• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

298 History courses in Ewell delivered Live Online

First Degree Usui Reiki Course

5.0(13)

By Spiritual Vitality

First Degree Usui Reiki Course This is the first level of Reiki. It is suitable for therapists and laypeople alike – everyone is welcome to come and share the gentle energy. ​It will enable you to connect with the universal energy that exists all around us to help yourself, friends and family, or animals and plant life. If you are interested in using Reiki as a therapy in your practice – then this is the starting point. Individuals wanting to add Reiki to their daily life will benefit highly from this course. This course is comprehensive and detailed.

First Degree Usui Reiki Course
Delivered OnlineFlexible Dates
£220

Nutritional Consultancy Diploma

By Plaskett International

BECOME A NUTRITIONAL CONSULTANT AND LEARN HOW TO STEER YOUR CLIENTS TOWARDS BETTER HEALTH A MESSAGE FROM THE AUTHOR This course is a must for anyone who is passionate about health & well-being and would like to fast-track to a practitioner role whereby you can confidently advise your clients on the best route to achieving good health in a world where ill-health is prevalent. The hope is expressed that this course will lead you feeling well informed, on a deeper naturopathic level, and provide you with a range of measures that you can apply to practice as you steer your clients towards better health. DR. LAWRENCE PLASKETT Course Duration 12 months Study Hours 300 hours Course Content 27 sections Course Fee £595 Course Overview The Plaskett Diploma in Nutritional Consultancy is especially useful for those whereby holistic health is a feature of your line of work and you would like to enhance the service that you provide, or for those that wish to set up an independent practice as a Nutritional Consultant. In Part One you will: Be introduced to the concept of naturopathy Gain a general understanding of the subject of health and nutrition Grasp the fundamentals of the cell's need for nutrients Appreciate the role of carbohydrates, fats, proteins, vitamins and minerals and understand the basics of how these nutrients work in the body Be aware of the enormous health benefits that can come from favourable dietary change Appreciate the merits of particular foods and nutrients Ultimately gain the knowledge that will lead towards a better standard of well-being now, and a prolonging of good health in the future In Part Two you will:Gain a deeper understanding of naturopathy and its principles which you can then apply to practise in nutritional therapies.Obtain the skills to understand the depth of disease in your patients to then find a route back from chronic disease and enable you to advise the best treatment plan.Develop an understanding of the role of the practitioner from the initial consultation, the taking of a case history, the interpretation and the subsequent advising of a treatment plan.Learn the ‘tools of the trade’ in using diets, supplements, herbs, phytonutrients in treatment, with flexibility and insight. BREAKDOWN OF THE COURSE SECTIONS PART ONE includes the following 12 sections: SECTION 1 THE PRINCIPLE BULK NUTRIENTS & ASSOCIATED FOODS In Section 1, we begin the study of nutrients and foods by looking at the main bulk nutrients that our diets contain: protein, carbohydrate and fat. Before one can consider individual vitamins and minerals, one has to know about the nutrients that make up most of our diets, namely the bulk nutrients. These are the suppliers of food energy, essential amino acids and fatty acids. You will need to understand these so as to manipulate them with skill. Areas Covered Proteins The carbohydrates Fibre Fats Classes of foods based upon composition SECTION 2 THE CELL & CELL ENERGY This section will illuminate the nature of the cell and explain how the energy of the cell is generated and what functions the cell must perform using that energy. It explains calories as units of energy measurement and the dynamic role of the enzymes in the cells. Areas Covered The cell Cell energy The energy content of food What else does the body have to do with its energy? How does the body release energy from food? Enzymes The overwhelming importance of cell energy The vitality of cells and tissues The key role of blood glucose What key factors are most likely to erode good vitality? Go-factors for enzymes Internal cell environment Enzyme poisons SECTION 3 THE ENVIRONMENT INSIDE THE CELL This section explains the importance of the controlled environment inside the cell. It particularly stresses how important it is to maintain the balance between sodium and potassium and between calcium and magnesium. Areas covered Out of balance intakes of sodium and potassium Calcium and magnesium balance Calcium mishandling SECTION 4 THE NEED FOR THE CELL TO SELF CLEANSE This section shows you how the cell needs to remain vital and active and to maintain the integrity of its energy systems and enzymes. It stresses the cell's need to excrete waste and toxic materials and to actively cleanse. This approach is both naturopathic and science-based. Areas covered Naturopathic elimination The concept of self-cleansing Naturopathy Vitality Chronic and acute Suppression SECTION 5 THE MICRO-MINERALS & THEIR CONTRIBUTION TO THE CELL This section emphasises and explains the importance of micro-minerals. It shows them in their role as enzyme activators and how they contribute in this way to cell energy and to maintaining the cell's integrity and function. It explains the key roles and characteristics of individual micro-minerals. Areas covered How metals act as enzyme activators Iron Zinc Manganese Copper Chromium Selenium Molybdenum General supplementation policy on trace metals Non-metallic micro-minerals Toxic metals Notes on metallic macro-minerals SECTION 6 THE VITAMINS This section covers the entire group of vitamins. It shows how they activate enzymes, contribute to cell energy and increase vitality. It explains their differing functions and characteristics. Areas covered Vitamins defined Intakes and rnis for vitamins How vitamins work The vitamins Non-vitamin nutrients How vitamins contribute to cell energy and increase the life force Food sources of the vitamins SECTION 7 BOWEL FLORA – HOW IT AIDS CLEANSING & MAINTENANCE OF A GOOD BODY ENVIRONMENT This section explains how the complex population of bacteria in the intestines contribute to maintaining vitality and health. In particular, it will become clear how these bacteria aid cleansing and the maintenance of a good environment within the body, which is so essential to good health. It includes how to nurture your own bowel flora organisms. Areas covered The bacteria of the large intestine (the bowel) The alternative view of desirable and undesirable bowel flora The benefits from an acidic lower bowel The effect of bowel flora upon cleansing Association of lactobacillus with milk Synthesis and absorption of b vitamins The reciprocal effects of bowel flora The bowel flora from infancy to adulthood Candida albicans How to maintain the bowel flora The use of bowel flora products SECTION 8 CHARACTERISTICS OF THE MAIN FOODS. SUPPRESSIVE VERSUS ELIMINATIVE FOODS This section identifies the 'suppressive' foods - those which block the body's elimination of toxins. It separates them from the 'eliminative' foods - those which enable or enhance the voiding of toxins. It gives the characteristics (in this respect) of the main food groups. It will tell you what problem foods to avoid and identify the acid-producing foods. Areas Covered Milk as a problem food Wheat and rye as problem foods Vegetables Relation of elimination to acidity The two-step process of elimination The neutral grains Salt Sugar SECTION 9 THE COMPOSITION OF FOODS This section provides a great deal of data on the composition of foods, their content and the main differences between them. This is a working mass of data to enable your own design of health-giving diets. Areas Covered Commentary on food tables The spread of bulk nutrients The spread of mineral nutrients SECTION 10 ALLERGIES, INTOLERANCE & SENSITIVITY. MICRO-MINERALS & THEIR CONTRIBUTION TO THE CELL This section is an introduction to allergies or intolerances - what they are; physical signs and symptoms, the most frequent; masked/hidden and/or addictive allergies; causes of allergy - food, chemical, emotional and mental; stages of allergy; different types of allergy - fixed, variable, cyclic; managing allergies and sensitivities - how to handle them; rotation diets (including the rotation chart); allergy testing and its limitations; food additives and chemicals; the role of nutrition in all this. Areas Covered Allergic reactions defined The nature of allergies and the effect they have Obvious reactions The four main classes of allergy The possible underlying causes of allergy Viewing allergy tests and their limitations What help is available to deal with allergies The key role of nutrition in the underlying case and treatment of allergy How allergies interfere with treatment The concept of neutralisation The allopathic or orthodox drug approach SECTION 11 DESIGNING DIETS This section provides clear guidance on designing maintenance nutritional diets that, compared to most ordinary diets, should improve health. Areas Covered Dietary paragraphs Using the dietary paragraphs to make up diets SECTION 12 THE USE OF SUPPLEMENTS This section explains and demystifies the subject of vitamin and mineral supplements and their use. It enables you to design simple maintenance and health-giving programmes of supplementation. Areas Covered General guidelines in the use of supplements Always attend to the diet first Preparing for mineral and vitamin supplementation Steps in supplement intake Simple and effective combinations The eliminative qualities of magnesium and calcium Less frequently used combinations Use of multiple formulations Adding in the trace elements as a further stimulant of toxin elimination & for correction of deficiencies On to the next stage – zinc and manganese Conditions where practitioners of nutritional medicine might use such formulae Vitamins a & d Vitamins c & e Choline & inositol Calcium pantothenate The role of the practitioner of nutritional medicine PART TWO includes the following 15 sections: SECTION 1  NATUROPATHY, ITS NATURE AND ITS HISTORY In this section we introduce the medical system known as “naturopathy”. We do so because this system provides the basis for understanding and using naturopathic nutritional therapies. Throughout this Course we shall refer to naturopathy and naturopathic principles and in learning and using these principles, you will hopefully discover a dynamic view of health and illness that will excite you and will inform and motivate your future practice. Areas Covered The Basic Principles of Naturopathy The Early Days: Hydrotherapy as the Core Therapy Progress of Naturopathy in the United States The Halycon Years of Naturopathy in Britain The Suppression of Naturopathy and its Rebirth The Details of Hydrotherapy Techniques The Range of Today’s Naturopathic Techniques Published Research into Naturopathy and General Acceptance Today’s Activities at Health Spas Naturopathy in Relation to Scientific Medicine Naturopathy in Relation to Biochemistry: the Principles of “General Chronicity” Naturopathy as the