The essential course for anyone who wants to find out about the EFQM Model and RADAR and how these tools can benefit their organisation. Whilst this training is effective as a stand-alone course, it is also the starting point for all EFQM qualification routes. Who is it for? This course is suitable for anyone who wants to understand the new EFQM Model and how it can be used to make their organisation more effective. It provides a good overview for consultants who want to add the Model/RADAR to their portfolio of products and services. It is also a pre-requisite for anyone considering one of the EFQM qualification routes as a way of progressing their management development and career. Pre-requisites for this course None Benefits By the end of the course, participants will be able to: explain how the EFQM Model could benefit their organisation and how it could be used to overcome current and future challenges explain how the Model is structured and how the different elements apply to their organisation apply RADAR, the diagnostic and assessment tool, to identify strengths and areas for improvement conduct a high-level health check of their organisation Following the welcome and introduction, this course comprises of 9 modules: Module 1 Why we need a model to face & master complexity? Why the EFQM Model? Module 2 Introduction to the EFQM Model Module 3 The Model (part 1): Direction Module 4 The EFQM Model Module 5 The Model (part 3): Results Module 6 RADAR Module 7 Assessment Module 8 Data & Insights Module 8 Next steps Delivery The course is delivered through a virtual trainer led live class Cost £450 + VAT which includes the training course, the EFQM Model e-book and your EFQM Foundation Certificate. If you are not yet a member but are already thinking about joining CforC, you can find more information on how to become a member and the benefits by clicking here.
Overview Business modelling requires analysts to produce the quantitative models that top management uses to support their decision-making, but top management must also understand the strengths and weaknesses of the models if they are to use them effectively to support their decisions and robustly navigate the strategic negotiation landscape. This is particularly important for PPP projects where long-term commitments are made now based on bankability, value for money and risk allocation. During the course, participants will gain knowledge and skills on the frameworks, tools, and methodologies necessary to build quantitative models for financial decision-making in order to improve the financial viability and bankability of PPP projects. Participants will master modelling frameworks on capital budgeting, risk measurement, regression analysis and Monte Carlo Simulation among others.
Remote working is on the increase. However, managing a remote team is not always the same as managing a traditional, single-site office-based team.
Understanding how to plan for capacity, be able to forecast and manage budgets is a critical skill in today's leadership and management environment. This programme will not only support your understanding but will also help you to practically put the learning into practice.
Project Stakeholder Relationship Skills: Virtual In-House Training This course is designed to provide project managers with the ability to: Analyze the complexities of major stakeholder relationship categories Apply the most appropriate interpersonal relationship skills to the different categories of relationships Align the dynamic needs of the stakeholders with a project's objective throughout the project life cycle What you Will Learn Examine traditional and non-traditional ways to identify and assess stakeholders Explain how competence, character, and trust lead to project success and strong relationships with stakeholders Utilize 'Embodied Leadership' skills to build stakeholder relationships Apply stakeholder engagement best practices to case study and real-life scenarios Getting Started Stakeholders and project success Stakeholder management research Managing stakeholder relationships Identifying Stakeholders Stakeholder categories Stakeholder relationships across the project life cycle Tools and techniques for identifying stakeholders Assessing Stakeholders Assessing stakeholder relationships Recognizing stakeholder attitudes toward the project Analyzing stakeholders Using other types of stakeholder assessments Building Stakeholder Relationships The importance of psychological safety Building trust and getting results The anatomy of trust Navigating Challenging Situations Dynamics of conflict Responding to conflict Managing difficult conversations
RQF level 1 Awareness of First Aid for Mental Health Each year approximately 1 in 4 people in the UK will experience a mental health condition and at least 1 in 6 employees experience common mental health problems in the workplace. Research has shown that work is the biggest cause of stress which can stop people performing at their best. Mental health conditions are often hidden due to stigma and fear of discrimination and research has shown that a culture of fear and silence around mental health is costly to employers. The HSE guidance 'First aid needs assessment’ refers to mental health in the workplace. This 4-hour qualification provides learners with the knowledge to recognise a range of mental health conditions, how to start a supportive conversation and when and how to signpost a person to seek appropriate professional help. Learners will know how to recognise and manage stress. Learners will not diagnose or treat mental health conditions as this can only be carried out by healthcare professionals but will gain the knowledge to identify when a person may have a condition and know where they can go to get help. Suitability - Who should attend? Here are some examples of who may benefit from attending the RQF Level 1 Award in Awareness of First Aid for Mental Health: Employees and workers: This course is relevant for individuals in any industry who may encounter colleagues or clients experiencing mental health difficulties. It can be particularly valuable for human resources personnel, line managers, supervisors, or team leaders responsible for the well-being of employees. Teachers and educators: Professionals working in schools, colleges, or other educational institutions can benefit from this training to better understand and support the mental health needs of students. Healthcare and social care workers: Individuals working in healthcare or social care settings, such as nurses, care assistants, support workers, or counsellors, can enhance their understanding of mental health issues and improve their ability to provide appropriate support. Community and voluntary workers: People involved in community or voluntary organizations, including youth workers, social workers, volunteers, or community leaders, can gain valuable insights into mental health awareness and support. Personal relationships and caregivers: The Level 1 training can also be beneficial for individuals who have personal relationships with someone experiencing mental health challenges. This may include family members, friends, or caregivers who want to enhance their understanding and offer appropriate assistance. It is important to note that the Level 1 Award in Awareness of First Aid for Mental Health RQF is an introductory course and does not qualify participants to provide formal mental health interventions or therapy. However, it serves as a foundation for further training and can contribute to creating a more mentally healthy and supportive environment in various