Microsoft Exchange training course description A hands on course focusing on the day to day running of Microsoft Exchange. The course is designed for those with a sound understanding of how Exchange forwards emails and concentrates on important issues such as monitoring, backups and restores. This course can be delivered on any version of Microsoft exchange and tailored as required. What will you learn Install MS Exchange Create, configure and manage user mailboxes. Configure and administer MS Exchange. Backup and restore MS Exchange. Microsoft Exchange training course details Who will benefit: Anyone working with MS Exchange. Prerequisites: Total SMTP and email for engineers Duration 3 days Microsoft Exchange training course contents Review of mail basics Basic routing & Client/Server, Mail flow & protocols, Mail server technology. Exchange features MAPI, Database, The Exchange organisation, Active Directory consideration. Installing Understanding server roles, Planning for Exchange, Preparing Active Directory, Preparing the host server, Installing Exchange. Introduction to Exchange management tools Exchange Management shell, Exchange Management console. Administration Configuring SMTP domains, Send connectors, Receive connectors, Setting up & managing user mailboxes, Setting up resource mailboxes, Mail enabled groups, Address lists. Troubleshooting Security & troubleshooting wizards, Windows platform tools, External/Internet tools.
GPON and FTTx networks training course description Designed to benefit those requiring an in depth knowledge of the principles and applications of Ten Gigabit and Gigabit Passive Optical Networking and Fibre to the X in NG Networks applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of 'hands on' equipment instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. What will you learn Compare PON/FTTx systems. Explain network elements and designs. Support applications and network interfaces. List circuit provisioning and bandwidth requirements. Understand upstream & downstream issues. Describe headend & network elements/OLT-ONT. Perform network testing with OTDR test sets. GPON and FTTx networks training course details Who will benefit: Anyone working with GPON and FTTx. Prerequisites: Introduction to data communications and networking. Duration 5 days GPON and FTTx training course contents FTTN, FTTC, FTTH SMF, MMF, Fibre safety and properties (dispersion/attenuation), Fibre reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes. Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node) , FTTD (Fibre to the desk), FFTH topologies and wavelengths, Active or passive optical network. WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM, EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters , Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. PON variants Gigabit passive optical network (GPON), Gigabit Ethernet passive optical network (GEPON), Time division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps FSAN (Full Service Access Network) NGA (Next Generation Access), Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. GEPON design GPON OSP centralized and distributed design, GPON PON splitters x4 x8 x32, Fibre splice trays /cassette trays & enclosures, GPON field testing and installation verification, GPON physical layer testing, Optical time domain reflectometer (OTDR), Optical power source & meter, Optical return loss (ORL), APON/BPON/GPON/EPON comparisons. GPON ITU-T G.984.1 Reference model, terminology & architecture, Access network system management functions. ONT & OLT functional block examples. FTTx scenarios, 4 switching arrangements for external access network backup. GPON ITU-T G.984.2 Physical layer, Enhancement band, Bit rate and wavelengths, FEC and RAMAN. GPON ITU-T G.984.3 Frame structure, GPON encapsulation method (GEM), GTC adaptation and framing sublayer protocol stack, Status reporting & traffic monitoring DBA (SR-DBA & TM-DBA), Transmission container (T-CONT) types, Downstream & upstream multiplexing, GEM port identifier, Media access control and ONU registration, Extended bandwidth assignment model scheduling architecture, PLOAM & alarm messages, Downstream & Upstream FEC, Process order in a GTC transmit flow. GPON ITU-T G.984.4 and G.988 ONT management and control interface (OMCI) Management interface, Reference model, Typical ONT with SCTE 55-1 or SCTE 55-2 compliancy. GPON ITU-T G.984.5 enhancement band Band options, GPON NGA, Wavelength allocation. GPON ITU-T G.984.6 optical reach extension (G.984.re) Reach extension (RE), OA-based and OEO-based reach extenders, Protection, Reach extender with OTDR blocking filters (BF) and bypass (BYP) filters. GPON ITU-T G.984.7 long reach Quiet Window. 10-GPON ITU-T G.987.1 (XG-PON) Scenarios, reference access network architecture, XG-PON with G-PON through WDM1r, G-PON and XG-PON wavelength allocation, G-PON and XG-PON co-existence with video overlay option, RE migration scenarios. G.989 40Gbps XG-PON2 Functional reference architecture, NG-PON2 system coexistence with legacy systems, Definitions of legacy compatibility terminology. GPON issues and standards GPON components GPON OLT / GPON ONT, GPON management, Operational support systems (OSS), Network management systems (NMS), OMCI (ONT Management control interface), RG (Residential gateway), Data and prioritised voice channel product, GPON broadband-forum standards, Broadband-forum , TR-069 and TR-156, HPNA (home phone network alliance), Powerline carrier (PLC), GPON DLNI G.hn or G.9960, MOCA, FTTH council certification standard for network certification. Fibre-connected home badge, Ethernet in the first mile (EFM), GPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice access platform (MSAP), Software planning tool, Superconnected cities / voucher scheme. Hands on practical assignments Single and multimode fibre recognition, Fibre Cleaning methods, Checking cleaning with an optical microscope, Optical light source and optical power meter referencing, PON splitter and fibre drum testing with an optical power meter, 6km classroom passive optical network testing with an OTDR at 1310/1550nm, Using decibels (dB's) and decibel milliwats (dBm's), Designing networks up to 20km long using vendor specifications (power budget), Fault finding with a visible fault locator.
