Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. Prerequisites Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of Active Directory concepts, including users, groups, and role-based access control. Understanding of resilience and disaster recovery, including backup and restore operations. 1 - Configure Microsoft Entra ID Describe Microsoft Entra ID benefits and features Describe Microsoft Entra concepts Compare Active Directory Domain Services to Microsoft Entra ID Select Microsoft Entra editions Implement Microsoft Entra join Implement Microsoft Entra self-service password reset 2 - Configure user and group accounts Create user accounts Manage user accounts Create bulk user accounts Create group accounts Create administrative units 3 - Configure subscriptions Identify Azure regions Implement Azure subscriptions Obtain an Azure subscription Identify Azure subscription usage Implement Microsoft Cost Management Apply resource tagging Apply cost savings 4 - Configure Azure Policy Create management groups Implement Azure policies Create Azure policies Create policy definitions Create an initiative definition Scope the initiative definition Determine compliance 5 - Configure role-based access control Implement role-based access control Create a role definition Create a role assignment Compare Azure roles to Microsoft Entra roles Apply role-based access control Review fundamental Azure RBAC roles 6 - Configure Azure resources with tools Use the Azure portal Use Azure Cloud Shell Use Azure PowerShell Use Azure CLI 7 - Use Azure Resource Manager Review Azure Resource Manager benefits Review Azure resource terminology Create resource groups Create Azure Resource Manager locks Reorganize Azure resources Remove resources and resource groups Determine resource limits 8 - Configure resources with Azure Resource Manager templates Review Azure Resource Manager template advantages Explore the Azure Resource Manager template schema Explore the Azure Resource Manager template parameters Consider Bicep templates Review QuickStart templates 9 - Configure virtual networks Plan virtual networks Create subnets Create virtual networks Plan IP addressing Create public IP addressing Associate public IP addresses Allocate or assign private IP addresses 10 - Configure network security groups Implement network security groups Determine network security group rules Determine network security group effective rules Create network security group rules Implement application security groups 11 - Configure Azure DNS Identify domains and custom domains Verify custom domain names Create Azure DNS zones Delegate DNS domains Add DNS record sets Plan for Azure Private DNS zones Review Azure Private DNS zone scenarios 12 - Configure Azure Virtual Network peering Determine Azure Virtual Network peering uses Determine gateway transit and connectivity Create virtual network peering Extend peering with user-defined routes and service chaining 13 - Configure network routing and endpoints Review system routes Identify user-defined routes Determine service endpoint uses Determine service endpoint services Identify private link uses 14 - Configure Azure Load Balancer Determine Azure Load Balancer uses Implement a public load balancer Implement an internal load balancer Determine load balancer SKUs Create back-end pools Create health probes Create load balancer rules 15 - Configure Azure Application Gateway Implement Azure Application Gateway Determine Azure Application Gateway routing Configure Azure Application Gateway components 16 - Configure storage accounts Implement Azure Storage Explore Azure Storage services Determine storage account types Determine replication strategies Access storage Secure storage endpoints 17 - Configure Azure Blob Storage Implement Azure Blob Storage Create blob containers Assign blob access tiers Add blob lifecycle management rules Determine blob object replication Upload blobs Determine Blob Storage pricing 18 - Configure Azure Storage security Review Azure Storage security strategies Create shared access signatures Identify URI and SAS parameters Determine Azure Storage encryption Create customer-managed keys Apply Azure Storage security best practices 19 - Configure Azure Files and Azure File Sync Compare storage for file shares and blob data Manage Azure file shares Create file share snapshots Implement Azure File Sync Identify Azure File Sync components Deploy Azure File Sync 20 - Configure Azure Storage with tools Use Azure Storage Explorer Use the Azure Import/Export service Use the WAImportExport tool Use the AzCopy tool 21 - Configure virtual machines Review cloud services responsibilities Plan virtual machines Determine virtual machine sizing Determine virtual machine storage Create virtual machines in the Azure portal Connect to virtual machines 22 - Configure virtual machine availability Plan for maintenance and downtime Create availability sets Review update domains and fault domains Review availability zones Compare vertical and horizontal scaling Implement Azure Virtual Machine Scale Sets Create Virtual Machine Scale Sets Implement autoscale Configure autoscale 23 - Configure Azure App Service plans Implement Azure App Service plans Determine Azure App Service plan pricing Scale up and scale out Azure App Service Configure Azure App Service autoscale 24 - Configure Azure App Service Implement Azure App Service Create an app with App Service Explore continuous integration and deployment Create deployment slots Add deployment slots Secure your App Service app Create custom domain names Back up and restore your App Service app Use Azure Application Insights 25 - Configure Azure Container Instances Compare containers to virtual machines Review