settings. Outcome / Qualification etc. Upon successful completion of the RQF Level 1 Awareness of First Aid for Mental Health course, participants can expect to achieve the following outcomes: Increased Awareness and Understanding: Participants will develop a basic awareness and understanding of mental health and mental health issues. They will gain knowledge about common mental health conditions, their signs and symptoms, and the importance of mental health in overall well-being. Recognition of Mental Health Signs: Participants will learn to recognize common signs of mental health issues in themselves and others. They will gain an understanding of the importance of early identification and intervention in promoting mental health and seeking appropriate support. Reduced Stigma and Improved Attitudes: The course aims to challenge stigmas and stereotypes associated with mental health. Participants will develop a more empathetic and supportive attitude towards individuals experiencing mental health challenges, promoting a positive and inclusive environment. Enhanced Communication Skills: Participants will learn basic communication skills for engaging with individuals experiencing mental health issues. They will gain an understanding of the importance of active listening, empathy, and non-judgmental communication in providing initial support. Signposting and Seeking Help: Participants will be equipped with knowledge about available resources, services, and support networks for mental health. They will learn about signposting individuals to appropriate professional help and self-help resources. Self-Care and Well-being Strategies: The course may provide participants with practical strategies for maintaining their own mental well-being. They may learn basic self-care techniques and stress management strategies to support their own mental health. Certificate of Completion: Upon successful completion of the course, participants will receive a certificate indicating their achievement of the RQF Level 1 Awareness of First Aid for Mental Health qualification. It's important to note that the Level 1 course provides a basic introduction to mental health awareness and first aid. It is not intended to provide participants with the qualifications or skills to diagnose or treat mental health conditions. Instead, it aims to promote mental health literacy, reduce stigma, and provide individuals with the knowledge to offer initial support and signposting to individuals in need. The Level 1 course can serve as a foundation for further learning and progression in the field of mental health. Individuals may choose to pursue higher-level courses or qualifications to develop more advanced skills and knowledge in mental health first aid or other related areas. Training Course Content MODULE 1 INTRODUCTION Session content Trainer/assessor introduction Learner introductions Course information • Administration • Learning outcomes and assessment criteria • Reasonable adjustments • Certification • Complaints and appeals • Assessment information Session duration 15 minutes MODULE 2 WHAT IS FIRST AID FOR MENTAL HEALTH? Session content Definitions Role and responsibilities of a First Aider The impact of mental health issues Mental health stigma Statistics Session duration 25 minutes MODULE 3 IDENTIFYING MENTAL HEALTH CONDITIONS Session content Mental health continuum Mental health risk factors Early warning signs Session duration 25 minutes MODULE 4 PROVIDING ADVICE AND STARTING A CONVERSATION Session content How to start a difficult conversation Non-judgemental listening skills When to contact the emergency services The First Aider’s own health and emotions Session duration 40 minutes MODULE 5 STRESS Session content What is stress? Causes of stress Effects of stress Coping strategies Session duration 25 minutes MODULE 6 MENTAL HEALTH CONDITIONS Session content Depression Anxiety Psychosis Eating disorders Suicide Self-harm Session duration 70 minutes MODULE 7 ASSESSMENT AND COURSE CLOSURE Session content Written assessment paper Course administration Course closure Session duration 40 minute Course delivery details Classroom-Based A minimum of 4 hours spread over at least one day. Ideally, the course should be run in one day, but must be completed within 2 weeks of starting the course, with each training session a minimum of two hours. Online/Virtual classroom The qualification has 2 assigned guided learning hours (GLH) and 5 hours total qualification time (TQT). GLH indicates the number of contact hours that the learner will have with the trainer/assessor. TQT includes GLH but considers unsupervised learning and is an estimate of how long the average learner will take to achieve the qualification. Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price. Continuing Studies After completing the RQF Level 1 Awareness of First Aid for Mental Health course, individuals can consider various progression options to further their knowledge and skills in mental health support. Here are some potential pathways: RQF Level 2 Award in First Aid for Mental Health: This qualification builds upon the knowledge gained in the Level 1 course and provides a more comprehensive understanding of mental health issues and how to provide appropriate support. It covers topics such as recognizing mental health conditions, promoting well-being, and providing initial support to those in crisis. RQF Level 3 Award in Supervising First Aid for Mental Health: For individuals who aspire to take on leadership or supervisory roles in mental health support, the Level 3 qualification is a logical progression. It provides in-depth knowledge and skills to supervise and manage a team of individuals providing first aid for mental health. Continued Professional Development (CPD): Engaging in ongoing CPD activities is essential for staying updated with the latest developments in mental health support. Individuals can attend workshops, seminars, or conferences related to mental health, trauma, or specific areas of interest within the field. Applied Practice: Applying the knowledge gained from the Level 1 course in real-world settings is crucial for developing practical skills. Individuals can seek opportunities to work or volunteer in environments where mental health support is needed, such as community organizations, schools, or helplines. Mental Health Support Training Programs: There are various specialized training programs available that focus on specific aspects of mental health support, such as suicide prevention, trauma-informed care, or supporting individuals with specific mental health conditions. These programs can provide individuals with additional expertise and deepen their understanding of specific areas within mental health support. Higher Education: Individuals who wish to pursue a more in-depth study of mental health can consider higher education programs in psychology, counseling, social work, or related fields. These programs provide comprehensive knowledge and training in mental health support and may lead to professional certifications or degrees. It's important for individuals to research and explore progression options that align with their specific career goals, interests, and local requirements. Different countries or regions may have varying certification or training requirements for mental health support roles, so it's advisable to check with relevant regulatory bodies or professional associations for specific guidance.
Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews
Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score
Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests