Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Network Designers Network Administrators Network Engineers Systems Engineers Data Center Engineers Consulting Systems Engineers Technical Solutions Architects Cisco Integrators/Partners Field Engineers Server Administrators Network Managers Storage Administrators Cisco Integrators and Partners Overview After completing the course, you should be able to: Describe Cisco ACI Fabric Infrastructure and basic Cisco ACI concepts Describe Cisco ACI policy model logical constructs Describe Cisco ACI basic packet forwarding Describe external network connectivity Describe VMM Integration Describe Layer 4 to Layer 7 integrations Explain Cisco ACI management features The Implementing Cisco Application Centric Infrastructure (DCACI) v1.2 course shows you how to deploy and manage the Cisco© Nexus© 9000 Series Switches in Cisco Application Centric Infrastructure (Cisco ACI©) mode. You will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode, how to connect the Cisco ACI fabric to external networks and services, and the fundamentals of Virtual Machine Manager (VMM) integration. You will gain hands-on practice implementing key capabilities such as fabric discovery, policies, connectivity, VMM integration, and more. This course earns you 40 Continuing Education (CE) credits towards recertification.This course helps prepare you for the following exam:300-620 Implementing Cisco Application Centric Infrastructure (DCACI) Introducing Cisco ACI Fabric Infrastructure and Basic Concepts What Is Cisco ACI? Cisco ACI Topology and Hardware Describing Cisco ACI Policy Model Logical Constructs Cisco ACI Logical Constructs Tenant Describing Cisco ACI Basic Packet Forwarding Endpoint Learning Basic Bridge Domain Configuration Knob Introducing External Network Connectivity Cisco ACI External Connectivity Options External Layer 2 Network Connectivity Introducing VMM Integration VMware vCenter VDS Integration Resolution Immediacy in VMM Describing Layer 4 to Layer 7 Integrations Service Appliance Insertion Without ACI L4-L7 Service Graph Service Appliance Insertion via ACI L4-L7 Service Graph Explaining Cisco ACI Management Out-of-Band Management In-Band Management
This module aims to develop knowledge and understanding of the role of logistics including an understanding of air, sea, road and rail freight and courier services. It will explore the advantages and disadvantages of using the different modes of transport the world of international trade.
This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, follow a methodical workflow to develop sound solutions, use open-source, off-the-shelf tools to develop, test, and deploy those solutions, and ensure that they protect the privacy of users. This course includes hands-on activities for each topic area.
The Real Estate Analyst course has been taught non-stop to global real estate firms over the last 25 years, and is without doubt the core financial modelling training in your career portfolio. Whether you have an upcoming financial modelling test for a new job or an APC exam, the Real Estate Analyst course is the choice for you.
Duration 4 Days 24 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN 8.0. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Detail VMware HCI Mesh⢠technology and architecture Detail vSAN File Service architecture and configuration Describe how to setup a stretched and a two-node vSAN cluster Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health⢠for monitoring vSAN health Use VMware Skyline Health to investigate and help determine failure conditions Discuss vSAN troubleshooting best practices Describe vSAN Express Storage Architecture⢠concepts During this course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introduction and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use VMware vSphere© Lifecycle ManagerTM to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Managing vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server vSAN HCI Mesh Understand the purpose of vSAN HCI Mesh Detail vSAN HCI Mesh technology and architecture Perform mount and unmount of a remote datastore vSAN File Service and iSCSI Target Service Understand the purpose of vSAN File Services Detail vSAN File Services architecture Configure vSAN File Shares Describe vSAN iSCSI Target Service vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain storage policies for vSAN stretched cluster vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Use a vSAN proactive test to detect and diagnose cluster issues vSAN Troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Use VMware Skyline Health to investigate and help determine failure conditions Explain which log files are useful for vSAN troubleshooting vSAN Express Storage Architecture Understand the purpose of vSAN Express Storage Architecture Describe the vSAN Express Storage Architecture components Identify Storage Policy differences Understand compression and encryption operation differences
Autocad face to face training customised and bespoke.