24-Hour Knowledge Knockdown! Prices Reduced Like Never Before The business world is a thriving ecosystem in the UK. Did you know that according to the Federation of Small Businesses, there are over 5.5 million businesses in the UK, employing over 60% of the workforce? Have you ever wondered how these businesses function or how they make crucial decisions? This Business Studies course will equip you with the knowledge and skills to navigate the exciting world of commerce. This Business Studies course delves into the core functionalities of a successful business. You'll explore operations management, project management, and business process improvement methods. Learn how businesses plan and forecast operations to meet demand, and how they measure and improve performance. Gain insights into financial management, including cash flow, credit control, and risk mitigation strategies. The course also covers the crucial aspects of the business environment, human resource management, and exceptional customer service practices. Courses included in this Package: Course 01: Diploma in Business Studies at QLS Level 5 Course 02: Business Management Course 03: Business Law Learning Outcomes of Business Studies Apply operations management principles for efficient production. Develop project plans and manage resources for successful completion. Analyze business processes and identify areas for improvement. Implement strategies for financial management and risk mitigation. Manage human resources effectively to create a motivated workforce. Design and deliver exceptional customer service experiences. Enrolling in this Business Studies course is an investment in your future. With the valuable knowledge and skills you'll gain, you'll be well-positioned to thrive in a dynamic business environment. Take the first step towards a rewarding career in business-enrol today! Why Choose Us? Get a Free CPD Accredited Certificate upon completion of Business Studies Get a free student ID card with Business Studies Training program (£10 postal charge will be applicable for international delivery) The Business Studies is affordable and simple to understand This course is entirely online, interactive lesson with voiceover audio Get Lifetime access to the Business Studies course materials The Business Studies comes with 24/7 tutor support Start your learning journey straightaway! *** Course Curriculum *** Course 01: Diploma in Business Studies at QLS Level 5 Module 01: Introduction Module 02: Operations Management Module 03: Introduction to Business Analysis Module 04: Project Management Module 05- Business Process Management Module 06: Planning & Forecasting Operations Module 07: Performance Management Module 08: Management of Cash and Credit Module 09: Managing Risk and Recovery Module 10: Business Environment Module 11: Human Resource Management Module 12: Customer Service Course 02: Business Management Module 01: Introduction To Business Management Module 02: Operations Management Module 03: Introduction To Business Analysis Module 04: Strategic Analysis And Product Scope Module 05: Project Management Module 06: Business Development And Succession Planning Module 07- Business Process Management Module 08: Planning & Forecasting Operations Module 09: Performance Management Module 10: Management Of Cash And Credit Module 11: Managing Risk And Recovery Module 12: Quality Management Module 13: Communication Skills Module 14: Business Environment Module 15: Organisational Skills Module 16: Negotiation Techniques Module 17: Human Resource Management Module 18: Motivation And Counselling Module 19: Customer Service Module 20: Time Management Module 21: Conflict Management Course 03: Business Law Module 1: Understanding Business Law Module 2: European Community Law Module 3: The Court System Module 4: Civil And Alternative Dispute Resolution Module 5: Contract & Business Law Module 6: Employment Law Module 7: Agency Law Module 8: Consumer Law And Protection Module 9: Law Of Tort Module 10: Business Organisations Module 11: Company Law Module 12: Business Property Module 13: Competition Law How will I get my Certificate? After successfully completing the course, you will be able to order your Certificates as proof of your achievement. PDF Certificate: £12.99 CPD Hard Copy Certificate: £29.99 QLS Endorsed Hard Copy Certificate: £119 CPD 180 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this Business Studies course. This course is open to everybody. Entrepreneurs Business Owners Career Changers Students Professionals Managers Requirements You will not need any prior background or expertise to enrol in this Business Studies Skills. Career path This Business Studies course will allow you to kickstart or take your career in the related sector to the next stage. Business Analyst Project Manager Human Resources Marketing Manager Finance Officer Business Owner Certificates CPD Accredited Certificate Digital certificate - £12.99 CPD Accredited Hard Copy Certificate Hard copy certificate - £29.99 Please note that International students have to pay an additional £10 as a shipment fee. Diploma in Business Studies at QLS Level 5 Hard copy certificate - £119 Please note that International students have to pay an additional £10 as a shipment fee.
