• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

262 Educators providing Identity courses delivered Live Online

Black's Academy

black's academy

London

AQA A level Mathematics 7357 AS level Mathematics 7356 GCSE higher level Mathematics 8300H GCSE foundation level Mathematics 8300F Edexcel A level Mathematics 9MA0 AS level Mathematics 8MA0 GCSE higher level Mathematics 1MA1H GCSE foundation level Mathematics 1MA1F OCR A level Mathematics H240 AS level Mathematics H230 GCSE higher level Mathematics J560 GCSE foundation level Mathematics Other courses IGCSE extended level Mathematics 0580 Scholastic Apititude Test (USA Exam) GED (USA Exam) All other exams Click on any of the above links to obtain free resources Book free diagnostic now blacksacademy symbol Director Peter Fekete Educational consultancy | Curriculum design | Courses for adults | Public speaking | Publications CONTACT a CONTENT OF THE REMOTE LEARNING SYSTEM * US GRADE 6 / UK GCSE GRADE 2–3 1. Addition and subtraction 2. Starting number sequences 3. Further number sequences part I 4. Multiplication to 8 x 8 5. Further number sequences part II 6. Multiplication to 12 x 12 7. Square numbers 8. Positive and negative numbers 9. Sums 10. Shapes and perimiters 11. Measurement and areas 12. Reading information 14. Understanding fractions 15. Decimals 16. Percentages 17. Long multiplication 18. Beginning algebra 19. Beginning probability 20. Beginning geometry 21. Properties of numbers 22. Telling the time 23. Geometry in three dimensions US GRADE 7 / UK GCSE GRADE 4 1. Deeper understanding of number 2. Combinations 3. Long division 4. Operations 5. Practical problems 6. Order and type of numbers 7. Measurement 8. Time and time management 9. Fractions 10. Organising information 11. Ratio and proportion 12. Probability 13. Angles 14. Visual reasoning 15. Bearings 16. Working in two dimensions 17. Working in three dimensions 18. Transformation geometry 19. Continuing algebra US GRADE 8 / UK GCSE GRADE 5–6 1. Patterns and pattern recognition 2. Lines, regions and inequalities 3. Mastering fractions 4. Types of number 5. More about triangles 6. Measurement and computation 7. Proportionality 8. Working with space 9. Indices 10. Further work with ratio 11. Investments 12. Further algebra 13. Quadrilaterals and polygons 14. Speed and displacement 15. Continuing with probability 16. Describing data US GRADE 9 / UK GCSE GRADE 6–7 1. Further proportionality 2. Congruency 3. The tricky aspects of algebra 4. Lines and equations 5. Basic formal algebra 6. Analysis and display of data 7. Graphing functions 8. Dimension and algebra 9. Algebraic fractions 10. Circle theorems 11. Algebraic factors 12. Simultaneous equations 13. Velocity and acceleration 14. Proportionality and scatter 15. Number puzzles US GRADE 10/ UK GCSE GRADE 7–8 1. Transpositions 2. Patterns and pattern recognition 3. Algebraic manipulations 4. Quadratics 5. Surds 6. Linear inequalities 7. Functions 8. Trigonometry 9. Systems of linear equations 10. Further presentation and analysis of data 11. Polynomial functions 12. Algebraic products 13. Finding roots 14. Intersection of lines and curves 15. Indices and index equations US GRADE 11/ UK GCSE GRADE 8–9 1. Completing the square 2. Venn diagrams 3. Coordinate geometry with straight lines 4. Further trigonometry 5. Transformations of curves 6. Modulus 7. Basic vectors 8. Quadratic inequalities 9. The quadratic discriminant 10. Arcs, sectors and segments 11. Circles, curves and lines 12. Probability and Venn diagrams 13. Functions, domains and inverses 14. Trigonometric functions 15. Recurrence relations 16. Further elementary vectors FREE LEGACY RESOURCES Business Studies, Economics, History, Mathematics, Philosophy, Sociology Business Studies PEOPLE AND ORGANISATIONS 1. Management structures and organisations 2. Leadership and management styles 3. Classical theory of motivation 4. Human relations school 5. Management by objectives 6. Workforce planning 7. Recruitment 8. Payment systems MARKETING 1. The economic problem 2. Money and exchange 3. Price determination 4. Determinants of demand 5. Market analysis 6. Marketing and the product life cycle 7. Objectives and marketing EXTERNAL INFLUENCES 1. Stakeholders 2. Business ethics 3. Market conditions 4. Business and the trade cycle 5. Business and technological change 6. Business and inflation 7. Business and exchange rates 8. Business and unemployment ACCOUNTING & FINANCE 1. Cash Flow Management 2. Costs, Profits & Breakeven Analysis 3. Budgeting & Variance Analysis 4. Sources of Finance 5. Profit & Loss Account 6. The Balance Sheet 7. Depreciation by the fixed-rate method 8. Reducing Balance Method 