• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1696 Guide courses in Leeds delivered Live Online

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students for AZ-140: Configuring and Operating Microsoft Azure Virtual Desktop are interested in delivering applications on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. As an Azure Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Azure Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Azure Virtual Desktop performance, and automate Azure Virtual Desktop management tasks. This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. Lessons include implementing and managing networking for Azure Virtual Desktop, configuring host pools and session hosts, creating session host images, implementing, and managing FSLogix, monitoring Azure Virtual Desktop performance and health, and automating Azure Virtual Desktop management tasks. Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. Candidates of this course must have solid Azure administration skills. This course assumes prior experience, including virtualization, networking, identity, storage, backup and restore, and disaster recovery. Students should have knowledge of on-premises virtual desktop infrastructure technologies as they relate to migrating to Azure Virtual Desktop. Students are expected to have used the tools common to the Azure environment, such as the Azure PowerShell and Cloud Shell. 1 - Azure Virtual Desktop Architecture Azure Virtual Desktop for the enterprise Azure Virtual Desktop components Personal and pooled desktops Service updates for Azure Virtual Desktop desktops Azure limitations for Azure Virtual Desktop Virtual machine sizing for Azure Virtual Desktop Azure Virtual Desktop pricing 2 - Design the Azure Virtual Desktop architecture Assess network capacity and speed requirements for Azure Virtual Desktop Azure Virtual Desktop Experience Estimator Recommend an operating system for an Azure Virtual Desktop implementation Balancing host pools Recommendations for using subscriptions and management groups Configure a location for the Azure Virtual Desktop metadata Recommend a configuration for performance requirements 3 - Design for user identities and profiles Select an appropriate licensing model for Azure Virtual Desktop based on requirements Personal and multi-session desktop scenarios Recommend an appropriate storage solution Plan for a desktop client deployment Plan for Azure Virtual Desktop client deployment - Remote Desktop Protocol (RDP) Windows Desktop client to multiple devices Hybrid Identity with Azure Active Directory Plan for Azure Active Directory (AD) Connect for user identities 4 - Implement and manage networking for Azure Virtual Desktop Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Azure Virtual Desktop network connectivity Implement and manage network security for Azure Virtual Desktop Configure Azure Virtual Desktop session hosts using Azure Bastion Monitor and troubleshoot network connectivity for Azure Virtual Desktop Plan and implement Remote Desktop Protocol Shortpath Configure Remote Desktop Protocol Shortpath for managed networks Configure Windows Defender Firewall with Advanced Security for RDP Shortpath Plan and implement Quality of Service for Azure Virtual Desktop 5 - Implement and manage storage for Azure Virtual Desktop Storage for FSLogix components Configure storage for FSLogix components Configure storage accounts Create file shares Configure disks 6 - Create and configure host pools