Philosophical Base for other Therapies SECTION 2 PHILOSOPHY OF NATUROPATHIC NUTRITIONAL THERAPEUTICS In order to begin to understand Nutritional Therapeutics, we have to understand the philosophy that is at its very basis. One will be departing quite fundamentally from conventionality and as the truth about natural medicine and natural nutrition unfolds in this Course, the student will, in all probability, come to realise that holism is a higher form of knowledge; one that transcends the materialistic and the mechanistic and will lead you on the first steps of this most exciting of all journeys. Areas Covered The status of knowledge about diet in relation to health The pressure of conventional opinion The limitations of the conventional approach What goes in must affect health in the long run The body's resistance to deterioration Profound effects from treatment The life force in relation to scientific concepts The nature of toxins Starting to look at the route for recovery Acute conditions, inflammation and hyperactivity Routes by which toxins enter the body Routes of exit of toxins Movement of toxins within the body: toxic locations Iridology Knife edge between healing and non-healing The effects to be expected from toxins residing in tissues SECTION 3 SYNTHESIS OF NATUROPATHY & SCIENCE What is to be presented in this Section is pertinent to the whole question of the initiation of chronic diseases. If we look in the pathology texts and consult the sections on individual types of chronic disease, we usually find an explanation of the cause (aetiology) on a superficial level. However, when we begin to probe into the cause of the causes, we soon hit an impenetrable wall of “not knowing”. It is in this Section that we aim to open the door to this question and therefore give a route back from chronic disease. Areas covered Introduction: a specialized meaning of “Chronicity” The Nature of Toxic Damage – Non-Specific Cell Toxicity The Nature of Membranes Mechanisms of Protein Synthesis and their Vulnerability to Toxins Damage to Mitochondria and the Endoplasmic Reticulum Relationship of General Cellular Damage to Cancer The Nucleus, DNA and their Vulnerability to Toxins DNA Repair Mechanisms The Nature of Toxic Damage – Specific Cell Toxicity Cell Damage and the “General Chronicity” Theory SECTION 4 THE PRACTITIONER’S ROLE In this Section we wish to paint a picture that fairly fully describes this role. It is important to build a set of views about your future role that is fully compatible and interwoven with the naturopathic philosophy and data given in the previous Sections of the Course.  Areas covered Introduction to the Role of the practitioner The Wider Environment The Microcosm of the Consulting Room patient & treatment pimary components of the Practitioner’s role a working relationship & commitment to each patient physical examination communicating & recording the prescription providing nutritional products required for therapy communication with doctors spreading the word SECTION 5 UNDERSTANDING THE DEPTH OF DISEASE Here is where the clinical work begins. We begin by thinking about this one aspect – how sick is your patient? You need some idea as to how big the problem is that lies before you. Areas covered The Nature of Health and Disease and the Approach to Treatment Some of the Misconceptions Flexibility of Disease Definitions Arthritis as an Example Do You Need a Hospital Diagnosis When You Are Not Unwell? Homotoxicology and the Teachings of Reckeweg Reckeweg’s Six Levels of Deterioration Examples of Progressive Sequences of Medical Conditions The Miasmic Background: Important but Disputed territory The Three Basic Homeopathic Miasms The Tubercular Miasm The Carcinocin Miasm The Sub-divisions of the Tubercular Miasm Note on Iridology SECTION 6 THE CONCEPT OF ELIMINATORY PRESSURE & ITS MANAGEMENT Eliminatory pressure is the term we use to denote the combined effect of all the various naturopathic-type measures we apply to help the body biochemistry of a sick person to return to normal. According to the “Theory of General Chronicity”, the normality of the biochemistry of the body cells, and hence their degree of freedom from toxicity and damage, is our yardstick of general health and vitality. Areas covered The Nature of Eliminatory Pressure Differences of Response to Naturopathic Pressure The Interactions between Toxins and Toxic Damage Regulating Eliminative Pressure at Manageable Levels The Basics of Generating Eliminatory Pressure Fasting: Free Radicals and Antioxidants “Firing up” Eliminatory Pressure with Fruit The Stage I and Stage 2 Elimination Using Foods to Generate Controlled Levels of Eliminatory Pressure Using Supplements to Generate Controlled Levels of Eliminatory Pressure Contributions to Eliminatory Pressure from Herbs and Special Nutrients Levels of Eliminatory Pressure, Understanding and Managing Them The Effectiveness’, or Otherwise, of Eliminatory Reactions The Concept of the “Chronically Acute” The Approach to Overall Management of the Case SECTION 7 TAKING THE CASE HISTORY & UNDERSTANDING ORGANS AND ORGAN FUNCTIONS In this Section we concern ourselves with the actual technique for taking down the particulars of the case. Before we can carry out a full naturopathic diagnosis, we shall need to understand the principles of ‘Plotting the Course of Disease’. It is from this that we will gain a full appreciation of how the sick person came to be in their present condition and this will then lead us on to the question of what to do about it.  