Professional Management is crucial to your company's success. In fact, managers can have the single largest impact on your organisation's productivity and overall profitability, with more influence over employee morale and performance than anyone else.
Our unique 5 day workshop prepares you for a first time pass of your CISSP exam. Covering each of the famous 8 CBK's, cram the theory before testing your knowledge during exam simulations. Led by a multi-award winning InfoSec consultant, this workshop delivers everything you need to pass,
Duration 5 Days 30 CPD hours This course is intended for A Microsoft Power Platform Functional Consultant is responsible for creating and configuring apps, automations, and solutions. They act as the liaison between users and the implementation team. The functional consultant promotes utilization of solutions within an organization. The functional consultant may perform discovery, engage subject matter experts and stakeholders, capture requirements, and map requirements to features. They implement components of a solution including application enhancements, custom user experiences, system integrations, data conversions, custom process automation, and simple visualizations. This course will teach you to use Microsoft Power Platform solutions to simplify, automate, and empower business processes for organizations in the role of a Functional Consultant. A Microsoft Power Platform Functional Consultant is responsible for creating and configuring apps, automations, and solutions. They act as the liaison between users and the implementation team. The functional consultant promotes utilization of solutions within an organization. The functional consultant may perform discovery, engage subject matter experts and stakeholders, capture requirements, and map requirements to features. They implement components of a solution including application enhancements, custom user experiences, system integrations, data conversions, custom process automation, and simple visualizations. This course may contain a 1-day Applied Workshop. This workshop will allow you to practice your Functional Consultant skills by creating an end-to-end solution to solve a problem for a fictitious company. The solution will include a Microsoft Dataverse database, Power Apps canvas app, and Power Automate flows. Prerequisites Experience as an IT professional or student Working knowledge of Microsoft Power Platform and its key components Knowledge of Microsoft Dataverse (or general data modeling) and security concepts 1 - Describe the business value of the Microsoft Power Platform Explore Microsoft Power Platform Describe the business value of the Power Platform Explore connectors and Microsoft Dataverse Describe how Power Platform works with Microsoft 365 apps and services Explore how Power Platform works with Microsoft Teams Describe how Power Platform works with Microsoft Dynamics 365 apps Describe how Power Platform solutions consume Microsoft Azure services Explore how Microsoft Power Platform apps work together Use Artificial Intelligence to increase productivity 2 - Core components of Power Pages Get started with Power Pages Core tools and components of Power Pages Overview of Power Pages security Overview of Power Pages extensibility 3 - Explore Power Pages templates Site design templates Scenario-based templates Dynamics 365 Power Pages site templates 4 - Explore Power Pages design studio Work with pages Page components Site styling and templates 5 - Explore Power Pages design studio data and security features Data workspace in Power Pages design studio Power Pages security features 6 - Introduction to Power Pages administration Power Pages administrative tools Set up workspace in Power Pages design studio 7 - Get started building with Power BI Use Power BI Building blocks of Power BI Tour and use the Power BI service 8 - Get data with Power BI Desktop Overview of Power BI Desktop Explore Power BI Desktop Connect to data sources Get data from Excel Transform data to include in a report Combine data from multiple sources Clean data to include in a report 9 - Model data in Power BI How to manage your data relationships Create calculated columns Optimize data models Create measures Create calculated tables Explore time-based data 10 - Use visuals in Power BI Create and customize simple visualizations Create slicers Map visualizations Matrices and tables Create scatter, waterfall, and funnel charts Modify colors in charts and visuals Page layout and formatting 11 - Explore data in Power BI Quick insights in Power BI Create and configure a dashboard Ask questions of your data with natural language Create custom Q&A suggestions Share dashboards with your organization