• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

261 Educators providing Identity courses

A-list Film Production Pro

a-list film production pro

London

ably. Productions Inc.: a production company that deals in all aspects of creative projects from film and television production to CD manufacturing http://www.acepix.com Ace Pix International, Inc.: a full in-house motion picture / television production and distribution company http://www.ancientpictures.comAncient Pictures: a Seattle-based motion picture and commercial production Company, as well as a networking center for writers to meet, enhance their skills and network in the film industry http://www.apotheosispictures.comApotheosis Pictures Productions: an independent film production company and the developers of the ScreenForge screenwriting software for Microsoft Word. ScreenForge is the best and most affordable screenplay formatting software available for MS Word, and a viable alternative to the much more expensive stand-alone screenwriting programs Armageddon Productions: creators of the 1997 home video release "Bloodletting," they develop and produce feature films, digital visual effects and music and movie soundtracks. They have also developed screenplays for other companies, such as Full Moon Pictures' "Witchouse" and "Alien Arsenal," and Regent Entertainment's upcoming "The Brotherhood" Assembler Films: a company that has shot and released films in Italy, Japan, India, the U.S. and Canada, to name a few Belarus Productions: Minsk-based independent production company, providing assistance to film-makers and broadcast journalists. TV production, film production, crew hire, equipment rent and location scouting in Belarus Black Cab Productions: an independent film, music, and literary production company specializing in horror, bizarre, and dark works http://www.blackfishfilms.comBlackFish Films: quality international productions specializing in non-broadcast projects for educational, military and corporate projects. Shooting 16, 35 and 70mm. Free goodies for independent producers Blokland Pictures: specializing in the development, production, and distribution of feature film drama; serving the international specialty marketplace http://www.angelfire.com/tn/tcthepackrat/bloodyfun.htmlBloody Fun Pictures: no-budget video/filmmaking, since 1996 http://www.bwave.f9.co.ukBrainwave: in the business of producing their own peculiar brand of entertainment for over a decade: films, radio plays, songs, etc. on the smallest budgets imaginable http://www.brilligprods.comBrillig Productions: exploring creative areas of filmmaking; developing narratives that range from the fanciful to the bizarre, visual designs that push the limits of independent cinema, and story-telling techniques that are inspired and inspirings http://www.c21etv.comC21ETV: one-stop-shop providing multimedia design, implementation and programming, VCD business cards production, video/TV production, digital, broadcast, industrial, post production http://www.cabiriafilms.com Cabiria Films, Prague: Filming in East Europe – locations & production services Cambridge Films: an independent production company http://www.cinedictum.com Cinedictum: a production company which produces cinedicta. Described as a form of film-aphorism, cinedicta are very short films whose concise narrative holds both entertainment and moral value, while addressing universal themes http://www.commercialfactory.comThe Commercial Factory: specializing in the production of high-quality television commercials, from the original idea to broadcast ready http://www.cotenfilms.comCoten Films: an independent film production company specialising in corporate and private video work, Web design and new media. Responsible for the action comedy feature film "Cop on the Edge IX" and the forthcoming "Days' End" http://www.crystalpyramid.comCrystal Pyramid: broadcast video production company in San Diego, California http://www.homestead.com/degalazare/dlp.htmlDega Lazare Productions: movies and other multimedia productions being made in the small town of Kahnawake by teens. From action/adventure to horror and comedy, it's all there http://www.dereko.tvDereko Entertainment: a small, independent and privately held feature film production company based in Los Angeles, California. Whose goal is to produce and release one or more feature films per year, both domestic/international territories Documentary Educational Resources (DER): produce, distribute and promote anthropological and documentary films and videos http://www.doublegproductions.comDouble G Video Productions: a video productions company providing a wide range of service and talent bank for your productions needs. "From gold to gold let Double G video productions get your story told!" http://www.egygrip.comEgygrip: a skilled