Key Objectives for the Training provision Effective listening to a client's needs and requirements during various stages of the sales process. Engage in meaningful communication with clients, learn to identify challenges and opportunities that relate to the prospects. Overcome the identified challenge. Build long term rapport and establish trust with the prospect throughout the sales process, Ensure continued customer satisfaction that can turn into repeat business. Be able to build rapport with customers or clients. Know the right questions to ask to fully understand the customer or client’s needs without putting on any pressure. Be able to check you have the right information from the customer or client. Be able to match products and services to the customer or client using the information you have gathered. Be able to influence effectively. Know how to stand out from your competitors. Stage 1 – Research the Company’s ‘Value Propositions’ and USP Analysis Conducting 30 min confidential interviews with a cross-section of the eligible Attendees & the Stakeholders, in order to gain an objective understanding of the various scenarios and clients that the Participants work with. the Company’s ‘Value Propositions’ Unique Selling Points The Customers’ journey(s) The Competition’s offers for analysis and comparisons. From these findings, a carefully calibrated bespoke Programme will be designed and delivered. Stage 2 - Design the Bespoke 2 x day Course nd Stage 3 - Delivery of the Course Programme This Programme can be delivered in 2 x consecutive days, or split between 2 – 3 weeks, to make it more ‘work-friendly’ – if required. It is very practical and commercially focussed in approach, with lots of interactive exercises designed to draw out the learning applications via the debriefings. The ‘Real Play’ scenarios on day 2 will be based on specific case studies drawn from the Research findings so that they are authentic to optimise the learning. Individual Action Plans will be captured at the end of each day to be debriefed by the Participants’ respective Line Managers. Template Programme Day One – Foundation – Strategic Approach Section One – The Principles of Consultative Selling Defining ‘Consultative Selling’ The Company’s ‘Unique Selling Points’ & Value Proposition The Consultative Selling model – the five stages Avoiding appearing ‘pushy’, ‘pressurising’ or ‘talking through the sale’ Section Two –Strategy & Preparation ‘Buy-Class’ Matrix Strategic plan Template – matching services/products to identified needs & opportunities. Preparing a range of objectives Constants and variables – USP’s Researching key Client/Decision Makers’ priorities, profile & background (LinkedIn etc.) Preparing for potential & likely Objections Section Three – Email etiquette & ‘influencing’ email correspondence. Email etiquette A.B.S.U.R.D model Clarity and tone – discovery of clients’ needs & motivational factors. Techniques to influence and ‘nudge’. Ensuring the data and content have a ‘gentle’ motivational & appealing message. Top Tips Day Two – Practical Application Section Four – Rapport Building & Effective Communication skills ‘Behaviour Labelling’ techniques – setting a positive tone. Asking Open Questions – gaining a full understanding of the clients’ priorities & expectations. EQ - Inviting opinions; perspectives; experiences – winning confidence. Active Listening – focus and commitment to understand. ‘Reading the room’ – adapting to responses and reactions. Maintaining focus on relevant topics that the Client cares about; carefully consider the opportunities to influence. But NO PRESSURE! Building a ‘bond of trust’ with commitments and authentic, shared values. Section Five – Explaining the Benefits – aligned to the Customers’ Priorities Understanding ‘Why do People Buy?’ Research data analysis. Open questions that lead to understanding the key issues and Clients’ priorities. Avoiding the danger of ‘pressurising’ the Client. Responding to objections effectively, with confidence and sensitivity. Explaining the benefits that are aligned to the Clients’ stated requirements. Making the Data ‘sing’ – memorable takeaways for the Client. Augmented benefits – Brand confidence; Case studies; Warranty; Service; Range; Flexibility etc. in alignment with their stated preferences/requirements Differentials compared to Competitors Section Six – Winning Commitment Inviting commitment – with confidence Consultative Selling Closing techniques (e.g. Alternative Close/Assumptive Close et al) Avoiding ‘talking through the sale’ – knowing when to ‘Shut UP!’ Confirming agreement – ensuring Clients’ motivation for repeat business Section Seven – Practical Application ‘Real Play’ From the Research findings, carefully devised scenarios can be generated to provide the most valuable learning opportunities to underpin all the skills & techniques covered in the Programme. Potential Real Play scenarios: A well-established customer has indicated that they are soon to be opening up additional new offices – this presents an opportunity to arrange for the Company to support them with their upcoming needs. After some very positive feedback and with the upcoming contract renewal imminent – how can the Company give the Customer more high-quality support in other areas of their business? A Competitor has been to see the client and they have prompted some concerns about ‘value for money’ & ‘quality of service’. How Real Play works… The group is split the group into 2 sub-groups, one with our Professional Actor (option available); the other with the Trainer or a willing Participant. Each group has a brief and has to instruct their Trainer/Actor/Participant on how to approach the scenario supplied. The Actor and Trainer (or willing Participant) perform the role play(s) as instructed by their respective teams; however, during