• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

731 Link courses in Cardiff delivered Live Online

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered OnlineFlexible Dates
£2,380

Android Studio Taster 1-Hour Course

4.6(12)

By PCWorkshops

Android Studio Taster Course. Brilliant for a beginner to get started quickly. introduction to the Android Studio environment, to get you started. An interesting and fun session. Hands-on, Practical Course, Instructor-led. 1 hour In our London classroom or online with Gotomeeting.com

Android Studio Taster 1-Hour Course
Delivered OnlineFlexible Dates
£15

Implementing Aruba OS-CX Switching, Rev. 20.21

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who will deploy and manage networks based on HPE's ArubaOS-CX switches. Overview After you successfully complete this course, expect to be able to: Use NetEdit to manage switch configurations Use the Network Analytics Engine (NAE) to implement scripting solutions to provide for proactive network management and monitoring Compare and contrast VSX, VSF, and backplane stacking Explain how VSX handles a split-brain scenario Implement and manage a VSX fabric Define ACLs and identify the criteria by which ACLs select traffic Configure ACLs on AOS-CX switches to select given traffic Apply static ACLs to interfaces to meet the needs of a particular scenario Examine an ACL configuration and determine the action taken on specific packets Deploy AOS-Switches in single-area and multi-area OSPF systems Use area definitions and summaries to create efficient and scalable multiple area designs Advertise routes to external networks in a variety of OSPF environments Promote fast, effective convergence during a variety of failover situations Use virtual links as required to establish non-direct connections to the backbone Implement OSFP authentication Establish and monitor BGP sessions between your routers and ISP routers Advertise an IP block to multiple ISP routers Configure a BGP router to advertise a default route in OSPF Use Internet Group Management Protocol (IGMP) to optimize forwarding of multicast traffic within VLANs Describe the differences between IGMP and IGMP snooping Distinguish between PIM-DM and PIM-SM Implement PIM-DM and PIM-SM to route multicast traffic Implement Virtual Routing Forwarding (VRF) policies to contain and segregate routing information Create route maps to control routing policies Understand the use of user roles to control user access on AOS-CX switches Implement local user roles on AOS-CX switches and downloadable user roles using a ClearPass solution Implement 802.1X on AOS-CX switch ports Integrate AOS-CX switches with an Aruba ClearPass solution, which might apply dynamic role settings Implement RADIUS-based MAC Authentication (MAC-Auth) on AOS-CX switch ports Configure captive portal authentication on AOS-CX switches to integrate them with an Aruba ClearPass solution Combine multiple forms of authentication on a switch port that supports one or more simultaneous users Configure dynamic segmentation on AOS-CX switches This course teaches you the advanced skills necessary to implement and operate enterprise level Aruba campus switching solutions. You will build on the skills you learned at the Associate level to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing and switching technologies. In this course, participants learn about ArubaOS-CX switch technologies including: securing port access with Aruba's dynamic segmentation, redundancy technologies such as Multiple Spanning Tree Protocol (MSTP), link aggregation techniques including Link Aggregation Protocol (LACP) and switch virtualization with Aruba?s Virtual Switching Extension (VSX) and Aruba's Virtual Switching Framework (VSF). This course is approximately 50% lecture and 50% hands-on lab exercises. Introduction to Aruba Switching Switches overview Architectures NetEdit Overview Centralized configuration Switch groups/templates AOS-CX mobile App Network Analytics Engine (NAE) Overview Configuration Core NAE feature lab sflow, local mirror, remote mirror VSX VSF vs. VSX: access and Agg/core design Stacking review VSF and uni/multi packet forwarding Stack fragments / split brain VSX Overview: roles, control, data, management planes VSX components (ISL, Keepalive, VSX LAG, Active Gateway, Active-Forwarding, Link Delay) Split Brain scenario Upstream Connectively Options (ROP single VRF, SVIs with multiple VRF, VSX Lag SVIs with multiple VRFs) Upstream/Downstream unicast traffic flow (South-North and North-South) VSX Configuration: VSX and Active Gateway VSX firmware updates ACLs Overview: types, components MAC ACL, Standard ACL, Extended ACL, Classifier-based Policies Configuration: wildcard bits, logging, pacl, vacl, racl Advanced OSPF Review basic OSPF Multi area: setup and aggregation Area-Types Stub, Totally Stub, NSSA, Totally NSSA External routes OSPF tuning: costs, bfd, gr, auth, vrrp, virt link BGP Overview: i/e bgp, as numbers Best path selection Configuration: route announcement Route filtering to prevent transit as IGMP Overview Querier Snooping Unknown multicasts Multicast Routing: PIM Overview PIM DM 802.1X Authentication Overview: roles, requirements, coa, accounting Dynamic port configuration: avp, acl, qos, VLAN Port-based vs. user-based: examples Radius service tracking, critical VLAN MAC Authentication Overview: Use cases Radius-based MAC Auth Dynamic Segmentation Leverage dynamic segmentation features Configure tunneled-node on AOS-CX switches Describe when and how to configure PAPI enhanced security, high availability, and fallback switching for tunneled-node Quality of Service Overview VoQ (Virtual Output Queue) QOS: queueing, QOS marks, dot1p, dscp Trust levels QOS configuration: port, VLAN, policies Interaction with user roles Queue configuration Rate limiters LLDP-MED Additional Routing Technologies VRF - Management VRF PBR MDNS PIM SM Capitve Portal Authentication Overview of guest solutions Built-in web auth ClearPass redirect with CPPM