and session hosts for Azure Virtual Desktop Automate creation of an Azure Virtual Desktop host pool using PowerShell Configure host pool assignment type Customize Remote Desktop Protocol (RDP) properties for a host pool Manage licensing for session hosts that run Windows client Deploying Azure AD-joined virtual machines in Azure Virtual Desktop 7 - Create and manage session host image for Azure Virtual Desktop Create a managed virtual machine (VM) image Modify a session host image Plan for image update and management Create and use an Azure Compute Gallery using the portal Create an Azure Virtual Desktop image by using VM Image Builder Install Microsoft 365 Apps on a master Virtual Hard Disk image Install language packs in Azure Virtual Desktop 8 - Manage access for Azure Virtual Desktop Role-based access control (RBAC) for Azure Virtual Desktop Plan and implement Azure roles and role-based access control (RBAC) for Azure Virtual Desktop Using Azure Virtual Desktop with Microsoft Intune Configuring screen capture protection for Azure Virtual Desktop 9 - Manage security for Azure Virtual Desktop Plan and implement Conditional Access policies for connections to Azure Virtual Desktop Plan and implement multifactor authentication (MFA) in Azure Virtual Desktop Understand Conditional Access policy components Manage security by using Azure Security Center Security posture management and threat protection 10 - Implement and manage FSLogix Plan for FSLogix FSLogix profile containers and Azure files Install FSLogix Storage options for FSLogix profile containers Profile Container vs Office Container Configure Office Containers Installing Microsoft Office using FSLogix application containers Configure Cloud Cache Configure Profile Containers Create a profile container with Azure NetApp Files and capacity pool Manage Rule Sets and application masking 11 - Configure user experience settings Virtual desktop optimization principles Persistent virtual desktop environments Configure user settings through group policies Configure user settings through Endpoint Manager policies Configure session timeout properties Configure device redirections Configure Universal Print Implement the Start Virtual Machine on Connect feature Troubleshoot user profile issues Troubleshoot Azure Virtual Desktop clients 12 - Install and configure apps on a session host MSIX app attach How MSIX app attach works Set up a file share for MSIX app attach Upload MSIX images to Azure NetApp Files in Azure Virtual Desktop How to configure apps for users Using the OneDrive sync app on virtual desktops Using Microsoft Teams on Azure Virtual desktop Publish built-in apps in Azure Virtual Desktop Troubleshoot application issues for Azure Virtual Desktop 13 - Plan for disaster recovery Disaster recovery for Azure Virtual Desktop Virtual machine replication FSLogix configuration 14 - Automate Azure Virtual Desktop management tasks Scale session hosts using Azure Automation Create or update an Azure Automation account Create an Azure Automation Run As account Create the Azure Logic App and execution schedule 15 - Monitor and manage performance and health Monitor Azure Virtual Desktop by using Azure Monitor Log Analytics workspace for Azure Monitor Monitor Azure Virtual Desktop by using Azure Advisor How to resolve Azure Advisor recommendations Diagnose graphics performance issues Additional course details: Nexus Humans AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop
Delivered OnlineFlexible Dates
£2,380

