, then this is a course for you! Java is one of the most popular languages in the World. It's used by companies like Google, Accenture, Target, CenturyLink, Intel, Symantec, T-Mobile, eBay, Capital One, Groupon, New Relic, Nielsen, Uber, Spotify, Philips, Chegg, Yelp, Okta, Slack, Thomson Reuters, Opower, Zillow, Cloudera, Netflix, Canon, TripAdvisor and many more. This means the demand is not scarce. With Java Skills you will always have a job, and companies all over the world will be coming to you! This course is designed to teach you everything you need to know about Java in order to build high-end, efficient and scalable Java Applications. If you want to become: a highly paid Java Developer an expert Java Programmer companies want to hire a Freelancer Java Programmer who builds Enterprises Java Applications a person who can build their own business applications using Java Programming Language an Android Developer a Java Web/Enterprise Applications Developer better at Java ( sharpen your Java Knowledge and go deep into learning Advanced Java) a Certified Java Developer... ... much more... Then this course is for you and much more.... You'll be immersed into Java from the first lecture to the end. You will also receive a Certificate of Completion so you can present to your potential employer. Why this Course? Why is this the best Course To Learn Java? Well, if you are here is probably because you've either looked online for Java tutorials or maybe watched a lot of youtube videos and still can't really grasp core Java Programming Principles. You see, out there on the Internet, you can find a lot of information, but the problem is that everything is scattered around and very frustrating to actually learn the right way since all you get is fragments of information. This is where this Complete Java MasterClass shines - it takes you from nothing to actually building amazing Java Applications, and MOST importantly, you'll learn the Ins and Outs of Java Programming Language. With the knowledge you gain from this course you can build any Java Based Application - Web Applications, Android Mobile Apps, Desktop Applications and even program your DVD Player! Here's a list of some of the things you'll learn: Everything pertaining to Java - Java keywords, Java lingo (operators, if statements, for loops, switch statements, while loops) and many other basic, fundamentals that will help you have a solid Java knowledge. I will show you how to install all the tools you need in order to run Java programs such as IntelliJ ( which is the development tool used to code in Java ). Also, will show you how to install the Java libraries onto your machine (Windows, Linux and Mac). By the way, if you are using Eclipse, Jedit, Notepad, Netbeans or any other IDE, it's all good - you will still be learning a lot from this course. I will show you how to think like a Pro Programmer when learning Java, and how to use the Java knowledge and transfer it to build Android Apps , Web Apps (using many other Java Frameworks like Spring Framework, Hibernate and more) Java Object Oriented Programming so you can re-use code and write truly scalable and efficient code. You'll Learn JavaFX library and build amazing User Interfaces that will make your potential employers want to hire you right away! And so much more.... My goal in this course is to give you everything I know about Java so that you can be the best Java Programmer in the market! So that you become a Well-Rounded Java Programmer! All I teach you is what I wished I had known when I first started learning to Program in Java. Don't just take my word for it, see what my past students had to say about my courses and my teaching style: 'Very well thought-out course. Flows smoothly with great delivery. I have been developing Android Apps for several years and I still found this course to be informative, relevant, and helpful. I would recommend everyone take this course if you are new to Android or returning for a refresher course.' - Douglas Pillsbury 'Great course. very easy in understanding and friendly learning. Good Job Sir. Thanks for this.' - Muhammad Adnan 'I am very satisfied with this course. I have only attended the Android part because I had a basic knowledge on Java. I really like how Paulo teaches. He goes step by step and you can understand everything. My first language is not english, but he speaks very clearly, I can understand every word. Also, he is a happy guy, and you can hear that throug the courses that he really loves what he is doing. ' - Antal Bereczki 'This course is ideal for beginners. This guy is a good teacher. As i get deeper, i feel i am gaining more and more power...haha. I honestly think this is the best money i have ever spent in my life. This course is worth the money 100 times over. OMG, this good. Paulo, you are FANTASTIC !