• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

897 Microsoft 365 courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

AZ-040T00 Automating Administration with Powershell

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: * -Experience with Windows networking technologies and implementation. * - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - REVIEW WINDOWS POWERSHELL * Learn about Windows PowerShell * Get familiar with Windows PowerShell applications * Identify factors to install and use Windows PowerShell * Configure the Windows PowerShell console * Configure the Windows PowerShell Integrated Scripting Environment (ISE) * Use Visual Studio Code with PowerShell 2 - UNDERSTAND THE COMMAND SYNTAX IN WINDOWS POWERSHELL * Discover the structure of PowerShell cmdlets * Discover the parameters for using PowerShell cmdlets * Review the tab completion feature in PowerShell * Display the About files content in PowerShell 3 - FIND COMMANDS AND GET-HELP IN WINDOWS POWERSHELL * Define modules in PowerShell * Find cmdlets in PowerShell * Use command aliases in PowerShell * Use Show-Command and Get-Help in PowerShell * Interpret the help file contents and update the local help content in PowerShell 4 - MANAGE ACTIVE DIRECTORY DOMAIN SERVICES USING POWERSHELL CMDLETS * Manage user accounts in PowerShell * Manage groups and group memberships in PowerShell * Manage computer accounts in PowerShell * Manage organizational units and Active Directory objects in PowerShell 5 - MANAGE NETWORK SERVICE SETTINGS FOR WINDOWS DEVICES USING POWERSHELL CMDLETS * Manage IP addresses in PowerShell * Manage IP routing in PowerShell * Manage DNS clients in PowerShell * Manage Windows Firewall settings in PowerShell 6 - MANAGE WINDOWS SERVER SETTINGS USING POWERSHELL CMDLETS * Automate management tasks using the Group Policy management cmdlets * Manage server roles and services using PowerShell cmdlets * Manage Hyper-V Virtual Machines using PowerShell cmdlets * Manage Internet Information Services using PowerShell cmdlets 7 - MANAGE SETTINGS FOR A LOCAL WINDOWS MACHINE USING POWERSHELL CMDLETS * Manage Windows 10 using PowerShell * Manage permissions with PowerShell 8 - UNDERSTAND THE WINDOWS POWERSHELL PIPELINE * Review Windows PowerShell pipeline and its output * Discover object members in PowerShell * Control the formatting of pipeline output 9 - SELECT, SORT, AND MEASURE OBJECTS USING THE PIPELINE * Sort and group objects by property in the pipeline * Measure objects in the pipeline * Select a set of objects in the pipeline * Select object properties in the pipeline * Create and format calculated properties in the pipeline 10 - FILTER OBJECTS OUT OF THE PIPELINE * Learn about the comparison operators in PowerShell * Review basic filter syntax in the pipeline * Review advanced filter syntax in the pipeline * Optimize the filter performance in the pipeline 11 - ENUMERATE OBJECTS IN THE PIPELINE * Learn about enumerations in the pipeline * Review basic syntax to enumerate objects in the pipeline * Review advanced syntax to enumerate objects in the pipeline 12 - SEND AND PASS DATA AS OUTPUT FROM THE PIPELINE * Write pipeline data to a file * Convert pipeline objects to other forms of data representation in PowerShell * Control additional output options in PowerShell 13 - PASS PIPELINE OBJECTS * Pipeline parameter binding * Identify ByValue parameters * Pass data by using ByValue * Pass data by using ByPropertyName * Identify ByPropertyName parameters * Use manual parameters to override the pipeline * Use parenthetical commands * Expand property values 14 - CONNECT WITH DATA STORES USING POWERSHELL PROVIDERS * Define Windows PowerShell providers * Review the built-in providers in PowerShell * Access provider help in PowerShell 15 - USE POWERSHELL DRIVES IN POWERSHELL * Explain PowerShell drives in PowerShell * Use PowerShell drive cmdlets in PowerShell * Manage the file system in PowerShell * Manage the registry in PowerShell * Work with certificates in PowerShell * Work with other PowerShell drives in PowerShell 16 - REVIEW CIM AND WMI * Review architecture of CIM and WMI * Review repositories in CIM and WMI * Locate online class documentation by using CIM and WMI cmdlets 17 - QUERY CONFIGURATION INFORMATION BY USING CIM AND WMI * List local repository namespaces and classes by using CIM and WMI * Query instances by using commands and WMI Query Language * Connect to remote computers by using CIM and WMI cmdlets * Query repository classes from remote computers by using CIMSession objects 18 - QUERY AND MANIPULATE REPOSITORY OBJECTS BY USING CIM AND WMI METHODS * Discover methods of repository objects by using CIM and WMI * Locate class methods and documentation by using CIM and WMI * Invoke methods of repository objects by using CIM and WMI 19 - MANAGE VARIABLES IN WINDOWS POWERSHELL SCRIPTS * Define variables in Windows PowerShell scripts * Create variable names in Windows PowerShell scripts * Assign values and types to variables in Windows PowerShell scripts * Identify the methods and properties of variables in Windows PowerShell scripts * Use string variables and methods in Windows PowerShell scripts * Use date variables and methods in Windows PowerShell scripts 20 - WORK WITH ARRAYS AND HASH TABLES IN WINDOWS POWERSHELL SCRIPTS * Define an array in Windows PowerShell scripts * Work with array lists in Windows PowerShell scripts * Define hash tables in Windows PowerShell Scripts * Work with hash tables in Windows PowerShell scripts 21 - CREATE AND RUN SCRIPTS BY USING WINDOWS POWERSHELL * Review Windows PowerShell scripts * Modify scripts in the PowerShell Gallery * Create scripts using Windows PowerShell * Review the PowerShellGet module in Windows PowerShell * Run scripts and set the execution policy in Windows PowerShell * Review Windows PowerShell and AppLocker * Sign the scripts digitally in Windows PowerShell 22 - WORK WITH SCRIPTING CONSTRUCTS IN WINDOWS POWERSHELL * Review and use the ForEach loop in Windows PowerShell scripts * Review and use the If construct in Windows PowerShell scripts * Review and use the Switch construct in Windows PowerShell scripts * Review the For construct in Windows PowerShell scripts * Review other loop constructs in Windows PowerShell scripts * Review Break and Continue in Windows PowerShell scripts 23 - IMPORT DATA IN DIFFERENT FORMATS FOR USE IN SCRIPTS BY USING WINDOWS POWERSHELL CMDLETS * Use the Get-Content command in Windows PowerShell scripts * Use the Import-Csv cmdlet in Windows PowerShell scripts * Use the Import-Clixml cmdlet in Windows PowerShell scripts * Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - USE METHODS TO ACCEPT USER INPUTS IN WINDOWS POWERSHELL SCRIPTS * Identify values that might change in Windows PowerShell scripts * Use the Read-Host cmdlet in Windows PowerShell scripts * Use the Get-Credential cmdlet in Windows PowerShell scripts * Use the Out-GridView cmdlet in Windows PowerShell scripts * Pass parameters to a Windows PowerShell script 25 - TROUBLESHOOT SCRIPTS AND HANDLE ERRORS IN WINDOWS POWERSHELL * Interpret error messages generated for Windows PowerShell commands * Add output to Windows PowerShell scripts * Use breakpoints in Windows PowerShell scripts * Interpret error actions for Windows PowerShell commands 26 - USE FUNCTIONS AND MODULES IN WINDOWS POWERSHELL SCRIPTS * Review functions in Windows PowerShell scripts * Use variable scope in Windows PowerShell scripts * Create modules in Windows PowerShell scripts * Use the dot sourcing feature in Windows PowerShell 27 - MANAGE SINGLE AND MULTIPLE COMPUTERS BY USING WINDOWS POWERSHELL REMOTING * Review the remoting feature of Windows PowerShell * Compare remoting with remote connectivity * Review the remoting security feature of Windows PowerShell * Enable remoting by using Windows PowerShell * Use one-to-one remoting by using Windows PowerShell * Use one-to-many remoting by using Windows PowerShell * Compare remoting output with local output 28 - USE ADVANCED WINDOWS POWERSHELL REMOTING TECHNIQUES * Review common remoting techniques of Windows PowerShell * Send parameters to remote computers in Windows PowerShell * Set access protection to variables, aliases, and functions by using the scope modifier * Enable multi-hop remoting in Windows PowerShell 29 - MANAGE PERSISTENT CONNECTIONS TO REMOTE COMPUTERS BY USING WINDOWS POWERSHELL SESSIONS * Review persistent connections in Windows PowerShell * Create and manage persistent PSSessions by using Windows PowerShell * Disconnect PSSessions by using Windows PowerShell * Review the feature of implicit remoting in Windows PowerShell 30 - REVIEW AZURE POWERSHELL MODULE * Review Azure PowerShell * Review the benefits of the Azure PowerShell module * Install the Azure PowerShell module * Migrate Azure PowerShell from AzureRM to Azure * Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - REVIEW THE FEATURES AND TOOLS FOR AZURE CLOUD SHELL * Review the characteristics of Azure Cloud Shell * Review the features and tools of Azure Cloud Shell * Configure and experiment with Azure Cloud Shell 32 - MANAGE AZURE RESOURCES WITH WINDOWS POWERSHELL * Create a new Azure virtual machine by using Windows PowerShell commands * Manage Azure virtual machines by using Windows PowerShell commands * Manage Azure related storage by using Azure PowerShell * Manage Azure subscriptions by using Azure PowerShell 33 - MANAGE USERS, GROUPS, AND LICENSES IN MICROSOFT ENTRA ID BY USING WINDOWS POWERSHELL * Review benefits to manage Microsoft 365 services by using Windows PowerShell * Connect to the Microsoft 365 tenant by using Windows PowerShell * Manage users in Microsoft 365 by using Windows PowerShell * Manage groups in Microsoft 365 by using Windows PowerShell * Manage roles in Microsoft 365 by using Windows PowerShell * Manage licenses in Microsoft 365 by using Windows PowerShell 34 - MANAGE EXCHANGE ONLINE BY USING WINDOWS POWERSHELL * Connect to Exchange Online by using Windows PowerShell * Manage mailboxes in Exchange Online by using Windows PowerShell * Manage resources in Exchange Online by using Windows PowerShell * Manage admin roles in Exchange Online by using Windows PowerShell 35 - MANAGE SHAREPOINT ONLINE BY USING WINDOWS POWERSHELL * Install and connect to SharePoint Online Management Shell by using Windows PowerShell * Manage SharePoint Online users and groups by using Windows PowerShell * Manage SharePoint sites by using Windows PowerShell * Manage SharePoint Online external user sharing by using Windows PowerShell 36 - MANAGE MICROSOFT TEAMS BY USING WINDOWS POWERSHELL * Review Microsoft Teams PowerShell module * Install the Microsoft Teams PowerShell module * Manage teams with Microsoft Teams PowerShell module 37 - CREATE AND MANAGE BACKGROUND JOBS USING WINDOWS POWERSHELL * Define the types of background jobs in Windows PowerShell * Start remote jobs and CIM/WMI jobs in Windows PowerShell * Monitor jobs in Windows PowerShell * Retrieve results for running jobs in Windows PowerShell 38 - CREATE AND MANAGE SCHEDULED JOBS USING WINDOWS POWERSHELL * Create and run Windows PowerShell scripts as scheduled tasks * Define scheduled jobs in Windows PowerShell * Create job option and job trigger objects in Windows PowerShell * Create and register a scheduled job in Windows PowerShell * Retrieve the results from a scheduled job in Windows PowerShell