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered OnlineFlexible Dates
£2,380

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Prerequisites Before attending this course, students must have previous experience deploying or administering Azure resources and conceptual knowledge of: Azure Active Directory Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability AZ-104T00 - Microsoft Azure Administrator 1 - Design governance Design for governance Design for management groups Design for subscriptions Design for resource groups Design for resource tags Design for Azure Policy Design for role-based access control (RBAC) Design for Azure landing zones 2 - Design an Azure compute solution Choose an Azure compute service Design for Azure Virtual Machines solutions Design for Azure Batch solutions Design for Azure App Service solutions Design for Azure Container Instances solutions Design for Azure Kubernetes Service solutions Design for Azure Functions solutions Design for Azure Logic Apps solutions 3 - Design a data storage solution for non-relational data Design for data storage Design for Azure storage accounts Design for data redundancy Design for Azure Blob Storage Design for Azure Files Design for Azure managed disks Design for storage security 4 - Design a data storage solution for relational data Design for Azure SQL Database Design for Azure SQL Managed Instance Design for SQL Server on Azure Virtual Machines Recommend a solution for database scalability Recommend a solution for database availability Design security for data at rest, data in motion, and data in use Design for Azure SQL Edge Design for Azure Cosmos DB and Table Storage 5 - Design data integration Design a data integration solution with Azure Data Factory Design a data integration solution with Azure Data Lake Design a data integration and analytic solution with Azure Databricks Design a data integration and analytic solution with Azure Synapse Analytics Design strategies for hot, warm, and cold data paths Design an Azure Stream Analytics solution for data analysis 6 - Design an application architecture Describe message and event scenarios Design a messaging solution Design an Azure Event Hubs messaging solution Design an event-driven solution Design a caching solution Design API integration Design an automated app deployment solution Design an app configuration management solution 7 - Design authentication and authorization solutions Design for identity and access management (IAM) Design for Microsoft Entra ID Design for Microsoft Entra business-to-business (B2B) Design for Azure Active Directory B2C (business-to-customer) Design for conditional access Design for identity protection Design for access reviews Design service principals for applications Design managed identities Design for Azure Key Vault 8 - Design a solution to log and monitor Azure resources Design for Azure Monitor data sources Design for Azure Monitor Logs (Log Analytics) workspaces Design for Azure Workbooks and Azure insights Design for Azure Data Explorer 9 - Design network solutions Recommend a network architecture solution based on workload requirements Design patterns for Azure network connectivity services Design outbound connectivity and routing Design for on-premises connectivity to Azure Virtual Network Choose an application delivery service Design for application delivery services Design for application protection services 10 - Design a solution for backup and disaster recovery Design for backup and recovery Design for Azure Backup Design for Azure blob backup and recovery Design for Azure files backup and recovery Design for Azure virtual machine backup and recovery Design for Azure SQL backup and recovery Design for Azure Site Recovery 11 - Design migrations Evaluate migration with the Cloud Adoption Framework Describe the Azure migration framework Assess your on-premises workloads Select a migration tool Migrate your structured data in databases Select an online storage migration tool for unstructured data Migrate offline data 12 - Introduction to the Microsoft Azure Well-Architected Framework Azure Well-Architected Framework pillars Cost optimization Operational excellence Performance efficiency Reliability Security 13 - Microsoft Azure Well-Architected Framework - Cost Optimization Develop cost-management discipline Design with a cost-efficiency mindset Design for usage optimization Design for rate optimization Monitor and optimize over time 14 - Microsoft Azure Well-Architected Framework - Operational excellence Embrace DevOps culture Establish development standards Evolve operations with observability Deploy with confidence Automate for efficiency Adopt safe deployment practices 15 - Microsoft Azure Well-Architected Framework - Performance efficiency Negotiate realistic performance targets Design to meet capacity requirements Achieve and sustain performance Improve efficiency through optimization 16 - Microsoft Azure Well-Architected Framework - Reliability Design for business requirements Design for resilience Design for recovery Design for operations Keep it simple 17 - Microsoft Azure Well-Architected Framework - Security Plan your security readiness Design to protect confidentiality Design to protect integrity Design to protect availability Sustain and evolve your security posture 18 - Getting started with the Microsoft Cloud Adoption Framework for Azure Customer narrative Common blockers 19 - Prepare for successful cloud adoption with a well-defined strategy Customer narrative Capture strategic motivation Define objectives and key results Evaluate financial considerations Understand technical considerations Create a business case 20 - Prepare for cloud adoption with a data-driven plan Customer narrative 21 - Choose the best Azure landing zone to support your requirements for cloud operations Customer narrative Common operating models Design areas for Azure landing zones Design principles for Azure landing zones Journey to the target architecture Choose an Azure landing zone option Deploy the Azure landing zone accelerator Enhance your landing zone 22 - Migrate to Azure through repeatable processes and common tools Customer narrative Migration process Migration tools Common tech platforms 23 - Address tangible risks with the Govern methodology of the Cloud Adoption Framework for Azure Customer narrative Govern methodology Corporate policies Governance disciplines Deploy a cloud governance foundation The Cost Management discipline 24 - Ensure stable operations and optimization across all supported workloads deployed to the cloud Establish business commitments Deploy an operations baseline Protect and recover Enhance an operations baseline Manage platform and workload specialization 25 - Innovate applications by using Azure cloud technologies Follow the innovation lifecycle Azure technologies for the build process Infuse your applications with AI Azure technologies for measuring business impact Azure technologies for the learn process 26 - Prepare for cloud security by using the Microsoft Cloud Adoption Framework for Azure Customer narrative Methodology Security roles and responsibilities Simplify compliance and security Simplify security implementation Security tools and policies Additional course details: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered OnlineFlexible Dates
£2,380