Display visuals and tiles in full screen Edit tile details and add widgets Get more space on your dashboard 12 - Publish and share in Power BI Publish Power BI Desktop reports Print and export dashboards and reports Introducing Power BI Mobile Create workspaces in Power BI Build apps Use apps Integrate OneDrive for Business with Power BI Publish to web 13 - Create and manage workspaces in Power BI Distribute a report or dashboard Monitor usage and performance Recommend a development life cycle strategy Troubleshoot data by viewing its lineage Configure data protection 14 - Manage semantic models in Power BI Use a Power BI gateway to connect to on-premises data sources Configure a semantic model scheduled refresh Configure incremental refresh settings Manage and promote semantic models Troubleshoot service connectivity Boost performance with query caching (Premium) 15 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 16 - Implement row-level security Configure row-level security with the static method Configure row-level security with the dynamic method 17 - Create tables in Dataverse Table characteristics Table relationships Dataverse logic and security Dataverse auditing Dual-write vs. virtual tables 18 - Manage tables in Dataverse Identify tables and table types in Dataverse Create a custom table Enable attachments within a table Licensing requirements for each table type 19 - Create and manage columns within a table in Dataverse Define columns in Microsoft Dataverse Column types in Microsoft Dataverse Add a column to a table Create a primary name column Restrictions that apply to columns in a table Create an auto numbering column Create an alternate key 20 - Create a relationship between tables in Dataverse Relate one or more tables - Introduction Relationship types that are available in Microsoft Dataverse Create a one-to-many relationship between tables Create a many-to-many relationship between tables Edit or delete relationships 21 - Working with choices in Dataverse Define choice column Standard choices column 22 - Get started with security roles in Dataverse Understand environment roles Adding or disabling an environment user Understand security concepts in Dataverse Understand user security roles and security role defaults Check the roles that a user belongs to Configure Dataverse teams for security Configure Dataverse group teams for security 23 - Use administration options for Dataverse Use Microsoft Power Platform Admin Center portal Tenant storage capacity Advanced Customization options in Power Apps Portal Enable and disable auditing 24 - Manage Dynamics 365 model-driven app settings and security Configure role-based security Manage teams and business units Explore settings and customizations 25 - Introduction to Microsoft Power Platform security and governance Identify Microsoft Power Platform environments Data Loss Prevention policies Microsoft Power Platform Center of Excellence Starter Kit 26 - Get started with model-driven apps in Power Apps Introducing model-driven apps Components of model-driven apps Design model-driven apps Incorporate business process flows 27 - Configure forms, charts, and dashboards in model-driven apps Forms overview Form elements Configure multiple forms Use specialized form components Configure views overview Configure grids Create and edit views Configure charts overview Dashboards overview Use interactive streams and tiles 28 - Get started with Power Apps canvas apps Power Apps building blocks Ways to build Power Apps Power Apps related technologies Additional Power Apps related technologies Designing a Power Apps app 29 - Connect to other data in a Power Apps canvas app Overview of the different data sources Work with action-based data sources Power Automate is a companion to Power Apps 30 - How to build the UI in a canvas app in Power Apps Use themes to quickly change the appearance of your app Branding a control Icons Images Personalization Using the tablet or phone form factors 31 - Manage apps in Power Apps Power Apps review 32 - Build your first app with Power Apps and Dataverse for Teams Create your first app with the hero template Customize your app with Power Apps Studio Publish your app Install template apps 33 - Access Dataverse in Power Pages websites Use lists to display multiple Dataverse records Use forms to interact with Dataverse data 34 - Authentication and user management in Power Pages Power Pages authentication settings User registration in Power Pages Authentication management for Power Pages users Power Pages authentication providers 35 - Power Pages maintenance and troubleshooting Power Pages website maintenance Power Pages website troubleshooting 36 - Define and create business rules in