9. Stock Evaluation 10. Working Capital and Liquidity 11. Accounting Principles and Window Dressing 12. Costing and Management Accounting 13. Investors and the Corporate Life Cycle 14. Investment Appraisal: Average Rate of Return 15. Investment Appraisal: Payback Method 16. Investment Appraisal: Net Present Value 17. Investment Appraisal: Internal Rate of Return 18. Profitability Ratios 19. Liquidity Ratios 20. Efficiency and shareholder ratios 22. Gearing and Risk 23. Net Asset Value Economics MARKETS & MARKET FAILURE 1. The economic problem 2. Productive and allocative efficiency 3. Money and exchange 4. Price determination 5. The money market 6. Introduction to the labour market 7. The determinants of demand 8. Supply and elasticity of supply 9. Excess supply and excess capacity 10. Elasticity of demand 11. Market structures 12. Income and cross elasticity 13. Market failure 14. Factor immobility 15. Public and private goods 16. Merit and non-merit goods 17. Cost-benefit analysis 18. Competition policy 19. Market failure and government intervention History ANCIENT HISTORY 1. Prehistory of Greece 2. Mycenae, the Heroic Age c.1550—1125 BC 3. The Greek Middle Ages c.1125—c.700 BC 4. The Greek Tyrannies c. 650—510 BC 5. Sparta 6th and 7th centuries BC 6. Athens and Solon 7. The early inhabitants of Italy 8. The Etruscans 9. Early Roman History up to Tarquin GERMANY & EUROPE 1870—1939 1. Social Change from 1870 to 1914 2. Socialism in Europe 1870 to 1914 3. The Balance of Power in Europe 1870 4. Anti Semitism in Europe 1870 to 1914 5. The Structure of Wilhelmine Germany 6. Bismarck and the Alliance System 7. Weltpolitik 8. Colonial Rivalries 9. First and Second Moroccan Crises 10. The First World War triggers 11. The Causes of the First World War 12. Germany and the First World War 13. Military history of the First World War 14. The Treaty of Versailles 15. The Domestic Impact of the First World War 16. The German Revolution 17. The Weimar Republic 18. The Early Years of the Nazi Party 19. The Rise of the Nazi Party 20. The Establishment of the Nazi Dictatorship 21. Nazi Rule in Germany 1934 to 1939 22. The Economics of the Third Reich 23. Appeasement RUSSIA & EUROPE 1855—1953 1. Alexander II and the Great Reforms 2. Imperial Russia under Alexander III 3. Nicholas II and the 1905 revolution 4. Social and economic developments in Russia 5. Russia: the Great war and collapse of Tsarism 6. Provisonal Government & October Revolution 7. The Era of Lenin 8. The Development of Lenin's Thought 9. New Economic Policy and the Rise of Stalin 10. Stalin and the Soviet Union 1924 to 1953 11. Stalin and the Soviet Economy 12. Stalin and International Relations BRITAIN 1914—1936 1. The Great War and Britain 1914—15 2. Britain during the Great War, 1915—16 3. Lloyd George & the Great War, 1916—1918 4. Great Britain after the War, 1918—22 5. British Politics, 1922—25 6. Class Conflict & the National Strike, 1926 7. Britain & International Relations, 1925—29 8. Social Trends in Britain during the 1920s 9. Social Issues during the late 1920s 10. British Politics 1926—29; Election of 1929 11. Britain — the crisis of 1929 12. The Labour Government of 1929—31 13. Britain and economic affairs, 1931—33 14. Britain and Foreign Affairs, 1931—36 15. Social Conditions in Britain during the 1930s Advanced level Mathematics ALGEBRA & GEOMETRY 1. Simultaneous Equations 2. Polynomial Algebra 3. Cartesian Coordinates 4. The equation of the straight line 5. Intersection of lines and curves 6. Remainder and Factor Theorems 7. Functions 8. Quadratic Inequalities 9. Graphs of Inequalities 10. Indices 11. Polynomial Division 12. Velocity-Time Graphs 13. Tally Charts 14. Absolute and relative errors 15. Sequences and Series 16. Arithmetic Progressions 17. Proof by Contradiction 18. Geometric Progressions 19. The Cartesian Equation of the Circle 20. Transformations of graphs 21. Plane Trigonometry 22. Modulus 23. Trigonometric Functions 24. Inverse Trigonometric Functions 25. Linear Inequalities 26. Proportionality 27. Probability 28. Surds 29. Special Triangles 30. Quadratic Polynomials 31. Roots & Coefficients of Quadratics 32. Radian measure 33. Permutations and Combinations 34. Set Theory and Venn Diagrams 35. Sine and cosine rules 36. Elementary Trigonometric Identities 37. Roots and curve sketching 38. Graphs and roots of equations 39. Picards Method 40. Small Angle Approximations 41. Simultaneous equations in three unknowns 42. Linear relations and experimental laws 43. Conditional Probability 44. Pascal's Triangle and the Binomial Theorem 45. Index Equations and Logarithms 46. The Binomial Theorem for Rational Indices 47. Exponential Growth and Decay 