Azure Container Instances Implement container groups Review the Docker platform 26 - Configure file and folder backups Describe Azure Backup benefits Implement Backup Center for Azure Backup Configure Azure Recovery Services vault backup options Use the Microsoft Azure Recovery Services (MARS) agent Configure on-premises file and folder backups 27 - Configure virtual machine backups Explore options to protect virtual machine data Create virtual machine snapshots in Azure Backup Set up Azure Recovery Services vault backup options Back up your virtual machines Restore your virtual machines Implement System Center DPM and Azure Backup Server Compare the MARS agent and Azure Backup Server Implement soft delete for your virtual machines Implement Azure Site Recovery 28 - Configure Azure Monitor Describe Azure Monitor key capabilities Describe Azure Monitor components Define metrics and logs Identify monitoring data and tiers Describe activity log events Query the activity log 29 - Configure Azure alerts Describe Azure Monitor alerts Manage Azure Monitor alerts Create alert rules Create action groups 30 - Configure Log Analytics Determine Log Analytics uses Create a Log Analytics workspace Create Kusto (KQL) queries Structure Log Analytics queries 31 - Configure Network Watcher Describe Azure Network Watcher features Review IP flow verify diagnostics Review next hop diagnostics Visualize the network topology
Are you looking to enter the dynamic world of real estate? Our course is designed to equip you with the knowledge and tools you need to communicate effectively with real estate professionals and develop key skills in real estate investment strategy and analytics. At the end of the course, you'll be able to read and interpret real estate market reports, and have a firm grasp of how iconic buildings, cities, and companies fit into the overall picture of the real estate sector. On this course, you will… Become familiar with the players, structure, general terminology and overall needs of Real Estate. Learn what is Real Estate and why it is different from other asset classes Get to grips with the overall size and structure of the UK Real Estate Market Learn and analyse the links between the different parts of the property market Understand who works in the Real Estate Market, their qualifications and their job descriptions Recognise how and when to use basic real estate concepts: Rent, Value, Yield, Risk and Return, etc… Learn how to read a real estate market report Understand how current affairs, politics and economics affects Real Estate Investment Use household names and iconic companies, cities and buildings to help consolidate your appreciation of this exciting sector Who will benefit from this course: Graduates or undergraduates studying economics, finance. Professionals working in Marketing or Accounting teams within Real Estate firms. APC students. Anyone interested in Real Estate. School leavers/A-Level Students looking to gain an understanding of Real Estate. Non cognate students who wish to transfer into Real Estate/Finance careers. Course Outline Module 1: What is and why buy Real Estate? The property Market The Size and Structure of the UK property market The impact of Real Estate in the Economy Module 2: The Real Estate Market System The Space Market The Asset Market The Development Market Module 3: How to value Real Estate An Introduction to Financial Mathematics The difference between Price, Value and Worth Property Yield Conventional Valuation Methods Module 4: How to read a Real Estate Market Report Property Market Indicators: Stock Indicators Property Market Indicators: Investment Indicators Module 5: Who works in Real Estate? The build Environment by Cobalt Recruitment Rea; Estate Agents Examples of Real Estate Market Agents CVs Real Estate Network
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is an IT, facilities or data centre operations professional working in and around the data centre and having the responsibility to achieve and improve high-availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Understand the design life cycle of data centres and the stages involved? Discuss the data centre requirements in great level of detail with vendors, suppliers and contractors to ensure that these requirements are met? Validate design plans, quotes and offers proposed by vendors/contractors? Understand redundancy levels for both the data centre design/setup and maintenance? Understand the various building considerations such as bullet proofing, mitigation of seismic activity, fire ratings and thermal stability? Understand how to install a raised floor that meets requirements, avoiding misalignment, level differences and leakage? Understand how to read a Single Line Electrical Diagram to identify and avoid the most common design issues? Choose the correct UPS and parallel configuration, learn and avoid classic parallel installation mistakes? Understand how to calculate battery banks, validate offered configurations to ensure they meet requirements? Understand what distance to keep to avoid EMF issues for human safety and equipment disturbances? Understand the fundamental cooling setup, CFM, Delta-T and other important factors? Understand contamination factors and limitations? Understand full details of fire suppression options, how to calculate gas content and verify installations? Understand how to measure data centre energy efficiency and how to improve it The course will bring participants to the level of a suitable sparring partner with suppliers. They will be able to verify offers provided by vendors for correctness, effectiveness and efficiency. Data Centre Design/Life Cycle Overview Overview of the phases of a data