Duration 5 Days 30 CPD hours This course is intended for Candidates for this exam are IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. The Modern Desktop Administrator deploys, configures, secures, manages, and monitors devices and client applications in an enterprise environment. Overview After completing this course, learners should be able to: Prepare to install Windows 10. Install Windows 10. Configure Updates for Windows. Perform post-installation configuration tasks. Configure devices and drivers for Windows. Configure storage for Windows. Configure network settings in Windows. Configure remote management of Windows. Configure and manage applications in Windows. Configure Internet Explorer. Describe the methods for securing Windows 10. Configure account access and authentication. Configure file and folder permissions. Create security policies. Describe common threats and methods for mitigating against them. Use Windows troubleshooting and monitoring tools. Troubleshoot Windows installations. Troubleshoot application installation issues. Troubleshoot web browser settings. Troubleshoot Windows authentication. Troubleshoot hardware issues related to Windows machines. Develop an Operating System deployment and upgrade strategy. Understand the different methods of deployment. Understand on-premise and cloud-based solutions. Deploy and migrate desktops to Windows 10. Plan and configure Windows Update policies. Describe the benefits and capabilities of Azure AD. Manage users using Azure AD with Active Directory DS. Implement Windows Hello for Business. Configure conditional access rules based on compliance policies. Describe the various tools used to secure devices and data. Implement Windows Defender Advanced Threat Protection. This five day accelerated course will cover topics necessary to prepare attendees with the baseline knowledge to take the MD-100 and MD-101 exams for the Modern Desktop Administrator Associate certification. Installing Windows Introducing Windows 10 Installation Options Requirements for Windows Features Installation Process and Media Upgrading to Windows 10 Updating Windows Windows Servicing Model Updating Windows Applying Applications and Windows Updates Post-Instalation Configuration and Personalization Customize the Windows 10 UI Configure device specific settings such as power plans and mobile device options Use the Windows control panel and setting app to configure settings Describe using Windows PowerShell Configuring Peripherals and Drivers Managing Devices and Drivers Managing Printers Configuring Networking Configure IP Network Connectivity Implement Name Resolution Implement Wireless Network Connectivity Remote Access Overview Remote Management Configuring Storage Overview of storage options Using OneDrive Managing Disks, Partitions, and Volumes Maintaining Disks and Volumes Managing Storage Spaces Managing Apps in Windows 10 Providing Apps to Users Managing Universal Windows Apps The Windows Store Web browsers in Windows 10 Configuring Authorization and Authentication Using Security Settings to Mitigate Threats Configuring User Account Control Implementing Device Registration Authentication Configuring Data Access and Usage Overview of File Systems Configuring and Managing File Access Configuring and Managing Shared Folders Managing Security with Policies Configuring Advanced Management Tools Configuring Tenant Roles Managing Tenant Health and Services Supporting the Windows 10 Environment Troubleshooting Windows Troubleshooting Tools Troubleshooting the Windows OS Troubleshooting Windows Startup Troubleshooting Operating System Service Issues Troubleshooting Sign-In Issues Troubleshooting Files and Applications File Recovery in Windows 10 Application Troubleshooting Troubleshooting Hardware and Drivers Troubleshooting Device Driver Failures Overview of Hardware Troubleshooting Troubleshooting Physical Failures Planning an Operating System Deployment Strategy Overview of Windows as a service Windows 10 Deployment options Considerations for Windows 10 deployment Implementing Windows 10 Implementing Windows 10 by using dynamic deployment Implementing Windows 10 by using Windows Autopilot Upgrading devices to Windows 10 Managing Updates for Windows 10 Implementing Windows 10 by using dynamic deployment Implementing Windows 10 by using Windows Autopilot Upgrading devices to Windows 10 Device Enrollment Device management options Manage Intune device enrollment and inventory Configuring Profiles Configuring device profiles Managing user profiles Monitoring devices Application Management Implement Mobile Application Management (MAM) Deploying and updating applications Administering applications Managing Authentication in Azure Ad MANAGING AUTHENTICATION IN AZURE AD Managing Devices and Device Policies Microsoft Intune Overview Managing devices with Intune Implement device compliance policies Managing Security Implement device data protection Managing Windows Defender ATP Managing Windows Defender in Windows 10 Additional course details: Nexus Humans Windows 10 Modern Desktop Administrator Associate Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Windows 10 Modern Desktop Administrator Associate Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This overview-level course is ideally suited for professionals seeking an introduction to microservices architecture and its application within a business context. Ideal attendee roles include software developers, system architects, technical managers, and IT professionals who are part of teams transitioning to a microservices approach. It's also an excellent starting point for non-technical roles such as product owners or business analysts who work closely with technical teams and want to better understand and become conversant in the language and principles of microservices. Overview This course combines engaging instructor-led presentations and useful demonstrations with engaging group activities. Throughout the course you'll explore: Understand the Basics of Microservices: Get to know the fundamental principles and characteristics of microservices and how they revolutionize traditional software development approaches. Explore the Design of Microservices: Gain an overview of how microservices are designed based on business requirements and what makes them unique in the software architecture world. Overview of Managing and Scaling Microservices: Get an introduction to how microservices are managed and scaled