24-Hour Knowledge Knockdown! Prices Reduced Like Never Before Are you tired of feeling like you're stuck in the shadows at work, missing out on promotions and the recognition you deserve? Do you find yourself struggling to keep up with the fast-paced demands of the modern office environment? The solution is right here, waiting for you! In the UK, where efficiency is paramount, our Office Skills: Secretarial & Shorthand, & PA Training program equips you with the skills that matter. With over70% of businesses seeking proficient office support, you'll be pleased to know that our course combines industry-focused modules with a success rate of 92% in the UK job market. Start your journey to becoming an invaluable asset in the workplace. Our course bundle offers a diverse learning experience, covering everything from fundamental office administration tasks like document management and communication to specialised areas like legal secretarial practices, compliance, and facilities management. You'll also gain valuable insights into team dynamics and virtual collaboration, preparing you to thrive in today's ever-evolving work environment. This Office Skills: Secretarial, Shorthand, & PA Training Bundle Contains 7 of Our Premium Courses for One Discounted Price: Course 01: Office Administration & Skills Diploma Course 02: Legal Secretary Course 03: Compliance Officer Training Level 3 Course 04: Facilities Management Certificate (FMC) Course 05: Diploma in Performance Management Course 06: Workplace Confidentiality Course 07: Virtual Team Building and Management Course Whether you're a recent graduate or seeking career advancement, this bundle provides the perfect platform to launch your success. Invest in your future and enrol today! Learning Outcomes of Office Skills Gain a comprehensive understanding of core office administration principles. Develop proficiency in essential software applications like Microsoft Office. Master the art of legal document preparation and filing procedures. Implement effective compliance strategies within an organizational framework. Foster strong communication and interpersonal skills for successful team management. Uphold the highest ethical standards of confidentiality in the workplace. Why Choose Us? Get a Free CPD Accredited Certificate upon completion of Office Skills: Secretarial, Shorthand, & PA Get a free student ID card with Office Skills: Secretarial, Shorthand, & PA Training program (£10 postal charge will be applicable for international delivery) The Office Skills: Secretarial, Shorthand, & PA is affordable and simple to understand This course is entirely online, interactive lesson with voiceover audio Get Lifetime access to the Office Skills: Secretarial, Shorthand, & PA course materials The Office Skills: Secretarial, Shorthand, & PA comes with 24/7 tutor support Start your learning journey straightaway! *** Course Curriculum *** Course 01: Office Administration & Skills Diploma Module 01: Personal Assistant Module 02: Admin Support Module 03: Administrative Management Module 04: Organisational Skills Module 05: Telephone Etiquette Module 06: Business Writing Module 07: Time Management Module 08: Body Language and Effective Communication Module 09: Meeting Management Module 10: Excel Basics Module 11: PowerPoint Basic Course 02: Legal Secretary Module 01: Understanding The Concept Of Paralegal Module 02: Key Legal Terminology Module 03: Effective Communication Skills For Paralegals Module 04: The Legal Workplace & Professionals Module 05: Law & Legal Systems Module 06: Contract & Business Law Module 07: Property Law Module 08: Wills, Probate, Estate Law Module 09: Criminal Law Module 10: Common Paralegal Legal Matters Module 11: Human Rights Module 12: Conflict And Conflict Resolution Module 13: Professional Conduct And Ethics Of Paralegals Module 14: Mandatory Knowledge Fields And Survival Tips For Paralegals Course 03: Compliance Officer Training Level 3 Module 01 : Introduction to Compliance Module 02 : Compliance Management System Module 03 : Basic Elements of Effective Compliance Module 04 : Compliance Audit Module 05 : Compliance and Ethics Module 06 : Introduction to Risk and Basic Risk Types Module 07 : Further Risk Types Module 08 : Introduction to Risk Management Module 09 : Risk Management Process Module 10 : Risk Assessment and Risk Treatment Module 11 : Types of Risk Management =========>>>>> And 4 More Courses <<<<<========= How will I get my Certificate? After successfully completing the course, you will be able to order your Certificates as proof of your achievement. PDF Certificate: Free (Previously it was £12.99*7 = £91) CPD Hard Copy Certificate: £29.99 CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this bundle. This bundle is ideal for: Career Changers Administrative Staff Legal Professionals Business Owners Aspiring Managers Requirements You will not need any prior background or expertise to enrol in this bundle. Career path After completing this bundle, you are to start your career or begin the next phase of your career. Office Manager Legal Secretary Compliance Officer Facilities Manager HR Assistant Team Leader Certificates CPD Accredited Digital Certificate Digital certificate - Included Upon passing the Course, you need to order a Digital Certificate for each of the courses inside this bundle as proof of your new skills that are accredited by CPD QS for Free. CPD Accredited Hard Copy Certificate Hard copy certificate - £29.99 Please note that International students have to pay an additional £10 as a shipment fee.
This course offers a comprehensive approach to workplace safety, focusing on ergonomics, fire prevention, and protection management. Participants will delve into the importance of ergonomics in health science, learning to evaluate operator-machine systems, classify body movements, and understand the impact of environmental variables on employee health. After the successful completion of the course, you will be able to learn about the following; Explore the Definition of 'Ergonomics' and its importance in health science. Learn how to Apply Ergonomics. Evaluate Operator-Machine Systems. Understand the classification of Body Movement, Postures, and Positions. Explore Cumulative Trauma Disorders or CTD. Understand Machine Variables and Environmental Variables affecting the health and safety of employees. Explore Workplace Layout and Design. Appreciate FIRE PREVENTION AND PROTECTION techniques. Explore the Categories of Fires and Extinguishers. This course covers essential topics in workplace safety, including ergonomics principles, operator-machine system evaluation, body movement classification, cumulative trauma disorders, machine and environmental variables affecting employee health, workplace layout and design considerations, fire prevention techniques, categories of fires, and proper extinguisher usage. Through practical examples and case studies, participants will learn how to identify and mitigate workplace hazards to create a safer and healthier work environment. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Ergonomics, Fire Prevention, and Protection Management Self-paced pre-recorded learning content on this topic. Ergonomics, Fire Prevention, and Protection Management Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. CEO, Director, Manager, Supervisor Health and safety officer Occupational therapist Physical therapist Safety engineer Human factors engineer Industrial designer Ergonomics consultant Workplace safety coordinator Health and safety manager Facility manager Occupational health specialist Environmental health and safety specialist Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.
Unleash your potential for survival with our cutting-edge course, equipping you with indispensable knowledge to navigate through life-threatening situations. Discover the secrets to recognising potential threats, cultivating a resilient mindset, and responding effectively to active shooter incidents. This comprehensive programme goes beyond the ordinary, arming you with emergency first aid skills, evacuation strategies, and preventive measures. Immerse yourself in a real-world case study on active shootings, gaining invaluable insights to enhance your preparedness. Key Features: CPD Certified Developed by Specialist Lifetime Access Embrace a transformational learning experience, empowering you with skills vital for personal safety. Navigate the intricacies of identifying threats, fostering a survival mindset, and executing swift responses. Equip yourself with emergency first aid, evacuation tactics, and preventative strategies, ensuring you emerge resilient and ready for any challenge. Course Curriculum Module 01: Introduction to Active Shooter Attacks Module 02: Identifying Potential Threats Module 03: Developing a Survival Mindset Module 04: Responding to an Active Shooter Incident Module 05: Emergency First Aid and Evacuation Module 06: Prevention and Preparedness Module 07: Case Study on Active Shooting Learning Outcomes: Identify potential threats through effective observation and assessment techniques. Cultivate a resilient mindset to enhance your adaptability in crisis situations. Execute prompt and effective responses to active shooter incidents. Master emergency first aid procedures for immediate casualty care. Strategically plan and implement evacuation procedures for maximum safety. Develop a proactive approach to prevention, bolstering overall preparedness. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals seeking personal safety and emergency response skills. Security personnel looking to enhance their threat identification capabilities. Community members interested in fostering a resilient mindset for crisis situations. Corporate employees aiming to strengthen workplace safety and security. Parents and educators concerned about the safety of their environments. Career path Security Consultant Emergency Response Coordinator Crisis Management Specialist Safety and Security Officer Community Safety Advocate Workplace Safety Coordinator Certificates Digital certificate Digital certificate - Included Will be downloadable when all lectures have been completed.
Key Features: CPD Certified Brainspotting: Trauma Treatment Course Free Certificate Developed by Specialist Lifetime Access Course Curriculum Module 01: Introduction to Brainspotting Module 02: The Brainspotting Process Module 03: Brainspotting Techniques Module 04: Integrating Brainspotting with Other Modalities Module 05: Applications of Brainspotting Module 06: Brainspotting in Diverse Populations Module 07: Ethical Considerations and Professional Development Learning Outcomes: Master the foundational principles of the Brainspotting approach with precision and insight. Demonstrate proficiency in applying the Brainspotting Process to trauma treatment scenarios. Explore and implement advanced Brainspotting Techniques for enhanced therapeutic outcomes. Navigate the seamless integration of Brainspotting with diverse therapeutic modalities. Apply Brainspotting across various populations with cultural competence and sensitivity. Cultivate ethical considerations and foster continuous professional growth in your practice. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Brainspotting: Trauma Treatment course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Brainspotting: Trauma Treatment. Moreover, this course is ideal for: Therapists seeking advanced trauma treatment techniques. Mental health professionals aiming to enhance their therapeutic repertoire. Counselors looking to deepen their understanding of trauma interventions. Psychologists dedicated to expanding their skills in trauma-focused therapies. Social workers committed to providing more effective trauma treatment. Requirements There are no requirements needed to enrol into this Brainspotting: Trauma Treatment course. We welcome individuals from all backgrounds and levels of experience to enrol into this Brainspotting: Trauma Treatment course. Career path After finishing this Brainspotting: Trauma Treatment course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Brainspotting: Trauma Treatment are: Clinical Psychologist - £38K to £62K/year. Psychotherapist - £30K to £50K/year. Trauma Counsellor - £28K to £45K/year. Psychiatric Nurse - £25K to £42K/year. Social Worker - £25K to £40K/year. Certificates Digital certificate Digital certificate - Included Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.
Duration 4 Days 24 CPD hours This course is intended for The audience for this course is data professionals managing data and databases who want to learn about administering the data platform technologies that are available on Microsoft Azure. This course is also valuable for data architects and application developers who need to understand what technologies are available for the data platform with Azure and how to work with those technologies through applications. This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases. Prerequisites In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses: AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - Prepare to maintain SQL databases on Azure Describe Microsoft Intelligent Data Platform roles Understand SQL Server in an Azure virtual machine Design Azure SQL Database for cloud-native applications Explore Azure SQL Database Managed Instance 2 - Deploy IaaS solutions with Azure SQL Explain IaaS options to deploy SQL Server in Azure Understand hybrid scenarios Explore performance and security Explain high availability and disaster recovery options 3 - Deploy PaaS solutions with Azure SQL Explain PaaS options for deploying SQL Server in Azure Explore single SQL database Deploy SQL database elastic pool Understand SQL database hyperscale Examine SQL managed instance Describe SQL Edge 4 - Evaluate strategies for migrating to Azure SQL Understand compatibility level Understand Azure preview features Describe Azure database migration options 5 - Migrate SQL workloads to Azure SQL