the action they can be paused for further recommendations or direction. The outcome is the responsibility of the team(s) – not the performers. Debrief the full Programme Individual Action Plans - to be followed through. ‘Best Practices’ for application into the business Options for Exercises within the Programme Sample Exercise – Red & White There is a specific time managed agenda and itinerary, which puts the group under pressure. The key challenge is for the sub-groups to maximise the commercial value from the task, however there is always a great danger that the individuals attempt to gain financial progress at the expense of the other group! Debriefing points: Persuasive communication and influence across barriers Gaining buy-in when others are sceptical Strategic planning accounting for others’ behaviours Sample Exercise – Communication Challenge Each Participant has different pieces of information, but are not allowed to share it visually. They are only allowed to communicate to work out the solution hidden among the large amount of data. Debrief: Structured approach Maintaining focus through distractions/interference Active Listening Controlled communication Sample Exercise – Persuasive emails Sample emails are shared to be critiqued and improved upon to be debriefed: Tone & impact Making the Data ‘sing’ Influential & motivational language Customer centric message. Sample Exercise –Juggling Each Participant has to pass the ‘Customers’ (Juggling balls) carefully through the system with all the other Participants to reach a profitable conclusion Debrief: EQ to read the room and effectively communicate, when the pressure is on Customer focus and adapting to challenges Devising a plan that wins buy-in Overcoming competing ideas to get to ‘best practice’ Consistent commitment, communication and motivational drivers that influenced performance. Sample Exercise –Critical Path The group are provided with 30 x discs and some ‘post-it’ notes. (no pens or pencils are allowed) Their brief is to create a grid shape with the 30 x discs, which will act as ‘stepping stones’ for the ‘Critical Path’ But they have to follow the correct order through the grid from the start to finish, which they will have to work out through ‘trial & error’ All of the team must pass through the ‘Critical Path’ worked out on the grid, observing the constraints, within the time limit. No talking is permitted once they start using the materials Debrief: - Clear communication focussing on the ‘client’s journey’ Planning for challenges Identifying risks and mitigating them Role allocations & support Quality control and disciplines Sample Exercise –Back to Back Each Participant is positioned back-to-back with a partner. They have to work out precisely what the ‘statement’ given to the other person is without looking around. Each person has a different brief. Debrief: - Asking Open Questions Active Listening Accuracy in identifying the objective.
Using an excavator as a crane is a common practice in certain construction and lifting operations. Using the digger as a crane requires appropriate training and skills However, it’s important to note that excavators are primarily designed for digging and earthmoving, not lifting. Using an Excavator as a Crane involves some inherent risks, and it’s crucial to follow safety guidelines and manufacturer recommendations. To book the NPORS Excavator as a Crane training or test please contact us to schedule your Training Here are some general considerations and steps you might take when using an excavator as a crane: 1. Check Manufacturer Guidelines: Always consult the manufacturer’s guidelines and specifications for the specific excavator model you are using. Manufacturers provide load charts and other essential information to ensure safe operation. 2. Understand Load Capacities: Know the lifting capacities of your excavator at various boom lengths and angles. Exceeding these capacities can lead to instability and accidents. 3. Use Proper Attachments: If your excavator is equipped with a lifting attachment, make sure it is designed and rated for lifting operations. Using inappropriate attachments can compromise safety. 4. Stabilise the Excavator: Ensure that the excavator is on stable ground. Extend the outriggers or stabilisers to provide additional support and prevent tipping. 5. Inspect the Excavator: Regularly inspect the excavator for any signs of wear, damage, or malfunction. Pay particular attention to the boom, hydraulics, and other critical components. 6. Position the Excavator: Position the excavator in a way that allows for a stable lifting operation. Avoid working on slopes or uneven surfaces. 7. Rigging and Lifting Techniques: Use proper rigging techniques, and ensure that the load is properly secured. Lift the load smoothly and avoid sudden movements. 8. Maintain Clear Communication: Establish clear communication between the operator and any ground personnel involved in the lifting operation. Use hand signals or radios to coordinate movements. 9. Avoid Exceeding Reach Limits: Do not exceed the excavator’s reach limits. Lifting loads beyond the recommended reach can lead to instability. 10. Training and Certification: Ensure that operators are properly trained and certified for lifting operations. Holding the NPORS Excavator As A Crane bolt on is essential for lifting operations Operating an excavator as a crane requires specific skills and knowledge. 