team of professionals based in Egypt, and capable of managing every step of the video or film production process from concept to compeletion Emerald Oceans Entertainment: a multi-media company with film and music divisions. Founded in 1995 as a film production company it has evolved into its current broader base, which is helping it establish its place in the industry Eye Light Media: creating films, videos, music and Web sites from a Christian world view The Farnham Film Company: a UK-based TV production company interested in co-production–particularly of children's programming http://www.angelfire.com/film/file5home/about.htmlFile5 Productions: producer of market-specific sports videos by writer-director-actor David Lima http://www.filmforum.comFilm Forum: New York's leading movie house for independent premieres and repertory programming http://www.fireflyonline.comFirefly Entertainment: established in 1994 to allow aspiring talents and interested persons to achieve their goals in film, television, and theatre. The group has won multiple awards, is comprised of members of all ages, and is based in west central Pennsylvania http://www.footlooseproductions.com/Footloose Productions: film and video production company specializing in documentaries, commercial films, photo shoots, movies, and music videos http://www.fourhorsemenfilm.com/Four Horsemen Films, LLC: an independent film production company in New Jersey http://www.angelfire.com/movies/gmcproductions/gmc.htmGMC Productions: teenage independent film makers on a low budget. See screening room with video clips, and check out past films Goldader Film Productions GmbH: creates and produces feature films, TV movies, commercials, music videos, 3-D animated shorts, interactive CDs and DVDs, educational and corporate films, CDs and DVDs Gulliver Media Australia: producing award-winning television documentaries and videos Harrington Productions: content creators for video, film and new media. Based in Maui, Hawaii, they supply field production packages, crew and post production. Client list includes ABC-Sports, ESPN, E! Entertainment, NBC, BBC and The Discovery Channel http://go.to/headscrewHeadscrew: working entirely in the film medium, they provide affordable commercial shoots for local Seattle businesses, create traditional clay, cel, line and computer animations and also stage location shoots for studios who are unable to re-locate a full crew for short periods of time http://www.focusfilms.comHocus Focus Films, Israel: Filming in a foreign country could sometime become a metaphysic experience. In Israel, life itself is. To cut Red Tape, achieve Green Lights, and avoid Blue Holes. Contact a production house that can accommodate all your needs http://www.hollywoodpa.comHollywood PA: the world's first Global Movie Set. This is an independent film, shot in Central Pennsylvania. You were able to watch it live from the set, interact with the cast and crew and discover the passion and pain in filmmaking http://www.iconent.comIconoclastic Entertainment: dedicated to finding and creating the finest screenplays on the planet http://www.imageproducers.comImage Producers: a full service video and multimedia production company working on a local, regional, national, and international basis. Their creative staff works together to develop the concept, write the script, shoot the footage, and take the project through post-production to deliver the finished product http://www.ipcfilms.comIPC Films: IPC is a production company looking for ideas, projects, scripts, talent, and investors http://www.jam-productions.comJam Productions a San Francisco Bay Area video/film company that does broadcast quality commercials, special event filming, indie film projects, multi-media and more http://www.jamsessionfilms.comJam Session Productions: a minority/woman-owned midwest-based film and multimedia company whose projects have included music videos, commercials and PSA's, training films, industrial films, TV program segments and more Janson Media: an international program sales and distribution company, a "content" company. We have licensed programming to over 180 countries around the world. Please see our Clients page, for a fairly complete list of the broadcasters and cable and satellite networks to whom we license programming http://www.jetifilms.comJeti Films: an independent film company based in Louisiana http://www.kaizenfilms.comKaizen Films: their mission is to develop new technologies and techniques to enhance the production of motion pictures, while maintaining cinema as an art form http://www.kineticimage.comKinetic Image Co., Ltd.: an Ohio-based motion picture production company that, for nearly twenty years, have specialized in creating exciting motion picture entertainment on budgets that would shame a cat. They created a number of well-received cult items which have graced the schedules of the USA Network and Cinemax http://www.kiwifilm.comKiwi Film & Video, Asia: a Hong Kong and Singapore based film and video production service company catering to a broad range of clients from around the world; fully-equipped camera crews is their specialty http://www.ltfilms.comLarry Taylor Productions: dedicated to providing creative projects for family entertainment, including movies and television programs, as well as the construction of a new and unique style of theme park. The vision: To put the heart into every picture. http://www.leafpile.tvLeaf Pile TV: Tune In: This TV variety program is filled with a swarm of segments composed of local events and artist interviews which provide musical entertainment and hilarious sketch comedy. Leaf Pile also has freelance videography for your major rock video or demo. Check out our exclusive camera packaging http://www.littlerickyproductions.comLittle Ricky Productions: feature films that reach the moral conscience of America http://www.mecfilms.comMatrixx Entertainment: The World's First Virtual Movie Studio(tm). Services include: producing, financing and distributing independent feature films; Web site, production and legal consulting for entertainment clients; books and manuals on filmmaking and more Media Movers,Inc.: full service localization company offering services in dubbing,subtitling,voiceovers & production in Asian, Indian & European http://members.aol.com/mptvMPTV: offering on-location video production, graphics and animation design, AVID video post production, Macromedia Director authoring, and many more services http://www.mptv.commptv.com: Film, video and audio production and distribution http://www.mundiali.comMundiali Entertainment: providing a venue for the production of lower cost motion pictures ($15 and $20 million each) and television programming (based on a cooperative agreement between Mundiali and either a television network or special project investors) http://members.tripod.com/%7EOverboardProductionsOverboard Productions: an independent film production copmpany headed up by Matt Fore http://www.angelfire.com/ga/PARALLELAFTERNOONParallel Afternoon Productions: independent thinkers with a vision that strives to be unequaled http://www.peacerecord.comPeace Record Company: a multi-faceted audio/video production company offering video editing, acting video demo production, video/audio tape duping, video projection and sound systems rentals, wedding videos, on location multi-camera video recordings of special events and more http://www.phproductions.comPH Productions: services include business and personal consulting and coaching, project development, script writing, video production, video biographies, television programs, infomercials, commercials, photography and 3-d animation http://www.psavideo.comProduction Services Arizona: since 1971, providing quality, production services in the areas of video, multimedia, and animation graphics. Serving clients worldwide from Korea to France, South America to Canada in medium to high budget corporate marketing and training venues. Full collateral support through PS/A's graphics dept. Rawbass: design and production of all types of artistic media http://www.rcwmediaworks.comRCW Media Works: an independent production company that realizes that it is not the size of your budget that determines quality, it is the dedication and heart that you put into your projects http://www.realitycrash.comReality Crash Productions: showcases original and creative projects from writers, artists, film makers and critics. They are looking for people to contribute to the site. You retain full rights for your work and a web page is provided for you http://www.revivalentertainment.com/Revival Entertainment: this team is producing films of the highest quality in Surrey England http://www.riggedproductions.comRigged Productions: film and video, cartoons and art, writing, music and audio, and other works http://www.riverproductions.comRiver Productions: an independent film company located in Los Angeles, CA, headed by Michael J. Isgrig (writer, director, producer), Lynn C. Grant (writer, producer) and Kym R. Wulfe (executive producer, head of business and legal affairs) http://www.roman-pictures.comRoman Pictures: a motion picture production company which primarily produces "budget-controlled" feature-length movies that are licensed for distribution and exploitation in the direct-to-video, cable, TV and satellite markets http://www.runningdogfilms.co.ukRunning Dog Films: a new British film company dedicated to making films using cheap and affordable technology combined with proven no/lo budget production practices http://www.shadesofday.comShades of Day: the art of independent film and video producing. Extensive