independently, and understand the significance of these features in your business operations. Familiarize with the Microservices Ecosystem: Learn about the typical patterns, best practices, and common pitfalls in the microservices world, setting a foundation for future learning and implementation. Introduction to Microservices in a Business Context: Acquire a basic understanding of how microservices can be aligned with specific business capabilities, and get a glimpse into how they can coexist with legacy systems in a business setting. Microservices have rapidly emerged as a popular architectural style, breaking down applications into small, independent services that can be developed, deployed, and scaled individually. Microservices offer a robust method to address a variety of projects, such as e-commerce platforms and content management systems, enhancing scalability and boosting productivity. This technology, when employed correctly, can greatly increase software delivery speed and system resilience, making it a crucial skill set for modern technology professionals.Understanding Microservices - A Technical Overview is a one-day course ideally suited for technical professionals seeking an introduction to microservices architecture and its application within a business context. Under the guidance of an industry expert, this engaging class combines lecture-style learning with lively demonstrations, case study review and group discussions.Throughout the course you?ll explore the principles and characteristics that define microservices, how to identify suitable projects for a microservices approach, the factors to consider when designing them, and the strategies to effectively manage and scale them within complex systems. You?ll also learn about the best practices, patterns, and anti-patterns, arming you with the knowledge to make the right architectural choices. This course also explores the real-world implementation of microservices in a business enterprise. We'll discuss how to align the application of microservices with your organization's specific business capabilities, and offer strategies for smoothly integrating this technology within existing legacy systems. Introduction to Microservices Understand what microservices are and their role in modern software development. Introduction to Microservices: what they are and why they matter. Monolithic vs Microservices: highlighting the shift and benefits. Key principles and characteristics of microservices. Identifying suitable applications for microservices transformation. Demo: Analyzing a sample application and identifying potential microservices Architecting and Managing Microservices Learn the basic strategies for scaling and managing microservices. Scaling Microservices: from a single service to hundreds. Key components of a microservices architecture. Introduction to resilience patterns: Circuit-Breakers and Bulkheads. Load management and provisioning in a microservices setup. Understanding the role of cloud services in microservices. Optional Demo: Illustrating how a microservice-based application scales in real-time Designing Microservices Learn the key aspects to consider when designing microservices. Defining microservice boundaries: Deciding the scope of a microservice. Communication patterns in microservices. Understanding Microservice endpoints. Exploring data stores and transaction boundaries in microservices. Overcoming challenges in Microservices design. Demo: Designing microservices for a hypothetical business requirement Implementing Microservices in a Business Enterprise Understand the process and considerations for implementing microservices in an enterprise context. Assessing enterprise readiness for microservices. Building the business case for microservices: strategic advantages and potential challenges. Aligning microservices with business capabilities. Organizational changes: Team structures and processes for microservices. Dealing with Legacy Systems: Strategies for microservices integration. Demo: Exploring a case study of successful microservices implementation in a business enterprise The Microservices Ecosystem Understand the key tools and best practices in the Microservices ecosystem. Understanding the typical Microservices Stack. Monitoring and Logging in Microservices. Introduction to Docker: Containerization of Microservices. Deployment strategies in a Microservices setup. Introduction to Orchestration in Microservices Demo: Containerizing and deploying a simple microservice Microservices Deployment Strategies Understand various ways to safely introduce changes in a microservices environment. The concept of Blue-Green Deployment: changing services without downtime. Canary Releases and Feature Toggles: slowly rolling out changes to users. Database changes in a microservices environment: keeping data consistent. Demo: Examining various deployment strategies Microservices Best Practices and DevOps Learn key strategies to ensure a smooth operation of your microservices setup. The DevOps culture in Microservices: collaboration for efficiency. Defining a Minimum Viable Product in a Microservices setup: building small, delivering fast. Dealing with data in a distributed setup: managing Data Islands. The importance of Continuous Integration/Continuous Delivery in a microservices setup. Governance: Keeping track of your services and their consumers. Demo: Visualizing a simple continuous delivery pipeline Microservices Patterns and Anti-Patterns Learn about common do's and don'ts when working with microservices. Understanding patterns that help with efficient microservices operation. Recognizing and avoiding anti-patterns that can hinder performance. Dealing with common challenges: dependencies between services, managing service boundaries. Demo: Examples of real-world patterns and anti-patterns Simple Overview of OAuth and OpenID for Microservices Introduction to OAuth and OpenID: What they are and why they matter in Microservices. The role of tokens in OAuth 2.0: How they help in securing communications. A simplified look at OpenID Connect: Linking identities across services. Demo
Train to become a Driving Instructor with Driving Skills Academy and earn up to £40,000 + per annum after meeting all your business and car expenses. If you want to be your own boss and are looking for a well-paid job that you can fit in and around your lifestyle then becoming a driving instructor could be the ideal full time or part time career.