11. Weather Conditions: Consider weather conditions, especially wind speeds, as they can affect the stability of the excavator during lifting operations. Always prioritise safety when using equipment for tasks it wasn’t originally designed for. If the lifting requirements are frequent or extensive, it may be more appropriate to use a dedicated crane with the necessary capacity and features. Remember, safety is paramount in any construction or lifting operation. Frequently Asked Questions 1. What is Excavator As A Crane Training, and why is it necessary? Excavator As A Crane Training provides individuals with the skills and knowledge required to safely and effectively use excavators for lifting operations. Although excavators are primarily designed for digging and earthmoving, this training ensures operators can perform lifting tasks safely, minimizing risks and accidents on job sites. 2. Who should undergo Excavator As A Crane Training? This training is essential for anyone involved in using excavators for lifting operations, including machine operators, construction workers, and site supervisors. Proper training ensures that individuals understand equipment operation procedures, load capacities, and safety protocols. 3. What topics are covered in Excavator As A Crane Training programs? Training programs cover a range of topics, including: Manufacturer guidelines and load charts Understanding load capacities at various boom lengths and angles Proper use of lifting attachments Excavator stabilization techniques Rigging and lifting techniques Positioning and communication strategies Safety procedures and weather considerations Regular inspection and maintenance of equipment 4. Is Excavator As A Crane Training mandatory in certain industries? While not legally mandated in all areas, many employers in the construction and lifting industries require operators to undergo training as part of their occupational health and safety policies. Compliance with excavator as a crane training requirements helps prevent accidents and ensures regulatory compliance. 5. Where can I find reputable Excavator As A Crane Training courses? Reputable Excavator As A Crane Training Courses are offered by various institutions, including industry associations, equipment manufacturers, and specialized training providers like Vally Plant Training. It is important to choose a program that offers accredited certification and covers relevant industry standards and best practices.
This course provides detailed safeguarding adults & children awareness, including essential knowledge in the recognition and reporting of abuse and neglect, procedures and responsibilities. This is for all workforce involved in Social Care from the health, public, independent, or voluntary sectors. This subject forms standard 10 & 11 in The Care Certificate.
At this Oracle SQL Fundamentals course, we cover SQL queries, group by's , aggregates, joins, date-functions, String Functions, Random Functions, Math Functions, Insert, update and delete, Creating and changing tables, sub-queries in detail, views, stored procedures, custom functions, and table variables. Course level is beginners to intermediate.
Course Information This course offers foundational guidance and practical support tailored for individuals operating within Good Manufacturing Practice (GMP) frameworks. Explore the fundamental prerequisites of a pharmaceutical quality system (PQS) and delve into the application of quality risk management (QRM) principles, aligning with current regulations and guidance. Gain insights into pivotal aspects such as requirements, roles, and responsibilities, encompassing change control, document management, and key documentation essential for effective implementation of GMP with a focus on regulatory inspections and common findings. Is this course for you? Ideal for professionals engaged in GMP across various sectors, including: Research and Development (R&D) Contract Manufacturing Organisations Manufacturing Units Quality Control (QC) Laboratories Auditing Roles. What will you learn? Event objectives - by the end of the course, delegates shall: Have an awareness of the basic requirements of GMP Be aware of UK and EU GMP Rules and Guidance and relevant publications Understand the roles and responsibilities associated with GMP Be able to contribute to and maintain quality documentation Have a basic understanding of product lifecycle and manufacturing Understand the requirements of GMP in the QC laboratory context Have a basic understanding of risk management and mitigation principles Understand the need for quality systems and quality assurance activities Be aware of common regulatory findings. Learning outcomes: delegates will be able to: Implement their role within GMP with confidence and knowledge of the principle requirements Contribute effectively to the GMP quality system and their organisation’s compliance Comprehend where their organisation’s activities sit within the larger GMP arena Know where to seek further information within the published rules and guidance, UK Legislation, European Commission Directives, ICH Guidance and other relevant publications, as well as via the internet. Tutors Tutors will be comprised of (click the photos for biographies): Louise Handy Director, Handy Consulting Ltd Programme Please note timings may be subject to alteration. Day 1 09:30 Introductions and Scope of the Course Understand the group requirements and the tutor's background and experience. 09:45 Background and Regulatory Environment Setting the scene, understanding the context, key legislation. 10:30 Principles of GMP Key points and requirements. 11:15 Break 11:30 Personnel and Responsibilities Management and staff, duties and accountabilities. 12:00 Overview of GMP Manufacturing Basics of the product life cycle. 12:30 Lunch 13:15 Risk Management Workshop Practical exploration of risk and mitigation activities. 14:30 QC Laboratories Activities and practicalities. 15:15 Break 15:30 Compliance Quality Assurance and Self Inspection. 16:15 Question Time A chance for questions on the practicalities of GMP. 16:30 Close of Course Extra Information Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points Development Level Learn