Areas covered The More Basic Facts The Aims and Objectives in Taking the Case The Organ States Assessing the Naturopathic State of Organs Hierarchy of Organs Organ-Specific Diagnosis Individually Important Organs and Systems Blood Sugar in Relation to Vitality: Hypoglycaemia The Adrenal Glands how should we recognise adrenal exhaustion clinically? The Liver The Kidneys The Immune System Location of Immune System Components. Functions of Immune System Components. Nutritional Therapy Interpretation of Immune System Signs The Skin SECTION 8 INTERPRETATION OF CASE HISTORY AND UNDERSTANDING INDIVIDUAL REACTIVITY In this Section, we would like you to consider the inevitability of the rules that apply to progression along the pathway to chronic disease, and to the possibility of return from any position that is well down that path. From understanding the case, you will be able to determine what the treatment should be. Areas Covered The Naturopathic Laws and Observational Skills The Progression of Disease More about the Acute and the Chronic The Nutritional Therapist’s View of Disease The Allopathic View of Disease More about “Charting the Naturopathic Ebb and Flow” The Multifactorial Diagnosis See What’s Moving, What’s Changing Assessing Individual Reactivity Let the Case Taking Stage Foreshadow the Interpretation just a Little Note on The Chinese Medicine Connections SECTION 9 THE TOOLS OF THE TRADE & USING DIETS AS TREATMENT Using the information presented to you in Part One of the course, you will be able to use those same dietary paragraphs and move towards a very flexible prescribing of individually designed diets. You will make up a diet for each patient that will embody a carefully thought out modulation of the elimination/suppression aspect of our approach to health.  Areas Covered What we have covered already Many people may seem not to need special diets Avoid becoming paranoid Choices in dietary design More about the food classes Facing realism in your range of non-therapeutic prescriptions Adaptation for vegetarians Elements of directional dietary prescribing The approach to actual therapeutic prescription SECTION 10 THE TOOLS OF THE TRADE & USING SUPPLEMENTS AS TREATMENT We provided advice in Part One of the Course on the use of supplements. We introduced the ratio between magnesium and calcium, the use of micro-minerals and the use of zinc and manganese to name but a few. Here we explain further the steps needed to apply these essential tools to ensure that your treatment advice is successful. Areas Covered The latest advice provided by the Introductory Nutritional Course supplementation Legal Restraint upon use of Supplements SECTION 11 THE TOOLS OF THE TRADE & USING HERBS AS TREATMENT In the course of our treatment we often need to deal with common herbs. This is to produce certain organ-specific or system-specific effects, not obtainable with other nutrients. The effect of this is not to make Herbalists of us, but to ensure that these remedies are very carefully selected for their compatibility with other nutrients.  Areas Covered Aloe vera Bromelain St john’s wort Gingko biloba Silymarin SECTION 12 ACTIONS OF GROUPS OF PHYTONUTRIENTS This Section begins to delve into what lies behind the known fact that fruit and vegetable consumption inhibits many diseases. What are the substances within them that are responsible for such an important protection of the human body? Each of the main groups is examined with the main purpose being to familiarize the Student with these substances and to offer scientific evidence that some of these really do protect against disease. Areas Covered The Position of Phytonutrients Among Other Factors What are Phytonutrients? The Place of Phytonutrients among Secondary Plant Metabolites The Different Groups of Beneficial Phytonutrients Evidence for anti-disease activity SECTION 13 SPECIAL SUPPLEMENTS & THE COMBINED PRESCRIPTION When we write about “special supplements”, we mean to refer to those substances that are used as nutritional supplements and which do not fit into any of the previous categories mentioned. Here we teach the Student that they may in fact include many substances from many groups, leading to a diversified classification that each has their own special effects, conferring unique advantages upon the taker of them. Areas Covered Special Supplements & combined prescription Conducting the Consultation SECTION 14 STEERING A COURSE THROUGH TREATMENT – FLEXIBILITY AND INSIGHT Having not specifically addressed the question of what happens after the initial consultation, it is here that we bring together all the information that has been presented to you in the pages of this Nutritional Therapeutics Course, therefore, making this Section a recapitulation of things we have covered already, but brought together in a cohesive treatment of the subject. Areas Covered Progressing the Case Things to do at the First Consultation to help towards the Second The Second Consultation the meaning of different outcomes Constipation and Diarrhoea as incidents in Treatment. Titration of Bowel Flora The Nutritional Therapy Intensive Cleanse Diet Enemas Supplements Juices Duration Supplement Sequences in Treatment From Calcium Formulations to Calcium-Free Formulations Other Progressions Allergies, Intolerances and Hypersensitivities SECTION 15 SNAGS, CLEANSES AND CASE HISTORIES TESTIMONIALS Here's what students have to say about the course Kate Woolger, pilates instructor UK I chose the Plaskett College as I wanted something which was flexible and could be done in my own time. The content of the course really appealed. The study experience has been enjoyable - sometimes hard if a subject wasn’t so interesting. In regards to changes I have already implemented, I’m more thoughtful of thinking things through from the inception rather than just looking at the problem"