48. Exponential and Natural Logarithm 49. Compound Angle Formulas 50. Sinusoidal functions 51. Vector Algebra 52. The Vector Equation of the Straight Line 53. The Scalar Product of Vectors 54. Axiom Systems 55. Introduction to Complex Numbers 56. The algebra of complex numbers 57. Complex Numbers and the Argand plane 58. De Moivres Theorem 59. Eulers formula 60. Further loci of complex numbers 61. Further graph sketching 62. Mathematical Induction 63. Proof of the Binomial Theorem 64. Polar Coordinates 65. Conic sections 66. Partial Fractions 67. First-order linear recurrence relations 68. Summation finite series with standard results 69. Method of differences 70. Trigonometric Equations 72. Series Expansion 73. Lagrange Interpolating Polynomial 74. Error in an interpolating polynomial 75. Abelian groups 76. Geometrical uses of complex numbers 77. Cyclic Groups 78. The Cayley-Hamilton Theorem 2x2 Matrices 79. Cayley Theorem 80. Determinants 81. Isomorphisms 82. Lagrange theorem 83. Properties of groups 84. Group structure 85. Subgroups 86. Homomorphisms 87. Matrix Algebra 88. Determinant and Inverse of a 2x2 matrix 89. Gaussian elimination 90. Matrix representation of Fibonacci numbers 91. Matrix groups 92. Inverse of a 3 x 3 Matrix 93. Singular and non-singular matrices 94. Properties of Matrix Multiplication 95. Induction in Matrix Algebra 96. Properties of Determinants 97. Permutation groups 98. First Isomorphism Theorem for Groups 99. Roots of Polynomials of Degree 3 100. Scalar Triple Product 101. Systems of Linear Equations 102. Matrix Transformations 103. Mappings of complex numbers 104. Cross product of two vectors 105. Vector planes 106. Eigenvalues and Eigenvectors CALCULUS 1. Introduction to the Differential Calculus 2. Stationary points and curve sketching 3. Applications of Differentiation 4. Differentiation from First Principles 5. The Trapezium Method 6. Integration 7. Direct Integration 8. Applications of integration to find areas 9. Graphs of Rational Functions 10. Derivatives of sine and cosine 11. Products, Chains and Quotients 12. Volumes of Revolution 13. Exponential and Logarithmic Functions 14. Integration by Parts 15. Parametric Equations 16. The Integral of 1/x 17. Integration by Substitution 18. Implicit Differentiation 19. Formation of a differential equation 20. Separation of variables 21. Integrals of squares of trig functions 22. Maclaurin Series 23. Techniques of Integration 24. Integrating Factor 25. The Newton-Raphson formula 26. Errors in Numerical Processes 27. Roots and Recurrence Relations 28. Derivatives of Inverse Trig. Functions 29. Second order homogeneous equations 30. Second order inhomogeneous equations 31. Implicit differentiation — second derivative 32. Integrands to inverse trigonometric functions 33. Integrands to logarithmic function 34. Integration of Partial Fractions 35. Logarithms and Implicit Differentiation 36. Implicit differentiation and MaClaurin series 37. Separation of variables by substitution 38. Trigonometric Substitutions for Integrals 39. Truncation Errors 40. Euler and Trapezoidal Method 41. Numerical methods for differential equations 42. Simpson Method 43. Proof of Simpson Formula 44. Richardson Extrapolation 45. Arc length of a curve in Cartesian coordinates 46. Arc length of a curve in Polar coordinates 47. Arc length of a curve: Parametric form 48. Curves in Euclidean space 49. Functions and continuity 50. The gradient of a scalar field 51. The derivatives of the hyperbolic functions 52. Hyperbolic Functions 53. Inverse Hyperbolic Functions 54. Hyperbolic Identities 55. Integrals with inverse hyperbolic functions 56. Reduction formulae 57. Simultaneous differential equations 58. Surface of Revolution 59. Vector differential calculus 60. Scalar Fields and Vector Functions STATISTICS & PROBABILITY 1. Central Tendency: Mean, Median and Mode 2. Standard Deviation 3. Cumulative Frequency 4. Discrete Random Variables 5. Mutually exclusive and independent events 6. The Binomial Distribution 7. The Normal Distribution 8. Standardised Normal Distribution 9. Regression Lines 10. Correlation 11. The Geometric Distribution 12. Hypothesis Testing — Binomial Distribution 13. Index Numbers 14. Time Series Analysis 15. Bayes Theorem 16. Confidence interval mean — known variance 17. The Central Limit Theorem 18. Pearsons product moment correlation 19. Spearmans Rank Correlation Coefficient 20. Hypothesis Testing — Normal Distribution 21. The Poisson Distribution 22. The Normal Approximation to the Binomial 23. The Normal Approximation to the Poisson 24. The Poisson Approximation to the Binomial 25. Type I and type II errors 26. Scalar multiples of a Poisson