database of cinema related resources http://www.sharpshootertv.comSharpshooter Worldwide: a television production company that specializes in on location filming, any where in the world. Their motto is: "We don't go after awards or publicity. We just do the work." http://www.smileycrew.comSmiley Crew Productions: a California-based film crew specializing in both TV and film. Their main agenda focuses on their popular cable access comedy show, and their pro creative, anti "trend" statements http://www.smorgasbordproductions.comSmorgasbord Productions: a small company involved in the production of multimedia. Film, video, animation, graphic art and comic books are their products Starsmead Production Ltd: comprehensive production services for television and film http://www.studiosatlascolinas.comThe Studios at Las Colinas: a full-service production and entertainment facility located in the heart of the Dallas/Fort Worth Metroplex; offering complete music, film, video, and multimedia production capabilities, as well as parties and events hosting http://www.suedeinteractive.comSuede Interactive: an in-house production facility (located in the NY Metro area) for radio and TV commercials, audio/video/film productions and Internet services (Web site design, search engine placement, e-commerce and hosting) http://www.tafproductions.comTAF Productions: an independent production company, based in the Netherlands, that specializes in executive and unit production services. Additionally, they create their own screen productions Tangled Web Productions: a feature film production company that writes, directs, and produces their own projects. They currently have four projects in development http://www.telenet.bc.caTelenet Communications: video, audio and multimedia production using DV cameras, non-linear editing software and audio foley Terrazas Video: Southern Arizona's largest production facility. Film, video, grip, lighting and stage. Visit their Web site for a complete list of resources TEWS Entertainment: founded by Tim Sullivan and Erik Woods in 1995, responsible for "Of Fortune and Glory," winner of the Best Picture award at the 2000 REwind Video Awards in Calgary http://www.thrae.comThrae Entertainment: your source for no-budget moviemaking on the Web. Provides information and insight into the world of movies without the burden of large financial resources, a place for moviemakers to share their experiences and information about their films http://www.torontopictures.comToronto Pictures: a production company, with its own film-school. Under the leadership of internationally-awarded film director, writer and producer Bruno Pischiutta, they specialize in producing feature films, documentaries and TV series http://www.transworldvideo.comTransworld Video Productions: from idea to shrink wrap; Cable TV to Network. Duplications and conversions to the world formats: NTSC, PAL, SECAM http://www.twodollarpistol.comTwo Dollar Pistol Films: specializing in the writing and production of independent feature films, shorts and documentaries and providing a wide array of digital production services for independent, private and corporate projects http://www.unknownproductions.comUnknown Productions: independent movie production with distribution from Cinematrix releasing, giving the world another entertainment choice http://1aindfilm.twoffice.comVariety Plus Enterprises, Inc.: serving the lower Westchester and New York City community since 1984. They specialize in creating stories, screenplays, and feature length motion pictures http://www.waterfrontchicago.comWaterfront Productions: a Chicago, Illinois-based production company that shoots and edits complete projects on film and video. Separate packages are available for just shooting or editing, if needed http://www.whodat.comWho Dat Music Productions: in Astoria, New York, is the developer of the Who Dat AudioLogo® brand identity for the Internet. We have produced elements for CD-ROM, DVD, Streaming Media for the Internet, Web Site Developers, Multimedia Productions, Interactive Productions, Original or Library Music for Film and Video, Narrators and Voice Over Talent, Web Casting, Corporate Presentation and the entire production if necessary http://www.worldwidefilmworks.comWorld Filmworks: a company designed to create musical/theatre productions, music videos, commercials, and short films, with an eye toward the ever-increasing presence of the Internet as the future of distribution http://www.youngmankang.comYoung Man Kang Films: a writer/director with more than 20 films and more than 50 TV commercials in his portfolio http://www.zone5pictures.comZone 5 Pictures: the source for all of your business media needs, including film and video production, studio photography, Web development, graphic design, feature films and animation/3D