MS-700T00 Managing Microsoft Teams

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. A Microsoft Teams administrator must be able to plan, deploy, and manage teams, chat, apps, channels, meetings, audio/video conferencing, live events, calling, and Teams certified devices. A Microsoft Teams administrator has experience integrating Microsoft Teams with SharePoint, OneDrive, Exchange, Microsoft 365 Groups, and other Microsoft, third-party, and custom apps. A Microsoft Teams administrator understands and collaborates with other workloads and roles, such as Network, Voice, Identity, Access, Devices, Licensing, Security, Compliance, Information management, and User Adoption. Overview What is Microsoft Teams and how the components work together How to implement Governance, Security and Compliance for Microsoft Teams How to prepare an organizations environment for a Microsoft Teams deployment How to deploy and manage teams How to manage collaboration and communication experiences in Microsoft Teams Techniques to manage and troubleshoot communication in Microsoft Teams The Managing Microsoft Teams course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. In this course, you will learn about various Teams management tools, security and compliance feature for Teams, network requirement for Teams deployment as well as different Teams settings and policies for managing collaboration and communication experience in Teams. Prerequisites A proficient understanding of basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices, including using PowerShell. 1 - Explore Microsoft Teams Explore capabilities in Microsoft Teams Explore Microsoft Teams integration with Microsoft 365 Explore Microsoft Teams integration with Microsoft Power Platform Illustrate Microsoft Teams architecture Describe Microsoft Teams with Microsoft 365 Groups Describe Microsoft Teams with SharePoint and OneDrive Describe Microsoft Teams with Exchange Understand Microsoft Teams certified solutions 2 - Plan and deploy Microsoft Teams Designate Teams admin roles Understand Teams management tools Plan for Teams rollout Plan for Teams adoption Plan for Teams licensing Deploy Microsoft Teams clients 3 - Implement lifecycle management and governance for Microsoft Teams Plan for lifecycle management Plan for Teams governance Manage Microsoft 365 Groups creation Configure Microsoft 365 Groups expiration policy Configure Microsoft 365 Groups naming policy Plan policy assignment for users and groups Create and manage policy packages Manage Teams preview features using Teams update policies Create and manage teams templates and template policies 4 - Monitor your Microsoft Teams environment Monitor Microsoft Teams usage reports Monitor Microsoft 365 usage reports Interpret Microsoft Adoption Score Manage user access with Azure Active Directory access reviews Monitor the Microsoft 365 network connectivity dashboard Manage Teams notifications and alerts Manage feedback policies 5 - Manage access for external users Understand features in Azure Active Directory Work with external users in Microsoft Teams Manage access for external users Manage external collaboration in Azure AD Manage external collaboration in Microsoft 365 Manage external access in Microsoft Teams Manage guest access in Microsoft Teams Manage file sharing in SharePoint and OneDrive 6 - Implement security for Microsoft Teams Configure conditional access and multifactor authentication for Microsoft Teams Configure Safe Attachments for Microsoft Teams Configure Safe Links for Microsoft Teams Examine the Defender for Cloud Apps Monitor security reports for Microsoft Teams Plan and configure enhanced encryption policies 7 - Implement compliance for Microsoft Teams Create and manage sensitivity labels Create and manage retention policies Create and manage Data Loss Prevention policies Deploy communication compliance Enable scoped directory search Create information barrier policy Create security and compliance alerts for Microsoft Teams 8 - Plan and configure network settings for Microsoft Teams Examine network requirements for Microsoft Teams Plan for network deployment using Network Planner Configure network ports and protocols for Microsoft Teams