Logistics Management: Logistics Management Course Online Are you interested in beginning a career in logistics management? We provide a course on logistics management that will help you advance your professional career. The knowledge and abilities required for this position would be improved by taking this Logistics Management: Logistics Management Course. You will gain a thorough grasp of logistics through this Logistics Management: Logistics Management Course. This Logistics Management: Logistics Management Course guarantees that you are familiar with the components of a logistics system and the many types of logistics management. You'll learn more about company logistics and the course's objectives in the Logistics Management: Logistics Management Course. Enrol in Logistics Management: Logistics Management Course today and begin your education to gain the advanced logistics management abilities you need to compete for your dream career. Special Offers of this Logistics Management: Logistics Management Course This Logistics Management: Logistics Management Course includes a FREE PDF Certificate. Lifetime access to this Logistics Management: Logistics Management Course Instant access to this Logistics Management: Logistics Management Course Get FREE Tutor Support from Monday to Friday in this Logistics Management: Logistics Management Course Free courses included with Logistics Management: Logistics Management Course Course 01: Level 4 Logistics Management Course 02: Level 7 Diploma in Supply Chain Management Course 03: Level 7 Project Management Course [ Note: Free PDF certificate as soon as completing this Logistics Management: Logistics Management Course] Logistics Management: Logistics Management Course Online Industry Experts Designed this Logistics Management: Logistics Management Course into 09 detailed modules. Course Curriculum of Logistics Management Course Module 01: An Overview of Logistics Management Module 02: Logistics, the Supply Chain and Competitive Strategy Module 03: Product Design, Cleaner Production and Packaging Module 04: Sustainable Purchasing and Procurement Module 05: Sustainable Warehousing Module 06: Understanding Customer Service Module 07: Basic Inventory Planning and Management Module 08: Freight Transport Management Module 09: Reverse Logistics and Recycling Assessment Method of Logistics Management Course After completing each module of the Logistics Management: Logistics Management Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Logistics Management Course After completing the MCQ/Assignment assessment for this Logistics Management: Logistics Management Course, you will be entitled to a Certificate of Completion from Training Tale. Who is this course for? Logistics Management: Logistics Management Course Online This Logistics Management: Logistics Management Course is perfect for - Job Seekers, Fresh Graduate, Organizational Manager, Company Owner. Requirements Logistics Management: Logistics Management Course Online Students who intend to enrol in this Logistics Management: Logistics Management Course must meet the following requirements: Logistics Management: Good command of the English language Logistics Management: Must be vivacious and self-driven. Logistics Management: Basic computer knowledge Logistics Management: A minimum of 16 years of age is required. Career path Logistics Management: Logistics Management Course Online You may be able to find the position you want in the industry with the help of our Logistics Management: Logistics Management Course. Certificates Certificate of completion Digital certificate - Included
This course will provide you with the necessary skills, knowledge and information about anger management whether you wish to manage your own anger issues or someone else's? Are you someone who helps people with their anger issues and concerns? If you want to improve your coaching skills especially with anger management, then this course is meant for you. Description: Anger Management is essential as anger issues can affect anyone's life and career. If you are someone who helps people with their anger issues, then you will need to be learning more about anger management and this advanced course has been designed for you. You will understand the dynamics regarding anger cycle. Learn about the common anger myths and understand the helpful and unhelpful ways of dealing with anger. Through this course, you will know the techniques in controlling anger that will help your clients with their anger issues. You will also learn the best perspective of anger management and practice it in this course. This course will provide you with the necessary skills, knowledge and information about anger management whether you wish to manage your own anger issues or someone else's? Who is the course for? Professionals like who help people with their anger issues. People who have an open mind to know about anger management. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: The Advanced Diploma in Anger Management is a useful qualification to possess, and would be beneficial for the following careers: Consultant Counsellor Life Coach Mental Health Instructor Mentor Therapist. Introduction to Anger Management What is Anger? 