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!' - Sean 'So far one of the best courses and instructors i have experienced in Udemy.' - Jim Landon Are you afraid that maybe since you are an experience developer, and have never done Java before, you won't be able to learn Java? Take a look at what one of my students said about my course and teaching style: 'As a web developer I always thought that learning Android development will be hard. But with this course it's piece of cake!' - SaÅ¡a Lacković Students love my course so much that they can't even contain themselves... Look at what one student wrote: 'If there's something more than 5 starts, I would have given to this course. Really great content along with detailed explanation. Keep going on by updating and enhancing the content of this course. Personally, I enjoy every lecture I attend. PAULO... YOU ARE BEST OF THE BEST 🙂  Thanks a lot for this great course, Best regards.' - Bassel Nasief Sign up today, and look forward to: Over 30 hours of HD 1080p video content Source code Assignments Building several fully-fledged Java Applications All the knowledge you need to start building any Java Application you want - Web, Desktop and more. Thousands of dollars worth of design assets My best selling From Zero to a Pro Mobile Developer eBook It's proven that the best way to learn something is by immersing yourself in the subject you are trying to learn. If you want to master Java Programming, then you are in the right place. By the end of this course, you will master Java Programming no matter the level of experience you are at right now.  In this comprehensive course, you will be learning by doing, by coding alongside me. You'll understand exactly what I am doing and why. You will hone this Java Programming craft. Why learn Java compared to other programming languages? If you do a quick google search, you'll find that Java is the most popular Programming Language in use according to TIOBE index, since it's the ONLY language that works across all computer platform. Java has the capability to run into different devices ( Android included) without needing to be recompiled for each one. Hence, the slogan 'Write once, run anywhere' This is why Java is everywhere. Literally, everywhere! Can you see the potential of making a really good living by becoming a Java Developer? Give yourself the competitive advantage by learning the most popular programming language of all times - Java! If you know Java, you'll always be competitive in the market. You will be at the top of the food chain! REMEMBER... I'm so confident that you'll love this course that we're offering a FULL money back guarantee for 30 days! So it's a complete no-brainer, sign up today with ZERO risk and EVERYTHING to gain. So what are you waiting for? Click the Enroll Now button and join the world's most highly rated Java 9 Masterclass - Beginner to Expert. Who is the target audience? Anyone who wants to learn Java Programming Language Anyone who wants to learn JavaFX, Java Web Application Development, Java Databases What you'll learn Have a Full Java Programming Language Core Knowledge Build JavaFX User Interfaces and Applications Build Scalable, Maintainable and Clean Java Programs Learn how to Use Many Java Enterprise Frameworks like SpringBoot and Vaadin to Build Java Enterprise Applications Become a Well-Rounded Java Programmer - who can see the big picture of Applications to be built Requirements Have a Computer and know how to turn it on and off. Willingness and drive to learn, strong work ethics, a doer mentality You - show up ready to learn!