Dataverse Define business rules - Introduction Define the components of a business rule Create a business rule 37 - Get started with Power Automate Introducing Power Automate Troubleshoot flows 38 - Use the Admin center to manage environments and data policies in Power Automate Administer flows Export and import flows Learn how to distribute button flows 39 - Use Dataverse triggers and actions in Power Automate Dataverse triggers Query data Create, update, delete, and relate actions 40 - Extend Dataverse with Power Automate Set up a flow and configure its trigger Email Dataverse record Add to-do items Test and run your flow 41 - Introduction to expressions in Power Automate Get started with expressions Notes make things easier Types of functions Write complex expressions 42 - Build your first Power Automate for desktop flow Set up the environment Explore Power Automate for desktop Create your first Power Automate for desktop flow Record Power Automate for desktop actions Edit and test recorded actions 43 - Run a Power Automate for desktop flow in unattended mode Set up an unattended desktop flow Create a new cloud flow that calls an existing flow in unattended mode Perform a test run Best practices 44 - Optimize your business process with process advisor Get familiar with process advisor Create your first recording Edit recordings and group actions Analyze recordings and interpret results Automation recommendations 45 - Get started with Microsoft Copilot Studio bots Get started working with environments Create bots and work with the Microsoft Copilot Studio interface Create topics Test bots Publish bots and analyze performance 46 - Enhance Microsoft Copilot Studio bots Use Power Automate to add actions Transfer conversations to agents by using Omnichannel for Customer Service Create topics for existing support content Analyze bot performance 47 - Manage topics in Microsoft Copilot Studio Work with bot topics Branch a topic Create topics for existing support content Work with system fallback topics Manage topics 48 - Manage Power Virtual Agents Environments in Microsoft Copilot Studio Bot topics permissions Bot entities and flow permissions Monitor and diagnose Administer and manage Export and import bots Authentication 49 - Get started building with Power BI Use Power BI Building blocks of Power BI Tour and use the Power BI service 50 - Get data with Power BI Desktop Overview of Power BI Desktop Explore Power BI Desktop Connect to data sources Get data from Excel Transform data to include in a report Combine data from multiple sources Clean data to include in a report 51 - Model data in Power BI How to manage your data relationships Create calculated columns Optimize data models Create measures Create calculated tables Explore time-based data 52 - Use visuals in Power BI Create and customize simple visualizations Create slicers Map visualizations Matrices and tables Create scatter, waterfall, and funnel charts Modify colors in charts and visuals Page layout and formatting 53 - Explore data in Power BI Quick insights in Power BI Create and configure a dashboard Ask questions of your data with natural language Create custom Q&A suggestions Share dashboards with your organization Display visuals and tiles in full screen Edit tile details and add widgets Get more space on your dashboard 54 - Publish and share in Power BI Publish Power BI Desktop reports Print and export dashboards and reports Introducing Power BI Mobile Create workspaces in Power BI Build apps Use apps Integrate OneDrive for Business with Power BI Publish to web 55 - Manage solutions in Power Apps and Power Automate Add and remove apps, flows, and entities in a solution Edit a solution-aware app, flow, and table Build and deploy a complex solution with flows, apps, and entities Automate solution management 56 - Load/export data and create data views in Dataverse View data in a table Create or edit views of data in a table Load data into a table Export data from a table Add, update, or delete data in a table by using Excel Import data using Power Query Generate a new dataflow from an Excel Template Dataflow and Azure integration 57 - Get started with AI Builder Choose an AI capability Create your first model Ways to use your models 58 - Manage models in AI Builder Model lifecycle Manage model versions Share your models 59 - Use AI Builder in Power Automate AI Builder in Power Automate saves time Advanced usage of AI Builder in Power Automate 60 - Functional Consultant skills Create entity relationship diagrams Create and document mock-ups Document functional requirements and artifacts Complete fit-gap analysis Discuss stakeholder management responsibilities Understand industry accelerators Define Application Lifecycle Management Participate in testing Evaluate options Define connectors Understand Power Apps component framework 61 - Solution Architect series: Plan application lifecycle management for Power Platform Key considerations for ALM Solutions Configuration and reference data Release process ALM with Azure DevOps