Courses matching "Identity"

Show all 709

Leadership Identity Through Self-Discovery

5.0(1)

By Puritas

This module focuses on developing leadership confidence through self-discovery, emphasising the importance of understanding one's unique leadership style and personal philosophy. Participants will explore their core identity as leaders and learn strategies to enhance their influence, credibility, and relationships within their organisation. Exploring the link between self-discovery and effective leadership, focusing on developing confidence to lead from within. Testimonial: “Without guidance, personal branding can quickly become an exercise in aspiration and competition; letting the carefully curated public personas of others dictate our own validity and definition of success. Clarity on who we truly are, what matters to us and therefore how we position ourselves in the world takes reflection and time. Rachael’s work in this area has inspired the nearly 100 delegates who have been part of our HR Leadership Academy over the past 8 years, and I have no doubt will continue to resonate with future cohorts.” MD, Nina Metson - Suffolk

Leadership Identity Through Self-Discovery
Delivered In-Person in Bishop Stortford + 9 more or UK WideFlexible Dates
£1,500 to £2,500

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered OnlineFlexible Dates
£2,380

Exam MS-100 Microsoft 365 Identity and Services Course

By Packt

This course will help you pass the Microsoft 365 Identity and Services (Exam MS-100) certification and demonstrate a detailed understanding of evaluating, planning, migrating, deploying, and managing Microsoft 365 services.

Exam MS-100 Microsoft 365 Identity and Services Course
Delivered Online On Demand7 hours 3 minutes
£93.99

Identity Theft Prevention Course

3.5(2)

By Elearncollege

Description Identity Theft Prevention Diploma Identity theft is a fraudulent practice of using someone else's name or personal information to obtain money or goods in that person's name. Anyone is a potential target of identity theft and that includes even children. Even celebrities like Robert De Niro and Oprah Winfrey have been victims of identity theft. Most identity theft can be prevented by taking precautions like protecting and safeguarding your personal information to make yourself a hard target. In the era of the internet, information of all kinds is available at a click of a button. Personal information is being shared through emails and social networking sites making everyone who doesn't practice discretion a soft target. Identity Theft Prevention Diploma aims to spread awareness among people on what identity theft is and how identity thieves obtain the personal information of others. By providing insights into the working of identity thieves, Identity Theft Prevention Diploma tries to educate you regarding the prevention methods to be followed so that you do not fall prey to scams or fraudulent practices of identity thieves. What You Will Learn 1: Understanding Identity Theft 2: Anti-Identity Theft Precautions and Guidelines 3: Recognizing Common Signs of Identity Theft 4: Looking Into Financial Statements 5: Keeping Tabs on Sensitive Information 6: Watching What You Discard 7: Practicing Discretion in Public Places 8: Becoming Familiar with the Methods of Identity Thieves 9: Buying Online and Some Common Online Threats 10: Staying Safe from Online Threats Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Identity Theft Prevention Course
Delivered Online On Demand9 days
£99

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

By Packt

This course will help you qualify for the Microsoft SC 900 exam, and this certification is targeted at those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Delivered Online On Demand7 hours 7 minutes
£26.99

55344 Identity with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server. This would typically include: ?AD DS administrators who are looking to train in identity and access technologies with Windows Server 2016, Windows Server 2019 or Windows Server 2022. ?System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2016, Windows Server 2019 or Windows Server 2022. Overview Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement and administer Active Directory Rights Management Services (AD RMS). Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement synchronization between AD DS and Azure AD. Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. Monitor, troubleshoot, and establish business continuity for AD DS services. This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory - related issues with Windows Server. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS). Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. 1 - Installing and configuring domain controllers Overview of AD DS Overview of AD DS domain controllers Deploying a domain controller 2 - Managing objects in AD DS Managing user accounts Managing groups in AD DS Managing computer objects in AD DS Using Windows PowerShell for AD DS administration Implementing and managing OUs 3 - Advanced AD DS infrastructure management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts 4 - Implementing and administering AD DS sites and replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication 5 - Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs 6 - Managing user settings with Group Policy Implementing administrative templates Configuring Folder Redirection, software installation, and scripts Configuring Group Policy preferences 7 - Securing Active Directory Domain Services Securing domain controllers Implementing account security Implementing audit authentication Configuring managed service accounts 8 - Deploying and managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs 9 - Deploying and managing certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards 10 - Implementing and administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Web Application Proxy Overview 11 - Implementing and administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection 12 - Implementing AD DS synchronization with Microsoft Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization 13 - Monitoring, managing, and recovering AD DS Monitoring AD DS Managing the Active Directory database Active Directory backup and recovery options for AD DS and other identity and access solutions