AZ-040T00 Automating Administration with Powershell
Delivered Online6 days, Jun 3rd, 13:00 + 9 more
£2975

55348 Administering Microsoft Endpoint Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site 2 - ANALYZING DATA USING QUERIES, REPORTS, AND CMPIVOT * Introduction to queries * Configuring SQL Server Reporting Services * Analyzing the real-time state of a device by using CMPivot 3 - PREPARING THE CONFIGURATION MANAGER MANAGEMENT INFRASTRUCTURE * Configuring site boundaries and boundary groups * Configuring resource discovery * Organizing resources using device and user collections 4 - DEPLOYING AND MANAGING THE CONFIGURATION MANAGER CLIENT * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings and performing management operations 5 - MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence 6 - DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points 7 - DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying and managing Windows apps 8 - MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Enabling third-party updates 9 - IMPLEMENTING DEFENDER PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Configuring and deploying advanced threat policies 10 - MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance settings * Viewing compliance results * Managing resource and data access 11 - MANAGING OPERATING SYSTEM DEPLOYMENT * An overview of operating system deployment * Preparing a site for operating system deployment * Deploying an operating system * Managing Windows as a service 12 - MANAGING AND MAINTAINING A CONFIGURATION MANAGER SITE * Configuring role-based administration * Configuring Remote Tools * Overview of Configuration Manager site maintenance and Management Insights * Backing up and recovering a Configuration Manager site * Updating the Configuration Manager infrastructure 13 - WHAT?S NEW IN MICROSOFT ENDPOINT CONFIGURATION MANAGER * Whats new in Microsoft Endpoint Manager covering each semi annual release ADDITIONAL COURSE DETAILS: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55348 Administering Microsoft Endpoint Configuration Manager
Delivered Online6 days, Jun 3rd, 13:00 + 5 more
£2975

55399 Implementing and Managing Microsoft Intune

By Nexus Human

Duration 3 Days 18 CPD hours This three-day instructor-led course is aimed at modern device management professionals looking to manage their enterprise devices using Microsoft Intune. This course will cover Enrolment, Application Management, Endpoint Security and Windows Autopilot as well as Azure Active Directory Conditional Access and Identity Protection. The delegates will learn how to enroll devices, deploy applications and manage them to maximize user productivity and device security. 1: INTRODUCTION TO MICROSOFT INTUNE * Mobile Device Management * Microsoft Intune * Azure Active Directory * AAD Identity Protection * AAD Conditional Access 2: MICROSOFT INTUNE DEVICE MANAGEMENT * Enrolling Devices * Device Compliance * Device Profiles * Device Updates 3: MICROSOFT INTUNE APPLICATION MANAGEMENT * Application Management * Deploying Applications * Application Configuration * Managing Applications * Policy Sets and Guided Scenarios 4: MICROSOFT INTUNE ENDPOINT SECURITY * Security Baselines and tasks * Antivirus * Disk Encryption * Firewall * Atack Surface reduction * Endpoint detection and response * Account Protection 5: DEPLOYING WINDOWS WITH WINDOWS AUTOPILOT * Windows Autopilot overview * Preparing for Windows Autopilot deployment * Deploying Windows 11 using Windows Autopilot 6: MICROSOFT INTUNE ADDITIONAL AND PREMIUM FEATURES * Remote Help * Tunnel for Mobile Application Management * Endpoint Privilege Management * Advanced Endpoint Analytics ADDITIONAL COURSE DETAILS: Nexus Humans 55399 Implementing and Managing Microsoft Intune training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55399 Implementing and Managing Microsoft Intune course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55399 Implementing and Managing Microsoft Intune
Delivered Online4 days, Jun 3rd, 13:00 + 9 more
£1785