Implement Quality of Service Configure reporting labels for location-enhanced Call Analytics reports Configure tenant data for Call Quality Dashboard reports Assess network readiness Manage network topology 9 - Create and manage teams Create teams Create a team from existing resources Plan and create org-wide teams Manage teams Manage users in a team Configure dynamic membership Archive restore and delete a team 10 - Manage collaboration experiences for chat and channels Create and manage channels in a team Create and manage Teams policies for channels Configure teams settings Create and manage messaging policies Manage channel moderation Manage access to channels 11 - Manage apps for Microsoft Teams Explore apps in Microsoft Teams Describe admin settings for Teams apps Manage access to Teams apps at the organization level Create and manage app permission policies Create and manage app setup policies Manage permissions and consent for Teams apps Plan and configure connectors Manage custom apps uploads Publish custom apps to Microsoft Teams Manage purchasing of apps in the Microsoft Teams app store Customize the organization's app store Customize the branded experience of an app 12 - Introduction to Teams meetings and calling Overview of Teams meetings and events Overview of Teams Phone Overview of auto attendants and call queues Overview of Teams devices 13 - Manage meetings and events experiences Explore meetings and events in Microsoft Teams Configure meeting settings Create and manage meeting policies Configure audio conferencing Create and manage meeting templates and template policies Create and manage meetings customization policies Configure live events settings Create and manage live events policies Examine live events across Microsoft 365 14 - Plan for Microsoft Teams Rooms and Surface Hub Determine license requirements for Microsoft Teams Rooms and shared devices Understand differences between Microsoft Teams Rooms on Android and Windows Understand Microsoft Teams Rooms on Surface Hub 2S Understand and plan Teams Room accessories, components, and peripherals Understand Teams Rooms management options 15 - Configure, deploy, and manage Teams devices Manage Microsoft Teams Phones Manage Microsoft Teams Room Systems Microsoft Teams Rooms management options Manage Surface Hub 2S devices Configure Microsoft Teams SIP gateway Manage Microsoft Teams displays Remote provisioning and sign in for Teams Phones Update Microsoft Teams devices remotely Manage Microsoft Teams device tags 16 - Plan for Teams Phone Plan to deploy Teams Phone Plan for Teams Phone PSTN connectivity Determine license requirements Plan for Teams Phone devices Plan and design Teams Phone features Plan for voicemail 17 - Configure and deploy Teams Phone Configure emergency calling for Teams Calling Plans Manage and configure Microsoft PSTN numbers Configure Operator Connect and Teams Phone Mobile Configure Teams Phone policies Create and manage Teams policies Configure Audio Conferencing 18 - Configure and manage voice users Enable users for Teams Phone Enable users for Direct Routing with Teams Phone Enable additional calling features for Teams Phone Enable users for Teams Phone Mobile 19 - Configure auto attendants and call queues Design call flows for auto attendants and call queues Configure auto attendants and call queues Deploy a channel-based call queue Configure resource accounts Configure Microsoft 365 groups for voicemail Interpret call queue conference modes Interpret call queue routing methods Configure holidays for auto attendants and call queues Configure custom music on hold 20 - Troubleshoot audio, video, and client issues Troubleshoot Teams Collect and identify logs Clear Microsoft Teams client cache Identify issues with call analytics Identify issues with Call Quality Dashboard Use Power BI to analyze Call Quality Dashboard data Identify issues with the Direct Routing Health Dashboard Additional course details: Nexus Humans MS-700T00 Managing Microsoft Teams training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-700T00 Managing Microsoft Teams course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-700T00 Managing Microsoft Teams
Delivered OnlineFlexible Dates
£2,380