Implementing Aruba OS-CX Switching, Rev. 20.21
Delivered OnlineFlexible Dates
Price on Enquiry

Creative Career Stories with Alex Hill

By Right Aligned

In this series we will be joined by a collection of creators and exploring their career including education, career steps and challenges.

Creative Career Stories with Alex Hill
Delivered OnlineFlexible Dates
FREE to £100

Italian Amaretti (gluten free) - ONLINE cooking class

5.0(21)

By Madebyflour

In this lesson you will learn how to easily make from scratch Amaretti, world famous Italian almond biscuit!

Italian Amaretti (gluten free) - ONLINE cooking class
Delivered OnlineFlexible Dates
£10

What is NLP?

By Proactive NLP Ltd

What is NLP? Join proactivenlp.com on this virtual workshop and find out how NLP can start changing your life by saying goodbye to the negatives and welcoming in all the positives you want.

What is NLP?
Delivered OnlineFlexible Dates
£22.50 to £25

Adobe After Effects Basic to Fundamentals Training Course (Live Online Only)

By London Design Training Courses

Training duration: 10 hrs Course info Method: 1-2-1, Personalized attention, Tailored content, Flexible pace, Individual support. Schedule: Personalized training experience with our flexible 1-2-1 sessions. Tailor your own schedule by pre-booking a convenient hour of your choice, available from Monday to Saturday between 9 am and 7 pm. Unlock visual effects and motion graphics skills with our 3ds Max and After Effects Course. Certified tutors guide you through seamless integration of 3D models and animations. Live online format, recorded lessons, and lifetime email support provided. Enroll now and explore exciting career opportunities in visual effects, animation, and motion graphics. Course Outline: Adobe After Effects Fundamentals. Getting Started Overview of the workspace and interface. Importing and organizing assets for seamless workflow. Understanding projects and compositions for effective project management. Working with layers to create complex compositions. Applying Effects (FX) Introduction to applying effects in After Effects. Fixed and applied FX for enhancing visual appeal. Understanding animation principles for smooth motion. Modifying motion paths to control animation trajectories. Mastering keyframes for precise animation control. Exploring the basics of the graph editor for advanced animation adjustments. Text Animation Creating and animating text in After Effects. Enhancing text with layer styles for engaging visuals. Utilizing animation options for dynamic text effects. Implementing motion blur for realistic motion. Shape Layers Introduction to shape layers and their versatility. Creating shapes from Illustrator files for flexible designs. Working with paths and their applications in animations. Utilizing animation options to breathe life into shapes. Exporting and Finalizing Projects Effective project management and organization techniques. Understanding export options for optimal rendering. Exporting projects through Media Encoder for various platforms. Utilizing dynamic link to Premiere Pro for seamless integration. Masks and Chroma-keying Creating and animating masks for selective visual effects. Utilizing tracking masks for precise adjustments. Limiting effects to specific areas using track mattes and property links. Mastering green-screen chroma-keying with Keylight 1.2. Additional Effects Exploring additional effects such as Warp Stabilizer, Camera Tracker, Motion Tracker, and Puppet Pin tool. Implementing these effects to enhance motion graphics and visual effects. Creative applications and hands-on practice with each effect. By the end of this fast-paced and practical Adobe After Effects training course, participants will achieve the following learning outcomes: Key Skills in After Effects: Gain proficiency in essential After Effects skills to transform video projects effectively. Professional Techniques: Master a range of professional techniques and processes invaluable for film makers, motion designers, and animators. Project Planning: Learn how to plan projects, prepare assets, and set compositions for seamless video production. Animation and Effects: Acquire the ability to apply and animate various transformations and effects on images, videos, and text elements. Masking and Compositing: Develop skills in masking and compositing to create visually stunning and cohesive compositions. Rendering Videos: Understand the video rendering process to produce high-quality final outputs.

