• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

73 Enterprise courses in Liverpool

Growth Leadership Programme

By The Power Within Training & Development Ltd

Workplace Innovation Are You A Leader Who Wants To Enhance Your Team’s Accountability, Adaptability, Resilience, And Well-Being? Consider joining our newly launched Growth Leadership Programme: Workplace Innovation, subsided by Scottish Enterprise, which offers a unique approach to leadership development and workplace Innovation, emphasising Motivational Intelligence (MQ). Our programme will help you build on your leadership capabilities and confidence while creating a more innovative, productive, and fair workplace for employee development and growth. Growth Leadership: Workplace Innovation Leading with Motivational Intelligence (MQ) You’ll learn to: Develop MQ leadership skills that encourage fair and innovative workplace practices and inclusive economic growth. Increase engagement, innovation, and productivity among your team. Enhance your strategic decision-making skills. Build a resilient, agile, and change-driven team culture. Identify and integrate organisational values into your workplace culture. Create a successful business that is also a fair place to work. Session Overview Our comprehensive programme, consisting of eight engaging and insightful sessions, is meticulously crafted to provide a world-class education in Leadership, Workplace Innovation and Motivational Intelligence (MQ). We combine some of the most potent, powerful and cutting-edge research in workplace innovation, neuroscience and the most promising discoveries in cognitive and social psychology of the 20th century. 01 Self-Leadership and The Secret to Personal Success Session 1: Self-Leadership and The Secret to Personal Success This comprehensive kick-off session delves into the foundations of self-leadership and personal success. Participants will explore various aspects, from setting course expectations and creating a conducive learning environment to understanding motivational intelligence and managing negative thoughts. Through essential resources like the Leadership Reference Manual and Roadmap Workbook, multi-sensory perception, and spaced repetition learning techniques, participants will solidify their learnings and enhance personal and professional growth. Key Learning Outcomes: Understand the critical role of self-leadership in personal and professional success and the impact of external and internal factors on performance Develop strategies to optimise motivation, communication, and effectiveness within teams and organisations, leveraging diverse learning styles and adult learning techniques Utilise essential resources like the Leadership Reference Manual and Roadmap Workbook for ongoing growth and development while implementing practical tools like the Start, Stop, Continue plan for self-reflection and improvement Explore the power of adaptability, self-awareness, and resilience in navigating through challenging times and maintaining a positive mindset Discover the importance of a positive mental diet, gratitude, and consistent small decisions that compound over time, leading to personal and professional growth 02 The Role of Intelligence in Leadership and Management Session 2: The Role of Intelligence in Leadership and Management It's time to delve into Motivational Intelligence and its role in our personal and professional lives. In this comprehensive and interactive session, participants will explore the multifaceted aspects of intelligence in Leadership and management, focusing on IQ, EQ, and MQ. Participants will learn how to cultivate a growth mindset and motivational intelligence within themselves and their teams, fostering a culture of learning and resilience. The session will also cover the importance of crafting a clear vision for the team or organisation and provide practical strategies for effectively communicating the vision to internal and external stakeholders. Key Learning Outcomes: Understand the roles of IQ, EQ, and MQ in Leadership and management and their impact on individual and team performance Develop strategies to improve your levels of intelligence and foster a growth mindset within individuals and teams Discover the importance of vision in Leadership and management and learn to craft it using the WHERE (performance), HOW (perception), and WHY (purpose) perspectives Gain insights into effectively communicating the vision to stakeholders, ensuring alignment, ownership, and motivation Reflect on the role of a growth mindset and motivational intelligence in achieving the team's vision and fostering a culture of continuous improvement and adaptability 03 The Pillars of Human Performance: Unlocking Potential Session 3: The Pillars of Human Performance: Unlocking Unlimited Potential Discover the keys to unlocking your unlimited potential and becoming a more effective leader in this interactive course. Through engaging discussions and self-reflection, participants will dive deep into unlimited potential, understand its significance in Leadership, and learn to overcome challenges in their teams or businesses. Participants will gain insights into the characteristics of influential leaders, the importance of asking the right questions, and the value of embracing failure as a part of success. With a focus on personal and professional growth, this session will equip you with the tools and techniques to become a better manager and leader. Key Learning Outcomes: Understand the concept of unlimited potential and its importance in Leadership and personal growth Identify personal and team visions, challenges, and the role of asking the right questions in gaining insights Recognise the role of practice and reflection in transforming weaknesses into strengths Explore the characteristics and impact of great leaders and learn how to apply these traits in your leadership style Embrace the importance of failure as a crucial part of success and create a supportive environment for personal and team development 04 Defining Management and Vertical Alignment Session 4: Defining Management and Vertical Alignment In this engaging session, participants will delve into the essential differences between management and Leadership and discover how understanding these