variable 27. Test for the Mean of a Poisson distribution 28. Random Number Sampling 29. Estimating Population Parameters 30. Random Samples and Sampling Techniques 31. The Concept of a Statistic 32. Hypothesis test for the population variance 33. Central Concepts in Statistics 34. Continuous Probability Distributions 35. Modeling: Chi squared goodness of fit 36. Chi squared test for independence 37. Degrees of Freedom 38. Difference Sample Means Unknown Variance 39. Moment generating functions 40. Probability generating functions 41. Linear Combinations of Random Variables 42. Maximum Likelihood Estimators 43. Wilcoxon signed rank test on median 44. Non-parametric significance tests 45. Single-sample sign test of population median 46. Paired-sample sign test on medians 47. Paired sample t-test for related data 48. Paired sample Wilcoxon signed rank test 49. Difference of two sample means 50. Pooled sample estimate 51. Testing the Sample Mean 52. The Uniform Distribution MECHANICS 1. Velocity-Time and Displacement-Time Graphs 2. Force diagrams 3. Representation of Forces by Vectors 4. Static Equilibrium 5. Equilibrium of coplanar forces 6. Weight and Free Fall 7. Normal Reaction and Friction 8. Newtons First and Second Laws 9. Relative Motion 10. Projectiles 11. Calculus and Kinematics 12. Motion of a Particle: Vector calculus form 13. Work 14. Energy Conversions 15. Gravitational potential and kinetic energy 16. Connected Particles 17. Moments 18. Linear momentum 19. Power 20. Hookes Law 21. Simple Harmonic Motion 22. Simple Harmonic Motion and Springs 23. Calculus, Kinematics in Three Dimensions 24. Sliding, toppling and suspending 25. Impulsive Tensions in Strings 26. Angular Velocity 27. Motion in a Horizontal Circle 28. Centre of Mass of a Uniform Lamina 29. Motion in a Vertical Circle 30. Motion under a Variable Force 31. Conservation of Angular Momentum 32. Centre of Mass of a Composite Body 33. Motion under a central force 34. Centre of Mass of a Uniform Lamina 35. Centre of Mass Uniform Solid of Revolution 36. Equilibrium of Rigid Bodies in Contact 37. Damped Harmonic Motion 38. Moment of Inertia 39. Impulse, elastic collisions in one dimension 40. Parallel and Perpendicular Axis Theorems 41. Motion described in polar coordinates 42. Simple pendulum 43. Compound pendulum 44. Stability and Oscillations 45. Vector calculus 46. Linear Motion of a Body of Variable Mass DISCRETE & DECISION 1. Algorithms 2. Introduction to graph theory 3. Dijkstra algorithm 4. Sorting Algorithms 5. Critical Path Analysis 6. Dynamic Programming 7. Decision Trees 8. The Maximal Flow Problem 9. The Hungarian algorithm 10. Introduction to Linear Programming 11. Simplex Method 12. Matching Problems 13. Game Theory 14. Minimum connector problem 15. Recurrence relations 16. Proofs for linear recurrence relations 17. Simulation by Monte Carlo Methods 18. Travelling and Optimal Salesperson Problems 19. The Travelling Salesperson Problem Philosophy INTRODUCTION TO PHILOSOPHY 1. The problem of evil 2. Introduction to Plato 3. Knowledge, belief and justification 4. Descartes Meditation I 5. Introduction to the problem of universals 6. Introduction to metaethics 7. Subjectivism versus objectivism 8. Aristotle's function argument 9. Natural Law Theory 10. Utilitarianism 11. The Nicomachaen Ethics of Aristotle 12. Virtue Ethics 13. Descartes Meditation II 14. Hume and empiricism 15. The paradox of induction 16. Hume's attack on Descartes 17. The Cosmological Argument 18. The Ontological Argument 19. The Teleological Argument 20. The Argument from religious experience 21. The Moral Argument 22. The argument from illusion 23. Materialism 24. Human Identity Sociology PERSPECTIVES & METHODOLOGY 1. Introduction to Marxism 2. Introduction to Durkheim 3. Weber: classes, status groups and parties 4. Introduction to patriarchy and gender roles 5. Mass culture theory 6. The Frankfurt school STRATIFICATION & DIVERSITY 1. Ethnic groups and discrimination 2. Race, Ethnicity and Nationalism 3. Social Inequality 4. Theories of Racism 5. Class structure 6. Modern Functionalism and Stratification 7. Social Mobility 8. Bottomore: Classes in Modern Britain 9. American exceptionalism ASPECTS OF SOCIETY 1. Definitions of Poverty 2. Theories of Poverty 3. Solutions to Poverty 4. Alienation 5. Leisure 6. Work and Technological Change 7. Conflict and Cooperation at Work 8. Attitudes to Work 9. Unemployment 10. Perspectives on Education 11. Education and Ethnicity 12. Education and Gender 13. The Family and Social Structure 14. The Family and Household Structure 15. Conjugal Roles 16. Marital Breakdown 17. Post War Education in Britain 18. British Social Policy 1945—1990