Nutritional Consultancy Diploma
Delivered OnlineFlexible Dates
£80 to £595

How to use Heat Engineer Software V2 (Selectable dates)

3.7(8)

By Heat Engineer

For new users and the curious. Hello, For new users and the curious. IMPORTANT: Firstly, once you are signed up, send us your requests on what you would like to see within the demonstration and learn on the course. We will then cater for your needs and answer them during the session. This is designed to be an introduction into how to start a room by room survey using the Heat Engineer app, then sending this survey to the online dashboard. We will then go through the different steps to complete this heat loss report. Optional pages will also be worked through and shown. Examples of how to select the flow temperature and the heat source (heat pumps and boilers) will be presented once the heat loss result is completed.

How to use Heat Engineer Software V2 (Selectable dates)
Delivered OnlineJoin Waitlist
£47.93

Information Architecture

By Experience Thinkers

Create a well-structured pathway to optimized content by understanding how information architecture applies to user experience design.

Information Architecture
Delivered OnlineFlexible Dates
£536.75

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered OnlineFlexible Dates
£2,975

IoT and Blockchain Training

By Nexus Human

Duration 1 Days 6 CPD hours Overview Please refer to Overview This course provides an overview of IoT and Blockchain, and how Blockchain holds the potential to securely unlock business and operational value of IoT to support common tasks, such as sensing, processing, storing information, and communicating. What is IoT? Internet of Things Overview IoT History How does IoT work? Components of an IoT device Current IoT Landscape Growth areas Privacy concerns IoT Design Standards Zigbee networking protocol Thread Group AllSeen Alliance/AllJoyn Open Interconnect Consortium/IoTivity Industrial Internet Consortium ITU-T SG20 IEEE P2413 Apple HomeKit IoT Design Questions Questions to help you design an IoT solution IoT Architecture Stage 1 - Data Generation (Sensors / Actuators) Stage 2 - Data Acquisition Systems Stage 3 - Edge Processing Stage 4 - Long-Term Data Storage / Blockchain What is Blockchain? History of Blockchain How does Blockchain work? Benefits of Blockchain Blockchain vs. conventional technology IoT / Blockchain Benefits of adding Blockchain to IoT Trust Building Cost Reduction Accelerate Data Exchanges Scaled Security for IoT Additional course details: Nexus Humans IoT and Blockchain Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the IoT and Blockchain Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

