• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

473 Identity courses in Nottingham delivered On Demand

British Sign Language Course (BSL) Level 1 & 2

5.0(1)

By Course Gate

If you want to learn BSL and help children with hearing loss or special needs, this course is for you. You will learn how to communicate effectively in BSL, and how to support the development and achievement of these children. You will also connect with the deaf community and appreciate their culture and identity. Don't miss this opportunity to become a proficient and confident BSL user. Enrol today and start your journey with us.

British Sign Language Course (BSL) Level 1 & 2
Delivered Online On Demand8 hours 23 minutes
£11.99

Ace Your Segmenting Positioning Assignments with Our Tailored Help

By Jack Walker

Mastering Segmenting and Positioning in Marketing: A Comprehensive Guide for Success Introduction In the dynamic field of marketing, mastering segmentation and positioning is crucial to developing effective strategies that resonate with target audiences. Whether you are a student navigating complex assignments or a professional refining your skills, understanding the nuances of these concepts is essential. Segmenting Positioning Assignment Help can provide you with the guidance needed to enhance your knowledge and tackle challenging tasks with confidence. Understanding Market Segmentation Market segmentation is the process of dividing a broad consumer or business market into sub-groups based on shared characteristics. These groups could be divided by demographics, psychographics, behavior, or geographic location. The objective is to tailor marketing strategies that cater specifically to each segment, ensuring more targeted and effective communication. Segmentation plays a vital role in helping marketers understand the different needs of various customer groups. By identifying these unique traits, businesses can allocate resources more efficiently, create products that meet customer demands, and develop messaging that resonates with a particular audience. For students, mastering the principles of segmentation is essential for excelling in marketing courses. When tackling your assignments, it’s important to grasp the four main types of market segmentation: Demographic Segmentation: Based on variables like age, gender, income, education, and occupation. Psychographic Segmentation: Focuses on psychological aspects such as lifestyle, values, and personality traits. Behavioral Segmentation: Involves grouping consumers based on behavior patterns like purchase history, brand loyalty, or usage rates. Geographic Segmentation: Divides markets based on location, such as country, region, or city. Acquiring a solid understanding of these categories can give you the edge needed to excel in marketing. However, if you’re finding it difficult to put these theories into practice, Segmenting Positioning Assignment Help can provide the expert guidance required to succeed. The Importance of Positioning in Marketing Strategy Positioning is the next critical step after segmentation. Once a company has identified its market segments, it must determine how to position its products or services within those segments. Effective positioning means that a company’s offerings are clearly differentiated from competitors in the minds of consumers. There are three main approaches to positioning: Competitive Positioning: Emphasizes how a product stands against competitors. Product Feature Positioning: Highlights specific features or benefits that appeal to the target market. Price-Based Positioning: Focuses on offering value through price differentiation, often targeting budget-conscious consumers. Understanding these positioning strategies is critical to creating a strong brand identity. In marketing assignments, you’ll often be asked to develop a positioning strategy that fits with a company’s overall marketing goals and customer expectations. Struggling with positioning concepts? Segmenting Positioning Assignment Help can offer you the in-depth knowledge and practical advice needed to navigate these assignments successfully. How to Apply Segmenting and Positioning in Real-World Marketing Applying segmentation and positioning in the real world goes beyond theory. It requires critical thinking, creativity, and analytical skills to develop a marketing strategy that truly speaks to the target audience. Here’s how you can apply these concepts effectively: Conduct Thorough Market Research: Understanding your target audience through research is the foundation of both segmentation and positioning. Use surveys, interviews, and data analysis to gather insights into consumer behavior and preferences. Identify Key Customer Segments: Based on your research, identify the segments that are most likely to be interested in your product or service. Tailor your marketing efforts to these groups for maximum impact. Develop a Clear Positioning Statement: Craft a message that clearly communicates the unique benefits of your offering. Ensure that it differentiates your product from competitors and resonates with the target segment. Consistently Communicate Your Positioning: Your positioning should be reflected in all aspects of your marketing, from advertising to customer service. Consistency is key to building brand loyalty and trust. Completing assignments that require you to apply these real-world skills can be challenging. Segmenting Positioning Assignment Help can assist you in crafting well-researched and structured assignments that demonstrate a clear understanding of these concepts. The Role of Segmentation and Positioning in Digital Marketing With the rise of digital marketing, segmentation and positioning have become more sophisticated. Online platforms provide marketers with vast amounts of data, enabling them to create more refined segments and develop highly targeted campaigns. Whether through social media, email marketing, or pay-per-click advertising, businesses can now reach specific audiences with laser precision. For students studying digital marketing, it’s crucial to understand how segmentation and positioning are applied in this context. Some key areas to focus on include: Targeted Advertising: Platforms like Google Ads and Facebook allow businesses to target ads based on demographics, interests, behaviors, and locations. This enables more efficient use of marketing budgets and improves conversion rates. Personalization: Modern consumers expect personalized experiences. By segmenting audiences and positioning products effectively, marketers can deliver tailored messages that resonate on an individual level. Data-Driven Decisions: Analytics tools provide valuable insights into consumer behavior, allowing businesses to refine their segmentation and positioning strategies over time. Understanding these digital marketing applications can give you a competitive edge in your assignments. If you need further guidance, Segmenting Positioning Assignment Help is available to offer tailored support for your digital marketing studies. How Segmenting and Positioning Lead to Business Success Businesses that master segmentation and positioning often outperform their competitors. By targeting the right audience with the right message, they can increase customer engagement, build brand loyalty, and drive sales. Some of the key benefits include: Improved Customer Satisfaction: When companies understand the unique needs of their target segments, they can deliver products and services that meet those needs more effectively. Increased Market Share: Positioning a brand as the best solution for a particular market segment can lead to a larger market share and greater profitability. Enhanced Brand Perception: A well-positioned brand is seen as more credible and reliable by consumers, helping to build long-term customer relationships. For students, understanding these benefits is essential for crafting successful marketing strategies in your coursework. If you’re finding it difficult to connect these concepts with real-world business outcomes, Segmenting Positioning Assignment Help can guide you through the process. Conclusion Segmenting and positioning are foundational concepts in marketing that can significantly impact business success. By breaking down broad markets into smaller, more manageable segments and crafting positioning strategies that resonate with those segments, companies can develop highly effective marketing campaigns. If you’re working on assignments that require you to analyze these concepts, don’t hesitate to seek support. Segmenting Positioning Assignment Help is designed to give you the expertise and confidence you need to ace your assignments and build a strong foundation for your future career in marketing.

Ace Your Segmenting Positioning Assignments with Our Tailored Help
Delivered Online On Demand
FREE

Understanding the LGBTQ+ Community

By traumatraining.uk

Throughout this course, we explore key topics including the historical context of LGBTQ+ rights, the impact of societal attitudes on mental health, and the importance of affirming practices in therapy. You will also learn about the intersectionality of LGBTQ+ identities with other aspects of diversity, such as race, ethnicity, and socioeconomic status, providing a holistic view of your clients’ experiences. Our goal is to create a deeper understanding and awareness of the LGBTQ+ community, empowering you to build meaningful, respectful relationships with clients and colleagues from all backgrounds. By the end of this course, you will be better equipped to challenge biases, advocate for inclusivity, and support the mental health needs of LGBTQ+ individuals.

Understanding the LGBTQ+ Community
Delivered Online On Demand15 months
FREE

Online Options

Show all 690

BOOKINGS CLOSED! 25th July Ciara McEllin #Agent121. Looking for: ADULT FICTION / NON-FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION / NON-FICTION Ciara McEllin is building her list as a Junior Agent at Watson Little. She reads widely across book club, upmarket and literary fiction. Within these areas, she is drawn to novels that examine family and relationship dynamics, sexuality, identity, and vulnerability. Ciara is keen to hear from writers who take a fresh approach to these themes, whether that be a new perspective on a traditional narrative or a focus on characters and voices that remain underrepresented: think Kairos by Jenny Erpenbeck, Asymmetry by Lisa Halliday or Monkey Grip by Helen Garner. She will always want to read beautifully written novels with a strong sense of place, tangible characters and an essence that stays with you – living deep in your bones – long after you’ve finished reading. Recent reads Ciara has enjoyed include: Lonesome Dove by Larry McMurtry, Enter Ghost by Isabella Hammad, Close to Home by Michael Magee, Siblings by Brigitte Reimann, Trespasses by Louise Kennedy, The Idiot by Elif Batuman, Highway Blue by Ailsa McFarlane and My Phantoms by Gwendoline Riley. At the moment Ciara is particularly eager to see: - Sexy, sensual and seductive stories that explore desire and sexual boundaries not often represented in literature such as Little Rabbit by Alyssa Songsiridej, Cleanness by Garth Greenwell and Mrs. S by K Patrick - An atmospheric and existential thriller in the vein of Intimacies by Katie Kitamura, In The Cut by Susanna Moore and Drive Your Plow Over the Bones of the Dead by Olga Tokarczuk - An intoxicating coming of-age-tale that captures the aliveness, intelligence and wildness of girlhood like Brutes by Dizz Tate, The Virgin Suicides by Jeffrey Eugenides and The Girls by Emma Cline - Books that are joyful or brutal, particularly those that are both, similar to Headshot by Rita Bullwinkel, Kick the Latch by Kathryn Scanlan and Small Things Like These by Claire Keegan - Stories exploring an Australia or Ireland that is rarely seen in literature for example A Loving, Faithful Animal by Josephine Rowe and Wild Houses by Colin Barrett In non-fiction, Ciara enjoys narrative, memoir and essay collections. She is interested in hearing from experts, academics, critics and journalists writing about society, culture and food, and excited by writers seeking to revise, reshape or revolutionise the conversation in their area of expertise. Some of her favourite non-fiction titles include How To Survive A Plague by David France, The Transgender Issue by Shon Faye, the Living Autobiography Series by Deborah Levy, Last Witnesses: Unchildlike Stories by Svetlana Alexievich, King Kong Theory by Virginie Despentes; and she particularly enjoys the work of M.F.K Fisher, Annie Ernaux, Natalia Ginsburg and Helen Garner. Ciara is not looking for Children’s, YA or Fantasy. Ciara would like you to submit a covering letter, 1 -2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Ciara is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 21 July 2025 at 10:00am UK BST