A-list Film Production Pro

a-list film production pro

London

ably. Productions Inc.: a production company that deals in all aspects of creative projects from film and television production to CD manufacturing http://www.acepix.com Ace Pix International, Inc.: a full in-house motion picture / television production and distribution company http://www.ancientpictures.comAncient Pictures: a Seattle-based motion picture and commercial production Company, as well as a networking center for writers to meet, enhance their skills and network in the film industry http://www.apotheosispictures.comApotheosis Pictures Productions: an independent film production company and the developers of the ScreenForge screenwriting software for Microsoft Word. ScreenForge is the best and most affordable screenplay formatting software available for MS Word, and a viable alternative to the much more expensive stand-alone screenwriting programs Armageddon Productions: creators of the 1997 home video release "Bloodletting," they develop and produce feature films, digital visual effects and music and movie soundtracks. They have also developed screenplays for other companies, such as Full Moon Pictures' "Witchouse" and "Alien Arsenal," and Regent Entertainment's upcoming "The Brotherhood" Assembler Films: a company that has shot and released films in Italy, Japan, India, the U.S. and Canada, to name a few Belarus Productions: Minsk-based independent production company, providing assistance to film-makers and broadcast journalists. TV production, film production, crew hire, equipment rent and location scouting in Belarus Black Cab Productions: an independent film, music, and literary production company specializing in horror, bizarre, and dark works http://www.blackfishfilms.comBlackFish Films: quality international productions specializing in non-broadcast projects for educational, military and corporate projects. Shooting 16, 35 and 70mm. Free goodies for independent producers Blokland Pictures: specializing in the development, production, and distribution of feature film drama; serving the international specialty marketplace http://www.angelfire.com/tn/tcthepackrat/bloodyfun.htmlBloody Fun Pictures: no-budget video/filmmaking, since 1996 http://www.bwave.f9.co.ukBrainwave: in the business of producing their own peculiar brand of entertainment for over a decade: films, radio plays, songs, etc. on the smallest budgets imaginable http://www.brilligprods.comBrillig Productions: exploring creative areas of filmmaking; developing narratives that range from the fanciful to the bizarre, visual designs that push the limits of independent cinema, and story-telling techniques that are inspired and inspirings http://www.c21etv.comC21ETV: one-stop-shop providing multimedia design, implementation and programming, VCD business cards production, video/TV production, digital, broadcast, industrial, post production http://www.cabiriafilms.com Cabiria Films, Prague: Filming in East Europe – locations & production services Cambridge Films: an independent production company http://www.cinedictum.com Cinedictum: a production company which produces cinedicta. Described as a form of film-aphorism, cinedicta are very short films whose concise narrative holds both entertainment and moral value, while addressing universal themes http://www.commercialfactory.comThe Commercial Factory: specializing in the production of high-quality television commercials, from the original idea to broadcast ready http://www.cotenfilms.comCoten Films: an independent film production company specialising in corporate and private video work, Web design and new media. Responsible for the action comedy feature film "Cop on the Edge IX" and the forthcoming "Days' End" http://www.crystalpyramid.comCrystal Pyramid: broadcast video production company in San Diego, California http://www.homestead.com/degalazare/dlp.htmlDega Lazare Productions: movies and other multimedia productions being made in the small town of Kahnawake by teens. From action/adventure to horror and comedy, it's all there http://www.dereko.tvDereko Entertainment: a small, independent and privately held feature film production company based in Los Angeles, California. Whose goal is to produce and release one or more feature films per year, both domestic/international territories Documentary Educational Resources (DER): produce, distribute and promote anthropological and documentary films and videos http://www.doublegproductions.comDouble G Video Productions: a video productions company providing a wide range of service and talent bank for your productions needs. "From gold to gold let Double G video productions get your story told!" http://www.egygrip.comEgygrip: a skilled team of professionals based in Egypt, and capable of managing every step of the video or film production process from concept to compeletion Emerald Oceans Entertainment: a multi-media company with film and music divisions. Founded in 1995 as a film production company it has evolved into its current broader base, which is helping it establish its place in the industry Eye Light Media: creating films, videos, music and Web sites from a Christian world view The Farnham Film Company: a UK-based TV production company interested in co-production–particularly of children's programming http://www.angelfire.com/film/file5home/about.htmlFile5 Productions: producer of market-specific sports videos by writer-director-actor David Lima http://www.filmforum.comFilm Forum: New York's leading movie house for independent premieres and repertory programming http://www.fireflyonline.comFirefly Entertainment: established in 1994 to allow aspiring talents and interested persons to achieve their goals in film, television, and theatre. The group has won multiple awards, is comprised of members of all ages, and is based in west central Pennsylvania http://www.footlooseproductions.com/Footloose Productions: film and video production company specializing in documentaries, commercial films, photo shoots, movies, and music videos http://www.fourhorsemenfilm.com/Four Horsemen Films, LLC: an independent film production company in New Jersey http://www.angelfire.com/movies/gmcproductions/gmc.htmGMC Productions: teenage independent film makers on a low budget. See screening room with video clips, and check out past films Goldader Film Productions GmbH: creates and produces feature films, TV