AZ-400T00 Designing and Implementing Microsoft DevOps Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: * Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. * Both Azure administration and Azure development with proven expertise in at least one of these areas. * Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. * AZ-104T00 - Microsoft Azure Administrator * AZ-204T00: Developing Solutions for Microsoft Azure 1 - INTRODUCTION TO DEVOPS * What is DevOps? * Explore the DevOps journey * Identify transformation teams * Explore shared goals and define timelines 2 - CHOOSE THE RIGHT PROJECT * Explore greenfield and brownfield projects * Decide when to use greenfield and brownfield projects * Decide when to use systems of record versus systems of engagement * Identify groups to minimize initial resistance * Identify project metrics and key performance indicators (KPIs) 3 - DESCRIBE TEAM STRUCTURES * Explore agile development practices * Explore principles of agile development * Define organization structure for agile practices * Explore ideal DevOps team members * Enable in-team and cross-team collaboration * Select tools and processes for agile practices 4 - CHOOSE THE DEVOPS TOOLS * What is Azure DevOps? * What is GitHub? * Explore an authorization and access strategy * Migrate or integrate existing work management tools * Migrate or integrate existing test management tools * Design a license management strategy 5 - PLAN AGILE WITH GITHUB PROJECTS AND AZURE BOARDS * Link GitHub to Azure Boards * Configure GitHub Projects * Manage work with GitHub Project boards * Customize Project views * Collaborate using team discussions * Agile Plan and Portfolio Management with Azure Boards 6 - INTRODUCTION TO SOURCE CONTROL * Explore DevOps foundational practices * What is source control? * Explore benefits of source control * Explore best practices for source control 7 - DESCRIBE TYPES OF SOURCE CONTROL SYSTEMS * Understand centralized source control * Understand distributed source control * Explore Git and Team Foundation Version Control * Examine and choose Git * Understand objections to using Git * Describe working with Git locally 8 - WORK WITH AZURE REPOS AND GITHUB * Migrate from TFVC to Git * Use GIT-TFS * Develop online with GitHub Codespaces 9 - STRUCTURE YOUR GIT REPO * Explore monorepo versus multiple repos * Implement a change log 10 - MANAGE GIT BRANCHES AND WORKFLOWS * Explore branch workflow types * Explore feature branch workflow * Explore Git branch model for continuous delivery * Explore GitHub flow * Explore fork workflow * Version Control with Git in Azure Repos 11 - COLLABORATE WITH PULL REQUESTS IN AZURE REPOS * Collaborate with pull requests * Examine GitHub mobile for pull request approvals 12 - IDENTIFY TECHNICAL DEBT * Examine code quality * Examine complexity and quality metrics * Measure and manage technical debt * Integrate other code quality tools * Plan effective code reviews 13 - EXPLORE GIT HOOKS * Implement Git hooks 14 - PLAN FOSTER INNER SOURCE * Explore foster inner source * Implement the fork workflow * Describe inner source with forks 15 - MANAGE GIT REPOSITORIES * Work with large repositories * Purge repository data * Manage releases with GitHub Repos * Automate release notes with GitHub 16 - EXPLORE AZURE PIPELINES * Explore the concept of pipelines in DevOps * Describe Azure Pipelines * Understand Azure Pipelines key terms 17 - MANAGE AZURE PIPELINE AGENTS AND POOLS * Choose between Microsoft-hosted versus self-hosted agents * Explore job types * Explore predefined agent pool * Understand typical situations for agent pools * Communicate with Azure Pipelines * Communicate to deploy to target servers * Examine other considerations * Describe security of agent pools * Configure agent pools and understanding pipeline styles 18 - DESCRIBE PIPELINES AND CONCURRENCY * Understand parallel jobs * Estimate parallel jobs * Describe Azure Pipelines and open-source projects * Explore Azure Pipelines and Visual Designer * Describe Azure Pipelines and YAML 19 - EXPLORE CONTINUOUS INTEGRATION * Learn the four pillars of continuous integration * Explore benefits of continuous integration * Describe build properties * Enable Continuous Integration with Azure Pipelines 20 - IMPLEMENT A PIPELINE STRATEGY * Configure agent demands * Implement multi-agent builds * Explore source control types supported by Azure Pipelines 21 - INTEGRATE WITH AZURE PIPELINES * Describe the anatomy of a pipeline * Understand the pipeline structure * Detail templates * Explore YAML resources * Use multiple repositories in your pipeline 22 - INTRODUCTION TO GITHUB ACTIONS * What are Actions? * Explore Actions flow * Understand workflows * Describe standard workflow syntax elements * Explore events * Explore jobs * Explore runners * Examine release and test an action 23 - LEARN CONTINUOUS INTEGRATION WITH GITHUB ACTIONS * Describe continuous integration with actions * Examine environment variables * Share artifacts between jobs * Examine Workflow badges * Describe best practices for creating actions * Mark releases with Git tags * Create encrypted secrets * Use secrets in a workflow * Implement GitHub Actions for CI/CD 24 - DESIGN A CONTAINER BUILD STRATEGY * Examine structure of containers * Work with Docker containers * Understand Dockerfile core concepts * Examine multi-stage dockerfiles * Examine considerations for multiple stage builds * Explore Azure container-related services * Deploy Docker containers to Azure App Service web apps 25 - INTRODUCTION TO CONTINUOUS DELIVERY * Explore traditional IT development cycle * What is continuous delivery? * Move to continuous delivery * Understand releases and deployments * Understand release process versus release 26 - CREATE A RELEASE PIPELINE * Describe Azure DevOps release pipeline capabilities * Explore release pipelines * Explore artifact sources * Choose the appropriate artifact source * Examine considerations for deployment to stages * Explore build and release tasks * Explore custom build and release tasks * Explore release jobs * Configure Pipelines as Code with YAML 27 - EXPLORE RELEASE RECOMMENDATIONS * Understand the delivery cadence and three types of triggers * Explore release approvals * Explore release gates * Use release gates to protect quality * Control Deployments using Release Gates 28 - PROVISION AND TEST ENVIRONMENTS * Provision and configure target environments * Configure automated integration and functional test automation * Understand Shift-left * Set up and run availability tests * Explore Azure Load Testing * Set up and run functional tests 29 - MANAGE AND MODULARIZE TASKS AND TEMPLATES * Examine task groups * Explore variables in release pipelines * Understand variable groups 30 - AUTOMATE INSPECTION OF HEALTH * Automate inspection of health * Explore events and notifications * Explore service hooks * Configure Azure DevOps notifications * Configure GitHub notifications * Explore how to measure quality of your release process * Examine release notes and documentation * Examine considerations for choosing release management tools * Explore common release management tools 31 - INTRODUCTION TO DEPLOYMENT PATTERNS * Explore microservices architecture * Examine classical deployment patterns * Understand modern deployment patterns 32 - IMPLEMENT BLUE-GREEN DEPLOYMENT AND FEATURE TOGGLES * What is blue-green deployment? * Explore deployment slots * Describe feature toggle maintenance 33 - IMPLEMENT CANARY RELEASES AND DARK LAUNCHING * Explore canary releases * Examine Traffic Manager * Understand dark launching 34 - IMPLEMENT A/B TESTING AND PROGRESSIVE EXPOSURE DEPLOYMENT * What is A/B testing? * Explore CI-CD with deployment rings 35 - INTEGRATE WITH IDENTITY MANAGEMENT SYSTEMS * Integrate GitHub with single sign-on (SSO) * Explore service principals * Explore Managed Identity 36 - MANAGE APPLICATION CONFIGURATION DATA * Rethink application configuration data * Explore separation of concerns * Understand external configuration store patterns * Examine Key-value pairs * Examine App configuration feature management * Integrate Azure Key Vault with Azure Pipelines * Manage secrets, tokens and certificates * Examine DevOps inner and outer loop * Integrate Azure Key Vault with Azure DevOps * Enable Dynamic Configuration and Feature Flags 37 - EXPLORE INFRASTRUCTURE AS CODE AND CONFIGURATION MANAGEMENT * Explore environment deployment * Examine environment configuration * Understand imperative versus declarative configuration * Understand idempotent configuration 38 - CREATE AZURE RESOURCES USING AZURE RESOURCE MANAGER TEMPLATES * Why use Azure Resource Manager templates? * Explore template components * Manage dependencies * Modularize templates * Manage secrets in templates * Deployments using Azure Bicep templates 39 - CREATE AZURE RESOURCES BY USING AZURE CLI * What is Azure CLI? * Work with Azure CLI 40 - EXPLORE AZURE AUTOMATION WITH DEVOPS * Create automation accounts * What is a runbook? * Understand automation shared resources * Explore runbook gallery * Examine webhooks * Explore source control integration * Explore PowerShell workflows * Create a workflow * Examine checkpoint and parallel processing 41 - IMPLEMENT DESIRED STATE CONFIGURATION (DSC) * Understand configuration drift * Explore Desired State Configuration (DSC) * Explore Azure Automation State configuration (DSC) * Examine DSC configuration file * Explore hybrid management * Implement DSC and Linux Automation on Azure 42 - IMPLEMENT BICEP * What is Bicep? * Install Bicep * Understand Bicep file structure and syntax 43 - INTRODUCTION TO SECURE DEVOPS * Describe SQL injection attack * Understand DevSecOps * Explore Secure DevOps Pipeline * Explore key validation points * Explore continuous security validation * Understand threat modeling 44 - IMPLEMENT OPEN-SOURCE SOFTWARE * Explore how software is built * What is open-source software * Explore corporate concerns with open-source software components * Explore common open-source licenses * Examine license implications and ratings 45 - SOFTWARE COMPOSITION ANALYSIS * Inspect and validate code bases for compliance * Explore software composition analysis (SCA) * Integrate Mend with Azure Pipelines * Implement GitHub Dependabot alerts and security updates * Integrate software composition analysis checks into pipelines * Examine tools for assess package security and license rate * Interpret alerts from scanner tools * Implement security and compliance in an Azure Pipeline 46 - STATIC ANALYZERS * Explore SonarCloud * Explore CodeQL in GitHub * Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP AND DYNAMIC ANALYZERS * Plan Implement OWASP Secure Coding Practices * Explore OWASP ZAP penetration test * Explore OWASP ZAP results and bugs 48 - SECURITY MONITORING AND GOVERNANCE * Implement pipeline security * Explore Microsoft Defender for Cloud * Examine Microsoft Defender for Cloud usage scenarios * Explore Azure Policy * Understand policies * Explore initiatives * Explore resource locks * Explore Azure Blueprints * Understand Microsoft Defender for Identity 49 - EXPLORE PACKAGE DEPENDENCIES * What is dependency management? * Describe elements of a dependency management strategy * Identify dependencies * Understand source and package componentization * Decompose your system * Scan your codebase for dependencies 50 - UNDERSTAND PACKAGE MANAGEMENT * Explore packages * Understand package feeds * Explore package feed managers * Explore common public package sources * Explore self-hosted and SaaS based package sources * Consume packages * Publish packages * Package management with Azure Artifacts 51 - MIGRATE CONSOLIDATING AND SECURE ARTIFACTS * Identify existing artifact repositories * Migrate and integrating artifact repositories * Secure access to package feeds * Examine roles * Examine permissions * Examine authentication 52 - IMPLEMENT A VERSIONING STRATEGY * Understand versioning of artifacts * Explore semantic versioning * Examine release views * Promote packages * Explore best practices for versioning 53 - INTRODUCTION TO GITHUB PACKAGES * Publish packages * Install a package * Delete and restore a package * Explore package access control and visibility 54 - IMPLEMENT TOOLS TO TRACK USAGE AND FLOW * Understand the inner loop * Explore Azure Monitor and Log Analytics * Examine Kusto Query Language (KQL) * Explore Application Insights * Implement Application Insights * Monitor application performance with Application Insights 55 - DEVELOP MONITOR AND STATUS DASHBOARDS * Explore Azure Dashboards * Examine view designer in Azure Monitor * Explore Azure Monitor workbooks * Explore Power BI * Build your own custom application 56 - SHARE KNOWLEDGE WITHIN TEAMS * Share acquired knowledge within development teams * Integrate with Azure Boards * Share team knowledge using Azure Project Wiki 57 - DESIGN PROCESSES TO AUTOMATE APPLICATION ANALYTICS * Explore rapid responses and augmented search * Integrate telemetry * Examine monitoring tools and technologies 58 - MANAGE ALERTS, BLAMELESS RETROSPECTIVES AND A JUST CULTURE * Examine when get a notification * Explore how to fix it * Explore smart detection notifications * Improve performance * Understand server response time degradation * Reduce meaningless and non-actionable alerts * Examine blameless retrospective * Develop a just culture

AZ-400T00 Designing and Implementing Microsoft DevOps Solutions
Delivered Online5 days, Jun 3rd, 13:00 + 2 more
£2975

PL-300T00 Microsoft Power BI Data Analyst

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The audience for this course are data professionals and business intelligence professionals who want to learn how to accurately perform data analysis using Power BI. This course is also targeted toward those individuals who develop reports that visualize data from the data platform technologies that exist on both in the cloud and on-premises. This course covers the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will show how to access and process data from a range of data sources including both relational and non-relational sources. Finally, this course will also discuss how to manage and deploy reports and dashboards for sharing and content distribution. Prerequisites Understanding core data concepts. Knowledge of working with relational data in the cloud. Knowledge of working with non-relational data in the cloud. Knowledge of data analysis and visualization concepts. DP-900T00 Microsoft Azure Data Fundamentals is recommended 1 - DISCOVER DATA ANALYSIS * Overview of data analysis * Roles in data * Tasks of a data analyst 2 - GET STARTED BUILDING WITH POWER BI * Use Power BI * Building blocks of Power BI * Tour and use the Power BI service 3 - GET DATA IN POWER BI * Get data from files * Get data from relational data sources * Create dynamic reports with parameters * Get data from a NoSQL database * Get data from online services * Select a storage mode * Get data from Azure Analysis Services * Fix performance issues * Resolve data import errors 4 - CLEAN, TRANSFORM, AND LOAD DATA IN POWER BI * Shape the initial data * Simplify the data structure * Evaluate and change column data types * Combine multiple tables into a single table * Profile data in Power BI * Use Advanced Editor to modify M code 5 - DESIGN A SEMANTIC MODEL IN POWER BI * Work with tables * Create a date table * Work with dimensions * Define data granularity * Work with relationships and cardinality * Resolve modeling challenges 6 - ADD MEASURES TO POWER BI DESKTOP MODELS * Create simple measures * Create compound measures * Create quick measures * Compare calculated columns with measures 7 - ADD CALCULATED TABLES AND COLUMNS TO POWER BI DESKTOP MODELS * Create calculated columns * Learn about row context * Choose a technique to add a column 8 - USE DAX TIME INTELLIGENCE FUNCTIONS IN POWER BI DESKTOP MODELS * Use DAX time intelligence functions * Additional time intelligence calculations 9 - OPTIMIZE A MODEL FOR PERFORMANCE IN POWER BI * Review performance of measures, relationships, and visuals * Use variables to improve performance and troubleshooting * Reduce cardinality * Optimize DirectQuery models with table level storage * Create and manage aggregations 10 - DESIGN POWER BI REPORTS * Design the analytical report layout * Design visually appealing reports * Report objects * Select report visuals * Select report visuals to suit the report layout * Format and configure visualizations * Work with key performance indicators 11 - CONFIGURE POWER BI REPORT FILTERS * Apply filters to the report structure * Apply filters with slicers * Design reports with advanced filtering techniques * Consumption-time filtering * Select report filter techniques * Case study - Configure report filters based on feedback 12 - ENHANCE POWER BI REPORT DESIGNS FOR THE USER EXPERIENCE * Design reports to show details * Design reports to highlight values * Design reports that behave like apps * Work with bookmarks * Design reports for navigation * Work with visual headers * Design reports with built-in assistance * Tune report performance * Optimize reports for mobile use 13 - PERFORM ANALYTICS IN POWER BI * Explore statistical summary * Identify outliers with Power BI visuals * Group and bin data for analysis * Apply clustering techniques * Conduct time series analysis * Use the Analyze feature * Create what-if parameters * Use specialized visuals 14 - CREATE AND MANAGE WORKSPACES IN POWER BI * Distribute a report or dashboard * Monitor usage and performance * Recommend a development life cycle strategy * Troubleshoot data by viewing its lineage * Configure data protection 15 - MANAGE SEMANTIC MODELS IN POWER BI * Use a Power BI gateway to connect to on-premises data sources * Configure a semantic model scheduled refresh * Configure incremental refresh settings * Manage and promote semantic models * Troubleshoot service connectivity * Boost performance with query caching (Premium) 16 - CREATE DASHBOARDS IN POWER BI * Configure data alerts * Explore data by asking questions * Review Quick insights * Add a dashboard theme * Pin a live report page to a dashboard * Configure a real-time dashboard * Set mobile view 17 - IMPLEMENT ROW-LEVEL SECURITY * Configure row-level security with the static method * Configure row-level security with the dynamic method ADDITIONAL COURSE DETAILS: Nexus Humans PL-300T00: Microsoft Power BI Data Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-300T00: Microsoft Power BI Data Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-300T00 Microsoft Power BI Data Analyst
Delivered Online4 days, Jun 3rd, 13:00 + 17 more
£1785