Level 7 Diploma In Strategic Marketing Pathway To MSc In Strategic Marketing

4.9(261)

By Metropolitan School of Business & Management UK

Level 7 Diploma In Strategic Marketing Pathway To MSc In Strategic Marketing Level 7 Diploma in Strategic Marketing (QCF) – 6 - 8 Months Credits: 120 Credits Level 7 Diploma in Strategic Marketing qualification provides the learners with the skills and understanding in marketing & branding that align with good strategic decision making to maintain organisations’ competitive advantage.  Successful completion of this qualification will develop learners’ strategic marketing management, consumer behaviour and branding skills and their ability to focus on the requirements of implementing an organisation’s strategy. This programme is a Pathway to MSc in Strategic Marketing. Course Details The Level 7 Diploma in Strategic Marketing qualification enables learners to progress into or within employment and/or to work toward a relevant Master’s programme with advanced standing.The Level 7 Diploma in Strategic Marketing qualification consists of 6 mandatory units for a combined total of 120 credits, 1200 hours Total Qualification Time (TQT) and 600Guided Learning Hours (GLH) for the completed qualification.Modules (120 Credits): Contemporary Issues and Principles of Marketing Consumer Behaviour and Market Communications Digital and Social Media Marketing Contemporary Challenges and Strategic Marketing Strategic Brand Management Marketing Research Project Accreditation All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. University Progression University Top-up On completion of this course, students have the opportunity to complete a Master degree programme from a range of UK universities. The top-up programme can be studied online or on campus. The top-up comprises the final 60 credits which consist of either a dissertation or a dissertation and one module. (The course tuition fee listed above does NOT include the top-up fees) University Progression Click here to see University routes and fee information for progression. Entry Requirements For entry onto the Level 7 Diploma in Strategic Marketing leading to the MSc in Strategic Marketing qualification, learners must possess: An honours degree in related subject or UK level 6 diploma or equivalent overseas qualification i.e. Bachelors Degree or Higher National Diploma OR Mature learners (over 25) with at least 5 years of management experience if they do not possess the above qualification (this is reviewed on a case by case basis) Workshops Workshops are conducted by live webinars for all students. Visa Requirements There is no Visa requirement for this programme.

Level 7 Diploma In Strategic Marketing Pathway To MSc In Strategic Marketing
Delivered OnlineFlexible Dates
£3,250

Total OSPF for engineers

5.0(3)

By Systems & Network Training

OSPF training course description A detailed hands on examination of OSPF. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. The course starts with a recap of reading routing tables and then jumps straight in with simple OSPF configuration. OSPF features are then studied and configured before moving onto how OSPF works within an area. Multi area OSPF is then studied before looking at OSPF operation in detail by analysing OSPF packets. Finally areas are covered again in more detail followed by troubleshooting. What will you learn Design OSPF networks. Design IP addressing schemes suitable for route summarisation. Troubleshoot OSPF networks. Describe the operation of OSPF. OSPF training course details Who will benefit: Technical staff working with OSPF. Prerequisites: TCP/IP Foundation for engineers Duration 3 days OSPF training course contents Basic routing and OSPF Reading routing tables, routing protocols, What is OSPF? Process IDs, passive interfaces. Hands on Simple OSPF configuration. OSPF History of OSPF, metrics, costs, convergence, Distance Vector vs. Link state routing protocols, IGPs, classless, OSPF features, load sharing, per packet/destination, OSPF authentication. Hands on Configuring OSPF features. OSPF within an area How OSPF works, LSDB, LSDB benefits and disadvantages, LSA types, Type 1 and 2, LSA propagation, router IDs, hellos, configuring hellos, the exchange protocol. Hands on Investigating OSPF structures. Areas Scalability, why areas? Area IDs, area 0, ABRs, ABR resilience, areas & LSDBs, areas & LSAs, Type 3 LSAs, virtual links. Hands on Multi area OSPF. Redistribution Multiple routing protocols, common scenarios, routing distance, External LSAs, E1 and E2. Type 4 LSAs. OSPF and default routes. Hands on Configuring static route redistribution. Route aggregation Route summarisation. How to aggregate, ABR summarisation, ASBR summarisation. Hands on OSPF address summarisation. OSPF packet formats OSPF packets, protocol stack, OSPF stages, packet flows, packet types, the OSPF header, multicasts, Hello, DDB, LS request, LS update, LS ACK, LSA header, LSA formats, neighbours, neighbour states, DRs, adjacencies, BDRs, DR election. Hands on Analysing OSPF packets, troubleshooting. OSPF network types BMA, NBMA, Point to point links. Hands on Configuring OSPF over Frame Relay. OSPF stub areas LSA types, area types, area architecture, stub areas, default routes, benefits and disadvantages of stub areas, TSSAs, NSSAs, Type 7 LSAs. Hands on Stub and TSSA configuration. The OSPF MIB SNMP overview, MIB 2, the OSPF MIB, OSPF MIB groups, useful objects, OSPF traps. Hands on the OSPF MIB. troubleshooting. Summary RFCs, OSPF design guidelines. OSPF variants (appendix) OSPF on demand, MOSPF, multicast overview, Type 6 LSAs, OSPF for IPv6 (OSPFv3).