An accredited qualification for current and prospective managers. This programme gives Team Leaders & Managers the skills, disciplines and confidence to manage their team effectively and add a great deal more value to the organisation - where they have to apply their learning in order to achieve the highly coveted ILM qualification. One of the main responsibilities of a manager is to make sure that employees are satisfied with their job and reaching their full potential. A manager who can energise his or her employees will have a team which has a much greater potential and capability of achieving company goals and objectives. It is therefore vital that a manager has the essential skills to fully support and lead their team to success. This 3-day programme brings together the key leadership skills that you will need to be an effective manager so that you can return to the workplace and deliver tangible results. All of our ILM Programmes are provided in partnership with The BCF Group, which is the ILM Approved Centre we deliver under. Course Syllabus The syllabus of the ILM Level 3 Award in Leadership and Management course is split into three main modules, covering the following: Module OneSolving Problems and Making Decisions What is a problem? How to identify a problem, its nature, scope and impact Identifying the root cause Understanding how to interpret information to solve a problem What is involved in making an informed decision? Generate ideas/solutions- creative thinking techniques How to evaluate your options Finding the critical path Having confidence to commit to a decision Planning approach Communicating the decision Implementing the plan Module TwoUnderstanding Leadership What is leadership? Recognise the differences and similarities between leadership and management Qualities and skills of a leader Action Centered Leadership - Team, Task, Individual - John Adair Varying leadership styles Evaluating a range of leadership models and their significance for: Task, Performance, Culture, Relationships Reflect on your own leadership styles and behaviours Create an action plan to enhance your performance Module ThreeUnderstanding the Communication Process in the Workplace Identify what is effective communication Understand the importance of effective communication at work Recognise the different ways we communicate Recognise possible barriers to communication and how to overcome them Johari's window - communication flows How others will perceive and interpret the information you have provided Active listening Developing questioning skills Understanding the significance of non-verbal communication and body language Developing sensory acuity and how to use it effectively in the workplace In-House & Classroom Courses Available Online We have developed an alternative to traditional face-to-face training that continues to provide a full learning experience, and allows delegates to learn effectively whilst self-isolating from home. This is how it looks: Delegates booked on Classroom and In-House courses will continue to have access to their trainer online throughout the days that the course is booked to run. Prior to a delegate's course start date, they will be enrolled on our e-learning platform (in partnership with BCF Group) for the course they are booked on to. They will also be given contact information for their trainer, and details of how to access the online workshops. Delegates will not require any special IT equipment. A desktop computer, laptop, tablet, or a mobile phone with internet and audio capability is all that is required. Delegates taking ILM Qualifications will then proceed to the book review, video review and work based assignments with 12 months tutor support as appropriate, and in line with our previous arrangements. We hope you agree that this blended learning experience represents the safest way to continue supporting our clients and delegates during the Coronavirus disruption. In-House Courses As well as being one of the most popular open courses, we can also arrange this course as an in-house programme for companies and organisations who wish to develop a number of their managers at the same time, and would find an in-house course at their own premises much more suitable. Scheduled Courses Classroom Course - Nottingham (NG12 4DG) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. In addition to the 2 days in the classroom, delegates will need to undertake self-directed learning and 2 work-based assignments. Cost: £995 + vat 07-08 September 2023 14-15 December 2023 12-13 February 2024 Classroom Course - Reading (RG41 5QS) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. In addition to the 2 days in the classroom, delegates will need to undertake self-directed learning and 2 work-based assignments. Cost: £995 + vat 05-06 October 2023 15-16 January 2024 11-12 April 2024 Zoom™ Course Attending a course via Zoom videoconferencing gives you all of the benefits of classroom training without the need to leave your home or office. You still benefit from a real tutor facilitating the programme, and the content is exactly the same. The only difference is that we split the course into four half-day sessions to make it easier on your eyes! Cost: £895 + vat November 2023 - 7th Nov (morning), 7th Nov (afternoon), 8th Nov (morning), 8th Nov (afternoon) March 2024 - 19th Mar (morning), 19th Mar (afternoon), 20th Mar (morning), 20th Mar (afternoon) June 2024 - 11th Jun (morning), 11th Jun (afternoon), 12th Jun (morning), 12th Jun (afternoon) Dickson Training Ltd Founded in 1985 in Yorkshire, we have built an impressive and loyal client base. Our partnerships are built by consistently delivering outstanding development solutions and working in close collaboration with our clients, resulting in us becoming a leading UK and international training provider.