About this Virtual Instructor Led Training (VILT) This 5 half-day Virtual Instructor Led Training (VILT) course covers carbon capture and geological storage of carbon dioxide. Burning fossil fuels for energy is a major source of carbon dioxide emissions to the atmosphere. Most anthropogenic (man-made) carbon dioxide is emitted by coal-fired or gas-fired power plants, and significant quantities of carbon dioxide are emitted through the production and separation of carbon dioxide-rich natural gas and industries such as cement, iron and steel. Carbon Capture Utilization and Storage, or CCUS, involves the long-term storage of captured carbon dioxide emissions in subsurface geologic formations. This VILT course covers all aspects of CCUS including transport, storage and monitoring, economics and community engagement. It explores in detail the challenges of the current technology of geological storage, monitoring and verification including examples from working projects around the world. Many of these technologies are commonly employed by the petroleum industry. Successful deployment of CCUS will also require economic incentives, appropriate regulation, clarity on liability issues and acceptance by the community. These aspects of CCUS, and the corresponding opportunities for appropriately skilled organisations and individuals also will be discussed. Course Content at a Glance Context for CCS/CCUS as An Emissions-reduction Measure Principles of Geological Storage Finding Geological Storage Sites Stationary Sources of Carbon Dioxide for Capture Carbon Dioxide Capture Technologies Compression and Transport of Carbon Dioxide Economics of CCS/CCUS Community, Safety, Legal & Regulatory Issues Risk Assessment Training Objectives Upon completion of this VILT course, participants will be able to: Identify the need for Carbon Capture and Storage (CCS) Outline the key steps in the Carbon Capture and Storage process Distinguish between reservoir rocks and sealing rocks Describe the importance of permeability and porosity to storing carbon dioxide Contrast the geological structures and trapping mechanisms for storing carbon dioxide Describe the changes in geologically stored carbon dioxide over time Outline the monitoring techniques employed to ensure the carbon dioxide is safely stored Appreciate the industrial applications of carbon dioxide capture Recognize the scale of industry required for transporting and storing carbon dioxide Describe economic considerations for CCS/CCUS Outline the economic and environmental opportunities and challenges with using carbon dioxide injection in a range of applications Explain the challenges of regulatory frameworks and public acceptance in a CCS/CCUS project Identify potential risks of a CCS/CCUS project Outline the risk assessment and management process Target Audience This VILT course is ideally suited for a technical audience - geoscientists, petroleum and chemical engineers - as well as for economists, regulators, legal staff and managers wishing to learn more about the details of both the technical, regulatory and socio-economic aspects of carbon capture and storage. Participants should have: Experience with oil and gas, coal or other energy projects Basic understanding of the energy industry Course Level Intermediate Trainer Your first expert course leader spent 18 years in the Petroleum Industry before joining academia, in both technical and managerial roles with Shell, Arco and Vico. He has received numerous awards, including Distinguished Service, Honorary member and Special Commendation awards from the American Association of Petroleum Geologist (AAPG) and was AAPG's International Vice-President and recently chairman of AAPG's House of Delegates (the Associations Parliamentary body). He is an SPE Distinguished Lecturer (DL) and has served as DL for several other professional organisations, including, AAPG, IPA and PESA. He is currently a Professor of Petroleum Geology and Engineering at the Australian School of Petroleum, University of Adelaide. He holds the South Australia State Chair in Carbon Capture & Storage (CCS) and is also presently Distinguished Scientist of the Cooperative Research Centre for Greenhouse Gas Technologies (CO2CRC), having served earlier as the Storage Program Manager and Chief Scientist. Your second expert course leader has a wide and deep knowledge of major capture technologies: solvent, membrane and adsorption based technologies and has developed pathways for retrofitting CO2 capture and storage (CCS) to fossil fuel-based power plants. He has been actively engaged in Post-combustion capture project management and demonstration projects in Victoria's Latrobe Valley on CO2 capture and hydrogen production, and on CO2 capture using membrane contactor technology. He has led various feasibility studies for the Asian Development Bank on CO2 Capture at Indian Oil Corporation's refineries, for JPOWER on hydrogen production from Victorian brown coal and for Kawasaki on incorporation of CCS in hydrogen production from fossil fuel. He has authored multiple peer reviewed journal articles, co-authored various confidential reports on CO2 capture, utilization and hydrogen production and utility, and has presented his work at various conferences, symposiums and seminars. He has a PhD in Chemical Engineering from Monash University Australia and a Master of Technology in Process Engineering from Indian Institute of Technology Delhi India. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: -Experience with Windows networking technologies and implementation. - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - Review Windows PowerShell Learn about Windows PowerShell Get familiar with Windows PowerShell applications Identify factors to install and use Windows PowerShell Configure the Windows PowerShell console Configure the Windows PowerShell Integrated Scripting Environment (ISE) Use Visual Studio Code with PowerShell 2 - Understand the command syntax in Windows PowerShell Discover the structure of PowerShell cmdlets Discover the parameters for using PowerShell cmdlets Review the tab completion feature in PowerShell Display the About files content in PowerShell 3 - Find commands and Get-Help in Windows PowerShell Define modules in PowerShell Find cmdlets in PowerShell Use command aliases in PowerShell Use Show-Command and Get-Help in PowerShell Interpret the help file contents and update the local help content in PowerShell 4 - Manage Active Directory Domain Services using PowerShell cmdlets Manage user accounts in PowerShell Manage groups and group memberships in PowerShell Manage computer accounts in PowerShell Manage organizational units and Active Directory objects in PowerShell 5 - Manage network service settings for Windows devices using PowerShell cmdlets Manage IP addresses in PowerShell Manage IP routing in PowerShell Manage DNS clients in PowerShell Manage Windows Firewall settings in PowerShell 6 - Manage Windows Server settings using PowerShell cmdlets Automate management tasks using the Group Policy management cmdlets Manage server roles and services using PowerShell cmdlets Manage Hyper-V Virtual Machines using PowerShell cmdlets Manage Internet Information Services using PowerShell cmdlets 7 - Manage settings for a local Windows machine using PowerShell cmdlets Manage Windows 10 using PowerShell Manage permissions with PowerShell 8 - Understand the Windows PowerShell pipeline Review Windows PowerShell pipeline and its output Discover object members in PowerShell Control the formatting of pipeline output 9 - Select, sort, and measure objects using the pipeline Sort and group objects by property in the pipeline Measure objects in the pipeline Select a set of objects in the pipeline Select object properties in the pipeline Create and format calculated properties in the pipeline 10 - Filter objects out of the pipeline Learn about the comparison operators in PowerShell Review basic filter syntax in the pipeline Review advanced filter syntax in the pipeline Optimize the filter performance in the pipeline 11 - Enumerate objects in the pipeline Learn about enumerations in the pipeline Review basic syntax to enumerate objects in the pipeline Review advanced syntax to enumerate objects in the pipeline 12 - Send and pass data as output from the pipeline Write pipeline data to a file Convert pipeline objects to other forms of data representation in PowerShell Control additional output options in PowerShell 13 - Pass pipeline objects Pipeline parameter binding Identify ByValue parameters Pass data by using ByValue Pass data by using ByPropertyName Identify ByPropertyName parameters Use manual parameters to override the pipeline Use parenthetical commands Expand property values 14 - Connect with data stores using PowerShell providers Define Windows PowerShell providers Review the built-in providers in PowerShell Access provider help in PowerShell 15 - Use PowerShell drives in PowerShell Explain PowerShell drives in PowerShell Use PowerShell drive cmdlets in PowerShell Manage the file system in PowerShell Manage the registry in PowerShell Work with certificates