databases Choose the right SQL Server Instance option in Azure Migrate SQL Server to Azure SQL Database offline Migrate SQL Server to Azure SQL Database online Load and move data to Azure SQL Database 6 - Migrate SQL workloads to Azure Managed Instances Evaluate migration scenarios to SQL Database Managed Instance Migrate to SQL Database Managed Instance Load and Move data to SQL Database Managed Instance 7 - Configure database authentication and authorization Describe Active Directory and Azure Active Directory Describe authentication and identities Describe Security Principals Describe database and object permissions Identify authentication and authorization failures 8 - Protect data in-transit and at rest Explore Transparent Data Encryption Configure server and database firewall rules Explain object encryption and secure enclaves Enable encrypted connections Describe SQL injection Understand Azure Key Vault 9 - Implement compliance controls for sensitive data Explore data classification Explore server and database audit Implement Dynamic Data Masking Implement Row Level security Understand Microsoft Defender for SQL Explore Azure SQL Database Ledger Implement Azure Purview 10 - Describe performance monitoring Describe performance monitoring tools Describe critical performance metrics Establish baseline metrics Explore extended events Describe Azure SQL Insights Explore Query Performance Insight 11 - Configure SQL Server resources for optimal performance Explain how to optimize Azure storage for SQL Server virtual machines Describe virtual machine resizing Optimize database storage Control SQL Server resources 12 - Configure databases for optimal performance Explore database maintenance checks Describe database scoped configuration options Describe automatic tuning Describe intelligent query processing 13 - Explore query performance optimization Understand query plans Explain estimated and actual query plans Describe dynamic management views and functions Explore Query Store Identify problematic query plans Describe blocking and locking 14 - Evaluate performance improvements Describe wait statistics Tune and maintain indexes Understand query hints 15 - Explore performance-based design Describe normalization Choose appropriate data types Design indexes 16 - Automate deployment of database resources Describe deployment models in Azure Automate deployment by using Azure Resource Manager templates and Bicep Automate deployment by using PowerShell Automate deployment by using Azure CLI 17 - Create and manage SQL Agent jobs Create a SQL Server maintenance plan Describe task status notifications 18 - Manage Azure PaaS tasks using automation Explore Elastic jobs Understand Azure Automation Build an automation runbook Automate database workflows by using Logic Apps Monitor automated tasks 19 - Describe high availability and disaster recovery strategies Describe recovery time objective and recovery point objective Explore high availability and disaster recovery options Describe Azure high availability and disaster recovery features for Azure Virtual Machines Describe high availability and disaster recovery options for PaaS deployments Explore an IaaS high availability and disaster recovery solution Describe hybrid solutions 20 - Explore IaaS and PaaS solutions for high availability and disaster recovery Describe failover clusters in Windows Server Configure Always-on availability groups Describe temporal tables in Azure SQL Database Describe active geo-replication for Azure SQL Database Explore auto-failover groups for Azure SQL Database and Azure SQL Managed Instance 21 - Back up and restore databases Back up and restore SQL Server running on Azure virtual machines Back up a SQL Server virtual machine Back up and restore a database using Azure SQL Database Additional course details: Nexus Humans DP-300T00: Administering Microsoft Azure SQL Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-300T00: Administering Microsoft Azure SQL Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is data professionals, data architects, and business intelligence professionals who want to learn about data engineering and building analytical solutions using data platform technologies that exist on Microsoft Azure. The secondary audience for this course includes data analysts and data scientists who work with analytical solutions built on Microsoft Azure. In this course, the student will learn how to implement and manage data engineering workloads on Microsoft Azure, using Azure services such as Azure Synapse Analytics, Azure Data Lake Storage Gen2, Azure Stream Analytics, Azure Databricks, and others. The course focuses on common data