• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

724 Identity courses

BOOKINGS CLOSED! 30th July Imogen Pelham #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Imogen Pelham has been at Marjacq since 2015, and has worked as a literary agent for more than a decade. She represents literary fiction and some upmarket commercial fiction, as well as a wide range of non-fiction. Imogen's looking for fiction with a strong premise, a surprise twist, or sharp humour. Recent favourites include Leave The World Behind by Rumaan Alam, Early Morning Riser by Katherine Heiny, and Sorrow & Bliss by Meg Mason. Her non-fiction list includes history, memoir, medicine and psychology. She is particularly interested in identity, the arts and investigative journalism. Imogen would like you to submit a covering letter, 1 - 2 page synopsis and the first 10,000 words of your manuscript in a single word document. (In addition to the paid sessions, Imogen is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 25 July at 12 noon UK BST

BOOKINGS CLOSED! 30th July Imogen Pelham #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online + more
£72

Beginner's Guide to Video Editing (Interactive Workshop)

4.9(7)

By Clockwork Eye Video

This video editing workshop equips you with the essential skills to create professional-looking videos for your business, even if you've never edited before.

Beginner's Guide to Video Editing (Interactive Workshop)
Delivered Online + more
£250

Leadership Identity Through Self-Discovery

5.0(1)

By Puritas

This module focuses on developing leadership confidence through self-discovery, emphasising the importance of understanding one's unique leadership style and personal philosophy. Participants will explore their core identity as leaders and learn strategies to enhance their influence, credibility, and relationships within their organisation. Exploring the link between self-discovery and effective leadership, focusing on developing confidence to lead from within. Testimonial: “Without guidance, personal branding can quickly become an exercise in aspiration and competition; letting the carefully curated public personas of others dictate our own validity and definition of success. Clarity on who we truly are, what matters to us and therefore how we position ourselves in the world takes reflection and time. Rachael’s work in this area has inspired the nearly 100 delegates who have been part of our HR Leadership Academy over the past 8 years, and I have no doubt will continue to resonate with future cohorts.” MD, Nina Metson - Suffolk

Leadership Identity Through Self-Discovery
Delivered In-Person in Bishop Stortford + 9 more or UK WideFlexible Dates
£1,500 to £2,500

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered OnlineFlexible Dates
£2,380

Exam MS-100 Microsoft 365 Identity and Services Course

By Packt

This course will help you pass the Microsoft 365 Identity and Services (Exam MS-100) certification and demonstrate a detailed understanding of evaluating, planning, migrating, deploying, and managing Microsoft 365 services.

Exam MS-100 Microsoft 365 Identity and Services Course
Delivered Online On Demand7 hours 3 minutes
£93.99

Identity Theft Prevention Course

3.5(2)

By Elearncollege

Description Identity Theft Prevention Diploma Identity theft is a fraudulent practice of using someone else's name or personal information to obtain money or goods in that person's name. Anyone is a potential target of identity theft and that includes even children. Even celebrities like Robert De Niro and Oprah Winfrey have been victims of identity theft. Most identity theft can be prevented by taking precautions like protecting and safeguarding your personal information to make yourself a hard target. In the era of the internet, information of all kinds is available at a click of a button. Personal information is being shared through emails and social networking sites making everyone who doesn't practice discretion a soft target. Identity Theft Prevention Diploma aims to spread awareness among people on what identity theft is and how identity thieves obtain the personal information of others. By providing insights into the working of identity thieves, Identity Theft Prevention Diploma tries to educate you regarding the prevention methods to be followed so that you do not fall prey to scams or fraudulent practices of identity thieves. What You Will Learn 1: Understanding Identity Theft 2: Anti-Identity Theft Precautions and Guidelines 3: Recognizing Common Signs of Identity Theft 4: Looking Into Financial Statements 5: Keeping Tabs on Sensitive Information 6: Watching What You Discard 7: Practicing Discretion in Public Places 8: Becoming Familiar with the Methods of Identity Thieves 9: Buying Online and Some Common Online Threats 10: Staying Safe from Online Threats Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Identity Theft Prevention Course
Delivered Online On Demand9 days
£99

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

By Packt

This course will help you qualify for the Microsoft SC 900 exam, and this certification is targeted at those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Delivered Online On Demand7 hours 7 minutes
£26.99

55344 Identity with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server. This would typically include: ?AD DS administrators who are looking to train in identity and access technologies with Windows Server 2016, Windows Server 2019 or Windows Server 2022. ?System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2016, Windows Server 2019 or Windows Server 2022. Overview Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement and administer Active Directory Rights Management Services (AD RMS). Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement synchronization between AD DS and Azure AD. Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. Monitor, troubleshoot, and establish business continuity for AD DS services. This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory - related issues with Windows Server. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS). Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. 1 - Installing and configuring domain controllers Overview of AD DS Overview of AD DS domain controllers Deploying a domain controller 2 - Managing objects in AD DS Managing user accounts Managing groups in AD DS Managing computer objects in AD DS Using Windows PowerShell for AD DS administration Implementing and managing OUs 3 - Advanced AD DS infrastructure management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts 4 - Implementing and administering AD DS sites and replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication 5 - Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs 6 - Managing user settings with Group Policy Implementing administrative templates Configuring Folder Redirection, software installation, and scripts Configuring Group Policy preferences 7 - Securing Active Directory Domain Services Securing domain controllers Implementing account security Implementing audit authentication Configuring managed service accounts 8 - Deploying and managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs 9 - Deploying and managing certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards 10 - Implementing and administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Web Application Proxy Overview 11 - Implementing and administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection 12 - Implementing AD DS synchronization with Microsoft Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization 13 - Monitoring, managing, and recovering AD DS Monitoring AD DS Managing the Active Directory database Active Directory backup and recovery options for AD DS and other identity and access solutions