00:15:00 Costs and Pay-Offs 00:15:00 The Anger Process 00:30:00 How Does Anger Affect Our Thinking? 00:15:00 Understanding Behavior Types 00:15:00 Managing Anger 00:15:00 Communication Tips and Tricks 00:30:00 Anger Management Module One - Getting Started 01:00:00 Module Two - Understanding Anger 00:30:00 Module Three - Do's and Don'ts 01:00:00 Module Four - Gaining Control 01:00:00 Module Five - Separate the People from the Problem 00:30:00 Module Six - Working on the Problem 01:00:00 Module Seven - Solving the Problem 01:00:00 Module Eight - A Personal Plan 01:00:00 Module Nine - The Triple A Approach 02:00:00 Module Ten - Dealing with Angry People 01:00:00 Module Eleven - Pulling It All Together 01:00:00 Module Twelve - Wrapping Up 01:00:00 Activities Advanced Diploma in Anger Management- Activities 00:00:00 Mock Exam Mock Exam-Advanced Diploma in Anger Management 00:20:00 Final Exam Final Exam-Advanced Diploma in Anger Management 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Project Management: Project Management Course Online This Project Management: Project Management Course was designed for job seekers and those who are already employed in a company. It fulfils the majority of your project management and administration needs. The Project Management: Project Management Course covers everything you will need to succeed as a project manager. It also covers several aspects of global project management. This is a hands-on Project Management: Project Management Course that will teach you about project management from various perspectives. This Project Management: Project Management Course will teach you how to effectively manage any project, no matter how large or small. This Project Management: Project Management Course provides you with a thorough theoretical as well as practical understanding of project management. It explains how to use various tools and methods and evaluate various plans, such as communication, time, budget, efficiency, and risk plans. This Project Management: Project Management Course is ideal for you if you want to succeed in this field. Main Course: Level 7 Project Management Free Courses Course 01: Level 3 Business Administration Course 02: Level 5 Diploma in Business Analysis Special Offers of this Project Management: Project Management Course This Project Management: Project Management Course includes a FREE PDF Certificate. Lifetime access to this Project Management: Project Management Course Instant access to this Project Management: Project Management Course Get FREE Tutor Support from Monday to Friday in this Project Management: Project Management Course [ Note: Free PDF certificate as soon as completing the Project Management: Project Management Course] Project Management: Project Management Course Online Industry Experts Designed this Project Management: Project Management Course into 17 detailed modules. Detailed Course Curriculum of this Level 7 Project Management Course Module 01: Introduction to Project Management Module 02: Project Lifecycle Module 03: Factors for Project Success or Failure Module 04: Project Feasibility Analysis and Project Selection Module 05: Project Execution and Control Module 06: Quality Management Module 07: Managing Conflict Module 08: Cost Management Module 09: Time Management Module 10: Project Risk Management Module 11: Project Procurement Management Module 12: Project Change Management Module 13: Communication Management Module 14: Project Integration Management Module 15: Scope Management Module 16: Managing Project Closure Module 17: International Project Assessment Method of Project Management Course After completing each module of the Project Management: Project Management Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Project Management Course After completing the MCQ/Assignment assessment for this Project Management: Project Management Course, you will be entitled to a Certificate of Completion from Training Tale. Who is this course for? Project Management: Project Management Course Online This Project Management: Project Management Course for anyone who wants to improve their project management skills and try their hand at it. People who work in the following fields will benefit from this Project Management: Project Management Course: Project Manager Project Supervisor Project Assistant Requirements Project Management: Project Management Course Online Students who intend to enroll in this Project Management: Project Management Course must meet the following requirements: Project Management: Good command of the English language Project Management: Must be vivacious and self-driven. Project Management: Basic computer knowledge Project Management: A minimum of 16 years of age is required. Career path Project Management: Project Management Course Online Project Management: Project Management Course offers a wide range of career opportunities, including: Assisting with a project Co-Ordinator of the project Certificates Certificate of completion Digital certificate - Included
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
10 QLS Endorsed Courses for HR Manager | 10 Endorsed Certificates Included | Lifetime Access | 24/7 Tutor Support