55344 Identity with Windows Server
Delivered OnlineFlexible Dates
£2,975

Why Identity Matters

5.0(1)

By Enspark

There is perhaps more identity-related conflict than ever before, and it is becoming increasingly more public. These conflicts can create polarization in all areas of life, including the workplace, where it can lead to harmful consequences for an entire organization. And yet, instituting change on an organizational level is sometimes a challenge. This video is a great resource for helping team members understand the importance of cultural awareness and respecting the identity of others. It is a great compliment to any D&I training. Length: 2:48 Learning Objectives Analyze and identify various identity dimensions, including age, geography, gender, race, religion, social class, nationality, sexual identity, worldviews, ideologies, belief systems, core values, and narratives.;Recognize the multifaceted nature of identity-based conflicts and their impact on society, including incivility, inequality, and polarization.;Develop a heightened level of identity intelligence, enabling more self-awareness, strategic thinking, and confidence in interpersonal and professional interactions.;Explore the evolving rules and boundaries of identity-related discussions and conflicts in contemporary society.

Why Identity Matters
Delivered Online On Demand5 minutes
£4.95

SC-300: Microsoft Identity and Access Administrator

By Packt

Learn all about Microsoft identity and Azure security the right way with tons of lab exercises. A course that aims to prepare students for the prestigious SC-300: Microsoft Identity and Access administrator exam. The course adheres to the new curriculum and objectives.

SC-300: Microsoft Identity and Access Administrator
Delivered Online On Demand10 hours 56 minutes
£41.99

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered OnlineFlexible Dates
£595