Java 9 Masterclass - Beginner to Expert -Updated for 2020
Delivered Online On Demand22 hours 55 minutes
£25

JavaScript in Action - 3 Fun Interactive JavaScript Projects

By Packt

Explore how you can build interactive and dynamic web content using JavaScript to create fun mini-projects

JavaScript in Action - 3 Fun Interactive JavaScript Projects
Delivered Online On Demand1 hour 30 minutes
£29.99

ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN

By Nexus Human

Duration 5 Days 30 CPD hours Overview SDWAN Overview Cisco SDWAN Hardware Deploying the Overlay Configuring vManage Deploying using Templates Creating Policies Monitoring vManage vAnalytics Troubleshooting Tools for VManage In this Implementation and Configuration SDWAN Course, students will deploy and configure SD-WAN Controllers, vEdge Devices, and Cisco IOS-XE Devices. Students will create Multiple Device and CLI Templates that will allow Hundreds of devices to be deployed using only a few Centralized Templates. Students will create Security Policies to enable the Enterprise Firewall, IDS/IPS, URL Filtering, and Web Layer Security to protect and allow Enterprises to deploy Cloud applications as well as Direct Internet Access (DIA). Students will also create Local and Central Policies that enable a Centralized Policy control of WAN Routing and device QOS configuration and enforcement. Students will also learn how Cisco SD-WAN allows Enterprises to deploy an effective Cloud Solutions such as Amazon AWS, Microsoft Azure, and Google Cloud. Students will also learn how to Monitor and Troubleshoot the SD-WAN Solution. SDWAN Overview Describe what a Software-Defined Wide Area Network (SD-WAN) is Describe the secure extensible network Describe the function of the virtual IP fabric created in the SD-WAN solution What is SDWAN Cisco Cloud vs On-premises vs private cloud management Cisco IWAN vs Viptela SDWAN IWAN Migration to SDWAN SDWAN Integration with Cisco Cisco SDWAN Licensing Deploying Cisco SDWAN Controllers On-Prem vs Cloud deployment vManage NMS vBond Orchestrator Deploy the vSmart Controller Controller High Availability Cluster Management Cisco SDWAN Certificates and Whitelists On-Prem vs Cloud Certificate deployment Controller Certificates Hardware Device Certificates Software Device Certificates Certificates Device Whitelists Controller Whitelists Cisco SDWAN Edge Devices vEdge Appliances vEdge Cloud Cisco IOS-XE Platforms Cisco CSR 1000V Router Cisco 54xx Enterprise Network Compute System (ENCS) Cisco SDWAN Fabric and Overview Virtual Fabric Overview Overlay Management Protocol Transport Locators (TLOCs) Multicast TCP Optimization Opening Firewall Ports Software Installation and Upgrade vEdge Routers Deploying vEdge Routers Migrating IOS-XE Devices to Cisco SD-WAN Zero Touch Provisioning Deploy AWS Gateway using the AWS Wizard Cisco SD-WAN Security Solution Security SDWAN IOS-XE Security SDWAN vEdge Security Firewall Ports Control Plane Security Data Plane Security Traffic Segmentation Service Chaining Cloud Security Enterprise Firewall Quality of Service Application Visibility and Recognition Differentiated Services-Quality of Service Critical Applications SLA Path MTU Discovery TCP Performance Optimization Bidirectional Forwarding Detection (BFD) vEdge Router Queuing Configuring vManage Using the vManage Interface Using the vManage Dashboard Administration Configuration SD-WAN Templates Templates Wide Area Application Server (WAAS) Maintenance Configure Cisco Umbrella Quality of Service (QoS) SD-WAN Policies Local Policies vs Central Policies Policies Smart policies (Control, Data, AppRoute, cflowd) SD-WAN Cloud OnRamp SAAS Cloud OnRamp IAAS vAnalytics Applications Network Availability Network Health vAnalytics Dashboard Monitoring vManage Network ACL Log Alarms Audit Log Events Geography View Device Information View Link Information Configure Geographic Coordinates for a Device Troubleshooting Tools for vManage Using vManage to Troubleshoot the environment Operational Commands Rediscover Network CLI Command to troubleshoot the environment. SSH Terminal Additional course details: Nexus Humans ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ICSDWAN-CT-Implementing, Configuring, Monitoring, and Troubleshooting Cisco (Viptela)SDWAN
Delivered OnlineFlexible Dates
Price on Enquiry

Dog Walking Course

3.5(2)

By Elearncollege

Description Dog Walking Diploma Dog walking is an option for people who are in search of self-employment. Just like any other job, dog walking also involves certain challenges. Altogether it has been considered as a job which gives you peace of mind. Before entering into the business of dog walking, one should know the scope and objectives of dog walking. You need to balance your expense and income keeping in mind that being self-employed will not guarantee you a steady income. After having a clear knowledge about the job, you can register the enterprise and start promoting it. You should create a website and set up good customer service so as to earn the trust of clients, the cornerstone of any business. You can make use of any media for advertising. Once the agreement is signed, the dog walker will be in charge of the dog. The time and route of travel can be decided by taking into account the convenience of the dog and dog walker. He should ensure the safety of the dog and of himself. There can be several difficulties for both the dog and the client. Dog walker should handle all of them tactically in a professional way. The dog walker should keep in mind that there are chances for dog fights and should therefore take preventive measures. He should keep communicating with the client at frequent intervals. Blogging is the best option for this. The dog walker should maintain the blog regularly. Trust is the main factor which a dog walker should not lose. If it is lost, everything will be worthless. Dog walking diploma aims to make people aware of dog walking. It describes all of its steps in different chapters in detail. It is a guide for all who wish to build up a future in dog walking. Along with the basics of dog walking, the dog walking diploma explains the strategies involved as well. What you will learn 1: Scope and Objectives of dog walking 2: Primary steps of business 3: Creating a website 4: Advertising strategies 5: Equipment for dog walking business 6: Interviewing the client 7: Start with dog walking 8: Understanding the animal and earning trust 9: Encountering troubles and dog fight  Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Dog Walking Course
Delivered Online On Demand9 days
£99

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered OnlineFlexible Dates
£2,380