engineering tasks such as orchestrating data transfer and transformation pipelines, working with data files in a data lake, creating and loading relational data warehouses, capturing and aggregating streams of real-time data, and tracking data assets and lineage. Prerequisites Successful students start this course with knowledge of cloud computing and core data concepts and professional experience with data solutions. AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - Introduction to data engineering on Azure What is data engineering Important data engineering concepts Data engineering in Microsoft Azure 2 - Introduction to Azure Data Lake Storage Gen2 Understand Azure Data Lake Storage Gen2 Enable Azure Data Lake Storage Gen2 in Azure Storage Compare Azure Data Lake Store to Azure Blob storage Understand the stages for processing big data Use Azure Data Lake Storage Gen2 in data analytics workloads 3 - Introduction to Azure Synapse Analytics What is Azure Synapse Analytics How Azure Synapse Analytics works When to use Azure Synapse Analytics 4 - Use Azure Synapse serverless SQL pool to query files in a data lake Understand Azure Synapse serverless SQL pool capabilities and use cases Query files using a serverless SQL pool Create external database objects 5 - Use Azure Synapse serverless SQL pools to transform data in a data lake Transform data files with the CREATE EXTERNAL TABLE AS SELECT statement Encapsulate data transformations in a stored procedure Include a data transformation stored procedure in a pipeline 6 - Create a lake database in Azure Synapse Analytics Understand lake database concepts Explore database templates Create a lake database Use a lake database 7 - Analyze data with Apache Spark in Azure Synapse Analytics Get to know Apache Spark Use Spark in Azure Synapse Analytics Analyze data with Spark Visualize data with Spark 8 - Transform data with Spark in Azure Synapse Analytics Modify and save dataframes Partition data files Transform data with SQL 9 - Use Delta Lake in Azure Synapse Analytics Understand Delta Lake Create Delta Lake tables Create catalog tables Use Delta Lake with streaming data Use Delta Lake in a SQL pool 10 - Analyze data in a relational data warehouse Design a data warehouse schema Create data warehouse tables Load data warehouse tables Query a data warehouse 11 - Load data into a relational data warehouse Load staging tables Load dimension tables Load time dimension tables Load slowly changing dimensions Load fact tables Perform post load optimization 12 - Build a data pipeline in Azure Synapse Analytics Understand pipelines in Azure Synapse Analytics Create a pipeline in Azure Synapse Studio Define data flows Run a pipeline 13 - Use Spark Notebooks in an Azure Synapse Pipeline Understand Synapse Notebooks and Pipelines Use a Synapse notebook activity in a pipeline Use parameters in a notebook 14 - Plan hybrid transactional and analytical processing using Azure Synapse Analytics Understand hybrid transactional and analytical processing patterns Describe Azure Synapse Link 15 - Implement Azure Synapse Link with Azure Cosmos DB Enable Cosmos DB account to use Azure Synapse Link Create an analytical store enabled container Create a linked service for Cosmos DB Query Cosmos DB data with Spark Query Cosmos DB with Synapse SQL 16 - Implement Azure Synapse Link for SQL What is Azure Synapse Link for SQL? Configure Azure Synapse Link for Azure SQL Database Configure Azure Synapse Link for SQL Server 2022 17 - Get started with Azure Stream Analytics Understand data streams Understand event processing Understand window functions 18 - Ingest streaming data using Azure Stream Analytics and Azure Synapse Analytics Stream ingestion scenarios Configure inputs and outputs Define a query to select, filter, and aggregate data Run a job to ingest data 19 - Visualize real-time data with Azure Stream Analytics and Power BI Use a Power BI output in Azure Stream Analytics Create a query for real-time visualization Create real-time data visualizations in Power BI 20 - Introduction to Microsoft Purview What is Microsoft Purview? How Microsoft Purview works When to use Microsoft Purview 21 - Integrate Microsoft Purview and Azure Synapse Analytics Catalog Azure Synapse Analytics data assets in Microsoft Purview Connect Microsoft Purview to an Azure Synapse Analytics workspace Search a Purview catalog in Synapse Studio Track data lineage in pipelines 22 - Explore Azure Databricks Get started with Azure Databricks Identify Azure Databricks workloads Understand key concepts 23 - Use Apache Spark in Azure Databricks Get to know Spark Create a Spark cluster Use Spark in notebooks Use Spark to work with data