Total OSPF for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Software development fundamentals

5.0(3)

By Systems & Network Training

Software development training course description This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-361, and build an understanding of these topics: Core programming, Object-Oriented programming, general software development, web applications, desktop applications, and databases. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. What will you learn Describe core programming. Explain Object Oriented programming. Describe general software development. Describe Web applications. Describe desktop applications. Explain how databases work. Software development training course details Who will benefit: Anyone looking to learn the fundamentals of software. Prerequisites: None. Duration 3 days Software development training course contents Core programming Computer storage and data types How a computer stores programs and the instructions in computer memory, memory stacks and heaps, memory size requirements for the various data storage types, numeric data and textual data. Computer decision structures Various decision structures used in all computer programming languages; If decision structures; multiple decision structures, such as If…Else and switch/Select Case; reading flowcharts; decision tables; evaluating expressions. Handling repetition For loops, While loops, Do...While loops and recursion. Understand error handling Structured exception handling. Object-oriented programming Classes Properties, methods, events and constructors; how to create a class; how to use classes in code. Inheritance Inheriting the functionality of a base class into a derived class. Polymorphism Extending the functionality in a class after inheriting from a base class, overriding methods in the derived class. Encapsulation Creating classes that hide their implementation details while still allowing access to the required functionality through the interface, access modifiers. General software development Application life cycle management Phases of application life cycle management, software testing. Interpret application specifications Application specifications, translating them into prototypes, code, select appropriate application type and components. Algorithms and data structures Arrays, stacks, queues, linked lists and sorting algorithms; performance implications of various data structures; choosing the right data structure. Web applications Web page development HTML, CSS, JavaScript. ASP.NET web application development Page life cycle, event model, state management, client-side versus server-side programming. Web hosting Creating virtual directories and websites, deploying web applications, understanding the role of Internet Information Services. Web services Web services that will be consumed by client applications, accessing web services from a client application, SOAP, WSDL. Desktop applications Windows apps UI design guideline categories, characteristics and capabilities of Store Apps, identify gestures. Console-based applications Characteristics and capabilities of console- based applications. Windows Services Characteristics and capabilities of Windows Services. Databases Relational database management systems Characteristics and capabilities of database products, database design, ERDs, normalisation concepts. Database query methods SQL, creating and accessing stored procedures, updating and selecting data. Database connection methods Connecting to various types of data stores, such as flat file; XML file; in-memory object; resource optimisation.

Software development fundamentals
Delivered in Internationally or OnlineFlexible Dates
£2,367

Dreamweaver

5.0(3)