in PowerShell Work with other PowerShell drives in PowerShell 16 - Review CIM and WMI Review architecture of CIM and WMI Review repositories in CIM and WMI Locate online class documentation by using CIM and WMI cmdlets 17 - Query configuration information by using CIM and WMI List local repository namespaces and classes by using CIM and WMI Query instances by using commands and WMI Query Language Connect to remote computers by using CIM and WMI cmdlets Query repository classes from remote computers by using CIMSession objects 18 - Query and manipulate repository objects by using CIM and WMI methods Discover methods of repository objects by using CIM and WMI Locate class methods and documentation by using CIM and WMI Invoke methods of repository objects by using CIM and WMI 19 - Manage variables in Windows PowerShell scripts Define variables in Windows PowerShell scripts Create variable names in Windows PowerShell scripts Assign values and types to variables in Windows PowerShell scripts Identify the methods and properties of variables in Windows PowerShell scripts Use string variables and methods in Windows PowerShell scripts Use date variables and methods in Windows PowerShell scripts 20 - Work with arrays and hash tables in Windows PowerShell scripts Define an array in Windows PowerShell scripts Work with array lists in Windows PowerShell scripts Define hash tables in Windows PowerShell Scripts Work with hash tables in Windows PowerShell scripts 21 - Create and run scripts by using Windows PowerShell Review Windows PowerShell scripts Modify scripts in the PowerShell Gallery Create scripts using Windows PowerShell Review the PowerShellGet module in Windows PowerShell Run scripts and set the execution policy in Windows PowerShell Review Windows PowerShell and AppLocker Sign the scripts digitally in Windows PowerShell 22 - Work with scripting constructs in Windows PowerShell Review and use the ForEach loop in Windows PowerShell scripts Review and use the If construct in Windows PowerShell scripts Review and use the Switch construct in Windows PowerShell scripts Review the For construct in Windows PowerShell scripts Review other loop constructs in Windows PowerShell scripts Review Break and Continue in Windows PowerShell scripts 23 - Import data in different formats for use in scripts by using Windows PowerShell cmdlets Use the Get-Content command in Windows PowerShell scripts Use the Import-Csv cmdlet in Windows PowerShell scripts Use the Import-Clixml cmdlet in Windows PowerShell scripts Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - Use methods to accept user inputs in Windows PowerShell scripts Identify values that might change in Windows PowerShell scripts Use the Read-Host cmdlet in Windows PowerShell scripts Use the Get-Credential cmdlet in Windows PowerShell scripts Use the Out-GridView cmdlet in Windows PowerShell scripts Pass parameters to a Windows PowerShell script 25 - Troubleshoot scripts and handle errors in Windows PowerShell Interpret error messages generated for Windows PowerShell commands Add output to Windows PowerShell scripts Use breakpoints in Windows PowerShell scripts Interpret error actions for Windows PowerShell commands 26 - Use functions and modules in Windows PowerShell scripts Review functions in Windows PowerShell scripts Use variable scope in Windows PowerShell scripts Create modules in Windows PowerShell scripts Use the dot sourcing feature in Windows PowerShell 27 - Manage single and multiple computers by using Windows PowerShell remoting Review the remoting feature of Windows PowerShell Compare remoting with remote connectivity Review the remoting security feature of Windows PowerShell Enable remoting by using Windows PowerShell Use one-to-one remoting by using Windows PowerShell Use one-to-many remoting by using Windows PowerShell Compare remoting output with local output 28 - Use advanced Windows PowerShell remoting techniques Review common remoting techniques of Windows PowerShell Send parameters to remote computers in Windows PowerShell Set access protection to variables, aliases, and functions by using the scope modifier Enable multi-hop remoting in Windows PowerShell 29 - Manage persistent connections to remote computers by using Windows PowerShell sessions Review persistent connections in Windows PowerShell Create and manage persistent PSSessions by using Windows PowerShell Disconnect PSSessions by using Windows PowerShell Review the feature of implicit remoting in Windows PowerShell 30 - Review Azure PowerShell module Review Azure PowerShell Review the benefits of the Azure PowerShell module Install the Azure PowerShell module Migrate Azure PowerShell from AzureRM to Azure Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - Review