• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8 Event Management courses in Horndean delivered Live Online

ITIL© 4 High Velocity IT (HVIT)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Ideally candidates should have at least two years professional experience working in IT Service Management. The ITIL 4 HVIT Qualification would most likely suit the following delegates: Individuals continuing of their journey in service management ITSM managers and aspiring ITSM managers IT managers and practitioners involved in digital services or working in digital transformation projects, working within or towards high velocity environments Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This course has been created to help IT service management practitioners working in organizations that are becoming more digitally enabled. The practitioners are familiar with traditional IT service management concepts, and now want to be able to discuss ?digital? with more confidence, to develop practical competences, and to be valued contributors in the digital domain. They want to improve how they and their co-workers: Help get customers? jobs done ? helping customers become who they seek to become Keep raising the bar ? taking things to a significantly higher level Trust and are trusted ? as professional knowledge workers in a healthy workplace Accept ambiguity and uncertainty - not scared of not knowing an answer Commit to continual learning ? all as part of their daily work The scope of the course is the primary activities in the digital value chain. In other words, what the practitioner does and which resources they use across the lifecycle of digital products, in order to: Make the right digital investments Realize and deliver digital products and services quickly Provide digital products and services that are highly resilient to disruption Ensure that the service consumer realizes value from the digital products and services Assure conformance of activities with governance, risk and compliance requirements. Understand and know how to use the key principles and methods of Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in directing, planning and improvement Understand and know how to direct, plan and improve value streams and practices ITIL 4 is a framework for quality IT service management (ITSM) through proven best practice, providing practical and flexible guidance to support your organization on its journey to digital transformation while empowering your IT teams to continue to play a crucial role in the wider business strategy. This course highlights the ways in which digital organizations and digital operating models function in high-velocity environments, including the use of working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing. This class includes an exam voucher. Prerequisites ITIL© 4 Foundation 1 - THE NATURE OF HIGH-VELOCITY IN A DIGITAL WORLD Overview of the key ITIL 4 high-velocity terminology Understand when the transformation to high velocity IT is desirable and feasible Understand the five objectives associated with digital products ? to achieve: Valuable investments ? strategically innovative and effective application of IT Fast development - quick realization and delivery of IT services and IT-related products Resilient operations - highly resilient IT services and IT-related products Co-created value - effective interaction between service provider and consumer Assured conformance - to governance, risk and compliance (GRC) requirements. 2 - ITIL OPERATING MODEL ? DIGITAL PRODUCT LIFECYCLE Understand how high velocity IT relates to: The four dimensions of service management The ITIL service value system The service value chain The digital product lifecycle 3 - FUNDAMENTAL CONCEPTS FOR DELIVERING HVIT Understand the following concepts: Ethics Safety culture Toyota Kata Lean / Agile / Resilient / Continuous Service-dominant logic Design thinking Complexity thinking Use the principles, models and concepts to contribute to: Help get customers? jobs done Trust and be trusted Commit to performance Deal with uncertainty Improve by being inquisitive 4 - ACHIEVING VALUE WITH DIGITAL PRODUCTS Know how the service provider ensures valuable investments are achieved. Know how to use the following practices to contribute to achieving valuable investments: Portfolio management Relationship management Know how the service provider ensures fast deployment is achieved Know how to use the following practices to contribute to achieving fast deployment: Architecture management Business analysis Deployment management Service validation and testing Software development and management Know how the service provider ensures resilient operations are achieved Know how to use the following practices to contribute to achieving resilient operations: Availability management Capacity and performance management Monitoring and event management Problem management Service continuity management Infrastructure and platform management Know how the service provider ensures co-created value is achieved Know how to use the following practices to contribute to achieving co-created value with the service consumer: Relationship management Service design Service desk Know how the service provider ensures assured conformance is achieved Know how to use the following practices to contribute to achieving assured conformance: Information security management Risk management

ITIL© 4 High Velocity IT (HVIT)
Delivered OnlineFlexible Dates
£2,385

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered OnlineFlexible Dates
£2,380

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

EA/PA Excellence Workshop Virtual

5.0(1)

By Own Your Success

Discover how to elevate your career as an executive assistant or personal assistant with our comprehensive EA Mastery Workshop. Gain new skills, strategies, and tools to maximize your impact and achieve success.