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - INTRODUCTION TO MICROSOFT 365 THREAT PROTECTION * Explore Extended Detection & Response (XDR) response use cases * Understand Microsoft Defender XDR in a Security Operations Center (SOC) * Explore Microsoft Security Graph * Investigate security incidents in Microsoft Defender XDR 2 - MITIGATE INCIDENTS USING MICROSOFT 365 DEFENDER * Use the Microsoft Defender portal * Manage incidents * Investigate incidents * Manage and investigate alerts * Manage automated investigations * Use the action center * Explore advanced hunting * Investigate Microsoft Entra sign-in logs * Understand Microsoft Secure Score * Analyze threat analytics * Analyze reports * Configure the Microsoft Defender portal 3 - PROTECT YOUR IDENTITIES WITH MICROSOFT ENTRA ID PROTECTION * Microsoft Entra ID Protection overview * Detect risks with Microsoft Entra ID Protection policies * Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - REMEDIATE RISKS WITH MICROSOFT DEFENDER FOR OFFICE 365 * Automate, investigate, and remediate * Configure, protect, and detect * Simulate attacks 5 - SAFEGUARD YOUR ENVIRONMENT WITH MICROSOFT DEFENDER FOR IDENTITY * Configure Microsoft Defender for Identity sensors * Review compromised accounts or data * Integrate with other Microsoft tools 6 - SECURE YOUR CLOUD APPS AND SERVICES WITH MICROSOFT DEFENDER FOR CLOUD APPS * Understand the Defender for Cloud Apps Framework * Explore your cloud apps with Cloud Discovery * Protect your data and apps with Conditional Access App Control * Walk through discovery and access control with Microsoft Defender for Cloud Apps * Classify and protect sensitive information * Detect Threats 7 - RESPOND TO DATA LOSS PREVENTION ALERTS USING MICROSOFT 365 * Describe data loss prevention alerts * Investigate data loss prevention alerts in Microsoft Purview * Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - MANAGE INSIDER RISK IN MICROSOFT PURVIEW * Insider risk management overview * Create and manage insider risk policies * Investigate insider risk alerts * Take action on insider risk alerts through cases * Manage insider risk management forensic evidence * Create insider risk management notice templates 9 - INVESTIGATE THREATS BY USING AUDIT FEATURES IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW STANDARD * Explore Microsoft Purview Audit solutions * Implement Microsoft Purview Audit (Standard) * Start recording activity in the Unified Audit Log * Search the Unified Audit Log (UAL) * Export, configure, and view audit log records * Use audit log searching to investigate common support issues 10 - INVESTIGATE THREATS USING AUDIT IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW (PREMIUM) * Explore Microsoft Purview Audit (Premium) * Implement Microsoft Purview Audit (Premium) * Manage audit log retention policies * Investigate compromised email accounts using Purview Audit (Premium) 11 - INVESTIGATE THREATS WITH CONTENT SEARCH IN MICROSOFT PURVIEW * Explore Microsoft Purview eDiscovery solutions * Create a content search * View the search results and statistics * Export the search results and search report * Configure search permissions filtering * Search for and delete email messages 12 - PROTECT AGAINST THREATS WITH MICROSOFT DEFENDER FOR ENDPOINT * Practice security administration * Hunt threats within your network 13 - DEPLOY THE MICROSOFT DEFENDER FOR ENDPOINT ENVIRONMENT * Create your environment * Understand operating systems compatibility and features * Onboard devices * Manage access * Create and manage roles for role-based access control * Configure device groups * Configure environment advanced features 14 - IMPLEMENT WINDOWS SECURITY ENHANCEMENTS WITH MICROSOFT DEFENDER FOR ENDPOINT * Understand attack surface reduction * Enable attack surface reduction rules 15 - PERFORM DEVICE INVESTIGATIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Use the device inventory list * Investigate the device * Use behavioral blocking * Detect devices with device discovery 16 - PERFORM ACTIONS ON A DEVICE USING MICROSOFT DEFENDER FOR ENDPOINT * Explain device actions * Run Microsoft Defender antivirus scan on devices * Collect investigation package from devices * Initiate live response session 17 - PERFORM EVIDENCE AND ENTITIES INVESTIGATIONS USING MICROSOFT DEFENDER FOR ENDPOINT * Investigate a file * Investigate a user account * Investigate an IP address * Investigate a domain 18 - CONFIGURE AND MANAGE AUTOMATION USING MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Manage automation upload and folder settings * Configure automated investigation and remediation capabilities * Block at risk devices 19 - CONFIGURE FOR ALERTS AND DETECTIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Configure alert notifications * Manage alert suppression * Manage indicators 20 - UTILIZE VULNERABILITY MANAGEMENT IN MICROSOFT DEFENDER FOR ENDPOINT * Understand vulnerability management * Explore vulnerabilities on your devices * Manage remediation 21 - PLAN FOR CLOUD WORKLOAD PROTECTIONS USING MICROSOFT DEFENDER FOR CLOUD * Explain Microsoft Defender for Cloud * Describe Microsoft Defender for Cloud workload protections * Enable Microsoft Defender for Cloud 22 - CONNECT AZURE ASSETS TO MICROSOFT DEFENDER FOR CLOUD * Explore and manage your resources with asset inventory * Configure auto provisioning * Manual log analytics agent provisioning 23 - CONNECT NON-AZURE RESOURCES TO MICROSOFT DEFENDER FOR CLOUD * Protect non-Azure resources * Connect non-Azure machines * Connect your AWS accounts * Connect your GCP accounts 24 - MANAGE YOUR CLOUD SECURITY POSTURE MANAGEMENT? * Explore Secure Score * Explore Recommendations * Measure and enforce regulatory compliance * Understand Workbooks 25 - EXPLAIN CLOUD WORKLOAD PROTECTIONS IN MICROSOFT DEFENDER FOR CLOUD * Understand Microsoft Defender for servers * Understand Microsoft Defender for App Service * Understand Microsoft Defender for Storage * Understand Microsoft Defender for SQL * Understand Microsoft Defender for open-source databases * Understand Microsoft Defender for Key Vault * Understand Microsoft Defender for Resource Manager * Understand Microsoft Defender for DNS * Understand Microsoft Defender for Containers * Understand Microsoft Defender additional protections 26 - REMEDIATE SECURITY ALERTS USING MICROSOFT DEFENDER FOR CLOUD * Understand security alerts * Remediate alerts and automate responses * Suppress alerts from Defender for Cloud * Generate threat intelligence reports * Respond to alerts from Azure resources 27 - CONSTRUCT KQL STATEMENTS FOR MICROSOFT SENTINEL * Understand the Kusto Query Language statement structure * Use the search operator * Use the where operator * Use the let statement * Use the extend operator * Use the order by operator * Use the project operators 28 - ANALYZE QUERY RESULTS USING KQL * Use the summarize operator * Use the summarize operator to filter results * Use the summarize operator to prepare data * Use the render operator to create visualizations 29 - BUILD MULTI-TABLE STATEMENTS USING KQL * Use the union operator * Use the join operator 30 - WORK WITH DATA IN MICROSOFT SENTINEL USING KUSTO QUERY LANGUAGE * Extract data from unstructured string fields * Extract data from structured string data * Integrate external data * Create parsers with functions 31 - INTRODUCTION TO MICROSOFT SENTINEL * What is Microsoft Sentinel? * How Microsoft Sentinel works * When to use Microsoft Sentinel 32 - CREATE AND MANAGE MICROSOFT SENTINEL WORKSPACES * Plan for the Microsoft Sentinel workspace * Create a Microsoft Sentinel workspace * Manage workspaces across tenants using Azure Lighthouse * Understand Microsoft Sentinel permissions and roles * Manage Microsoft Sentinel settings * Configure logs 33 - QUERY LOGS IN MICROSOFT SENTINEL * Query logs in the logs page * Understand Microsoft Sentinel tables * Understand common tables * Understand Microsoft Defender XDR tables 34 - USE WATCHLISTS IN MICROSOFT SENTINEL * Plan for watchlists * Create a watchlist * Manage watchlists 35 - UTILIZE THREAT INTELLIGENCE IN MICROSOFT SENTINEL * Define threat intelligence * Manage your threat indicators * View your threat indicators with KQL 36 - CONNECT DATA TO MICROSOFT SENTINEL USING DATA CONNECTORS * Ingest log data with data connectors * Understand data connector providers * View connected hosts 37 - CONNECT MICROSOFT SERVICES TO MICROSOFT SENTINEL * Plan for Microsoft services connectors * Connect the Microsoft Office 365 connector * Connect the Microsoft Entra connector * Connect the Microsoft Entra ID Protection connector * Connect the Azure Activity connector 38 - CONNECT MICROSOFT DEFENDER XDR TO MICROSOFT SENTINEL * Plan for Microsoft Defender XDR connectors * Connect the Microsoft Defender XDR connector * Connect Microsoft Defender for Cloud connector * Connect Microsoft Defender for IoT * Connect Microsoft Defender legacy connectors 39 - CONNECT WINDOWS HOSTS TO MICROSOFT SENTINEL * Plan for Windows hosts security events connector * Connect using the Windows Security Events via AMA Connector * Connect using the Security Events via Legacy Agent Connector * Collect Sysmon event logs 40 - CONNECT COMMON EVENT FORMAT LOGS TO MICROSOFT SENTINEL * Plan for Common Event Format connector * Connect your external solution using the Common Event Format connector 41 - CONNECT SYSLOG DATA SOURCES TO MICROSOFT SENTINEL * Plan for syslog data collection * Collect data from Linux-based sources using syslog * Configure the Data Collection Rule for Syslog Data Sources * Parse syslog data with KQL 42 - CONNECT THREAT INDICATORS TO MICROSOFT SENTINEL * Plan for threat intelligence connectors * Connect the threat intelligence TAXII connector * Connect the threat intelligence platforms connector * View your threat indicators with KQL 43 - THREAT DETECTION WITH MICROSOFT SENTINEL ANALYTICS * What is Microsoft Sentinel Analytics? * Types of analytics rules * Create an analytics rule from templates * Create an analytics rule from wizard * Manage analytics rules 44 - AUTOMATION IN MICROSOFT SENTINEL * Understand automation options * Create automation rules 45 - THREAT RESPONSE WITH MICROSOFT SENTINEL PLAYBOOKS * What are Microsoft Sentinel playbooks? * Trigger a playbook in real-time * Run playbooks on demand 46 - SECURITY INCIDENT MANAGEMENT IN MICROSOFT SENTINEL * Understand incidents * Incident evidence and entities * Incident management 47 - IDENTIFY THREATS WITH BEHAVIORAL ANALYTICS * Understand behavioral analytics * Explore entities * Display entity behavior information * Use Anomaly detection analytical rule templates 48 - DATA NORMALIZATION IN MICROSOFT SENTINEL * Understand data normalization * Use ASIM Parsers * Understand parameterized KQL functions * Create an ASIM Parser * Configure Azure Monitor Data Collection Rules 49 - QUERY, VISUALIZE, AND MONITOR DATA IN MICROSOFT SENTINEL * Monitor and visualize data * Query data using Kusto Query Language * Use default Microsoft Sentinel Workbooks * Create a new Microsoft Sentinel Workbook 50 - MANAGE CONTENT IN MICROSOFT SENTINEL * Use solutions from the content hub * Use repositories for deployment 51 - EXPLAIN THREAT HUNTING CONCEPTS IN MICROSOFT SENTINEL * Understand cybersecurity threat hunts * Develop a hypothesis * Explore MITRE ATT&CK 52 - THREAT HUNTING WITH MICROSOFT SENTINEL * Explore creation and management of threat-hunting queries * Save key findings with bookmarks * Observe threats over time with livestream 53 - USE SEARCH JOBS IN MICROSOFT SENTINEL * Hunt with a Search Job * Restore historical data 54 - HUNT FOR THREATS USING NOTEBOOKS IN MICROSOFT SENTINEL * Access Azure Sentinel data with external tools * Hunt with notebooks * Create a notebook * Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered Online5 days, Jun 4th, 13:00 + 3 more
£2380