centre life cycle Planning, re-alignment and continuous improvement Standards and Rating Level Definitions Rating level history Difference between Uptime and TIA-942 Rating level definitions Redundancy options (N+1), 2N, 2(N+1) Concurrent Maintainability/Compartmentalisation Example configurations Substation and feed requirements Maintenance options Operational processes guidelines/standards Skill development Building Considerations Building location considerations Floor and hanging loads requirements Fire rating for walls and glass Blast protection Bullet proofing Forced entry protection Advanced Raised Floor & Suspended Ceiling Raised floor installation guidelines Techniques to install a proper and leveled raised access floor Common mistakes Choosing the right tiles and their locations Seismic-mitigating floor constructions Choosing the correct suspended ceiling Advanced Power Power infrastructure layout; Formulas which you should know for the data centre Single Line Electrical diagrams; how to read to ensure key components are present for protection Over current protection devices (MCB/MCCB/VCB/ACB/Fuses) definitions and what to use where Earth Leakage devices (RCB/RCD/ELCB/GFCI/ALCI/RCBO), definitions and what to use where Sizing of protective components Lightning strikes and surge protection devices (TVSS/SPD), how they operate, where to use and how to install Power cabling and cable run considerations PDU/DB setup and minimum requirements Generators; Generator types: Standy/Prime/Continuous Component make up and functions Fuel storage and calculation Paralleling of gen-sets Generator room/area requirements UPS Systems; Required specifications for UPS systems How to read data sheets and select the correct UPS Requirements for parallel configurations and avoid pitfalls such as single point of failures How parallel installation should be done, classic mistakes made by installers and how to avoid these Harmonic Filters; Active/Passive filters and their application Battery Banks; Battery bank terminology Designing battery banks, how to calculate, and double check the battery bank to be installed Battery charging pitfalls and ensuring the right charger is being installed and used Using parallel battery banks; how to properly install them, limitations and risks when using batteries in parallel How to test batteries correctly and make decisions on cell/block or string replacement Battery casing choices; ABS, V0, V1, V2 Alternative energy storage; flywheel, re-usable cell, compressed air UPS, etc. Advanced Electro Magnetic Fields Sources of EMF Difference between single, three phase and bus-bar EMF Options available to measure EMF and how to interpret the results from single-axes and composite measurements Guidance on safe distance for equipment and humans Calculation of EMF attenuation factor for shielding material permeability and saturation factors Advanced Cooling Important definitions; dry-bulb, wet-bulb, dew-point, RH, sensible and latent heat Psychometric chart and ASHRAE recommendations Environmental class definitions and thermal specifications Temperature/humidity measurements guideline Heat dissipation methods Altitude impact on temperature intake to ICT equipment Floor plan setup for effective cooling Differences in tile surface and supporting structure and the air-flow performance impact Rack door construction and the flow performance impact Equipment Delta-T and its impact Optimising air flow Thermal units conversions Calculations for air volume displacement (CFM/CMH) Cooling capacity calculations Air-conditioning selection De- / humidifying options Air conditioning efficiency SHR impact on cost saving Efficiency indicator New cooling principle and techniques (Submerged, VSD/VRF/ECF/water- and air side economisers) Redundancy guidelines for air-conditioners avoiding classic misconceptions and mistakes for meeting ANSI/TIA-942 compliant designs Installation requirements Connections to fire panel and EPO Commissioning of air conditioners Set points and calibration CFD (Computational Fluid Dynamics) Advanced Fire Protection The fire triangle and elements to stop a fire Detection systems in detail (VESDA, VIEW, smoke sensors) Considerations for installation of sensors Proper testing of smoke sensors Water based systems i.e. deluge, wet-pipe, dry-pipe, pre-action and why most of them don't work and how to detect this Details on Inert and Halocarbon systems and how to select the correct system for your data centre How to calculate the gas content ensuring the appropriate level is installed to suppress the fire including safety considerations Other requirements for gas systems such as release times, hold times, pipe install requirements and other important factors Requirements for the fire detection panel Installation verification, methods, what to check and how New advanced fire suppression technologies Design and Install Scalable Networking Cabling System ANSI/TIA942 cabling structure topology ToR, EoR Design Intelligent patching systems Installation best practice such as routing, bending radius, separation from power, containment fill ratio, fiber link loss calculator, bonding and grounding requirement Standard for telecommunications labeling and administration Environmental Specifications and Contamination Control Acoustic noise effects, regulations, specifications and limits Data centre contaminations and classifications Measurements, standards and limits Preventive measures and avoidance Data Centre Efficiency Business drivers to go Green High-availability or Green? Green guidelines and standards How to measure it and what are acceptable numbers compared to the general industry PUE classes defined by Green Grid and issues with PUE Techniques for saving energy in all parts of the data centre i.e. application/system level, cooling, power distribution Mock ExamEXAM: Certified Data Centre Specialist