distinctions can significantly impact team culture and performance. We'll examine common management mistakes and their effects, uncover the best practices of excellent management, and discuss the development of management skills and the management hierarchy. This interactive session will provide valuable insights and actionable strategies that can be applied to personal and professional life, helping participants become more effective and successful managers and leaders. Key Learning Outcomes: Differentiating between management and Leadership: Gain a deeper understanding of how these concepts differ and their impact on team culture and performance Identifying common management mistakes: Learn about these pitfalls and their consequences on team culture and performance and develop strategies to avoid them Mastering the best practices of excellent management: Discover the five essential techniques to help you become a more effective manager Developing management skills and understanding the management hierarchy: Enhance your ability to grow as a leader and manager Embracing Ultimate Responsibility: Learn the importance of taking ownership and responsibility for your and your team's success and understand the role of motivational intelligence in achieving this 05 Workplace Innovation and High-Payoff Activities Session 5: Workplace Innovation and High-Payoff Activities n (Job Crafting) This session provides a comprehensive overview of the critical principles of workplace innovation, job crafting, people leadership, and coaching in the workplace. Participants will learn about job crafting, our MQ workplace innovation process, and the crucial role of Leadership in managing and monitoring performance in the workplace. By adopting a proactive and creative approach to their work, individuals can improve their job satisfaction, contribute to their organisation's success, and drive economic health for the nation. Key Learning Outcomes: Understanding of Leadership in the job crafting innovative process Skills in job crafting and workplace innovation Knowledge of the critical role of Leadership in performance management Techniques for effective coaching and positive feedback, through trust and mutual respect in the workplace Helping individuals reflect on their role in the success of the team and company and developing a written plan to achieve their goals 06 Defining and Exploring Leadership Session 6: Defining and Exploring Leadership In this session, we will define and explore the essence of Leadership, dispelling the myths and providing a definition that will guide you through the course. We will also explore the three-tier hierarchy of success and how leaders can influence MQ (motivational intelligence) by doing five things consistently. As a manager or leader, you may have found that your team's success is not guaranteed even with the best plans, processes, and strategies. This is because not all team members will adopt new ideas or changes unless they first believe they can achieve the desired outcome. Key Learning Outcomes: Understanding the essence of Leadership to provide an in-depth understanding of the essence of successful Leadership, dispelling the myths and providing a definition that will guide you through the course Psychology of your team: Leaders understand that to achieve their goals, they need to focus on the psychology of their team Power of questions in Leadership: Leaders can gain insight into the minds of their team members and unlock the key to motivating and developing them by asking the right questions Explore the three-tier hierarchy of success and the importance of each level in determining a person's likelihood of success Five things great leaders do each day to influence a culture of responsibility, consistently build esteem and confidence, and always work on coaching and mentoring employees 07 Building a Leadership Toolbox Session 7: Building a Leadership Toolbox: Trust & Inspiration Fostering Adaptability, Responsibility, Resilience, and Courage, this step focuses on leaders' tools and techniques to promote greater team accountability and ownership. It starts to delve into the critical role of self-esteem in a person's motivational intelligence and adaptability. We also explore how self-esteem is formed and influences a person's interpretation of feedback. We also look at self-esteem's critical role in a person's motivational intelligence and adaptability, examining how self-esteem is formed and influences a person's interpretation of feedback. Key Learning Outcomes: Understanding the tools and techniques leaders can use to foster greater team accountability and ownership Delving into the critical role of self-esteem in a person's motivational intelligence and adaptability Exploring how self-esteem is formed and influences a person's interpretation of feedback Examining the levels of self-esteem and associated behaviours of each group Understanding the influence of comfort zones and tools leaders can use to help people overcome the fear of change 08 Developing a Healthy Perspective and Resilient Attitude Session 8: Developing a Healthy Perspective and Resilient Attitude This step explores how developing a healthy perspective and resilient attitude is crucial for success as a leader. In this session, we will explore the critical role of self-reflection in building motivation and adaptability. We will examine how self-esteem is formed and how it influences a person's interpretation of feedback. We will also delve into the levels of self-esteem and the associated behaviours of each class. We will provide practical strategies for cultivating resilience and adaptability in facing challenges and setbacks. Through reflection and analysis of your moments of surprise, frustration, and failure, you will develop a growth mindset that fosters continuous learning and improvement. Key Learning Outcomes: The critical role of self-reflection in building motivation and adaptability How self-esteem is formed and influences a person's interpretation of feedback The levels of self-esteem and the associated behaviours of each class Strategies for cultivating resilience and adaptability in the face of challenges and setbacks The influence of affirmations and tools leaders can use to help people overcome the fear of change

Growth Leadership Programme
Delivered in Motherwell or UK Wide or OnlineFlexible Dates
Price on Enquiry

Our team of Construction industry experts provide business management training for leaders and business owners across England and Scotland CONSTRUCTION INDUSTRY SPECIFIC Construction Business Growth Academy The Power Within Training is dedicated to helping construction-based business owners and construction management throughout England, Scotland, and Wales achieve more than they believed possible. Our construction business training is designed to develop owner-managers and help them create the future they want. To ensure business growth, we have a dedicated team of industry professionals to give unique support specific to the skills, traits, and challenges found within Construction. This programme was created to help you push and elevate your business to the next level. Contact us to register for our construction business training. Explore Our Construction Business Growth Course We created the Business Growth Academy for business owners like you to grow and develop their businesses in a more controlled and sustainable way. To ensure growth, our construction business training is a series of six training modules focused on business growth, leadership, and financial management. Most of our participants are business owners looking to get the tools needed to spend more time working on their business while generating more profitability to ensure consistent business growth. The Power Within Training uses the latest business growth strategies, which allow you to identify, modify and quickly implement our easy-to-follow business-building tools and techniques designed around the construction and property development industry. Whether you are a business owner or an aspiring construction and property development entrepreneur, our Construction Management Course will provide the tools and techniques to drive your business forward and achieve sustainable growth. Join us at the Business Growth Academy and unlock your full potential. The Goal of Our Construction Management Training Our goal with this training is to provide you with the tools you need to take control of your business. This allows you to use the latest strategies and ensure the smooth growth of your construction business. The construction management training we offer is a three-month course with new modules available twice monthly, delivered via Zoom or in person. These modules are designed to work around your schedule. After, you’ll have a 39-hour CPD certification thanks to our CITB skills & training courses. Overall, our fully funded construction management training will help you place the proper foundation, allowing you to build a more substantial and focused business that’s centred around constant growth and profits while future-proofing your business. BUSINESS GROWTH ACADEMY The Benefit of Our Business Growth Academy As you go through our training, you’ll delve into each module and the critical steps and tools. These include how to plan, organize, and control construction operations, all designed to provide you with a well-rounded view of your business. Not only will you get the tools you need to ensure your construction business growth, but you’ll also get access to benefits such as lifetime access to your online interactive training portal, entrance into a private social and professional networking group, pro bono coaching, and mentoring from industry experts and leaders. Here are some additional benefits of our construction management training: Register your interest today You’ll build a personalised 12-month business development plan that keeps you focused on high-value activities, ensuring you remain on track to grow. Tools and techniques to not only measure but also increase your profitability within your business. These tools help you ensure that you’re never leaving money on the table again. Learn, develop, and nurture self-management and leadership strategies that you can work on and in your business to help you from chasing your tail or burning out. You’ll develop unshakeable confidence in your business’s ability to grow and become the kind of entrepreneur that chooses the customers they want to work with, meaning customers who are driven by value, not by price. Gain valuable leadership and self-development skills, which encourage learning for life. Lastly, you’ll no longer wonder, “what if?” You’ll have the knowledge and understanding to keep unlocking and growing your business’s true potential. WHAT'S INCLUDED IN THE PROGRAMME Course Overview As we’ve mentioned, our business management course is designed to be completed over three months, with two courses being released monthly. These are designed to be done on Zoom or in person and are flexible around your busy schedule. Our modules were created to be easy to understand while providing the resources needed to elevate your construction business. Here is a more in-depth look at what to expect from our modules: Module 1: The C.O.D.E Breaker: The Business FundamentalsThis module will encourage you to deep dive into your why and break the business C.O.D.E. You’ll be shown the importance of knowing why you started the business, how you can build a business while remaining authentic, and what needs to be done to ensure you create and support a solid foundation moving