Identity Theft Protection

By Compete High

Discover the Ultimate Shield: Identity Theft Protection Course Protecting your identity is more critical now than ever before. 🛡️ Identity theft continues to plague individuals and businesses worldwide, costing billions annually. But fear not! Introducing our comprehensive Identity Theft Protection Course, your ultimate defense against cyber threats and fraudulent activities. 🚀 Why Choose Our Course? In today's digital age, personal information is vulnerable to sophisticated cybercriminals lurking in the shadows of the internet. Our course arms you with the knowledge and tools necessary to safeguard your identity and financial assets against malicious attacks. Here's what sets us apart: 1. Expert Guidance: Learn from industry experts with years of experience in cybersecurity and identity protection. Our instructors are dedicated to empowering you with actionable insights and strategies. 2. Comprehensive Curriculum: Dive into a well-rounded curriculum designed to cover various aspects of identity theft, including common tactics used by hackers, phishing schemes, data breaches, and best practices for prevention and response. 3. Practical Skills: Gain hands-on experience through real-world scenarios and case studies. Develop practical skills to identify potential threats, secure your personal information, and mitigate risks effectively. 4. Stay Updated: In the ever-evolving landscape of cybersecurity, staying informed is key. Our course equips you with the latest trends, technologies, and best practices to stay ahead of emerging threats. 5. Interactive Learning: Engage in interactive learning experiences, including quizzes, assignments, and discussions. Connect with peers, share insights, and collaborate to enhance your understanding of identity theft protection. 💡 Benefits of Taking Our Course Enrolling in our Identity Theft Protection Course offers a myriad of benefits: 1. Peace of Mind: Safeguard your identity and financial well-being with proactive measures against identity theft and fraud. 2. Empowerment: Take control of your digital footprint and learn how to navigate the online world safely and securely. 3. Financial Security: Prevent potential financial losses and damages resulting from identity theft, unauthorized transactions, and fraudulent activities. 4. Enhanced Awareness: Develop a keen awareness of common scams, phishing attempts, and fraudulent practices prevalent in today's digital landscape. 5. Career Advancement: Gain valuable skills and knowledge highly sought after in various industries, including cybersecurity, finance, law enforcement, and consumer protection. 🎯 Who is This For? Our Identity Theft Protection Course is tailored for individuals and professionals seeking to safeguard their identities and mitigate cyber risks, including: Consumers: Protect yourself and your family from identity theft and online fraud. Business Owners: Safeguard sensitive customer data and maintain trust and credibility with your clientele. Finance Professionals: Enhance your understanding of fraud prevention and risk management in financial transactions. Legal Professionals: Stay informed about legal frameworks and regulations pertaining to identity theft and consumer protection. Cybersecurity Enthusiasts: Deepen your knowledge of cybersecurity principles and best practices for identity protection. 🚀 Career Path Upon completing our Identity Theft Protection Course, you'll unlock a multitude of opportunities for career advancement and professional growth, including: Identity Theft Specialist: Become a certified identity theft specialist equipped to assist individuals and organizations in preventing and resolving identity theft incidents. Cybersecurity Analyst: Leverage your expertise in identity theft protection to pursue a career as a cybersecurity analyst, tasked with identifying vulnerabilities and implementing security measures to safeguard digital assets. Consumer Advocate: Advocate for consumer rights and protection by educating the public about identity theft risks and promoting awareness campaigns. Financial Consultant: Offer personalized financial advice and guidance to clients on protecting their assets and mitigating risks associated with identity theft and fraud. 🌟 Frequently Asked Questions (FAQs) Q: Is this course suitable for beginners in cybersecurity? A: Absolutely! Our course is designed to accommodate learners of all levels, from beginners to seasoned professionals. We provide comprehensive explanations and practical examples to ensure everyone can grasp the concepts effectively. Q: How long does it take to complete the course? A: The duration of the course may vary depending on your learning pace and schedule. On average, most students complete the course within a few weeks by dedicating a few hours each week to study and practice. Q: Are there any prerequisites for enrolling in the course? A: There are no specific prerequisites for enrolling in our Identity Theft Protection Course. However, a basic understanding of cybersecurity fundamentals and familiarity with online security practices would be beneficial. Q: Will I receive a certificate upon completion of the course? A: Yes, upon successful completion of the course requirements, you will receive a certificate of completion, affirming your proficiency in identity theft protection principles and best practices. 🛡️ Enroll Today and Protect Your Identity! Don't wait until it's too late. Take proactive steps to safeguard your identity and financial well-being with our Identity Theft Protection Course. Join us on this empowering journey towards a safer and more secure digital future. Enroll today and take control of your online presence! Course Curriculum Curriculum Curriculum 00:00 Module 1 What Is Identity Theft What Is Identity Theft 00:00 Module 2 Is Identity Theft difficult Is Identity Theft difficult 00:00 Module 3 Methods of Identity Theft Methods of Identity Theft 00:00 Module 4 Additional Identity Theft Methods Additional Identity Theft Methods 00:00 Module 5 Preventing Identity Theft Preventing Identity Theft 00:00 Module 6 Preventing Measures Preventing Measures 00:00 Module 7 What to Do When Identity Theft Occurs What to Do When Identity Theft Occurs 00:00 Module 8 Card Liability Card Liability 00:00 Module 9 Responsibility and Agreements Responsibility and Agreements 00:00

Identity Theft Protection
Delivered Online On Demand9 hours
£4.99