55344 Identity with Windows Server
Delivered OnlineFlexible Dates
£2,975

Why Identity Matters

5.0(1)

By Enspark

There is perhaps more identity-related conflict than ever before, and it is becoming increasingly more public. These conflicts can create polarization in all areas of life, including the workplace, where it can lead to harmful consequences for an entire organization. And yet, instituting change on an organizational level is sometimes a challenge. This video is a great resource for helping team members understand the importance of cultural awareness and respecting the identity of others. It is a great compliment to any D&I training. Length: 2:48 Learning Objectives Analyze and identify various identity dimensions, including age, geography, gender, race, religion, social class, nationality, sexual identity, worldviews, ideologies, belief systems, core values, and narratives.;Recognize the multifaceted nature of identity-based conflicts and their impact on society, including incivility, inequality, and polarization.;Develop a heightened level of identity intelligence, enabling more self-awareness, strategic thinking, and confidence in interpersonal and professional interactions.;Explore the evolving rules and boundaries of identity-related discussions and conflicts in contemporary society.

Why Identity Matters
Delivered Online On Demand5 minutes
£4.95

SC-300: Microsoft Identity and Access Administrator

By Packt

Learn all about Microsoft identity and Azure security the right way with tons of lab exercises. A course that aims to prepare students for the prestigious SC-300: Microsoft Identity and Access administrator exam. The course adheres to the new curriculum and objectives.

SC-300: Microsoft Identity and Access Administrator
Delivered Online On Demand10 hours 56 minutes
£41.99

Educators matching "Identity"

Show all 261
Hope's Place

hope's place

4.8(12)

Bristol

Hope’s Place opened its doors on October 17, 1998 in Ashland, Kentucky as a Children’s Advocacy Center. The Center grew out of a community child sexual abuse task force made up of child protective services, law enforcement, prosecution, mental health and medical communities who met regularly to define and refine professional roles in investigations and intervention in order to improve the system’s response to sexual abuse. Their efforts resulted in strong working relationships with clear investigative guidelines for an intervention system designed with the victim as its primary focus. Out of this task force a multi-disciplinary team was formed according to KRS 431.600 and 620.020 which mandates that all investigations of child sexual abuse be conducted by a specialized multi-disciplinary team. Kentucky has prioritized development of Children’s Advocacy Centers and was added to the multi-disciplinary team under KRS 431.600. Kentucky Association of Children’s Advocacy Centers (KACAC), a state association of Child Advocacy Centers was formed to provide regional centers with guidance and support. Hope’s Place is a full member in good standing in KACAC. In order to optimize services provided by Children’s Advocacy Centers and to maximize the spread of limited resources, a regionalized approach has been adopted for the funding and development of these agencies in the Commonwealth of Kentucky. This planful, deliberate approach undertaken by the Governor’s Office has allowed decisions regarding the funding of local programs to be undertaken on a statewide plan for funding. Hope’s Place is the designated regional advocacy center for the FIVCO district and provides a safe, client friendly environment to victims and their families for all aspects of sexual assault, including initial evidence collection, counseling, and court preparation. We also serve our neighboring communities in Ohio and West Virginia. In January 2003, a capital campaign began for the purchase and renovation of a larger facility. In April 2003, a building located at 1100 Greenup Avenue was purchased and administration relocated. At the present, Hope’s Place contracts with physicians and maintains 10 staff members including counselors, advocates, and forensic interviewers. Hope’s Place facilitates the coordination of services from multiple agencies for the common goal of victim treatment, victim advocacy, accurate evidence collection, public education, and prevention of sex crimes. Hope’s Place is a victim-focused Children’s Advocacy Center that provides a safe atmosphere for the victim, lessens trauma and promotes healing by maximizing services through a multi-disciplinary team approach. Hope’s Place actively seeks to reduce the occurrence of sexual abuse and heighten awareness through prevention education. Our Center provides a victim-friendly, home-like environment, which is designed to meet the sexual abuse victim’s need for warmth, support and protection. Hope’s Place is where all agencies come together to meet the needs of sexually abused children by coordinating services for the common goal of prevention, intervention and accountability. Child sexual abuse is one of the most pervasive social problems faced by this society. Its impact is profound because of the sheer frequency with which it occurs and because of the trauma brought to the lives of children who experienced this crime. Historically, however, the sexual abuse of children was dismissed as a “family problem.” The significant impact of childhood sexual abuse is unquestionable. This impact, however, speaks not only to the individual child victim of the crime, but also to the mental health community. There is no longer a question of whether child sexual abuse is a criminal justice problem or a social services problem or a mental health problem, for its power pervades the territory of each. The question must now lie in the resolve of all professionals to overcome skepticism with acknowledgment, disbelief with understanding, indifference with indigence, and reluctance to intervene with an unwavering intolerance of the victimization of all children.