The comprehensive Link Building for SEO has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Link Building for SEO today, and learn from the very best the industry has to offer! This best selling Link Building for SEO has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Link Building for SEO is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Link Building for SEO is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Link Building for SEO is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Link Building for SEO, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Link Building for SEO will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Link Building for SEO to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
Link Building for SEO Certification Link building is an extremely crucial step of SEO and driving targeted traffic to your website. The techniques and strategies for link building have evolved the last decade, and link building has never been more important to SEO and marketing. Search engines use certain algorithms, to access web pages, and link building is a very reliable way in which to drive traffic to your site. What's Covered in the Course? Whether you are a beginner or not, this course on link building will help you learn the nuances and strategies, in order to help you use link building for effective SEO. The course covers several topics of interest, including: How to judge if a link is relevant or not, and how to determine if a link to your website is a follow or no-follow link; Understanding Google algorithms that determine SEO factors - this helps you upgrade your SEO strategies, in order to drive higher traffic to your website; The importance of getting links from credible website sources and building quality content on your website, for higher traffic; How to link to viral and controversial content, to generate interest; How to intensify SEO strategies on your web pages, by interlinking your pages and linking a page to itself; How to work towards establishing long-term brand value, by blogging and networking on the Internet; How to link to free websites, such as newspaper and industry sites, to post links to your own website; How to post your links on university and education websites, by offering scholarships or special discounts to students. This video course offers the following benefits The benefits of link building for you and your business are as follows: If you can understand and master link building strategies, it can help put your business ahead of the competition; Link building intensifies SEO on your website and also helps you benefit from traffic that comes to other websites; You can leverage relationships and events, to promote your brand in several different ways; You can market your site through SEO-optimised press releases.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Prologue to Link Building for SEO Finding out about third party referencing for SEO is significant for anybody hoping to improve their web index positioning and by and large webpage and page commitment. Regardless of whether you're simply beginning your online mission or need a lift in rush hour gridlock, external link establishment is perhaps the best apparatuses accessible. This course gives a thorough manual for third party referencing for SEO, including a full definition and foundation just as the different natural and key external link establishment strategies to upgrade your SEO. From how to track down the ideal sites and interface with them, to viable third party referencing techniques you can quickly apply, this course covers all you require to think about external link establishment for SEO! You Will Learn The full meaning of and foundation to third party referencing for SEO The distinctive external link establishment alternatives and how to pick the correct one Instructions to enhance your external link establishment through examination and investigation Down to earth external link establishment methodologies you can apply right away Advantages of Taking This Course You will drastically improve your page and site traffic You will acquire important interest and increment your client base You will expand deals and benefit You will set up an amazing and solid online standing
Duration 4 Days 24 CPD hours This course is intended for This course is intended for both novice and experienced SharePoint users who wish to make full use of SharePoint Online. Overview #NAME? This course delivers the complete site owner story from start to finish in an engaging and practical way to ensure you have the confidence to plan and create new sites or manage your existing sites in SharePoint Online. Your goal is to learn how to make SharePoint online relevant to your team by using a sites functionality to help you share information and collaborate with your colleagues. During the class, you will also learn best practices and ?what not to do? as you watch live, interactive demonstrations and put theory into practice with hands on exercises in SharePoint Online. 