BOOKINGS CLOSED! 25th July Ciara McEllin #Agent121. Looking for: ADULT FICTION / NON-FICTION
Delivered Online + more
£72

LAST CHANCE TO BOOK! 30th July Imogen Pelham #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Imogen Pelham has been at Marjacq since 2015, and has worked as a literary agent for more than a decade. She represents literary fiction and some upmarket commercial fiction, as well as a wide range of non-fiction. Imogen's looking for fiction with a strong premise, a surprise twist, or sharp humour. Recent favourites include Leave The World Behind by Rumaan Alam, Early Morning Riser by Katherine Heiny, and Sorrow & Bliss by Meg Mason. Her non-fiction list includes history, memoir, medicine and psychology. She is particularly interested in identity, the arts and investigative journalism. Imogen would like you to submit a covering letter, 1 - 2 page synopsis and the first 10,000 words of your manuscript in a single word document. (In addition to the paid sessions, Imogen is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 25 July at 12 noon UK BST

LAST CHANCE TO BOOK! 30th July Imogen Pelham #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online + more
£72

Beginner's Guide to Video Editing (Interactive Workshop)

4.9(7)

By Clockwork Eye Video

This video editing workshop equips you with the essential skills to create professional-looking videos for your business, even if you've never edited before.

Beginner's Guide to Video Editing (Interactive Workshop)
Delivered Online + more
£250

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered OnlineFlexible Dates
£2,380

Identity Theft Prevention Course

3.5(2)

By Elearncollege

Description Identity Theft Prevention Diploma Identity theft is a fraudulent practice of using someone else's name or personal information to obtain money or goods in that person's name. Anyone is a potential target of identity theft and that includes even children. Even celebrities like Robert De Niro and Oprah Winfrey have been victims of identity theft. Most identity theft can be prevented by taking precautions like protecting and safeguarding your personal information to make yourself a hard target. In the era of the internet, information of all kinds is available at a click of a button. Personal information is being shared through emails and social networking sites making everyone who doesn't practice discretion a soft target. Identity Theft Prevention Diploma aims to spread awareness among people on what identity theft is and how identity thieves obtain the personal information of others. By providing insights into the working of identity thieves, Identity Theft Prevention Diploma tries to educate you regarding the prevention methods to be followed so that you do not fall prey to scams or fraudulent practices of identity thieves. What You Will Learn 1: Understanding Identity Theft 2: Anti-Identity Theft Precautions and Guidelines 3: Recognizing Common Signs of Identity Theft 4: Looking Into Financial Statements 5: Keeping Tabs on Sensitive Information 6: Watching What You Discard 7: Practicing Discretion in Public Places 8: Becoming Familiar with the Methods of Identity Thieves 9: Buying Online and Some Common Online Threats 10: Staying Safe from Online Threats Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Identity Theft Prevention Course
Delivered Online On Demand9 days
£99

Exam MS-100 Microsoft 365 Identity and Services Course

By Packt

This course will help you pass the Microsoft 365 Identity and Services (Exam MS-100) certification and demonstrate a detailed understanding of evaluating, planning, migrating, deploying, and managing Microsoft 365 services.

