• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1073 Microsoft 365 courses

Microsoft Azure and 365 Bundle with 5 Exams (3 Certifications)

By Hudson

The Microsoft Certified Fundamentals, Associate, and Expert is a new breed of Microsoft certification. It is referred to as a ‘role-based certification’. According to Microsoft, role-based certifications show that individuals that possess them are keeping pace with today’s technical roles and requirements. They allow a learner to skill up and prove their expertise to employers and peers, plus get the recognition and opportunities they’ve earned

Microsoft Azure and 365 Bundle with 5 Exams (3 Certifications)
Delivered Online On Demand
£1,395

Microsoft 365 for the Web (with Teams, SharePoint, and OneDrive) v3.0

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based installation of Microsoft Office, and who are now extending Microsoft 365 to a collaborative cloud-based environment. Overview In this course, you will work productively in the Microsoft 365 cloud-based environment. You will: Navigate Microsoft 365 and integrate the online apps. Use Microsoft Outlook on the Web. Use Microsoft Teams on the web. Store documents in SharePoint, OneDrive, and Teams. Work with files online. This course is an introduction to Microsoft 365 in a cloud-based environment. Using the Microsoft 365 suite of productivity apps online, users can easily communicate and collaborate through Microsoft Teams messaging and meeting functionality and Outlook email. When you create a team, the Microsoft SharePoint team site provides a central storage location for accessing and modifying shared documents. Each user also receives individual document storage through OneDrive for Business. Teams can provide a central hub for working with shared documents in the familiar apps?Word, PowerPoint, and Excel?as an alternative to installing the Microsoft 365 Desktop applications. Getting Started with Microsoft 365 for the Web Topic A:ÿSign In to Microsoft 365 Online Topic B:ÿNavigate the Microsoft 365 Web Environment Topic C:ÿIntegrate the Microsoft 365 Web Apps Using Outlook on the Web Topic A:ÿSend and Receive Email on the Web Topic B:ÿAccess the Outlook Calendar Online Using Teams on the Web Topic A:ÿAccess Teams Features Topic B:ÿCreate and Configure Teams and Channels Topic C:ÿChat and Post in Teams Topic D:ÿCall and Meet in Teams Storing Documents on the Web Topic A:ÿOrganize Documents in SharePoint Topic B:ÿOrganize Documents in OneDrive Topic C:ÿWork with Documents in Teams Topic D:ÿSelect a File Storage Location Working with Files Online Topic A:ÿEdit Documents in Microsoft 365 Online Topic B:ÿCollaborate on Files Online Topic C:ÿFind Shared Resources Online Additional course details: Nexus Humans Microsoft 365 for the Web (with Teams, SharePoint, and OneDrive) v3.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft 365 for the Web (with Teams, SharePoint, and OneDrive) v3.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft 365 for the Web (with Teams, SharePoint, and OneDrive) v3.0
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft 365 for End-users

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is targeted at professionals who have never worked with Microsoft 365 before, or who have yet to move beyond its basic functions. The target audience typically includes individuals, professionals, and organizations who are looking to improve their productivity, collaboration, and communication using the suite of applications and services provided by Microsoft 365. This could include office workers, project managers, IT professionals, and small to large-scale businesses who want to maximize the benefits of cloud-based solutions for their daily operations.  Overview Upon successfully completing this course, students will have confidence in using the Microsoft 365 applications. Students will increase their work productivity and decrease time on completing tasks. In this course, students will learn how to use different tools of Microsoft 365 for better online collaboration, including OneDrive, SharePoint, Teams, Excel, Outlook, Word, and PowerPoint. First Steps in Office 365 The Difference Between Office 365 and Microsoft 365 Pros and cons of Microsoft 365 First Steps on mobile devices OneDrive Introduction - What is Microsoft OneDrive? How To Access Microsoft OneDrive? Upload Files Share Files Sync Files Recycle Bin Using OneDrive How To Access Onedrive On Phone? Teams - Simplify Collaboration within Companies Discover new ways to collaborate and communicate An introduction to your central place in Office 365 How to launch and install Teams The Interface of Microsoft Teams Use the Teams window to structure your organization Use Channels to structure the Teams window Use Tabs to access tools and information Communicate with others via Chat Keep track of activities Meetings, video conferencing and screen sharing Share files effectively Manage teams and permissions for organizational structuring Use Teams effectively on mobile devices Final remarks SharePoint Sites Introduction First Steps Document Library - First Steps Document Library - Set and Manage Alerts Document Library - Understanding Versioning Sync Libraries Share a Site Picture Library Lists Calendar Tasks Discussion Board Outlook First Steps in Mail Improved Search Function Work with Folders Settings Working with the Mail App Calendar People Tasks Excel Online Introduction Open and Edit an Excel Online Workbook Limitations of Excel Online Create a New Workbook with Excel Online Edit a Workbook Simultaneously with another Person Working with the Excel AppUse Excel effectively on mobile devices PowerPoint Online Introduction Open a PowerPoint Online Presentation Edit a Presentation Online Limitations of PowerPoint Online Create a Presentation with PowerPoint Online Working with the PowerPoint App Use Power Point effectively on mobile devices Word Online Introduction Open and Edit a Word Document Online Limitations of Word Online Create a New Document Edit a Document Simultaneously Working with the Word App