forward. During this module, you’ll discover how to successfully build a business in the construction industry, from the fundamentals and foundations to the growth. Lastly, we’ll review your vision, values, and purpose, show why these are critical areas, and allow you to establish a real business for you and your customers. Module 2: Your M.E.N.T.A.L Agility: The Entrepreneurial Mindset With this module, we’ll focus on self-leadership and how you should constantly be developing the ‘inner game’ or minder and the ‘outer game’ or action. The inner game consists of intention, self-awareness, self-confidence, and self-efficacy. These must be used to achieve personal mastery, while the outer game consists of influence and impact. M.E.N.T.A.L. agility is your key to all success and failure, meaning that without leading yourself, you’ll never find business success. For us, your M.E.N.T.A.L. agility is made of five key components that enable you to transition from owning a business to thinking and planning like an entrepreneurial business owner. Module 3: The T.I.M.E Multiple: Working ON or Working IN The point of this module is to help you understand that you can’t manage your time; you can only manage your use of time or your self-management skills. It’s vital to have strong self-management skills to be more successful at work. We’ll explore ways to help maximise your time and identify your High Payoff Activities. The T.I.M.E. multiplier is about accepting that you cannot do everything yourself. Instead, it would be best if you focused on your high-payoff activities. Our goal is to teach you to say it’s okay to say no. We’ll show you the importance of recognising the significance of all your decisions. Along with that, we focus on unique planning and defining processes to bring the future into the present. Module 4: The Business P.R.O.B.E: The Numbers Game Understanding your finances is essential as it allows you to make informed decisions that have the potential to make significant impacts on your business, growth, and even your bottom line. We want you never to leave money on the table again. When you know the difference between markup and margin, fixed and variable costs can make the difference between owning a business and the business owning you. Understanding your business numbers will increase your revenue and profitability and even grow your business. Module 5: High-Performance T.E.A.M.S: The Well-Oiled High-performing teams are more than a group that works together. A high-performing team has clear priorities and purposes and shares an understanding of how each team member or subcontractor prefers to approach work. The foundation of a high-performing team or business starts with trust. The development starts with creating an environment where leaders and team members can openly disclose which strengths they feel they bring to a team and what support they need to be their best selves. Truth is that all people’s problems directly reflect the business owner’s leadership and management. When a team doesn’t do things your way, they probably have no idea what your way is. Module 6: G.O.A.L.S: Setting & Defining the Accountability System Everyone works best with clearly defined goals, from completing a refurb on a budget or growing your construction business to over 10M annual profit. Remember the old saying, through a goal with a plan, is just a wish! We’ll teach you our tried and tested process for setting and achieving your objectives by focusing on what matters most. Reviewing your daily, weekly, and monthly goals, we can help you make high performance a habit. Best of all, you’ll create a detailed 12-month business development plan to get your personal and professional goals moving in the right direction. Meet the Construction Business Training Presenters Derrick Matheson: Training and Development Director and Trainer of Business Growth Academy A seasoned business owner, Derrick understands the challenges UK construction and property development professionals face. We have crafted a targeted program that simplifies growth, empowering entrepreneurs with easy-to-implement strategies.  Derrick’s mission is simple: to empower and equip ambitious entrepreneurs and professionals with the tools and knowledge necessary to thrive in today’s competitive market. The Business Growth Academy is a testament to his dedication, offering an innovative, step-by-step business-building process that demystifies the complexities of growth and unlocks the full potential of your enterprise. Stuart Mason: BGA’s Bold Training Manager, Lead Trainer, and Author of “How To Wreck Your Business Stuart, the fearless BGA Training Manager and Lead Trainer has turned his business failures into powerful lessons for others. As the author of “How To Wreck Your Business,” Stuart shares his hard-earned wisdom to help business owners avert the same pitfalls that led to the demise of his own company on its 20th anniversary. Stuart’s approach is refreshingly direct and unapologetically abrupt, cutting through the noise to deliver real-world insights that make a difference. Don’t expect a dry lecture on business theory from a dusty textbook; instead, Stuart offers a ‘streetwise’ perspective that is both practical and actionable, pushing you to uncover the answers that will make your business shine in a competitive market.