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for students who have experience using the Windows 10 operating system and need to start using the Windows 11 operating system. Overview In this course, you will use the new and updated features of Windows 11. You will: Navigate the Windows environment. Use apps available in Windows 11. Manage available apps. Configure Windows 11 settings. As an experienced Windows© 10 user, when you are ready to move to Windows 11, you might like some guidance in using the new and updated features. This course will help you identify and use those features efficiently and effectively. Navigating the Windows 11 Environment Topic A: Log in to Windows 11 Topic B: Use the Start Menu Topic C: Use the Taskbar Using Apps Topic A: Use Built-In Apps Topic B: Use the Updated File Explorer Managing Apps Topic A: Use Virtual Desktops Topic B: Obtain Apps from the Microsoft Store Configuring Windows 11 Settings Topic A: Use the Configuration Apps Topic B: Configure Accessibility Features
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Database Administrators, Database Developers, BI professionals, and Business reporting users. Overview Upon successful completion of this course, students will be able to run Queries and retrieve results, perform conditional searches, and retrieve data from multiple tables. Before starting this course, make sure you meet at least one of the following prerequisites: Basic knowledge of the Microsoft Windows operating system and its core functionality. Basic working knowledge of Relational Databases. In this course, students will gain a good understanding of the Transact-SQL language. They will be able to create queries, sort, filter the data, execute procedures with T-SQL. Course Outline 1.Introduction to Microsoft SQL Server 2.Introduction to T-SQL Querying 3.Writing SELECT Queries 4.Querying Multiple Tables 5.Sorting and Filtering Data 6.Working with SQL Server Data Types 7.Using DML to Modify Data 8.Using Built-In Functions 9.Grouping and Aggregating Data 10.Using Subqueries 11.Using Table Expressions 12.Using Set Operators 13.Using Windows Ranking, Offset, and Aggregate Functions 14.Pivoting and Grouping Sets 15.Executing Stored Procedures 16.Programming with T-SQL
Duration 5 Days 30 CPD hours This course is intended for Network engineer Systems engineer Wireless engineer Technical solutions architect Network administrator Wireless design engineer Network manager Overview After taking this course, you should be able to: Describe and implement foundational wireless theory Describe and implement basic wireless security and client access Describe and implement a Cisco wireless network architecture Configure Cisco centralized wireless networks Describe and implement WLAN maintenance and troubleshooting Thisÿcourse gives you the knowledge and skills you need to position, plan, implement, operate, and manage a Cisco WLAN network. This course teaches you how to design, install, configure, monitor, and conduct basic troubleshooting tasks on a Cisco WLAN network of any size. Course Outline DESCRIBING AND IMPLEMENTING FOUNDATIONAL WIRELESS THEORY DESCRIBING AND IMPLEMENTING FOUNDATIONAL WIRELESS MATH AND ANTENNAS DESCRIBING AND IMPLEMENTING FOUNDATIONAL WIRELESS OPERATION DESCRIBING AND IMPLEMENTING BASIC WIRELESS SECURITY DESCRIBING AND IMPLEMENTING 802.1X AND EAP IMPLEMENTING WIRELESS GUEST ACCESS AND CONFIGURING WIRELESS SECURITY DESCRIBING AND IMPLEMENTING CISCO WIRELESS NETWORK ARCHITECTURE DESCRIBING AND IMPLEMENTING CISCO WIRELESS NETWORK DESCRIBING AND IMPLEMENTING CISCO WIRELESS NETWORK WIRED SUPPORT CONFIGURING CISCO CENTRALIZED WIRELESS NETWORKS DESCRIBING AND IMPLEMENTING WLAN MAINTENANCE AND TROUBLESHOOTING
Duration 5 Days 30 CPD hours This course is intended for The Microsoft Technology Associate (MTA) is Microsoft?s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience. Overview This five-day Training 2-Pack helps you prepare for Microsoft Technology Associate Exams 98-366 and 98-367, and build an understanding of these topics: Network Infrastructures, Network Hardware, Protocols and Services, Security Layers, Operating System Security, Network Security, Security Software. These courses leverage the same content as found in the Microsoft Official Academic Courses (MOAC) for these exams. Understand Network InfrastructuresUnderstand Network HardwareUnderstand Protocols and ServicesUnderstand Security LayersUnderstand Operating System SecurityUnderstand Network SecurityUnderstand Security Software UNDERSTANDING LOCAL AREA NETWORKINGDEFINING NETWORKS WITH THE OSI MODELUNDERSTANDING WIRED AND WIRELESS NETWORKSUNDERSTANDING INTERNET PROTOCOLIMPLEMENTING TCP/IP IN THE COMMAND LINEWORKING WITH NETWORKING SERVICESUNDERSTANDING WIDE AREA NETWORKSDEFINING NETWORK INFRASTRUCTURES AND NETWORK SECURITYUNDERSTANDING SECURITY LAYERSAUTHENTICATION, AUTHORIZATION, AND ACCOUNTINGUNDERSTANDING SECURITY POLICYUNDERSTANDING NETWORK SECURITYPROTECTING THE SERVER AND CLIENT