By Systems & Network Training

Dreamweaver training course description Dreamweaver is a web authoring program that allows you to build professional quality websites. This course starts with a tour of Dreamweaver and customising your workspaces, moving onto HTML and CSS basics. Page layouts, templates and interactive pages are also covered. The final session covers how to use Dreamweaver as a HTML editor. Hands on session follow all the major theory chapters. What will you learn Use Dreamweaver to create websites. Customise Dreamweaver. Use templates. Add interactivity to web pages. Use Dreamweaver to edit HTML code. Dreamweaver training course details Who will benefit: Anyone wishing to create or edit websites. Prerequisites: None. Duration 3 days Dreamweaver training course contents Getting started Installing the programme, Updating to the latest version,, Online content, On first launch, Choosing the program colour theme, Setting up the workspace, Defining a Dreamweaver site, Checking for updates, Additional resources. Customizing your workspace Touring the workspace, Using the start screen, Exploring new feature guides, Setting interface preferences, Switching and splitting views, Selecting a workspace layout, Personalising Dreamweaver, Working with extract, Creating custom keyboard shortcuts, Using the Property inspector, Using the Related Files interface, Using tag selectors, Using the CSS Designer, Using the Visual Media Query (VMQ) interface, Using the DOM viewer, Using Element dialogs, displays and inspectors, Setting up version control in Dreamweaver, Exploring experimenting and learning. HTML Basics What is HTML? Where did HTML begin? Frequently used HTML elements, What's new in HTML5. CSS Basics What is CSS? HTML vs. CSS formatting, HTML defaults, CSS box model, Applying CSS styling, Multiples, classes and ids. Web design basics Developing a new website, Scenario, Working with thumbnails and wireframes, Creating a page layout Evaluating page design options, Working with predefined layouts, Styling an existing layout, Styling elements using the Extract panel, Extracting text from a Photoshop mockup, Troubleshooting CSS styling, Extracting text styling from a Photoshop mockup, Creating a gradient background using Extract, Extracting image assets from a mockup, Adding CSS background effects in code, Finishing up the layout. Working with templates Creating a template from an existing layout, Inserting editable regions, Inserting editable regions, Inserting HTML entities, Inserting metadata, Validating HTML code, Producing child pages, Moving CSS styles to linked file, Updating a template. Working with text, lists and tables Previewing the completed file, Creating and styling text, Creating lists, Creating and styling tables, Spell-checking webpages, Finding and replacing text. Working with images Web image basics, Previewing completed files, Inserting an image, Controlling image positions with CSS classes, Working with the Insert panel, Using the Insert menu, Inserting non-web file types, Working with Photoshop Smart Objects, Copying and pasting images from Photoshop, Inserting images by drag and drop, Optimizing images with the Property inspector. Working with navigation Hyperlinks, previewing the completed file, creating internal and external hyperlinks, setting up email links, Creating image-based links, Targeting page elements, Locking an element on the screen, Styling a navigation menu, Checking your page, Adding destination links. Adding interactivity Dreamweaver behaviours, Previewing the completed file, Working with Dreamweaver behaviours, Working with jQuery Accordion widgets, Inserting a jQuery Accordion widget, Styling a jQuery Accordion. Publishing to the web Defining a remote site, Cloaking folders and files, Wrapping things up, Putting your site online, Synchronizing local and remote sites. Working with code Creating HTML code, multicursor support, commenting your code, Working with CSS preprocessors, Selecting code, Collapsing code, Expanding code, Accessing Split code view, Previewing assets in Code View.

Dreamweaver
Delivered in Internationally or OnlineFlexible Dates
£2,367

NCSP ISO 27001 Specialist

By IIL Europe Ltd

The NCSP® ISO 27001 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the ISO 27001 controls in the context of a NIST Cybersecurity Framework program.This course looks at the impact of adapting a principled approach to an enterprise risk management framework to better support cybersecurity decisions within the context of the selected informative reference. It guides participants on the best approach to adapt, implement, and operate (AIO) a comprehensive cybersecurity program that integrates into existing organizational capabilities and incorporates the selected Informative Reference. NCSP® ISO 27001 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the perspective of the selected cybersecurity informative reference. The overall approach places these activities into systems thinking context by introducing the Service Value Management System composed of three aspects, governance, assurance, and the Z-X Model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ presented in the NCSP Practitioner. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.

NCSP ISO 27001 Specialist
Delivered OnlineFlexible Dates
£2,995

NCSP 800-171 Specialist

By IIL Europe Ltd

The NCSP® 800-171 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the 800-171 controls in the context of a NIST Cybersecurity Framework program. This course looks at the impact of adapting a principled approach to the enterprise risk management (ERM) framework to better support cybersecurity decisions, establishing the context for the selected informative reference (IR). It guides participants on the best approach to adapting, implementing, and operating (AIO) a comprehensive cybersecurity program that can be integrated into the existing organizational capabilities and incorporates the selected IR. NCSP® 800-171 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the selected cybersecurity IR perspective. The overall approach places these activities into a systems-thinking context by introducing the service value management system (SVMS), including governance, assurance, and the Z-X model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ concept presented in the NCSP Practitioner course. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.

NCSP 800-171 Specialist
Delivered OnlineFlexible Dates
£2,995