Business Growth Academy
Delivered in Motherwell or UK Wide or OnlineFlexible Dates
Price on Enquiry

Risk Management For Financial Institutions

5.0(5)

By Finex Learning

Overview Learn how to price equity options and the features that make them different from other asset classes. Explore how to use these products for taking equity risk, yield enhancement and portfolio protection Who the course is for Risk managers Bank treasury professionals Finance Internal Audit Senior management Fixed Income, FX, Credit and Equities traders Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Risk Management For Financial Institutions
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Online Options

Show all 1226

55238 SharePoint Online for Administrators

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for Administrators who need to setup, configure and manage SharePoint Online as part of their Office 365 Administration. Overview After completing this course, students will gain the skills to: - Understand the architecture of SharePoint Online - Have knowledge of all the components in SharePoint Online - Have on hands on experience configuring the components of SharePoint Online - Have hands on experience configuring the options - Work with Site Collections and storage options - Manage user profiles and social profiling - Understand and configure data connectivity in SharePoint Online - Build a taxonomy structure - Understand and configure Search in SharePoint Online - Configure and deploy apps - Understand and define Enterprise content management and data loss prevention. - Configure additional options and features in SharePoint Online such as Information Rights Management This course will introduce the audience to SharePoint Online Administration in Office 365 and explain and demonstrate the configuration options for SharePoint Online. The course is appropriate for existing SharePoint on-premises administrators and new administrators to Office 365 who need to understand how to correctly setup SharePoint Online for their company. The course will also help SharePoint on-premise administrators understand the differences between SharePoint on-premises and SharePoint Online. 1 - INTRODUCTION TO OFFICE 365 AND SHAREPOINT ONLINE Introduction to the Office 365 Administration Center Configure Reporting Accessing SharePoint management tools Accessing security and compliancy Managing Office 365 and SharePoint Online with PowerShell Comparing On Premises SharePoint with SharePoint Online User identity in Office 365 and SharePoint Online Manging user domains Building Hybrid scenarios OneDrive and Sites redirection Yammer redirection Understand hybrid search Hybrid business data connectivity Hybrid taxonomy 2 - WORKING WITH SITE COLLECTIONS Introduction to classic and modern admin centers Creating Site Collections Defining ownership and security for site collections Configuring Storage Configure External Access to site collections Recovering site collections Configure external sharing Managing site collections with PowerShell 3 - MANAGING USER PROFILES Overview of the profile service Defining profile properties Map profile properties to a term store Creating custom profile properties Managing audiences Creating audiences Managing user profile policies Configure trusted my site host locations Configure preferred search center locations Defining read access permission levels Configuring newsfeed options Setup email notifications Configure my site cleanup 4 - WORKING WITH DATA CONNECTIONS Introduction to Data Connections Overview of PowerApps, Flow and PowerBi Overview of the business connectivity service Introduction to BDC definition files Creating BDC definition files Introduction to the secure store service Configuring the secure store service Creating secure store target application settings Configure connections to cloud services Configure connections to on-premises services Tools to build data connections Creating external content types Building external lists using external data 5 - MANAGING THE TERM STORE Overview of the term store Understanding terms and life cycle management Creating term groups Creating the term store Creating Term Sets in the UI Creating Term Sets via importing via a CSV Creating terms in the UI Creating terms via PowerShell and CSOM Manage terms with synonyms and pinning Configure delegated administration 6 - CONFIGURING SEARCH An Introduction to the search service Classic versus Modern search experience Understanding Managed Properties Create Managed Properties Manage Authoritative pages Understand Result sources Create and configure result sources Understand Query rules Promoting results through query rules Remove search results from the index Exporting search configurations Importing search configurations 7 - CONFIGURING APPS An Introduction to Apps Understanding the App Catalog Building the App catalog Adding Apps to the catalog Add Apps to your SharePoint sites Adding Apps via the marketplace store Manage App licensing Configure store access settings Monitoring app usage 8 - ENTERPRISE CONTENT MANAGEMENT IN SHAREPOINT ONLINE An Introduction to ECM in SharePoint Online Components of ECM Office 365 versus classic compliancy Understanding In-Place records management Configure In-Place records management Understanding the records center Build and configure a records center Understanding the compliancy policy center Build a compliancy policy center and configure policies Discover the security and compliancy center Configure an eDiscovery center Build an eDiscovery case Understand data loss prevention Build a data loss prevention policy and query Working with classification and data governance 9 - MANAGE OPTIONS FOR SHAREPOINT ONLINE Configure OneDrive features Configure use of Yammer or Newsfeeds Understand Information Rights Management Configure Information Rights Management Define site classification options Understand early release options for Office 365 Configure Early release options for your Office 365 tenant Manage Access Control Additional course details: Nexus Humans 55238 SharePoint Online for Administrators training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55238 SharePoint Online for Administrators course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55238 SharePoint Online for Administrators
Delivered Online + more
£1,785