files Visualize data 24 - Run Azure Databricks Notebooks with Azure Data Factory Understand Azure Databricks notebooks and pipelines Create a linked service for Azure Databricks Use a Notebook activity in a pipeline Use parameters in a notebook Additional course details: Nexus Humans DP-203T00 Data Engineering on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-203T00 Data Engineering on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Description: This diploma in Body Language and Self-Esteem is an exclusive course that will show you how to read people's emotions and opinions before they even say a word, and to build your emotional intelligence. You will also learn how to judge your own body language, discover your appearance and learn to improve your body language to project a confident, interesting you. A dull posture can demonstrate a lack of confidence or boredom. Negative body language is either a conscious or an unconscious expression of negative feelings through movements of the body. Being skilled at noticing body language can assist one with personal or professional relationships and knowing when another is dissatisfied or unhappy. Who is the course for? Professionals who need to learn how to interpret body gestures and movements effectively People who are interested in learning more about the body language and how to utilize it Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Introduction to Body Language What Is Body Language 00:15:00 How to Read Body Language 00:30:00 How to Read People's Minds 00:30:00 How To Understand Eyes Contact 00:15:00 The Role of Head and Face in Body Language 00:30:00 The Role of Neck, Chest and Back in Body Language 00:15:00 The Role of Hands and Arms in Body Language 00:30:00 The Role of Legs in Body Language 00:15:00 The Role of the Lips in Body Language 00:15:00 Tips to Improve Body Language 00:15:00 Wrapping Up 00:15:00 Body Language Secrets Introduction 00:15:00 Aggressive Body Language 00:15:00 Attentive Body Language 00:15:00 Closed Body Language 00:30:00 Deceptive Body Language 00:30:00 Defensive Body Language 00:15:00 Dominant Body Language 00:15:00 Emotional Body Language 00:30:00 Evaluating Body Language 00:15:00 Greeting Body Language 00:30:00 Open Body Language 00:15:00 Relaxed Body Language 00:15:00 Power Body Language 00:15:00 Ready Body Language 00:15:00 Romantic Body Language 00:15:00 Submissive Body Language 00:15:00 Conclusion 00:15:00 Mastering Your Body Language Introduction To Body Language 00:15:00 Understand The Positive And Negative Positions 00:15:00 Observe How People React To Certain Body Language 00:15:00 Set A Goal For The Image You Wish To Project 00:15:00 Practice Scenarios In The Mirror 00:15:00 Train Your Body To React Positively 00:30:00 Learn How To Take Down Someone's Wall with Positive Body Positions 00:30:00 Understand The Importance Of Symmetry 00:15:00 Understand The Importance Of Matching The Other Person 00:15:00 What You Can Get Into With The Incorrect Body Language 00:15:00 Communicating Effectively Module One - Getting Started 00:30:00 Module Two - Communicating with Body Language 01:00:00 Module Three - Reading Body Language 01:00:00 Module Four - Body Language Mistakes 00:30:00 Module Five - Gender Differences 00:30:00 Module Six - Nonverbal Communication 01:00:00 Module Seven - Facial Expressions 02:00:00 Module Eight - Body Language in Business 01:00:00 Module Nine - Lying and Body Language 01:00:00 Module Ten - Improve Your Body Language 01:00:00 Module Eleven - Matching Your Words to Your Movement 01:00:00 Module Twelve - Wrapping Up 00:30:00 Effective Communication: Body Language- Activities 00:00:00 Body Language and Sales Body Language 00:25:00 Give Me Some Space! 00:15:00 What's Your Face Saying? 00:30:00 What's Your Body Saying? 00:30:00 Mirroring and Leading 00:30:00 Monitoring Your Posture 00:15:00 Dressing Up 00:15:00 Shaking Hands 00:30:00 Self Esteem and Assertiveness Skills Course Module One - Getting Started 01:00:00 Module Two - What Does Self-Confidence Mean To You? 55 00:30:00 Module Three - Obstacles to Our Goals 01:00:00 Module Four - Communication Skills 01:00:00 Module Five - The Importance of Goal Setting 01:00:00 Module Six - Feeling the Part 01:00:00 Module Seven - Looking the Part 01:00:00 Module Eight - Sounding the Part 01:00:00 Module Nine - Powerful Presentations 00:30:00 Module Ten - Coping Techniques 01:00:00 Module Eleven - Dealing with Difficult Behavior 00:30:00 Module Twelve - Wrapping Up 00:15:00 Mock Exam Mock Exam - Diploma in Body Language and Self-Esteem 00:20:00 Final Exam Final Exam - Diploma in Body Language and Self-Esteem 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.