Adobe After Effects Basic to Fundamentals Training Course (Live Online Only)
Delivered OnlineFlexible Dates
£330

Goldwork embroidery, Exquisite rose: Live Zoom class

By Ecole Saint Clare

Learn goldwork with this intricate rose

Goldwork embroidery, Exquisite rose: Live Zoom class
Delivered OnlineFlexible Dates
£173

TRAINING FOR FILM & GAME DESIGNERS One to One Online or Face to Face

By Real Animation Works

Film and VFX face to face training customised and bespoke. One to One Online or Face to Face

TRAINING FOR FILM & GAME DESIGNERS One to One Online or Face to Face
Delivered in London or OnlineFlexible Dates
£1,600

InDesign Evening Training

By London Design Training Courses

Why Choose InDesign Evening Training Course? Course Link. If you aim to enhance your design abilities, acquire proficiency in a new software, or pursue a career in graphic design, an InDesign course is highly beneficial. Tailored for individuals with foundational knowledge of Adobe InDesign, this training is designed to further develop your existing skills. Duration: 10 hrs Method: 1-on-1, Personalized attention Schedule: Tailor your own hours of your choice, available from Mon to Sat between 9 am and 7 pm InDesign Evening Course Outline (10 hours) Introduction Getting Started with Adobe InDesign CC Advanced Course Adjusting Workspace for Maximum Efficiency Customizing Default Font Size for New Documents Utilizing Special Features for Typekit & Open Type Fonts Exploring Sources for Free Fonts in InDesign Mastering Fonts in Adobe InDesign CC Identifying Fonts with Font Guess Selecting Beautiful Font Pairings Incorporating Free Icons from Adobe Market Using the Color Theme Tool Understanding Colour Modes Importing and Setting Default Colors Finding Great Colors with Adobe Color Managing Appearance of Black & Proofing Colors Creating Multiple Shapes with Gridify Live Distribute Drawing Arrows in InDesign CC Designing Complex Flowers in InDesign CC Utilizing Auto Size for Auto-Expanding Text Boxes Exploring Placeholder Text Alternatives Adding Paragraph Borders & Shading Understanding Paragraph vs Single Line Composer Making Paragraphs Span 2 Columns Mastering Justification & Hyphenation Options Aligning Optical Margins Harnessing the Power of Keep Options Working with Advanced Anchored Objects Using Conditional Text Creating Pie Charts & Bar Graphs Pros & Cons of Interactive Types Creating Interactive PDFs Adding Interactive Page Transitions Adding Navigation to Interactive PDFs Understanding Publish Online in InDesign CC Publishing Adobe InDesign Documents Online Adding Video to InDesign Documents Creating Button-Triggered Animations Making Multi-State Objects Incorporating Adobe Animate CC to InDesign Files Adding Maps & Calendars to Interactive Documents Generating QR Codes in InDesign CC Exploring Essential Keyboard Shortcuts Automatically Placing Text on Multiple Pages Creating Cross References & Index Adding Document Name Automatically with Text Variables Utilizing Adobe InDesign CC Book Feature Changing Preferences for Advanced Users Speeding Up Workflow for Advanced Users Using Character Styles Advanced Paragraph Styles Mapping Word Styles with InDesign Styles Creating Nested Styles & Grep Styles Using Next Style Mastering Object Styles Best Practices for Working Across Multiple Documents Utilizing Adobe Stock with InDesign CC Cropping Images Inside Text Making InDesign Layouts with Adobe Comp CC Advanced Use of CC Libraries Integrating Photoshop & Illustrator in InDesign CC Creating PDF Forms in InDesign CC Advanced Use of the Pages Panel Placing InDesign Documents Inside Each Other Installing and Using Scripts in InDesign CC Improving InDesign Performance Advanced Exporting & Printing Tricks Bonus: Software Updates Adobe InDesign https://adobe.com › indesign › get-started Installing for the first time or on a new computer? Click Get InDesign below to begin downloading. Follow the onscreen instructions to sign-in and install.

InDesign Evening Training
Delivered in London or OnlineFlexible Dates
£290