55399 Implementing and Managing Microsoft Intune

By Nexus Human

Duration 3 Days 18 CPD hours This three-day instructor-led course is aimed at modern device management professionals looking to manage their enterprise devices using Microsoft Intune. This course will cover Enrolment, Application Management, Endpoint Security and Windows Autopilot as well as Azure Active Directory Conditional Access and Identity Protection. The delegates will learn how to enroll devices, deploy applications and manage them to maximize user productivity and device security. 1: Introduction to Microsoft Intune Mobile Device Management Microsoft Intune Azure Active Directory AAD Identity Protection AAD Conditional Access 2: Microsoft Intune Device Management Enrolling Devices Device Compliance Device Profiles Device Updates 3: Microsoft Intune Application Management Application Management Deploying Applications Application Configuration Managing Applications Policy Sets and Guided Scenarios 4: Microsoft Intune Endpoint Security Security Baselines and tasks Antivirus Disk Encryption Firewall Atack Surface reduction Endpoint detection and response Account Protection 5: Deploying Windows with Windows Autopilot Windows Autopilot overview Preparing for Windows Autopilot deployment Deploying Windows 11 using Windows Autopilot 6: Microsoft Intune Additional and Premium Features Remote Help Tunnel for Mobile Application Management Endpoint Privilege Management Advanced Endpoint Analytics Additional course details: Nexus Humans 55399 Implementing and Managing Microsoft Intune training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55399 Implementing and Managing Microsoft Intune course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55399 Implementing and Managing Microsoft Intune
Delivered Online + more
£1,785

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online
£2,975

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online + more
£2,475

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online + more
£2,975

55341 Installation, Storage, and Compute with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server. This course will help them update their knowledge and skills related to storage and compute for Windows Server. Overview Prepare and install Windows Server and plan a server upgrade and migration strategy. Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes. Describe enterprise storage solutions, and select the appropriate solution for a given situation. Implement and manage Storage Spaces and Data Deduplication. Install and configure Microsoft Hyper-V, and configure virtual machines. Deploy, configure, and manage Windows and Hyper-V containers. Describe the high availability and disaster recovery technologies in Windows Server. Plan, create, and manage a failover cluster. Implement failover clustering for Hyper-V virtual machines. Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation. Create and manage deployment images. Manage, monitor, and maintain virtual machine installations. This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites A basic understanding of networking fundamentals. An awareness and understanding of security best practices. An understanding of basic Active Directory concepts. Basic knowledge of server hardware. Experience supporting and configuring Windows client operating systems such as Windows 10 or Windows 11. 1 - Installing, upgrading, and migrating servers and workloads Introducing Windows Server Preparing and installing Server Core Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models 2 - Configuring local storage Managing disks in Windows Server Managing volumes in Windows Server 3 - Implementing enterprise storage solutions Overview of DAS, NAS, and SANs Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet Understanding iSNS, DCB, and MPIO Configuring sharing in Windows Server 4 - Implementing Storage Spaces and Data Deduplication Implementing Storage Spaces Managing Storage Spaces Implementing Data Deduplication 5 - Installing and configuring Hyper-V and virtual machines Overview of Hyper-V Installing Hyper-V Configuring storage on Hyper-V host servers Configuring networking on Hyper-V host servers Configuring Hyper-V virtual machines Managing virtual machines 6 - Deploying and managing containers Overview of containers in Windows Server Deploying Windows Server and Hyper-V containers Installing, configuring, and managing containers by using Docker 7 - High availability and disaster recovery Defining levels of availability Planning high availability and disaster recovery solutions with Hyper-V virtual machines Backing up and restoring by using Windows Server Backup High availability with failover clustering in Windows Server 8 - Implementing failover clustering Planning a failover cluster Creating and configuring a new failover cluster Maintaining a failover cluster Troubleshooting a failover cluster Implementing site high availability with stretch clustering 9 - Implementing failover clustering with Windows Server Hyper-V Overview of the integration of Hyper-V with failover clustering Implementing Hyper-V VMs on failover clusters Key features for VMs in a clustered environment 10 - Implementing Network Load Balancing Overview of NLB Configuring an NLB cluster Planning an NLB implementation 11 - Creating and managing deployment images Introduction to deployment images Creating and managing deployment images by using MDT Virtual machine environments for different workloads 12 - Managing, monitoring, and maintaining virtual machine installations WSUS overview and deployment options Update management process with WSUS Overview of Windows PowerShell DSC Overview of Windows Server monitoring tools Using Performance Monitor Monitoring event logs