Microsoft 365 for End-users
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Dynamics 365 Associate Certification Bundle (with 4 Exams)

By Hudson

The Microsoft Certified Associate is a new breed of Microsoft certification. It is referred to as a ‘role-based certification’. According to Microsoft, role-based certifications show that individuals that possess them are keeping pace with today’s technical roles and requirements. They allow a learner to skill up and prove their expertise to employers and peers, plus get the recognition and opportunities they’ve earned

Microsoft Dynamics 365 Associate Certification Bundle (with 4 Exams)
Delivered Online On Demand
£1,295

MS-040T00-A Manage SharePoint and OneDrive in Microsoft 365

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IT Professionals who deploy and manage Microsoft SharePoint and OneDrive in their organizations. Students in this course are interested in Microsoft SharePoint and OneDrive. Overview Configure SharePoint Sites. Manage sites storage limits. Deploy OneDrive sync client. Use Group Policy to control OneDrive sync client settings. Manage external sharing for data in Microsoft SharePoint and OneDrive. Configure user profile properties. Manage audiences. Use the App Catalog to manage custom apps. Create and manage term groups, term sets, and terms. Describe the difference between modern and classic search experiences. Content is the most critical digital asset for every organization. In this course, you will learn how to plan, configure, and manage SharePoint Sites and OneDrive to enable modern content services that transform the content lifecycle. Specifically, this course discusses the modern SharePoint site structure, such as SharePoint hub sites. It provides best practices for the adoption and deployment of OneDrive within your organization. It also covers sharing, security, and monitoring in SharePoint and OneDrive in Microsoft 365. Additionally, you will learn how to manage user profiles and apps with proper permission settings. We will also discuss how to plan and configure Managed Metadata, Business Connectivity Services, and search allowing content to be found, consumed, and governed across Microsoft 365. Plan and Configure SharePoint Sites Overview of SharePoint in Microsoft 365 Configure SharePoint sites Manage SharePoint site Configure and Manage OneDrive Overview of OneDrive in Microsoft 365 Deploy OneDrive Manage OneDrive Sharing and Security in SharePoint and OneDrive Manage SharePoint site permissions Manage sharing in SharePoint and OneDrive Manage security in SharePoint and OneDrive Manage User Profiles and Apps Manage User Profiles Manage apps Plan and Configure Managed Metadata and Business Connectivity Services Plan and configure Managed Metadata Plan and configure Business Connectivity Services Plan and Configure Search Plan search Configure search Additional course details: Nexus Humans MS-040T00-A Manage SharePoint and OneDrive in Microsoft 365 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-040T00-A Manage SharePoint and OneDrive in Microsoft 365 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-040T00-A Manage SharePoint and OneDrive in Microsoft 365
Delivered OnlineFlexible Dates
Price on Enquiry

MS-203T00 Microsoft 365 Messaging

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Messaging Administrator deploys, configures, manages, and troubleshoots recipients, permissions, mail protection, mail flow, and public folders in both on-premises and cloud enterprise environments. Responsibilities include managing message hygiene, messaging infrastructure, and hybrid configuration and migration. To implement a secure hybrid topology that meets the business needs of a modern organization, the Messaging Administrator must collaborate with the Security Administrator and Microsoft 365 Enterprise Administrator. The Messaging Administrator should have a working knowledge of authentication types, licensing, and integration with Microsoft 365 applications. Overview After completing this course, students will be able to: Configure and manage the transport pipeline Manage and troubleshoot mail flow and transport issues Manage message hygiene and compliance Manage authentication for messaging Configure organizational settings and sharing Manage mobile devices Manage role-based permissions Create and manage recipient objects and resources Plan, implement, and troubleshoot public folders Plan a hybrid environment Perform mailbox migrations Deploy and troubleshoot a hybrid environment This course examines the key elements of Microsoft 365 messaging administration, including message transport and mail flow, messaging security, hygiene, and compliance, messaging infrastructure, and hybrid messaging. This course is designed for IT Professionals who deploy and manage the messaging infrastructure for Microsoft 365 in their organization. Managing the Transport Pipeline Overview of Transport Services Configuring Message Transport Managing Transport Rules Managing and Troubleshooting Mail Flow Managing Mail Flow Troubleshooting Mail Flow Troubleshooting Transport Issues Troubleshooting with Logs Managing Message Hygiene Planning for Message Hygiene Managing Anti-Malware and Anti-Spam Policies Managing Advanced Threat Protection Managing Compliance Messaging Compliance in the SCC Messaging Compliance in Exchange Managing Exchange Online Archiving and Auditing Managing Content Search Managing Organizational Settings Managing Authentication for Messaging Configuring Organizational Settings Configuring Organizational Sharing Managing Mobile Devices Mobile Device Mailbox Policies Managing Mobile Device Access Managing Role-Based Permissions Managing Admin Roles Managing User Roles Exchange Setup - RBAC and AD Split Permission Managing Recipient Objects and Resources Exchange Recipients Creating and Managing Exchange Recipients Managing Email Addresses, Lists, and Resources Managing Public Folders Planning the Public Folder Hierarchy Implementing and Managing Public Folders Troubleshooting Public Folders Planning a Hybrid Environment Exchange Hybrid Deployment Requirements Planning to Run the Hybrid Configuration Wizard Performing Mailbox Migrations Planning Mailbox Migrations Performing IMAP Migrations Performing Cutover and Staged Migrations Performing Advanced Migrations Deploying and Troubleshooting a Hybrid Environment Deploying and Managing an Edge Transport Server Configuring a Hybrid Deployment using the HCW Implementing Advanced Hybrid Functionality Troubleshooting Hybrid Deployments