EA/PA Excellence Workshop Virtual
Delivered OnlineFlexible Dates
£130 to £345

Curating the Experience: Psychology of Art and Exhibitions

By AIR Courses, London

A course on Curating and the Psychology of Perception - which are very closely interlinked. Curating and the Psychology of Perception are very closely interlinked. Yet, psychologists and curators are rarely brought together to examine them together. This course has previously ran as part of the rich portfolio of (AIR interdisciplinary courses)[https://www.gold.ac.uk/short-courses/air]. It now runs as part AIR Courses at TechnoTruth. Taught by leading experts This course is taught by two leading experts. The course combines lectures on the history of the most important exhibitions of modern art with psychology of perception to address several important questions. Read more on the course page. Group bookings and Enquiries To book this course for a group, please email us at: info(@TechnoTruth.co.uk). Refunds: We will be happy to refund the fee, minus the Eventbrite fee, which is not refundable. For cancellations latter than 24 hours ahead of the start of the training, a proportion of the fee (£95) is non-refundable.

Curating the Experience: Psychology of Art and Exhibitions
Delivered OnlineFlexible Dates
£195

Symantec Data Center Security - Server Advanced 6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for information technology professionals, security professionals, network, system managers and administrators tasked with installing, configuring and maintaining Symantec Data Center Security: Server Advanced. Overview At the completion of the course, you will be able to: Describe the major components of Symantec Data Center Security: Server Advanced and how they communicate. Install the management server, console and agent. Define, manage and create assets, policies, events and configurations. Understand policy creation and editing in depth. course is an introduction to implementing and managing a Symantec Data Center Security: Server Advanced 6.0 deployment. Introduction Course Overview The Classroom Lab Environment Introduction to Security Risks and Risk Security Risks Security Risk Management Managing and Protecting Systems Corporate Security Policies and Security Assessments Host-Based Computer Security Issues SDCS:Server Advanced Overview SDCS: Server Advanced Component Overview Policy Types and Platforms Management Console Overview Agent User Interface Overview DEMO of Management Console Installation and Deployment Planning the Installation Deploying SDCS:SA for High Availability Scalability Installing the Management Server Installing the Management Console Installing a Windows Agent Installing a UNIX Agent LAB: Install Manager and Agents Configuring Assets Asset and Agent Overview Viewing Agents and Assets Managing Agents Managing Agents on Assets LAB: Create Asset Groups LAB: Examine Agent Interface Policy Overview Policies Defined Prevention Policy Overview Process Sets Resource Access Policy Options Detection Policy Overview IDS Capabilities Rules Collectors Policy Management Workspace User Interface on Agent Example Use Cases LAB: Paper Based Scenarios LAB: What type of security strategy should be used? Detailed Prevention Policies Policy Editor Policy Structure Global Policy Options Service Options Program Options Policy Processing Order Network Rules File Rules Registry Rules Process Sets Predefined Policies LAB: Deploy Strict policy LAB: Examine Functionality Advanced Prevention Profiling Applications Customizing Predefined Policies LAB: Modify Policy Previously Deployed LAB: Re-examine Functionality LAB: Preparing for Policy deployment LAB: Best Practice - Covering Basics LAB: Further Enhance Strict Policy LAB: Create Custom Process Set LAB :Secure an FTP Server LAB: Troubleshoot Policy/pset Assignment Using CLI Detection Policies Detection Policies Structure Collectors Rules Predefined Detection Policies Creating a Detection Policy Using the Template Policy LAB: Deploy Baseline Policy LAB: Create Custom Policy Event Management Events Defined Viewing Events Reports and Queries Overview Creating Queries and Reports Creating Alerts LAB: View Monitor Types and Search Events LAB: Create Real Time Monitor Agent Management and Troubleshooting Configurations Defined Creating and Editing Configurations Common Parameters Prevention Settings Detection Settings Analyzing Agent Log Files Diagnostic Policies Local Agent Tool ? sisipsconfig LAB: Create Custom Configurations LAB: Implement Bulk Logging LAB: Disable Prevention on Agent Using CLI LAB: Use Diagnostic Policy to Gather Logs LAB: Troubleshoot a Policy System Management Managing Users and Roles Server Security Viewing and Managing Server Settings Viewing and Managing Database Settings Viewing and Managing Tomcat Settings LAB: Create a New User LAB: View System Settings