movies, commercials, music videos, 3-D animated shorts, interactive CDs and DVDs, educational and corporate films, CDs and DVDs Gulliver Media Australia: producing award-winning television documentaries and videos Harrington Productions: content creators for video, film and new media. Based in Maui, Hawaii, they supply field production packages, crew and post production. Client list includes ABC-Sports, ESPN, E! Entertainment, NBC, BBC and The Discovery Channel http://go.to/headscrewHeadscrew: working entirely in the film medium, they provide affordable commercial shoots for local Seattle businesses, create traditional clay, cel, line and computer animations and also stage location shoots for studios who are unable to re-locate a full crew for short periods of time http://www.focusfilms.comHocus Focus Films, Israel: Filming in a foreign country could sometime become a metaphysic experience. In Israel, life itself is. To cut Red Tape, achieve Green Lights, and avoid Blue Holes. Contact a production house that can accommodate all your needs http://www.hollywoodpa.comHollywood PA: the world's first Global Movie Set. This is an independent film, shot in Central Pennsylvania. You were able to watch it live from the set, interact with the cast and crew and discover the passion and pain in filmmaking http://www.iconent.comIconoclastic Entertainment: dedicated to finding and creating the finest screenplays on the planet http://www.imageproducers.comImage Producers: a full service video and multimedia production company working on a local, regional, national, and international basis. Their creative staff works together to develop the concept, write the script, shoot the footage, and take the project through post-production to deliver the finished product http://www.ipcfilms.comIPC Films: IPC is a production company looking for ideas, projects, scripts, talent, and investors http://www.jam-productions.comJam Productions a San Francisco Bay Area video/film company that does broadcast quality commercials, special event filming, indie film projects, multi-media and more http://www.jamsessionfilms.comJam Session Productions: a minority/woman-owned midwest-based film and multimedia company whose projects have included music videos, commercials and PSA's, training films, industrial films, TV program segments and more Janson Media: an international program sales and distribution company, a "content" company. We have licensed programming to over 180 countries around the world. Please see our Clients page, for a fairly complete list of the broadcasters and cable and satellite networks to whom we license programming http://www.jetifilms.comJeti Films: an independent film company based in Louisiana http://www.kaizenfilms.comKaizen Films: their mission is to develop new technologies and techniques to enhance the production of motion pictures, while maintaining cinema as an art form http://www.kineticimage.comKinetic Image Co., Ltd.: an Ohio-based motion picture production company that, for nearly twenty years, have specialized in creating exciting motion picture entertainment on budgets that would shame a cat. They created a number of well-received cult items which have graced the schedules of the USA Network and Cinemax http://www.kiwifilm.comKiwi Film & Video, Asia: a Hong Kong and Singapore based film and video production service company catering to a broad range of clients from around the world; fully-equipped camera crews is their specialty http://www.ltfilms.comLarry Taylor Productions: dedicated to providing creative projects for family entertainment, including movies and television programs, as well as the construction of a new and unique style of theme park. The vision: To put the heart into every picture. http://www.leafpile.tvLeaf Pile TV: Tune In: This TV variety program is filled with a swarm of segments composed of local events and artist interviews which provide musical entertainment and hilarious sketch comedy. Leaf Pile also has freelance videography for your major rock video or demo. Check out our exclusive camera packaging http://www.littlerickyproductions.comLittle Ricky Productions: feature films that reach the moral conscience of America http://www.mecfilms.comMatrixx Entertainment: The World's First Virtual Movie Studio(tm). Services include: producing, financing and distributing independent feature films; Web site, production and legal consulting for entertainment clients; books and manuals on filmmaking and more Media Movers,Inc.: full service localization company offering services in dubbing,subtitling,voiceovers & production in Asian, Indian & European http://members.aol.com/mptvMPTV: offering on-location video production, graphics and animation design, AVID video post production, Macromedia Director authoring, and many more services http://www.mptv.commptv.com: Film, video and audio production and distribution http://www.mundiali.comMundiali Entertainment: providing a venue for the production of lower cost motion pictures ($15 and $20 million each) and television programming (based on a cooperative agreement between Mundiali and either a television network or special project investors) http://members.tripod.com/%7EOverboardProductionsOverboard Productions: an independent film production copmpany headed up by Matt Fore http://www.angelfire.com/ga/PARALLELAFTERNOONParallel Afternoon Productions: independent thinkers with a vision that strives to be unequaled http://www.peacerecord.comPeace Record Company: a multi-faceted audio/video production company offering video editing, acting video demo production, video/audio tape duping, video projection and sound systems rentals, wedding videos, on location multi-camera video recordings of special events and more http://www.phproductions.comPH Productions: services include business and personal consulting and coaching, project development, script writing, video production, video biographies, television programs, infomercials, commercials, photography and 3-d animation http://www.psavideo.comProduction Services Arizona: since 1971, providing quality, production services in the areas of video, multimedia, and animation graphics. Serving clients worldwide from Korea to France, South America to Canada in medium to high budget corporate marketing and training venues. Full collateral support through PS/A's graphics dept. Rawbass: design and production of all types of