PYTHON BOOTCAMP: This 12-week Python Data Analytics Data Boot Camp is designed to give you a complete skill set required by data analysts . You will be fully fluent and confident as a Python data analyst, with full understanding of Python Programming. From Data, databases, datasets, importing, cleaning, transforming, analysing to visualisation and creating awesome dashboards The course is a practical, instructor-lead program.
This training is for lawyers who may come into contact with vulnerable people through their work. In particular, it is aimed at those who hold legal aid contracts and must meet the requirements of the Specialist Quality Mark (SQM) standard in respect of safeguarding. Everyone has the right to be kept safe from harm, abuse or neglect. We all have obligations to ensure that vulnerable people are protected and that we have appropriate procedures in place to ensure that abuse is identified and reported. We will help you to understand the following; What is safeguarding? The different types of abuse Example signs of abuse, harm and neglect What action should be taken if abuse is suspected The SQM requirements What a Safeguarding Policy should include Target Audience The online course is suitable for staff of all levels, from support staff to senior partners. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Amie Higgins, Consultant, DG Legal Amie is a Senior Solicitor, qualified under the Law Society’s Immigration & Asylum Accreditation Scheme (IAAS) as an Advanced Caseworker and Supervisor. Amie specialises in all aspects of Immigration, Asylum and Human Rights work, with a specialism in human trafficking/modern slavery cases and working with vulnerable clients. Amie is an experienced trainer, delivering a range of training on both legal and practice management topics.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server. This course will help them update their knowledge and skills related to storage and compute for Windows Server. Overview Prepare and install Windows Server and plan a server upgrade and migration strategy. Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes. Describe enterprise storage solutions, and select the appropriate solution for a given situation. Implement and manage Storage Spaces and Data Deduplication. Install and configure Microsoft Hyper-V, and configure virtual machines. Deploy, configure, and manage Windows and Hyper-V containers. Describe the high availability and disaster recovery technologies in Windows Server. Plan, create, and manage a failover cluster. Implement failover clustering for Hyper-V virtual machines. Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation. Create and manage deployment images. Manage, monitor, and maintain virtual machine installations. This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites A basic understanding of networking fundamentals. An awareness and understanding of security best practices. An understanding of basic Active Directory concepts. Basic knowledge of server hardware. Experience supporting and configuring Windows client operating systems such as Windows 10 or Windows 11. 1 - Installing, upgrading, and migrating servers and workloads Introducing Windows Server Preparing and installing Server Core Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models 2 - Configuring local storage Managing disks in Windows Server Managing volumes in Windows Server 3 - Implementing enterprise storage solutions Overview of DAS, NAS, and SANs Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet Understanding iSNS, DCB, and MPIO Configuring sharing in Windows Server 4 - Implementing Storage Spaces and Data Deduplication Implementing Storage Spaces Managing Storage Spaces Implementing Data Deduplication 5 - Installing and configuring Hyper-V and virtual machines Overview of Hyper-V Installing Hyper-V Configuring storage on Hyper-V host servers Configuring networking on Hyper-V host servers Configuring Hyper-V virtual machines Managing virtual machines 6 - Deploying and managing containers Overview of containers in Windows Server Deploying Windows Server and Hyper-V containers Installing, configuring, and managing containers by using Docker 7 - High availability and disaster recovery Defining levels of availability Planning high availability and disaster recovery solutions with Hyper-V virtual machines Backing up and restoring by using Windows Server Backup High availability with failover clustering in Windows Server 8 - Implementing failover clustering Planning a failover cluster Creating and configuring a new failover