Microsoft Office 365 Online (with Teams for the Desktop)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based installation of the Microsoft Office 2010, 2013, or 2016 edition of the Microsoft Office productivity suite, and who are now extending Microsoft Office to a collaborative cloud-based Office 365 environment. Overview In this course, you will build upon your knowledge of the Microsoft Office desktop application suite to work productively in the cloud-based Microsoft Office 365 environment. You will: Sign in, navigate, and identify components of the Office 365 environment. Create, edit, and share documents with team members using the Office Online apps, SharePoint, OneDrive© for Business, and Delve. Collaborate and work with colleagues using the Yammer and Planner apps. Use email and manage contacts with Outlook on the web. Collaborate using Teams. Configure Teams. This course introduces working with shared documents in the familiar Office 365 online apps?Word, PowerPoint©, and Excel©?as an alternative to installing the Microsoft© Office desktop applications. This course also introduces several productivity apps including Yammer?, Planner, and Delve© that can be used in combination by teams for communication and collaboration. Prerequisites * Outlook - Part 1 * PowerPoint - Part 1 * Word 2016 - Part 1 * Using Microsoft Windows 10 1 - GETTING STARTED WITH OFFICE 365 * Topic A: Sign In to Office 365 * Topic B: Navigate the Office 365 Environment 2 - COLLABORATING WITH SHARED FILES * Topic A: Work with Shared Documents in SharePoint * Topic B: Edit Documents in Office Online * Topic C: Collaborate on the SharePoint Site * Topic D: Work with OneDrive for Business and Delve 3 - USING PRODUCTIVITY APPS * Topic A: Work with Productivity Apps in Combination * Topic B: Broadcast Messages with Yammer * Topic C: Manage Tasks with the Planner App 4 - USING OUTLOOK ON THE WEB * Topic A: Send and Receive Email * Topic B: Manage Contacts * Topic C: Schedule Appointments * Topic D: Personalize Outlook on the Web 5 - COLLABORATING WITH TEAMS * Topic A: Overview of Microsoft Teams * Topic B: Converse and Share in Teams * Topic C: Call and Meet in Teams * Topic D: Collaborate with Office 365 Apps and Teams 6 - CONFIGURING TEAMS * Topic A: Configure Teams * Topic B: Configure Channels * Topic C: Configure Tabs

Microsoft Office 365 Online (with Teams for the Desktop)
Delivered OnlineTwo days, Jun 4th, 13:00
£295