IoT and Blockchain Training
Delivered OnlineFlexible Dates
Price on Enquiry

Quality Systems for Research Laboratories

By Research Quality Association

Course Information This highly interactive course will provide guidance on why and how to implement a quality system successfully into the research laboratory. By doing so, you will position your innovation for the success it deserves. But leave things as they are and there is a good chance that your science will not realise its full potential should success, and its consequences, come your way. A quality system in your research laboratory is the most effective and efficient way to: Help scientists work more efficiently Ensure discoveries can be defended Protect the value of intellectual property. This course is particularly aimed at those working in early phase research environments which are not constrained by the regulatory requirements of the Good Practice regulations but are producing intellectual property, testing and/or products for the therapeutic market. For organisational reasons, rather than regulatory ones, this is a place where you need to get it right. The programme is delivered by leaders in the field who, quite simply, ‘have done it’. Whether delegates are at senior management level seeking strategic direction, a laboratory head wishing to deliver science that will stand the test of time or a quality professional thrown in at the deep end, this course will provide key insight and practical guidance to underpin future success. Based on risk based systems, tried and tested over many years in the workplace, the programme will help delegates to define, train, implement and monitor the quality of their research, irrespective of field or discipline. Delegates will learn how to help position their organisation for success. Course content: Delegates will be guided thoughtfully through each key component of the process in a stimulating learning environment. The course probes all avenues of the research quality arena, from an initial understanding of the cultural aspects of the scientific discovery environment, to managing quality in outsourced research programmes. Computer systems and e-data security in the research environment will be discussed and pragmatic solutions described to help manage the ballooning cloud of e-data. In addition, the ever blurring boundary between the regulated and non-regulated research environments will be discussed and delegates given perspective on future developments in the field. With this knowledge, delegates will be able to get it ‘right first time’. Is this course for you? The course is designed for all those involved in the research laboratory quality arena and it has been tailored to meet the needs of scientific management, bench scientists and quality professionals alike. Delegates get immediate access to highly experienced tutors who will share their wisdom and insights in an area where few others have been successful. The course is linked with the RQA guidance which builds on years of experience and forms the foundation of the programme. Tutors Tutors will be comprised of (click the photos for biographies): Louise Handy Director, Handy Consulting Ltd Sandrine Bongiovanni Associate Director in Research and Quality Compliance, Novartis Programme Please note timings may be subject to alteration. Day 1 09:00 Registration 09:10 Welcome and Introductions 09:20 History and Overview of the Field Examples of business and regulatory risks and the consequences of low quality in research. A look at the standards and guidelines that exist. 10:00 The Culture, the Politics and the Scientist's Perspective Understanding research environments, the drivers and the challenges. 10:30 Break 10:45 Workshop - Risk Management Thinking about risk management and prioritisation. Looking at the critical factors for the implementations of a successful quality system. 12:15 Workshop - Feedback 12:45 Lunch 13:45 Personnel, Plans, Procedures, Facilities, Equipment, Materials and Reagents Looking at planning the work, defining procedures in a way which promotes robust science without compromising brilliance and ensuring that all these elements are demonstrably fit for their intended purpose. 14:30 Workshop - Assay Validation How much validation is required at what stage? What do we need to validate an assay? 15:00 Workshop - Feedback 15:15 Research, Work Records, Archives and Research Review Data and records which are accurate, attributable, legally attestable and safe to permit reconstruction experiments and studies. Looking at aspects of the work where there is a chance to review, correct or improve the science, the data and the processes. 16:15 Continual Improvement and Quality Systems Reviewing implementation of a quality system, finding opportunities for improvement, understanding culture change. 16:45 Questions and Answers 17:00 Close of Course Extra Information Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include:   Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points   Development Level Develop

Quality Systems for Research Laboratories
Delivered OnlineFlexible Dates
£380 to £508

Tapping Out of Trauma 1.0

By EFT Tapping Training Institute

Working with trauma requires advanced knowledge and skills beyond basic tapping training. While tapping produces amazing results, trauma requires a higher level of training in order to be both safe and effective.

Tapping Out of Trauma 1.0
Delivered OnlineFlexible Dates
£312

Off-Loom Weaving Workshop

By Lark & Bower

Learn to weave, 'off-loom' with Sarah Ward, via Zoom

Off-Loom Weaving Workshop
Delivered OnlineJoin Waitlist
£80

Off-Loom Weaving Workshop

By Lark & Bower

Learn to weave, 'off-loom' with Sarah Ward, via Zoom

Off-Loom Weaving Workshop
Delivered OnlineJoin Waitlist
£80