55341 Installation, Storage, and Compute with Windows Server
Delivered Online
£2,975

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered Online
£2,037

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - Explaining the OSI and TCP/IP Models Topic A: Explain OSI Model Layers Topic B: Explain the TCP/IP Suite 2 - Explaining Properties of Network Traffic Topic A: Explain Media Types and Access Methods Topic B: Deploy Ethernet Standards Topic C: Configure and Monitor Network Interfaces 3 - Installing and Configuring Switched Networks Topic A: Install and Configure Hubs and Bridges Topic B: Install and Configure Switches Topic C: Compare and Contrast Network Topologies Topic D: Compare and Contrast Network Types 4 - Configuring IP Networks Topic A: Configure IPv4 Addressing Components Topic B: Test IP Interfaces with Command Line Tools Topic C: Configure IPv4 Subnets Topic D: Configure Private and Public IPv4 Addressing Schemes Topic E: Configure IPv6 Addressing Components Topic F: Configure DHCP Services 5 - Installing and Configuring Routed Networks Topic A: Explain Characteristics of Routing Topic B: Install and Configure Routers 6 - Configuring and Monitoring Ports and Protocols Topic A: Explain the Uses of Ports and Protocols Topic B: Use Port Scanners and Protocol Analyzers Topic C: Explain the Use of Name Resolution Services Topic D: Configure DNS and IPAM Services 7 - Explaining Network Application and Storage Services Topic A: Explain the Uses of Network Applications Topic B: Explain the Uses of Voice Services and Advanced Networking Devices Topic C: Explain the Uses of Virtualization and Network Storage Services Topic D: Summarize the Concepts of Cloud Services 8 - Monitoring and Troubleshooting Networks Topic A: Monitor Network Interfaces and Logs Topic B: Explain Network Troubleshooting Methodology Topic C: Troubleshoot Common Network Services Issues 9 - Explaining Networking Attacks and Mitigations Topic A: Summarize Common Networking Attacks Topic B: Explain the Characteristics of VLANs Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - Installing and Configuring Security Devices Topic A: Install and Configure Firewalls and Proxies Topic B: Explain the Uses of IDS/IPS and UTM 11 - Explaining Authentication and Access Controls Topic A: Explain Authentication Controls and Attacks Topic B: Explain the Uses of Authentication Protocols and Directory Services Topic C: Explain the Uses of Port Security and NAC Topic D: Implement Network Device Hardening Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - Deploying and Troubleshooting Cabling Solutions Topic A: Deploy Structured Cabling Systems Topic B: Deploy Twisted Pair Cabling Solutions Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions Topic D: Deploy Fiber Optic Cabling Solutions 13 - Implementing and Troubleshooting Wireless Technologies Topic A: Install and Configure Wireless Technologies Topic B: Troubleshoot Wireless Performance Issues Topic C: Secure and Troubleshoot Wireless Connectivity 14 - Comparing and Contrasting WAN Technologies Topic A: Compare and Contrast WAN Core Service Types Topic B: Compare and Contrast WAN Subscriber Service Types Topic C: Compare and Contrast WAN Framing Service Types Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - Using Remote Access Methods Topic A: Use Remote Access VPNs Topic B: Use Remote Access Management Methods 16 - Identifying Site Policies and Best Practices Topic A: Manage Networks with Documentation and Diagrams Topic B: Summarize the Purposes of Physical Security Devices Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online + more
£2,475

DevOps Foundation©

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Foundation course includes Management, Operations, Developers, QA and Testing professionals such as: Individuals involved in IT development IT operations or IT service management. Individuals who require an understanding of DevOps principles. IT professionals working within, or about to enter, an Agile Service Design Environment The following IT roles: Automation Architects, Application Developers, Business Analysts, Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Consultants, DevOps Engineers, Infrastructure Architect, Integration Specialists, IT Directors, IT Managers, IT Operations, IT Team Leaders, Lean Coaches, Network Administrators, Operations Managers, Project Managers, Release Engineers, Software Developers, Software Tester/QA, System Administrators, Systems Engineers, System Integrators, Tool Providers. Overview The learning objectives for DevOps Foundation include an understanding of: DevOps objectives and vocabulary Benefits to the business and IT Principles and practices including Continuous Integration, Continuous Delivery, testing, security and the Three Ways DevOps relationship to Agile, Lean and ITSM Improved workflows, communication and feedback loops Automation practices including deployment pipelines and DevOps toolchains Scaling DevOps for the enterprise Critical success factors and key performance indicators Real-life examples and results The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organizational success. Learners will gain an understanding of DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation to improve the flow of work between software developers and IT operations professionals. This course prepares you for the DevOps Foundation (DOFD) certification. Exploring DevOps Defining DevOps Why Does DevOps Matter? Core DevOps Principles The Three Ways The First Way The Theory of Constraints The Second Way The Third Way Chaos Engineering Learning Organizations Key DevOps Practices Continuous Testing, Integration, Delivery, Deployment Site Reliability & Resilience Engineering DevSecOps ChatOps Kanban Business and Technology Frameworks Agile ITSM Lean Safety Culture Learning Organizations Continuous Funding Culture, Behaviors & Operating Models Defining Culture Cultural Debt Behavioral Models Organizational maturity models Automation & Architecting DevOps Toolchains CI/CD Cloud, Containers, and Microservices AI and Machine Learning Automation DevOps Toolchains Measurement, Metrics, and Reporting The Importance of Measurement DevOps Metrics - Speed, Quality, Stability, Culture Change lead/cycle time Value Driven Metrics Sharing, Shadowing and Evolving DevOps in the Enterprise Roles DevOps Leadership Organizational Considerations Getting Started Challenges, Risks, and Critical Success Factors Additional course details: Nexus Humans DevOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevOps Foundation©
Delivered Online
£1,495