Duration 2 Days 12 CPD hours This course is intended for Server administrators Network engineers Systems engineers Consulting systems engineers Technical solutions architects Network administrators Storage administrators Network managers Sales engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco UCS server hardware Describe Cisco UCS connectivity Describe the Cisco HyperFlex Data Platform, its data writing and reading processes, and data optimization Describe and configure Cisco UCS service profiles Describe and configure Cisco UCS service profile templates Describe and implement iSCSI on Cisco UCS Describe and implement Cisco UCS firmware updates Describe and implement Cisco UCS backups This introductory course shows you how to deploy, secure, operate and maintain the Cisco Unified Computing system (Cisco UCS) B-Series blade server, Cisco UCS C-Series and S-Series rack servers, and Cisco HyperFlex product family, for use in data centers. Describing Cisco UCS Server Hardware Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Cisco UCS S-Series Rack Servers Cisco Virtual Interface Cards Hyperconvergence Overview Cisco HyperFlex HX-Series Servers Describing Cisco UCS Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Cisco UCS C-Series Connectivity Cisco UCS S-Series Connectivity Cisco HyperFlex Connectivity Architecture Cisco HyperFlex Edge Connectivity Ethernet End-Host Mode Compared to Switching Mode Cisco UCS Fabric Interconnect Uplink Pinning Cisco UCS C-Series Integration Describing the Cisco HyperFlex HX Data Platform Cisco HyperFlex HX Data Platform Software Writing Data to Cisco HyperFlex HX Data Platform Reading Data from Cisco HyperFlex HX Data Platform Data Optimization in Cisco HyperFlex HX Data Platform Configuring Cisco UCS Service Profiles Portability Issue with Nonabstracted Identities Cisco UCS Service Profile Identity Pools Server Pools IP Pools Configuring Cisco UCS Service Profile Templates Service Profile Templates Implementing iSCSI on Cisco UCS iSCSI Addressing Evolution of SCSI from DAS to SAN iSCSI Multipathing Implementing Cisco UCS Firmware Updates Update Cisco UCS C-Series Server Firmware Download Tasks for the Infrastructure Image Download Tasks for Cisco UCS B-Series Firmware Packages Best Practices for Updating Firmware in Cisco UCS Manager Firmware Upgrades Using Auto Install Capability Catalog Updates Host Firmware Packages Driver Updates for Operating Systems and Hypervisors Implementing Cisco UCS Backups Compare Backup Options in Cisco UCS Manager Compare Two Import Types Policy Backup
Course Objectives At the end of this course you will be able to: Record and edit a Macro Assign macros to keyboard shortcuts, Quick Access Toolbar, Buttons and Shape objects. Use the Visual Basic Editor; change the properties of an object; add a module to a project; write the code for a procedure and then run it; and use the Object Browser to search procedures Manipulate data by declaring variables of different data types; combine data by using expressions; use functions to accept input and display output; and declare variables and procedures with the appropriate scope Use decision structures to create procedures that make decisions; and use loop structures to perform repetitive tasks Create an error handling routine in case things go wrong with VBA code ' 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk Customer Feedback Best Training Ever! Just finished a bespoke 1-1 training course in Excel Advanced, Macros & VBA. Pedro is an excellent trainer, imparting his skills and knowledge in the best way - appropriately to audience skills, knowledge and ability. Pedro is always approachable, encouraging and supportive, giving delegates the optimum learning environment. I would not hesitate to recommend Pedro as a trainer, whatever your level of ability. Amanda Morris - Treasury & Systems Accountant at Reall - Real Equity for All The trainer was very knowledgeable, kept everyone involved and was enthusiastic. A great experience.. Simon Harper - Lloyd's of London My learning experience was awesome. Perdinand Reagan - Subsea7 Very nice and relaxed approach to teaching. Was definitely a good learning experience. Jerome Pupe - S5 Agency World The Trainer – Very positive + patient + helpful + thorough Agnes Souza - Direct Wines ' With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Introduction to Macros and VBA Introducing Visual Basic for Applications Recording a Macro Naming conventions for Macro Procedures Running a Macro Absolute or Relative Cell Referencing Saving and Opening Files with Macros Making macros always available Adding Macros to Keyboard Shortcuts, Quick Access Toolbar, Buttons and Shapes Editing a Macro in the Visual Basic Editor Understanding the Development Environment Customising the Editor Tips for General Typing in VBA Using Visual Basic Help Working with Procedures Program Design Understanding Modules Naming Rules Creating a Module Understanding Procedures Programming Macro Concepts Creating a Subroutine Creating a Function Understanding Arguments Exiting Procedures Calling Procedures Objects, Properties, Methods and Events Understanding Objects Properties, Methods, and Events Navigating the Object Hierarchy Understanding Collections Accessing a Member of a Collection Understanding Hierarchy Using the Object Browser Using the With Statement Working with Properties Working with Methods Creating an Event Procedure Reserved Macro Names Using Expressions, Variables and Intrinsic Functions Understanding Expressions and Statements Declaring Variables Understanding Data Types Determining the Value of Variables Working with Variable Scope Using Built-in VBA Functions Understanding Constants Using Message Boxes Controlling the Answer to a Message Box Using Input Boxes Declaring and Using Object Variables Controlling Program Execution Understanding Control-of-Flow Structures Using the If...End If Decision Structures Nested If Statements Using the Select Case ... End Select Structure Using the Do ... Loop Structure Using the For ... Next Structure Using the For Each ... Next Structure Guidelines for Use of Control-of-Flow Structures Debugging and Handling Errors Understanding Errors Using Debugging Tools Setting Breakpoints and Using Break Mode Stepping Through Code Trapping Errors with the On Error Statement Understanding the Err Object Working with Inline Error Handling Writing an Error-Handling Routine Working with Forms and Controls Understanding UserForms Creating a Form Displaying and Removing a Form Aligning and Sizing Controls Using the Toolbox Working with a Form's Properties, Methods, and Events Working with Form and Control Properties, Methods and Event Setting the Tab Order Populating a Control Who is this course for? Who is this course for? This course is designed to give proficiency in the Visual Basic Editor (VBE), predominantly making use of Excel objects, understanding Object's Properties, Events and Methods, basic VBA Object oriented programming, event handling, control structures, and debugging tools. Requirements Requirements Preferably, delegates should have attended the Excel Advanced course. Certificates Certificates Certificate of completion Digital certificate - Included