SharePoint - Site Basics (Modern Experience)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for Microsoft© Windows© and Microsoft Office users who are transitioning to a SharePoint environment, and who need to access information from and collaborate with team members within Microsoft SharePoint. Overview Launch a SharePoint site and navigate among the pages and resources provided by the site. Use SharePoint lists to track and view information. Use document libraries to store and organize documents. Find, share, and archive content stored in SharePoint. Author documents as a member of a SharePoint team site. Use SharePoint workflow automation tools. In many professional environments, people work collaboratively in teams. Information technology and applications facilitate this by enabling people to easily share, access, edit, and save information. Microsoft© SharePoint© is a platform specifically designed to facilitate communication and collaboration, enabling people to use familiar applications and web-based tools to create, access, store, and track documents and data in a central location. In this course, you will use SharePoint to access, store, share, and collaborate with information and documents. Prerequisites To ensure your success in this course, you should have basic end-user skills with a current version of Microsoft Windows. LESSON 1: NAVIGATING SHAREPOINT SITES * Topic A: Launch SharePoint * Topic B: Gain Access to a Site You Didn't Create * Topic C: Navigate Within a SharePoint Site * Topic D: Access SharePoint from Your Mobile Device LESSON 2: USING LISTS TO TRACK INFORMATION * Topic A: Add and Populate Lists * Topic B: Change View Options * Topic C: Create a Custom View LESSON 3: USING DOCUMENT LIBRARIES TO SHARE AND ORGANIZE DOCUMENTS * Topic A: Store Files in a Document Library * Topic B: Create and Use Document Templates LESSON 4: FINDING, SHARING, AND ARCHIVING CONTENT * Topic A: Search for Items in Lists or Libraries * Topic B: Share Through Links * Topic C: Move Files Offline LESSON 5: AUTHORING DOCUMENTS AS A TEAM * Topic A: Work Together on Documents * Topic B: Manage File Versions and Document Recovery LESSON 6: AUTOMATING BUSINESS PROCESSES * Topic A: Use Rule-Based Automation * Topic B: Use Power Automate to Automate a Workflow

SharePoint - Site Basics (Modern Experience)
Delivered OnlineTwo days, Jun 5th, 13:00 + 1 more
£495

MS-900T01 Microsoft 365 Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for candidates looking to demonstrate foundational-level knowledge of cloud-based solutions to facilitate productivity and collaboration on-site, at home, or a combination of both.ÿCandidates may have knowledge of cloud-based solutions or may be new to Microsoft 365. Overview After completing this course, students will be able to: Describe cloud concepts Describe core Microsoft 365 services and concepts Describe security, compliance, privacy, and trust in Microsoft 365 Describe Microsoft 365 pricing and support This course introduces Microsoft 365, an integrated cloud platform that delivers industry-leading productivity apps along with intelligent cloud services, and world-class security. You?ll learn foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft 365 cloud service offerings. You will begin by learning about cloud fundamentals, including an overview of cloud computing. You will be introduced to Microsoft 365 and learn how Microsoft 365 solutions improve productivity, facilitate collaboration, and optimize communications. The course then analyzes how security, compliance, privacy, and trust are handled in Microsoft 365, and it concludes with a review of Microsoft 365 subscriptions, licenses, billing, and support. 1 - DESCRIBE CLOUD COMPUTING * What is cloud computing * Describe the shared responsibility model * Define cloud models * Describe the consumption-based model 2 - DESCRIBE THE BENEFITS OF USING CLOUD SERVICES * Describe the benefits of high availability and scalability in the cloud * Describe the benefits of reliability and predictability in the cloud * Describe the benefits of security and governance in the cloud * Describe the benefits of manageability in the cloud 3 - DESCRIBE CLOUD SERVICE TYPES * Describe Infrastructure as a Service * Describe Platform as a Service * Describe Software as a Service 4 - WHAT IS MICROSOFT 365? * Describe the differences between Office 365 and Microsoft 365 * Describe Windows 365 * Describe how Microsoft 365 empowers workers in this hybrid world of work * Explore Microsoft 365 tenant 5 - DESCRIBE PRODUCTIVITY SOLUTIONS OF MICROSOFT 365 * Describe the productivity capabilities and benefits of Microsoft 365 * Describe Microsoft 365 Apps * Describe work management tools in Microsoft 365 * Describe additional Microsoft 365 productivity apps 6 - DESCRIBE COLLABORATION SOLUTIONS OF MICROSOFT 365 * Describe the collaboration capabilities and benefits of Microsoft 365 * Describe how Microsoft Teams promotes collaboration and enhances teamwork * Describe the Microsoft Viva apps * Describe how Yammer helps communities connect and grow 7 - DESCRIBE ENDPOINT MODERNIZATION, MANAGEMENT CONCEPTS, AND DEPLOYMENT OPTIONS IN MICROSOFT 365 * Describe the endpoint management capabilities of Microsoft 365 * Compare the differences of Windows 365 and Azure Virtual Desktop * Describe the deployment and release models for Windows-as-a-Service (WaaS) * Identify deployment methods and update channels for Microsoft 365 Apps 8 - DESCRIBE ANALYTICS CAPABILITIES OF MICROSOFT 365 * Describe the capabilities of Viva Insights * Describe the capabilities of the Microsoft 365 admin center and Microsoft 365 user portal * Describe the reports available in the Microsoft 365 admin center and other admin centers 9 - DESCRIBE THE SERVICES AND IDENTITY TYPES OF AZURE AD * Describe Azure Active Directory * Describe the available Azure AD editions * Describe Azure AD identity types * Describe the types of external identities * Describe the concept of hybrid identity 10 - DESCRIBE THE ACCESS MANAGEMENT CAPABILITIES OF AZURE AD * Describe Conditional Access in Azure AD * Describe the benefits of Azure AD roles and role-based access control 11 - DESCRIBE THREAT PROTECTION WITH MICROSOFT 365 DEFENDER * Describe Microsoft 365 Defender services * Describe Microsoft Defender for Office 365 * Describe Microsoft Defender for Endpoint * Describe Microsoft Defender for Cloud Apps * Describe Microsoft Defender for Identity * Describe the Microsoft 365 Defender portal 12 - DESCRIBE SECURITY CAPABILITIES OF MICROSOFT SENTINEL * Describe how Microsoft Sentinel provides integrated threat management * Understand Sentinel costs 13 - DESCRIBE THE COMPLIANCE MANAGEMENT CAPABILITIES IN MICROSOFT PURVIEW * Describe the Microsoft Purview compliance portal * Describe Compliance Manager * Describe use and benefits of compliance score 14 - DESCRIBE THE SERVICE TRUST PORTAL AND PRIVACY AT MICROSOFT * Describe the Service Trust Portal * Describe Microsoft's privacy principles * Describe Microsoft Priva 15 - DESCRIBE MICROSOFT 365 PRICING, LICENSING, AND BILLING OPTIONS * Explore pricing models for Microsoft cloud services * Explore the billing and bill management options * Explore the available licensing and management options 16 - DESCRIBE SUPPORT OFFERINGS FOR MICROSOFT 365 SERVICES * Explore support options for Microsoft 365 services * Explain service level agreement (SLAs) concepts * Identify how to track the service health status * Explore how organizations can share feedback on Microsoft 365 services

MS-900T01 Microsoft 365 Fundamentals
Delivered OnlineTwo days, Jun 11th, 13:00 + 5 more
£595

