• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

492 Intelligence courses in Sheffield delivered Live Online

55348 Administering Microsoft Endpoint Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site 2 - Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot 3 - Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections 4 - Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations 5 - Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence 6 - Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points 7 - Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying and managing Windows apps 8 - Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates 9 - Implementing Defender Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies 10 - Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access 11 - Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service 12 - Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance and Management Insights Backing up and recovering a Configuration Manager site Updating the Configuration Manager infrastructure 13 - What?s new in Microsoft Endpoint Configuration Manager Whats new in Microsoft Endpoint Manager covering each semi annual release Additional course details: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55348 Administering Microsoft Endpoint Configuration Manager
Delivered OnlineFlexible Dates
£2,975

DIVERSITY – BUILDING A THRIVING BUSINESS ENVIRONMENT

5.0(4)

By Improving Communications Uk

LEARN TO FOCUS ON INTERPERSONAL SKILLS, BEHAVIOR, AND ENVIRONMENT AND HOW TO PROMOTE DIVERSITY-POSITIVE INTERACTIONS. You will be able to focus on interpersonal skills, behavior, and environment, to see how they promote diversity-positive interactions, as well as learn causes for discriminatory practices and create an action plan for increasing workplace acceptance and harmony. Uncover and discard beliefs and attitudes that foster or block progress. By discovering your strengths as well as liabilities, you can build on the positive and move toward minimizing the negative. As a result, you will gain greater personal and professional satisfaction. PART I – BROADENING THE VIEW Find new perspectives and ways to turn challenges into opportunities. Become skilled at ways to further develop self-awareness and sensitivity. PART II – FAIR STANDARDS Learn about how attitudes expressed in speech and behavior promote or hinder a positive work environment. Determine and apply steps for getting past prejudice for greater productivity. PART III – ORGANIZATIONAL UNITY Discover value in diverse perspectives and personalities and their benefits. Strategize ways to strengthen relationships and turn negative into positive interactions. ATTENDEES WILL BE ABLE TO: Discover new ways to “see things differently;” Use Emotional Intelligence to strengthen relationships and increase awareness of self and others; Define Diversity and uncover ways in which it is significantly useful in an organization; Develop best practices (rooted in honor and law) to use Diversity in planning, problem solving, and decision-making); Manage conflict through unity, using the organization’s mission, vision, values, and goals; and Understand and communicate value to staff. Online Class—Diversity – Building a Thriving Business Environment is a 4-hour interactive virtual class.    Register for this class and you will be sent ONLINE login instructions prior to the class date. Improving Communications brought our organization to realize how important our employees—our people—are to Baystate Dental. By helping us to develop a more thoughtful and sensitive nature, we now relate better with each other and our patients. Dr. Kevin Coughlin, DMD, FAGD, MBABaystate Dental

DIVERSITY – BUILDING A THRIVING BUSINESS ENVIRONMENT
Delivered Online + more
£316

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Tea 'N Chat - LINETTE MANUEL - 3D PRINTED FASHION

5.0(3)

By Textiles Skills Centre

Tea 'N Chat free event - Talk with LINETTE MANUEL about 3D Fashion printing.

Tea 'N Chat - LINETTE MANUEL - 3D PRINTED FASHION
Delivered Online
FREE to £10

Fundamentals of E&P Data Management

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) The energy industry has started its journey to be more data centric by embracing the industry 4.0 concept. As a result, data management - which was considered until recently as a back-office service to support geoscience, reservoir management, engineering, production and maintenance - is now given the spotlight! To become an active stakeholder in this important transition in E&P data management, it is necessary to understand the new technical opportunities offered by the Cloud, Artificial Intelligence and how data governance can pave the way towards more reliable and resilient processes within E&P domain. Several key questions that need to be addressed: Why place more focus on data assets? Is data management just about serving geoscientists or engineers with fresh data? What is the value of data management in the E&P sector for decision making? How to convince the data consumers that the data we provide is reliable? Is the data architecture of my organization appropriate and sustainable? The purpose of this 5 half-day Virtual Instructor Led Training (VILT) course is to present the data challenges facing the energy organizations today and see how they practically solve them. The backbone of this course is based on the DAMA Book of Knowledge for Data Management. The main data management activities are described in sequence with a particular focus on recent technological developments. Training Objectives Upon completion of this VILT course, the participants will be able to: Understand why the data asset is now considered as a main asset by energy organizations Appreciate the importance of data governance and become an active stakeholder of it Understand the architecture and implementation of data structure in their professional environment Get familiarized with the more important data management activities such as data security and data quality Integrate their subsurface and surface engineering skills with the data managements concepts This VILT course is unique on several points: All notions are explained by some short presentations. For each of them, a set of video, exercises, quizzes will be provided to help develop an engaging experience between the trainer and the participants A pre-course questionnaire to help the trainer focus on the participants' needs and learning objectives A detailed reference manual A lexicon of terms for data-management Limited class size to encourage the interactivity Target Audience This VILT course is intended for: Junior/new data managers Geoscientists Reservoir engineers Producers Maintenance specialists Construction specialists Human resources Legal Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-days consisting 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your expert course leader is a geologist by education who has dedicated his career to subsurface data management services. In 2016, he initiated a tech startup dedicated to Data Management using Artificial Intelligence (AI) tools. He is heavily involved in developing business plans, pricing strategies, partnerships, marketing and SEO, and is the co-author of several Machine Learning publications. He also delivers training on Data Management and Data Science to students and professionals. Based in France, he was formerly Vice President, Sales & Marketing at CGG where he was in charge of the Data Management Services strategy, Sales Manager at Spie O&G Services where he initiated the Geoscience technical assistance activities and Product Manager of interactive seismic inversion software design and marketing at Paradigm.       POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Fundamentals of E&P Data Management
Delivered in Internationally or OnlineFlexible Dates
£953 to £1,799