artistic media http://www.rcwmediaworks.comRCW Media Works: an independent production company that realizes that it is not the size of your budget that determines quality, it is the dedication and heart that you put into your projects http://www.realitycrash.comReality Crash Productions: showcases original and creative projects from writers, artists, film makers and critics. They are looking for people to contribute to the site. You retain full rights for your work and a web page is provided for you http://www.revivalentertainment.com/Revival Entertainment: this team is producing films of the highest quality in Surrey England http://www.riggedproductions.comRigged Productions: film and video, cartoons and art, writing, music and audio, and other works http://www.riverproductions.comRiver Productions: an independent film company located in Los Angeles, CA, headed by Michael J. Isgrig (writer, director, producer), Lynn C. Grant (writer, producer) and Kym R. Wulfe (executive producer, head of business and legal affairs) http://www.roman-pictures.comRoman Pictures: a motion picture production company which primarily produces "budget-controlled" feature-length movies that are licensed for distribution and exploitation in the direct-to-video, cable, TV and satellite markets http://www.runningdogfilms.co.ukRunning Dog Films: a new British film company dedicated to making films using cheap and affordable technology combined with proven no/lo budget production practices http://www.shadesofday.comShades of Day: the art of independent film and video producing. Extensive database of cinema related resources http://www.sharpshootertv.comSharpshooter Worldwide: a television production company that specializes in on location filming, any where in the world. Their motto is: "We don't go after awards or publicity. We just do the work." http://www.smileycrew.comSmiley Crew Productions: a California-based film crew specializing in both TV and film. Their main agenda focuses on their popular cable access comedy show, and their pro creative, anti "trend" statements http://www.smorgasbordproductions.comSmorgasbord Productions: a small company involved in the production of multimedia. Film, video, animation, graphic art and comic books are their products Starsmead Production Ltd: comprehensive production services for television and film http://www.studiosatlascolinas.comThe Studios at Las Colinas: a full-service production and entertainment facility located in the heart of the Dallas/Fort Worth Metroplex; offering complete music, film, video, and multimedia production capabilities, as well as parties and events hosting http://www.suedeinteractive.comSuede Interactive: an in-house production facility (located in the NY Metro area) for radio and TV commercials, audio/video/film productions and Internet services (Web site design, search engine placement, e-commerce and hosting) http://www.tafproductions.comTAF Productions: an independent production company, based in the Netherlands, that specializes in executive and unit production services. Additionally, they create their own screen productions Tangled Web Productions: a feature film production company that writes, directs, and produces their own projects. They currently have four projects in development http://www.telenet.bc.caTelenet Communications: video, audio and multimedia production using DV cameras, non-linear editing software and audio foley Terrazas Video: Southern Arizona's largest production facility. Film, video, grip, lighting and stage. Visit their Web site for a complete list of resources TEWS Entertainment: founded by Tim Sullivan and Erik Woods in 1995, responsible for "Of Fortune and Glory," winner of the Best Picture award at the 2000 REwind Video Awards in Calgary http://www.thrae.comThrae Entertainment: your source for no-budget moviemaking on the Web. Provides information and insight into the world of movies without the burden of large financial resources, a place for moviemakers to share their experiences and information about their films http://www.torontopictures.comToronto Pictures: a production company, with its own film-school. Under the leadership of internationally-awarded film director, writer and producer Bruno Pischiutta, they specialize in producing feature films, documentaries and TV series http://www.transworldvideo.comTransworld Video Productions: from idea to shrink wrap; Cable TV to Network. Duplications and conversions to the world formats: NTSC, PAL, SECAM http://www.twodollarpistol.comTwo Dollar Pistol Films: specializing in the writing and production of independent feature films, shorts and documentaries and providing a wide array of digital production services for independent, private and corporate projects http://www.unknownproductions.comUnknown Productions: independent movie production with distribution from Cinematrix releasing, giving the world another entertainment choice http://1aindfilm.twoffice.comVariety Plus Enterprises, Inc.: serving the lower Westchester and New York City community since 1984. They specialize in creating stories, screenplays, and feature length motion pictures http://www.waterfrontchicago.comWaterfront Productions: a Chicago, Illinois-based production company that shoots and edits complete projects on film and video. Separate packages are available for just shooting or editing, if needed http://www.whodat.comWho Dat Music Productions: in Astoria, New York, is the developer of the Who Dat AudioLogo® brand identity for the Internet. We have produced elements for CD-ROM, DVD, Streaming Media for the Internet, Web Site Developers, Multimedia Productions, Interactive Productions, Original or Library Music for Film and Video, Narrators and Voice Over Talent, Web Casting, Corporate Presentation and the entire production if necessary http://www.worldwidefilmworks.comWorld Filmworks: a company designed to create musical/theatre productions, music videos, commercials, and short films, with an eye toward the ever-increasing presence of the Internet as the future of distribution http://www.youngmankang.comYoung Man Kang Films: a writer/director with more than 20 films and more than 50 TV commercials in his portfolio http://www.zone5pictures.comZone 5 Pictures: the source for all of your business media needs, including film and video production, studio photography, Web development, graphic design, feature films and animation/3D