MS-203T00 Microsoft 365 Messaging
Delivered OnlineFlexible Dates
Price on Enquiry

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered OnlineFlexible Dates
£2,380

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

By Packt

This course will help you qualify for the Microsoft SC 900 exam, and this certification is targeted at those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Delivered Online On Demand7 hours 7 minutes
£26.99

MS-600T00 Building Applications and Solutions with Microsoft 365 Core Services

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Microsoft 365 development platform or in passing the Microsoft 365 Developer Associate certification exam. Students should also have 1-2 years experience as a developer. This course assumes students know how to code and have a basic understanding of REST APIs, JSON, OAuth2, OData, OpenID Connect, Microsoft identities including Azure AD and Microsoft accounts, Azure AD B2C, and permission/consent concepts. Overview Implementing Microsoft Identity Working with Microsoft Graph Determining workload platform targets Integration Points, including Microsoft Teams, Office Add-ins, and SharePoint Framework This course covers five central elements of Microsoft 365 platform ? implementing Microsoft Identity, working with Microsoft Graph, extending and customizing SharePoint, extending Teams, and extending Office. In this course, students will learn how to implement Microsoft Identity and work with Microsoft Graph. Students will also gain the knowledge on UI elements (including Adaptive Cards and UI Fabric), Integration Points (including Microsoft Teams, Office Add-ins, SharePoint Framework, Actionable Messages), and determining workload platform targets. In implementing Microsoft Identity, students will learn to implement Microsoft identity including registering an application, implanting authentication, configuring permissions to consume an API, and creating a service to access Microsoft Graph. In working with Microsoft Graph, students will learn how to access user data, explore query parameters, manage a group lifecycle, access files, and optimize network traffic using Microsoft Graph. In extending and customizing SharePoint, students will learn about SharePoint Framework web parts, extensions, and how to package and deploy a SPFx solution. In extending Teams, students will look at the components of a Teams App, work with webhooks, tabs, and conversational bots. In extending Office, students work with Office Add-ins, task pane add-ins, JavaScript APIs, Office UI Fabric, and actionable messages with adaptive cards. Implement Microsoft Identity Microsoft Identity platform Register an Application Implement Authentication Configure Permissions to consume an API Implement Authorization to consume an API Implement Authorization in an API Create a Service to access Microsoft Graph Work with Microsoft Graph What is Microsoft Graph Access user data from Microsoft Graph Data usage with query parameters Manage a group lifecycle on Microsoft Graph Access files with Microsoft Graph Optimize network traffic Extend and Customize SharePoint SharePoint Framework web parts SharePoint Framework extensions Package and deploy a SPFx solution Consumption of Microsoft Graph Consumption of 3rd party APIs secured with Azure AD from within SPFx Web Parts as Teams Tabs Branding and theming in SharePoint Extend Teams Microsoft Teams App Webhooks in Microsoft Teams Tabs in Microsoft Teams Messaging extensions in Microsoft Teams Conversational bots in Microsoft Teams Extend Office Office Add-ins Office JS APIs Customization of Add-ins Testing, debugging, and deployment options Actionable message Additional course details: Nexus Humans MS-600T00 Building Applications and Solutions with Microsoft 365 Core Services training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-600T00 Building Applications and Solutions with Microsoft 365 Core Services course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-600T00 Building Applications and Solutions with Microsoft 365 Core Services
Delivered OnlineFlexible Dates
Price on Enquiry

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380