cluster Maintaining a failover cluster Troubleshooting a failover cluster Implementing site high availability with stretch clustering 9 - Implementing failover clustering with Windows Server Hyper-V Overview of the integration of Hyper-V with failover clustering Implementing Hyper-V VMs on failover clusters Key features for VMs in a clustered environment 10 - Implementing Network Load Balancing Overview of NLB Configuring an NLB cluster Planning an NLB implementation 11 - Creating and managing deployment images Introduction to deployment images Creating and managing deployment images by using MDT Virtual machine environments for different workloads 12 - Managing, monitoring, and maintaining virtual machine installations WSUS overview and deployment options Update management process with WSUS Overview of Windows PowerShell DSC Overview of Windows Server monitoring tools Using Performance Monitor Monitoring event logs
Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is database professionals who need to fulfil a Business Intelligence Developer role. They will need to focus on hands-on work creating BI solutions including Data Warehouse implementation, ETL, and data cleansing. Overview Create sophisticated SSIS packages for extracting, transforming, and loading data Use containers to efficiently control repetitive tasks and transactions Configure packages to dynamically adapt to environment changes Use Data Quality Services to cleanse data Successfully troubleshoot packages Create and Manage the SSIS Catalog Deploy, configure, and schedule packages Secure the SSIS Catalog SQL Server Integration Services is the Community Courseware version of 20767CC Implementing a SQL Data Warehouse. This five-day instructor-led course is intended for IT professionals who need to learn how to use SSIS to build, deploy, maintain, and secure Integration Services projects and packages, and to use SSIS to extract, transform, and load data to and from SQL Server. This course is similar to the retired Course 20767-C: Implementing a SQL Data Warehouse but focuses more on building packages, rather than the entire data warehouse design and implementation. Prerequisites Working knowledge of T-SQL and SQL Server Agent jobs is helpful, but not required. Basic knowledge of the Microsoft Windows operating system and its core functionality. Working knowledge of relational databases. Some experience with database design. 1 - SSIS Overview Import/Export Wizard Exporting Data with the Wizard Common Import Concerns Quality Checking Imported/Exported Data 2 - Working with Solutions and Projects Working with SQL Server Data Tools Understanding Solutions and Projects Working with the Visual Studio Interface 3 - Basic Control Flow Working with Tasks Understanding Precedence Constraints Annotating Packages Grouping Tasks Package and Task Properties Connection Managers Favorite Tasks 4 - Common Tasks Analysis Services Processing Data Profiling Task Execute Package Task Execute Process Task Expression Task File System Task FTP Task Hadoop Task Script Task Introduction Send Mail Task Web Service Task XML Task 5 - Data Flow Sources and Destinations The Data Flow Task The Data Flow SSIS Toolbox Working with Data Sources SSIS Data Sources Working with Data Destinations SSIS Data Destinations 6 - Data Flow Transformations Transformations Configuring Transformations 7 - Making Packages Dynamic Features for Making Packages Dynamic Package Parameters Project Parameters Variables SQL Parameters Expressions in Tasks Expressions in Connection Managers After Deployment How It All Fits Together 8 - Containers Sequence Containers For Loop Containers Foreach Loop Containers 9 - Troubleshooting and Package Reliability Understanding MaximumErrorCount Breakpoints Redirecting Error Rows Logging Event Handlers Using Checkpoints Transactions 10 - Deploying to the SSIS Catalog The SSIS Catalog Deploying Projects Working with Environments Executing Packages in SSMS Executing Packages from the Command Line Deployment Model Differences 11 - Installing and Administering SSIS Installing SSIS Upgrading SSIS Managing the SSIS Catalog Viewing Built-in SSIS Reports Managing SSIS Logging and Operation Histories Automating Package Execution 12 - Securing the SSIS Catalog Principals Securables Grantable Permissions Granting Permissions Configuring Proxy Accounts Additional course details: Nexus Humans 55321 SQL Server Integration Services training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55321 SQL Server Integration Services course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.