Duration 2.5 Days 15 CPD hours This course is intended for This course is intended to help participants learn basic principles and techniques of providing PC, mobile, applications, and network support. Overview Upon successful completion of this course, students will have introductory knowledge of computer systems and mobile devices. In this course, students will identify and set up: computer hardware, software, networks, files, wireless devices and discuss safety. Identifying Computer Hardware Identify Types of Computing Devices Identify Internal Computer Components Common Computer Connector Types Identify Common Peripheral Devices Identifying Computer Software Compare Functions and Features of Common Operating Systems Identify Application Software Setting Up a Basic Workstation Connect Hardware Install and Configure Operating Systems Install and Configure Applications Configure Accessibility Options Configuring Network Access Network Connection Types Install and Configure a SOHO Router Network and Alternative Technologies Sharing and Storage Methods Working with Files, Folders, and Applications Create Files Navigate a File Structure Manage Files and Folders Compress and Extract Files Create Screen Captures Configuring and Using Wireless Devices Configuring Wireless Devices Use Wireless Devices Securing Computing Devices Identify Security Threats Apply Security Best Practices Perform Secure Web Browsing Supporting Computers and Users Environmental and Safety Concepts Back Up and Restore Data Manage Software Implement Basic Support Measures
Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. The primary audience for this course includes: Systems and network engineersTechnical architectsTechnical support personnelChannel partners and resellers Overview After completing this course, you should be able to: Describe the current network security landscape and the Cisco Integrated Threat Defense (ITD) solutionDescribe the key components of the ITD solution and their use in the networkConfigure the ISE for a baseline of operation in the ITD solutionConfigure the integration between the Stealthwatch and ISE platformsConfigure the integration between the Cisco Firepower and ISE platformsConfigure the integration between Cisco Firepower and AMP for Endpoints This course begins with an analysis of the current cybersecurity landscape and includes details on why networks today need an integrated threat defense architecture. You will integrate and verify proper operation of the key Cisco Integrated Threat Defense products, including Cisco Identity Services Engine (ISE), Cisco Stealthwatch©, Cisco Firepower© NGFW, and Cisco AMP for Endpoints. Verification includes the introduction of malware into the network to ensure proper identification, analysis, and quarantine. Course Outline Integrated Threat Defense Introduction Itd Products Identity Services Engine Setup Integration Of Stealthwatch With Identity Services Engine Integration Of Firepower With Identity Services Engine Integration Of Firepower With Amp For Endpoints
Duration 2 Days 12 CPD hours This course is intended for This SQL training course is designed for students new to writing SQL queries. Overview Upon successful completion of this course, students will be able to: - Understand how relational databases work - Use SQL to output reports - Write queries to obtain data from multiple tables. Students will learn SQL to build applications or to generate business reports.The SQL learned in the course is applicable to all major databases. Relational Database Basics Brief History of SQL Relational Databases Popular Databases SQL Statements Simple SELECTs Introduction to the Northwind Database Some Basics SELECTing All Columns in All Rows Exploring the Tables SELECTing Specific Columns Sorting Records The WHERE Clause and Operator Symbols Using the WHERE clause to check for equality or inequality Using the WHERE clause to check for greater or less than Checking for NULL Using WHERE and ORDER BY Together The WHERE Clause and Operator Words More SELECTs with WHERE Checking Multiple Conditions Writing SELECTs with Multiple Conditions Advanced SELECTs Calculated Fields Calculating Fields Aggregate Functions and Grouping Working with Aggregate Functions Built-in Data Manipulation Functions Data Manipulation Functions Subqueries, Joins and Unions Subqueries Joins Using Joins Outer Joins Unions Working with Unions If time allows, one or more of the following may be covered: Conditional Processing with CASE INSERT, UPDATE, DELETE Student Challenges - Design your own reports