Exam MS-100 Microsoft 365 Identity and Services Course
Delivered Online On Demand7 hours 3 minutes
£93.99

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

By Packt

This course will help you qualify for the Microsoft SC 900 exam, and this certification is targeted at those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Delivered Online On Demand7 hours 7 minutes
£26.99

55344 Identity with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server. This would typically include: ?AD DS administrators who are looking to train in identity and access technologies with Windows Server 2016, Windows Server 2019 or Windows Server 2022. ?System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2016, Windows Server 2019 or Windows Server 2022. Overview Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement and administer Active Directory Rights Management Services (AD RMS). Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement synchronization between AD DS and Azure AD. Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. Monitor, troubleshoot, and establish business continuity for AD DS services. This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory - related issues with Windows Server. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS). Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. 1 - Installing and configuring domain controllers Overview of AD DS Overview of AD DS domain controllers Deploying a domain controller 2 - Managing objects in AD DS Managing user accounts Managing groups in AD DS Managing computer objects in AD DS Using Windows PowerShell for AD DS administration Implementing and managing OUs 3 - Advanced AD DS infrastructure management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts 4 - Implementing and administering AD DS sites and replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication 5 - Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs 6 - Managing user settings with Group Policy Implementing administrative templates Configuring Folder Redirection, software installation, and scripts Configuring Group Policy preferences 7 - Securing Active Directory Domain Services Securing domain controllers Implementing account security Implementing audit authentication Configuring managed service accounts 8 - Deploying and managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs 9 - Deploying and managing certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards 10 - Implementing and administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Web Application Proxy Overview 11 - Implementing and administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection 12 - Implementing AD DS synchronization with Microsoft Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization 13 - Monitoring, managing, and recovering AD DS Monitoring AD DS Managing the Active Directory database Active Directory backup and recovery options for AD DS and other identity and access solutions

55344 Identity with Windows Server
Delivered OnlineFlexible Dates
£2,975

Why Identity Matters

5.0(1)

By Enspark

There is perhaps more identity-related conflict than ever before, and it is becoming increasingly more public. These conflicts can create polarization in all areas of life, including the workplace, where it can lead to harmful consequences for an entire organization. And yet, instituting change on an organizational level is sometimes a challenge. This video is a great resource for helping team members understand the importance of cultural awareness and respecting the identity of others. It is a great compliment to any D&I training. Length: 2:48 Learning Objectives Analyze and identify various identity dimensions, including age, geography, gender, race, religion, social class, nationality, sexual identity, worldviews, ideologies, belief systems, core values, and narratives.;Recognize the multifaceted nature of identity-based conflicts and their impact on society, including incivility, inequality, and polarization.;Develop a heightened level of identity intelligence, enabling more self-awareness, strategic thinking, and confidence in interpersonal and professional interactions.;Explore the evolving rules and boundaries of identity-related discussions and conflicts in contemporary society.

Why Identity Matters
Delivered Online On Demand5 minutes
£4.95

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered OnlineFlexible Dates
£595

Educators matching "Identity"

Show all 3
The Brunts Academy

the brunts academy

0.0(69)

Nottinghamshire

The Brunts Academy, is a popular and oversubscribed high achieving secondary school with a great tradition of success. We believe that an outstanding education develops our students academically, socially and morally, giving them the knowledge and skills to be successful at school and in life. We also feel it is important for our young people to develop outside of the classroom and we offer a wide range of enrichment and extra-curricular opportunities to help prepare our students for the next stage of their education, training or employment. As a ‘Values’ driven Academy our staff and students aspire to display the following values in all they do: Ambition - Fulfil your potential Integrity - Be honest and trustworthy Inclusivity - Respect for everyone Resilience - Never give up Endeavour - Always work hard We believe that secondary education represents a major stage in the life of each young person and so we aim to work together with parents, carers, trustees, agencies and the local community to support our young people; enabling them to develop and grow within this community and in building together a real sense of identity within The Brunts Academy. We demand excellence of ourselves and our community so that we can best serve our students and have an ambitious future. The Brunts Academy is proud of the success our students achieve year on year and through our constant focus on teaching and learning, we see our students develop into lifelong learners whilst enjoying their time with us.