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - EXPLORE THE ENTERPRISE DESKTOP * Examine benefits of modern management * Examine the enterprise desktop life-cycle model * Examine planning and purchasing * Examine desktop deployment * Plan an application deployment * Plan for upgrades and retirement 2 - EXPLORE WINDOWS EDITIONS * Examine Windows client editions and capabilities * Select client edition * Examine hardware requirements 3 - UNDERSTAND MICROSOFT ENTRA ID * Examine Microsoft Entra ID * Compare Microsoft Entra ID and Active Directory Domain Services * Examine Microsoft Entra ID as a directory service for cloud apps * Compare Microsoft Entra ID P1 and P2 plans * Examine Microsoft Entra Domain Services 4 - MANAGE MICROSOFT ENTRA IDENTITIES * Examine RBAC and user roles in Microsoft Entra ID * Create and manage users in Microsoft Entra ID * Create and manage groups in Microsoft Entra ID * Manage Microsoft Entra objects with PowerShell * Synchronize objects from AD DS to Microsoft Entra ID 5 - MANAGE DEVICE AUTHENTICATION * Describe Microsoft Entra join * Examine Microsoft Entra join prerequisites limitations and benefits * Join devices to Microsoft Entra ID * Manage devices joined to Microsoft Entra ID 6 - ENROLL DEVICES USING MICROSOFT CONFIGURATION MANAGER * Deploy the Microsoft Configuration Manager client * Monitor the Microsoft Configuration Manager client * Manage the Microsoft Configuration Manager client 7 - ENROLL DEVICES USING MICROSOFT INTUNE * Manage mobile devices with Intune * Enable mobile device management * Explain considerations for device enrollment * Manage corporate enrollment policy * Enroll Windows devices in Intune * Enroll Android devices in Intune * Enroll iOS devices in Intune * Explore device enrollment manager * Monitor device enrollment * Manage devices remotely 8 - EXECUTE DEVICE PROFILES * Explore Intune device profiles * Create device profiles * Create a custom device profile 9 - OVERSEE DEVICE PROFILES * Monitor device profiles in Intune * Manage device sync in Intune * Manage devices in Intune using scripts 10 - MAINTAIN USER PROFILES * Examine user profile * Explore user profile types * Examine options for minimizing user profile size * Deploy and configure folder redirection * Sync user state with Enterprise State Roaming * Configure Enterprise State Roaming in Azure 11 - EXECUTE MOBILE APPLICATION MANAGEMENT * Examine mobile application management * Examine considerations for mobile application management * Prepare line-of-business apps for app protection policies * Implement mobile application management policies in Intune * Manage mobile application management policies in Intune 12 - DEPLOY AND UPDATE APPLICATIONS * Deploy applications with Intune * Add apps to Intune * Manage Win32 apps with Intune * Deploy applications with Configuration Manager * Deploying applications with Group Policy * Assign and publish software * Explore Microsoft Store for Business * Implement Microsoft Store Apps * Update Microsoft Store Apps with Intune * Assign apps to company employees 13 - ADMINISTER ENDPOINT APPLICATIONS * Manage apps with Intune * Manage Apps on non-enrolled devices * Deploy Microsoft 365 Apps with Intune * Additional Microsoft 365 Apps Deployment Tools * Configure Microsoft Edge Internet Explorer mode * App Inventory Review 14 - PROTECT IDENTITIES IN MICROSOFT ENTRA ID * Explore Windows Hello for Business * Deploy Windows Hello * Manage Windows Hello for Business * Explore Microsoft Entra ID Protection * Manage self-service password reset in Microsoft Entra ID * Implement multi-factor authentication 15 - ENABLE ORGANIZATIONAL ACCESS * Enable access to organization resources * Explore VPN types and configuration * Explore Always On VPN * Deploy Always On VPN 16 - IMPLEMENT DEVICE COMPLIANCE * Protect access to resources using Intune * Explore device compliance policy * Deploy a device compliance policy * Explore conditional access * Create conditional access policies 17 - GENERATE INVENTORY AND COMPLIANCE REPORTS * Report enrolled devices inventory in Intune * Monitor and report device compliance * Build custom Intune inventory reports * Access Intune using Microsoft Graph API 18 - DEPLOY DEVICE DATA PROTECTION * Explore Windows Information Protection * Plan Windows Information Protection * Implement and use Windows Information Protection * Explore Encrypting File System in Windows client * Explore BitLocker 19 - MANAGE MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Examine key capabilities of Microsoft Defender for Endpoint * Explore Windows Defender Application Control and Device Guard * Explore Microsoft Defender Application Guard * Examine Windows Defender Exploit Guard * Explore Windows Defender System Guard 20 - MANAGE MICROSOFT DEFENDER IN WINDOWS CLIENT * Explore Windows Security Center * Explore Windows Defender Credential Guard * Manage Microsoft Defender Antivirus * Manage Windows Defender Firewall * Explore Windows Defender Firewall with Advanced Security 21 - MANAGE MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender for Cloud Apps * Planning Microsoft Defender for Cloud Apps * Implement Microsoft Defender for Cloud Apps 22 - ASSESS DEPLOYMENT READINESS * Examine deployment guidelines * Explore readiness tools * Assess application compatibility * Explore tools for application compatibility mitigation * Prepare network and directory for deployment * Plan a pilot 23 - DEPLOY USING THE MICROSOFT DEPLOYMENT TOOLKIT * Evaluate traditional deployment methods * Set up the Microsoft Deployment Toolkit for client deployment * Manage and deploy images using the Microsoft Deployment Toolkit 24 - DEPLOY USING MICROSOFT CONFIGURATION MANAGER * Explore client deployment using Configuration Manager * Examine deployment components of Configuration Manager * Manage client deployment using Configuration Manager * Plan in-place upgrades using Configuration Manager 25 - DEPLOY DEVICES USING WINDOWS AUTOPILOT * Use Autopilot for modern deployment * Examine requirements for Windows Autopilot * Prepare device IDs for Autopilot * Implement device registration and out-of-the-box customization * Examine Autopilot scenarios * Troubleshoot Windows Autopilot 26 - IMPLEMENT DYNAMIC DEPLOYMENT METHODS * Examine subscription activation * Deploy using provisioning packages * Use Windows Configuration Designer * Use Microsoft Entra join with automatic MDM enrollment 27 - PLAN A TRANSITION TO MODERN ENDPOINT MANAGEMENT * Explore using co-management to transition to modern endpoint management * Examine prerequisites for co-management * Evaluate modern management considerations * Evaluate upgrades and migrations in modern transitioning * Migrate data when modern transitioning * Migrate workloads when modern transitioning 28 - MANAGE WINDOWS 365 * Explore Windows 365 * Configure Windows 365 * Administer Windows 365 29 - MANAGE AZURE VIRTUAL DESKTOP * Examine Azure Virtual Desktop * Explore Azure Virtual Desktop * Configure Azure Virtual Desktop * Administer Azure Virtual Desktop ADDITIONAL COURSE DETAILS: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online6 days, Jun 10th, 13:00 + 15 more
£2975

Educators matching "Microsoft 365"

Show all 54
Blackbird Corporate Ltd

blackbird corporate ltd

5.0(4)

Stoke On Trent

What makes us stand out from the crowd? Unlike other training providers, Blackbird Corporate Ltd ONLY specialise in Microsoft 365 and SharePoint. All of the services that we offer are tailored to our clients’ needs because no two business are the same so require an individual approach. Our services include bespoke SharePoint and Microsoft 365 training, SharePoint/Microsoft 365 Project Management and Consultancy. We also offer SharePoint Support Packages so you have peace of mind that we are there to help. To discuss how we can help and support your business, contact our team who are happy to work with you to make sure you get the best service for your business. Whether you are looking for End User training or an onsite consultant we have one of the best teams to support you and your organisation. We are a dedicated team of specialists with over 35 years collective experience. No matter what your requirements we will have a team member that will have the experience to make sure you and your business get the best service possible. At Blackbird Corporate Ltd we also have a second passion and that is Motorcycle Racing. We have been proud to sponsor various racers over the past 11 years including two Scottish Superbike Champions, a Thundersport GB GP1 Champion and the only female racer to hold a championship title in every class she has competed in. Since 2015 we decided have run our own team CV Racing. Then in 2018 we decided to show our support to the talented riders in Thundersport GB by sponsoring the Golden Era Supersort and Steelsport Class. We are now in our fourth year sponsoring this amazing class of riders and are proud to be associated with Thundersport GB.