1 - An Introduction to SharePoint Online Introducing Office 365 and SharePoint Getting started with Office 365 The cloud revolution Login to Office 365 What is Office 365 Using the app launcher What is SharePoint Office 365 settings Introducing Office 365 Groups Delve Ownership and Access OneDrive 2 - Creating Sites Planning your sites Create new subsites The Office 365 tenant Site templates Web addresses Apply a them Site collections Building your navigation Create a new site Delete subsites Team site navigation User interface: classic vs modern Site contents: classic vs modern Where does classic come from? 3 - Creating and Managing Web Pages The types of pages found in SharePoint Classic SharePoint pages Modern SharePoint pages How to use classic team site pages Create news and site pages Review features of publishing sites Web parts Save, publish, share and delete pages Communication sites 4 - Working with Apps An introduction to apps Co-authoring Marketplace apps Check In ? Out Adding apps to a site Edit and view file properties Create and manage columns Quick edit view Public and personal views File commands Managing app settings Copy link and Share Content approval Folders Major and minor versioning The recycle bin Document sets Alerts Working with files in a library OneDrive sync Create, Upload and edit files Working with classic lists 5 - Building processes with Flow and PowerApps What are business processes? Design and publish a Flow Classic tools for designing processes Getting started with PowerApps in SharePoint Design and test a classic workflow Enhance data capture with PowerApps Getting started with Flow in SharePoint Test a Flow and PowerApps enriched list 6 - Customizing Security Office 365 Group access Share a file Updating Office 365 Group Security Remove a user Managing access to SharePoint Customizing SharePoint security New sites private vs public Create permission levels and groups Setup access requests Security inheritance Share a site Security best practices 7 - Working with Search Delve Search tips An introduction to SharePoint search Accessing classic search Search in folders, libraries and sites Promoted results Search results 8 - Enterprise Content Management Managed metadata service Information management policies An introduction to content types The records center Create and manage content type In-place records management Deploy content types The content organizer Using content types in apps Durable links The content type hub
Become a Certified User Experience Professional Build a career in UX with the world’s only university credit-rated online UX course. Acquire the mindset, the skills and the confidence that make UX designers so valuable. A rewarding and meaningful career awaits. Why become a UX designer? Be in demand UX is a high-growth sector. The demand for UX designers far outstrips the supply of qualified professionals. Get well paid UX designers are highly paid. The average entry-level salary for a UX designer in the United Kingdom is £35,465 (PayScale, 2019) Love your job UX designers make an impact. They solve real-world problems using an exciting mix of research, design, technology and psychology. Study method Online, self-paced Duration 6 months Access to content 12 months Qualification Level 8 Diploma - User Experience Design Awarded by Glasgow Caledonian University Regulated by SQA Additional info Exam(s) / assessment(s) is included in price Tutor is available to students Description Duration: 6 months Get certified in six months following a flexible, structured learning path. Delivery: Online The course is delivered entirely online, including video modules, mentor-led webinars and support. Assessment: 2-hour exam Before getting certified, you'll be assessed during a two-hour exam taken online. Outcomes for you Think like a UX designer; adopt the mindset that sets them apart Showcase your knowledge with a portfolio of project work Speak with the confidence that comes from a true, deep understanding of UX Advance your career with job-ready skills Complete a university credit-rated course, valued by employers globally Become a Certified UX Professional Learn with us We’ve worked hard to design the best possible online learning experience for you. As well as an unmatched syllabus, our approach includes: Projects & portfolio Learn by doing with a series of real-world projects ideal for your UX portfolio. Mentors & webinars Be guided by our hand-picked, world-class mentors during monthly webinars. Structure & support Stay motivated with a structured programme supported by fellow students and our customer success team. What you’ll learn We’ve put together a university credit-rated curriculum that’s deep, rigorous and covers everything you need to know to become a certified UX professional and turbocharge your career. Module 01 - Introduction to UX design Module 02 - User research Module 03 - User goals Module 04 - Structure and navigation Module 05 - Interactions Module 06 - Design principles Module 07 - Design patterns Module 08 - Mobile Module 09 - Workflows Module 10 - Prototyping and handover Module 11 - AI and UX Module 12 - Creating your portfolio Module 13 - Career guidance Hub Tutorials for Figma Projects and portfolio - Projects that build into a portfolio Exam - 2-hour final exam Requirements Background You don’t need experience in design or technology to enrol in our courses, although having one or both is a definite bonus. Our students come from a diverse array of backgrounds, including project management, development, graphic design, product management, business analysis and so on. Commitment You do need to be motivated and committed. We set a high bar. Studying for one of our professional qualifications requires a certain amount of time, energy and focus. Our team will be there to support you along every step of the way but success will come as a result of your own diligence. Career path The average salary for entry level user experience designers is £28,000 The average salary for user experience designers with 1-5 years experience ranges from £29,000 to £50,000 The average salary for user experience managers/leads is £80,000 Information from LinkedIn Salary Reports, based on real jobs listings.