Enterprise Risk Management

5.0(10)

By GBA Corporate

Overview With the change in the density of enterprise risk, new risks have emerged, and managing it has become everyone's responsibility. The new Enterprise Risk Management course offers you the exclusive opportunity to learn the concepts and principles of the newly updated ERM framework and to integrate the framework into your organisation's strategy. The course is designed with all the modules to provide you with the knowledge necessary to understand and apply Enterprise Risk Management - Integrating with Strategy and Performance. The ERM framework assists management and boards of directors with their respective duties for managing risk.

Enterprise Risk Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626
1...678

Educators matching "Enterprise"

Show all 30
Evolve Enterprise

evolve enterprise

Liverpool

Welcome to Evolve Enterprise Established in 2016, Evolve Enterprise offer bespoke support for children from 7-11 who may be at risk of becoming disengaged in mainstream education due to their complex needs and vulnerabilities. We specialise in working with children who struggle to adapt to the demands and expectations of mainstream school and support them and their families through the pathways of assessment, planning and intervention. We offer a therapeutic based alternative provision from our center in Well Lane Primary School (Annex). We aim to to support schools, children and families and, if possible, help them to either re-integrate back to their mainstream school or enable transition into the provision that is most suitable to meet their educational needs at the earliest opportunity. Our therapeutic and nurturing environment is designed to support all our pupils to help them to progress and develop personally, socially and emotionally. We understand the importance to children and their development of being in a mainstream setting and spending time with peers and friends but, unfortunately this is not always possible. Our goal for all children who access the Evolve programme is to support them to integrate back into their chosen pathway while supporting schools, parents and other support services with a more strategic and seamless transition. At Evolve we have a strong sense of responsibility to our children and families and believe that by working in partnership we can help them to achieve so much more. Our vision is for Evolve to be a single point of contact for schools, helping manage the day to day support for each individual and, by promoting consistency and structure through our therapeutic learning, we aim to give them a sense of security and belonging. We believe that by offering this it will give a more complete support package and, by working with schools, help to maximise the best outcomes that help to guide some of the most complex and vulnerable children through key stage 2, and beyond, with purpose and guidance.

Make.

make.

5.0(44)

Liverpool

Make CIC sits firmly at the heart of the city’s creative and maker scene, where we’ve worked to support artists, makers and small businesses since 2012. Growing from the Baltic Triangle, Make encompasses creative space in Elevator Studios – where we run a hub for small businesses and makers to grow and develop projects and ideas – with 18,000 square feet of maker space on Regent Street, amidst the growing cultural cluster of Liverpool’s north docks. Make is the culmination of nine years of research, planning and development from directors Kirsten Little and Liam Kelly. We combine, arts, textiles, education and mentoring backgrounds with our own experiences of running a business, to plug gaps in resources and provide support we struggled to find when we were setting up our own business. At the North Docks, we’re housed slap bang in the middle of the city’s spiritual engine room, where things have been made and fixed for hundreds of years. You can also find the best coffee in the city region at Make North Docks, with Caffé Riccardo based in our atrium. Our newest and third venture in Wirral’s Grade I listed Hamilton Square, Make Hamilton, is a creative community hub and makerspace with affordable workspace, a café and a meeting space, and – at the heart of it all – a community garden. Our two venues are open to members, residents and the public. We’re a place to work from, run workshops, events, and exhibitions; we’re a space for workers, makers, students and tutors; for artist’s talks and creative events; celebrations, launches, meetings and exhibitions. We have a strong sense of our place and pride in our work here in the Liverpool City Region. We believe in self-sufficiency and sustainability, and aim to remove barriers to people joining the economy by making things themselves, or starting their own business and becoming self-sufficient. Make is a place to share skills, make, fix and create; to learn and to teach; to try and tweak. We combine high tech ideas with traditional crafts; experienced hands with new skills. It’s a place to collaborate and create; a magnet for creatives, makers, dreamers and doers. Join us.