M.D.D LIFE AND RELATIONSHIP COACHING PACKAGE (LIFE AND RELATIONSHIP COACHING)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Systemic coaching and Cognitive Coaching Help with relationship failure Removing emotional blocks Working through trauma Dealing with anger issues Building Self esteem Help with discovering your purpose and emotional needs NLP Training Improving emotional Intelligence Working on problem areas in life and relationships Your own personal Life Coach 7 days a week Your coach is available 24hrs a day whenever you need to talk with this exclusive package https://relationshipsmdd.com/product/life-and-relationship-coaching-package/

M.D.D LIFE AND RELATIONSHIP COACHING PACKAGE (LIFE AND RELATIONSHIP COACHING)
Delivered in London or UK Wide or OnlineFlexible Dates
£1,500

M.D.D HOW TO HAVE CONFIDENCE PACKAGE (DATING/RELATIONSHIP COURSES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

A training course for those lacking in confidence and suffering from low self-esteem. Confidence and self-esteem issues can have a very detrimental effect on progressing in your dating life and having healthy relationships. This course will consist of a full assessment of your history. emotions, self-belief, dating history, and insight into how to build your confidence and forge a stronger self-belief pattern and supporting you to become a better and more confident person able to face the ups and downs and challenges of daily life and believing in yourself and knowing you can overcome any obstacle in dating, relationships or daily life. Confidence can be lost when we face negative situations but can be regained with indoctrination and social awareness and emotional intelligence education. https://relationshipsmdd.com/product/how-to-have-confidence-package/

M.D.D HOW TO HAVE CONFIDENCE PACKAGE (DATING/RELATIONSHIP COURSES)
Delivered in London or UK Wide or OnlineFlexible Dates
£1,200

Mastering Hybrid Approaches for Projects

By IIL Europe Ltd

Learning Agile or Scrum without the necessary work context is ineffective; more importantly, learning Agile or Scrum without a platform to practice and apply them on an ongoing basis is futile. IIL's Mastering Hybrid Approaches for Projects workshop provides both context and practice across all aspects of the value delivery system including waterfall, hybrid, and Agile approaches. This workshop provides options that span the value delivery spectrum for developing scope, estimating durations, managing schedules, and tracking progress. For example, participants will learn how to organize scope with a WBS and prioritize it with a backlog as well as lead the day-to-day work with a task board. The workshop also covers how to integrate iterations and releases into a high-level predictive schedule. The project team is the heart of the project. This workshop explains various team roles along with key leadership skills such as emotional intelligence and decision making. Key tenets of Agile practices, such as servant leadership and self-managing teams are explored along with the different types of meetings, such as daily stand-ups, iteration planning, and demonstrations. Those who attend will be better prepared to situationally apply agile and hybrid concepts. In addition, this course provides the structure for critical thinking to occur: to know and understand when to apply a predictive approach, when to apply an adaptive approach and when and how to combine them in a tailored and customized hybrid approach that meets the needs and demands of the project and the organization. The learning experience design is rooted in real world perspectives, leveraging team exercises based on a comprehensive case study.

Mastering Hybrid Approaches for Projects
Delivered OnlineFlexible Dates
£1,850 to £2,195

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495

Transitioning into Leadership for an IT Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for IT Professionals who expect to or who have recently transitioned into a management role will benefit from this course. Overview Make a smooth transition into management Develop your authentic leadership style Engage and empower staff to achieve excellence Build high-performing, collaborative teams Apply delegation best practices Attract and retain great staff From developing an inspiring vision and empowering members to reach it, to meeting deadlines, and evaluating results. This course will teach students the skills and behaviors needed to successfully transition into an IT manager role. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Making the Transition into Leadership Defining Success Developing Leadership Competencies Acting as Leader, Liaison, Figurehead. Monitor, Disseminator, and Spokesperson Allocating Resources Acting Entrepreneurially Negotiating and Handling Disturbances 2. Building Trust, Engagement and Involvement Applying SCARF Leading by Example with the 5 Components of Emotional Intelligence - Self-Awareness, Self-Regulation, Motivation, Empathy, and Social Skill Engaging, Involving, and Motivating Others The 4 Disciplines of Motivation - Behavioral, Cognitive, Psychodynamic, and Humanistic Working with Differing Personality Styles Developing Your Leadership Psychological Toolkit Discovering and Meeting Stakeholder Expectations 3. Collaboration & Teams Creating, Facilitating, and Maintaining Teams Building a Team through Culture, Human to Human Relationships, Effective Communication, and Setting and Meeting Goals & Objectives Modern, Autonomous, Self-Organizing, and Cross-Functional Teams 4. Building People with Challenging Work Willingness to Delegate Delegating Successfully - Preparing and Researching, Clarifying the Intent of the Task, Planning Your Delegation, Delegating Responsibility and Empowering Your Staff to Take Action, and Providing Ongoing Support and Oversight 5. Attracting and Keeping Great People Managing Performance Knowing Your Staff Checking Assumptions Engaging Your Team Leading and Coaching for Success Managing Disruption

Transitioning into Leadership for an IT Manager
Delivered OnlineFlexible Dates
£2,250