Courses matching "Identity"

Show all 216

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered OnlineFlexible Dates
£2,380

55344 Identity with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server. This would typically include: ?AD DS administrators who are looking to train in identity and access technologies with Windows Server 2016, Windows Server 2019 or Windows Server 2022. ?System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2016, Windows Server 2019 or Windows Server 2022. Overview Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement and administer Active Directory Rights Management Services (AD RMS). Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement synchronization between AD DS and Azure AD. Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. Monitor, troubleshoot, and establish business continuity for AD DS services. This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory - related issues with Windows Server. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS). Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. 1 - Installing and configuring domain controllers Overview of AD DS Overview of AD DS domain controllers Deploying a domain controller 2 - Managing objects in AD DS Managing user accounts Managing groups in AD DS Managing computer objects in AD DS Using Windows PowerShell for AD DS administration Implementing and managing OUs 3 - Advanced AD DS infrastructure management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts 4 - Implementing and administering AD DS sites and replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication 5 - Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs 6 - Managing user settings with Group Policy Implementing administrative templates Configuring Folder Redirection, software installation, and scripts Configuring Group Policy preferences 7 - Securing Active Directory Domain Services Securing domain controllers Implementing account security Implementing audit authentication Configuring managed service accounts 8 - Deploying and managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs 9 - Deploying and managing certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards 10 - Implementing and administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Web Application Proxy Overview 11 - Implementing and administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection 12 - Implementing AD DS synchronization with Microsoft Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization 13 - Monitoring, managing, and recovering AD DS Monitoring AD DS Managing the Active Directory database Active Directory backup and recovery options for AD DS and other identity and access solutions

55344 Identity with Windows Server
Delivered OnlineFlexible Dates
£2,975

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered OnlineFlexible Dates
£595

Understanding and Developing a Marketing Strategy

5.0(1)

By Let’s Do Business Group

An area that many small and new businesses struggle with is developing and defining their approach to marketing. Creating a marketing strategy document is something every business owner should do before you start marketing your business.

Understanding and Developing a Marketing Strategy
Delivered Online + more
£35

Red Hat Identity Management and Active Directory Integration with exam (RH363)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications Identity management specialist or engineer Access management specialist or engineer Web application developer DevOps specialist Overview As a result of attending this course, you will gain an understanding of the architecture of an identity management realm and trusted relationships using both Red Hat Enterprise Linux Identity Management and Microsoft Active Directory. You will be able to create, manage, and troubleshoot user management structures, security policies, local and remote secure access methods, and implementation technologies such as Kerberos, PKI, and certificates. You should be able to demonstrate these skills: Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers. Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies. Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower. This course will empower you with the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat© Enterprise Linux.You will master these skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. This course covers the same material as RH362, but includes the Red Hat Certified Specialist in Identity Management exam (EX362). Install Red Hat Identity Management Describe and install Red Hat Identity Management (IdM). Centralize Identity Management Explain the IdM server services, explore IdM clients access methods, and install an IdM client. Authenticate identities with Kerberos Define the Kerberos protocol and configure services for Kerberos authentication. Integrate IdM with Active Directory Create a trust relationship with Active Directory. Control user access Configure users for authorized access to services and resources. Manage a public key infrastructure Manage certificate authorities, certificates, and storing secrets. Maintain IdM operations Troubleshoot and recover Identity Management. Integrate Red Hat products with IdM Configure major services to share the IdM authentication database. Install scalable IdM Construct a resilient and scalable Identity Management topology.

Red Hat Identity Management and Active Directory Integration with exam (RH363)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network security engineers Network security architects ISE administrators Senior Security Operations Center (SOC) personnel responsible for Incidence Response Cisco integrators and partners Overview After taking this course, you should be able to: Describe the Cisco Identity Services Engine (ISE) Explain Cisco ISE deployment Describe Cisco ISE policy enforcement components Describe Cisco ISE policy configuration Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support Configure guest access Configure hotspots and guest portals Describe the Cisco ISE profiler services Describe profiling best practices and reporting Configure a Cisco ISE BYOD solution Configure endpoint compliance Configure client posture services Configure Cisco ISE device administration Describe Cisco ISE TrustSec configurations The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco© Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification Course Outline Introducing Cisco ISE Architecture Introducing Cisco ISE Deployment Introducing Cisco ISE Policy Enforcement Components Introducing Cisco ISE Policy Configuration Troubleshooting Cisco ISE Policy and Third-Party NAD Support Introducing Web Authentication and Guest Services Configuring Hotspots and Guest Portals Introducing the Cisco ISE Profiler Introducing Profiling Best Practices and Reporting Configuring Cisco ISE BYOD Introducing Cisco ISE Endpoint Compliance Services Configuring Client Posture Services and Compliance Working With Network Access Devices Exploring Cisco TrustSec Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco© Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE)
Delivered OnlineFlexible Dates
Price on Enquiry

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered OnlineFlexible Dates
£2,975

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Cisco SISE Implementing and Configuring Cisco Identity Services Engine v3.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 is a Cisco ISE training program that discusses the Cisco Identity Services Engine, an identity and access control policy platform that provides a single policy plane across the entire organization, combining multiple services, including authentication, authorization, and accounting (AAA), posture, profiling, device onboarding, and guest management, into a single context-aware identity-based platform. This CCNA course provides students with the knowledge and skills to enforce security posture compliance for wired and wireless endpoints as well as enhance infrastructure security using the Cisco ISE. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization

Cisco SISE Implementing and Configuring Cisco Identity Services Engine v3.0
Delivered OnlineFlexible Dates
Price on Enquiry