Symantec Data Center Security - Server Advanced 6.0
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios Course Outline Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model Security Responsibilities Understanding Enterprise Environment Assets Threat Tuning Threat Researching and Threat Intelligence Practices Understanding APIs Understanding SOC Development and Deployment Models Performing Security Analytics and Reports in a SOC Malware Forensics Basics Threat Hunting Basics Additional course details: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

55242 Microsoft Dynamics 365 Customization and Configuration

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Information workers, IT Professionals and Developers. Students should have an existing working knowledge of either Microsoft Dynamics 365 or Microsoft Dynamics CRM. Overview Understand the features and tools that exist in Microsoft Dynamics 365 for Customizers Be aware of integrating complimenting Microsoft products such as SharePoint, Skpe for Business and Exchange Undertake and carry out the initial setup and configuration required in a Microsoft Dynamics 365 deployment Design and configure a comprehensive Security model using the inbuilt tools in Microsoft Dynamics 365 Customize the Dynamics 365 schema by creating custom Entities, Fields and Relationships Design custom Information Forms, Quick View Forms, Quick Create Forms and System Views Create System Charts, Dashboards and Interactive Experience Dashboards Create and manage Business Rules using the Business Rule Designer Plan, design and implement best practice Workflow, Business Process Flows and Custom Actions Be able to apply best practice methodology using Unmanaged and Managed Solutions to deploy Microsoft Dynamics 365 customizations and patches This course provides students with a detailed hands-on experience of setting up, customizing, configuring and maintaining the CRM components of Microsoft Dynamics 365. Attendees of this course will gain an in-depth understanding of the Dynamics 365 security model, learn how to customize the Dynamics 365 framework, create and maintain powerful workflows and business process flows and use solutions to package and deploy customizations across multiple Dynamics 365 environments. The course applies to both Business and Enterprise Editions of Dynamics 365 as well as Online and On-premise deployments. Introduction Getting familiar with the versions of Microsoft Dynamics CRM\365 Get acquainted with the Dynamics 365 framework Review the Dynamics 365 interfaces, devices and apps Understand the tools for Dynamics 365 customizers A brief overview of Solutions Understand the differences between Dynamics 365 organisations and environments Review further reading and resources Set up the lab environment - Acme Enterprises Event Management Solution Initial Setup and Configuration An introduction to Dynamics 365 online setup An introduction to Dynamics 365 on premise setup Review the System Settings area Understand how to configure Auto Save Settings Understand how to configure Format Settings Understand how to configure Email Settings Understand how to configure Skype Integration Understand how to configure SharePoint Integration Security Design and configure Business Units Configure Security Roles Manage Users and Teams Implement Access Teams Configure Hierarchy Security Creating and Managing Entities Introduction to the Dynamics 365 schema Review the different Entity Types Create new Custom Entities Managing Entity Ownership Managing Entity Properties Custom Entity Security Review Entities and Solutions Customizing Fields Introduction to Field Customization Understand the different Field Types Review Field Formats Create a new Field Review Fields and Solutions Implement a Calculated Field Configure Field Level Security Customizing Relationships and Mappings Introduction to Relationships Review the different Relationship Types Create a Relationship Review Relationships and Solutions Understand Relationship Behavior Implement a Hierarchy Relationship Configure Field Mappings Customizing Forms, Views and Visualizations The process to create a new Form Review the different Form types Using the Form Designer Customizing the Main, Quick View and Quick Create Forms Configure Form Security Review the different View types Customizing System Views Customizing System Charts and Dashboards Workflows, Business Process Flows and Custom Actions Introduction to Processes Workflow Business Process Flows Custom Actions Solution Management An introduction to Solution Management How to add and administer components in a Solution The differences between unmanaged and managed Solutions How to export and import a Solution How to set Managed Properties for a Solution What happens when you delete a Solution How to Clone a Solution Patch How to Clone a Solution

55242 Microsoft Dynamics 365 Customization and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Educators matching "Event Management"

Show all 19