the features and tools for Azure Cloud Shell Review the characteristics of Azure Cloud Shell Review the features and tools of Azure Cloud Shell Configure and experiment with Azure Cloud Shell 32 - Manage Azure resources with Windows PowerShell Create a new Azure virtual machine by using Windows PowerShell commands Manage Azure virtual machines by using Windows PowerShell commands Manage Azure related storage by using Azure PowerShell Manage Azure subscriptions by using Azure PowerShell 33 - Manage users, groups, and licenses in Microsoft Entra ID by using Windows PowerShell Review benefits to manage Microsoft 365 services by using Windows PowerShell Connect to the Microsoft 365 tenant by using Windows PowerShell Manage users in Microsoft 365 by using Windows PowerShell Manage groups in Microsoft 365 by using Windows PowerShell Manage roles in Microsoft 365 by using Windows PowerShell Manage licenses in Microsoft 365 by using Windows PowerShell 34 - Manage Exchange Online by using Windows PowerShell Connect to Exchange Online by using Windows PowerShell Manage mailboxes in Exchange Online by using Windows PowerShell Manage resources in Exchange Online by using Windows PowerShell Manage admin roles in Exchange Online by using Windows PowerShell 35 - Manage SharePoint Online by using Windows PowerShell Install and connect to SharePoint Online Management Shell by using Windows PowerShell Manage SharePoint Online users and groups by using Windows PowerShell Manage SharePoint sites by using Windows PowerShell Manage SharePoint Online external user sharing by using Windows PowerShell 36 - Manage Microsoft Teams by using Windows PowerShell Review Microsoft Teams PowerShell module Install the Microsoft Teams PowerShell module Manage teams with Microsoft Teams PowerShell module 37 - Create and manage background jobs using Windows PowerShell Define the types of background jobs in Windows PowerShell Start remote jobs and CIM/WMI jobs in Windows PowerShell Monitor jobs in Windows PowerShell Retrieve results for running jobs in Windows PowerShell 38 - Create and manage scheduled jobs using Windows PowerShell Create and run Windows PowerShell scripts as scheduled tasks Define scheduled jobs in Windows PowerShell Create job option and job trigger objects in Windows PowerShell Create and register a scheduled job in Windows PowerShell Retrieve the results from a scheduled job in Windows PowerShell
Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET
Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. Both Azure administration and Azure development with proven expertise in at least one of these areas. Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. AZ-104T00 - Microsoft Azure Administrator AZ-204T00: Developing Solutions for Microsoft Azure 1 - Introduction to DevOps What is DevOps? Explore the DevOps journey Identify transformation teams Explore shared goals and define timelines 2 - Choose the right project Explore greenfield and brownfield projects Decide when to use greenfield and brownfield projects Decide when to use systems of record versus systems of engagement Identify groups to minimize initial resistance Identify project metrics and key performance indicators (KPIs) 3 - Describe team structures Explore agile development practices Explore principles of agile development Define organization structure for agile practices Explore ideal DevOps team members Enable in-team and cross-team collaboration Select tools and processes for agile practices 4 - Choose the DevOps tools What is Azure DevOps? What is GitHub? Explore an authorization and access strategy Migrate or integrate existing work management tools Migrate or integrate existing test management tools Design a license management strategy 5 - Plan Agile with GitHub Projects and Azure Boards Link GitHub to Azure Boards Configure GitHub Projects Manage work with GitHub Project boards Customize Project views Collaborate using team discussions Agile Plan and Portfolio Management with Azure Boards 6 - Introduction to source control Explore DevOps foundational practices What is source control? Explore benefits of source control Explore best practices for source control 7 - Describe types of source control systems Understand centralized source control Understand distributed source control Explore Git and Team Foundation Version Control Examine and choose Git Understand objections to using Git Describe working with Git locally 8 - Work with Azure Repos and GitHub Migrate from TFVC to Git Use GIT-TFS Develop online with GitHub Codespaces 9 - Structure your Git Repo Explore monorepo versus multiple repos Implement a change log 10 - Manage Git branches and workflows Explore branch workflow types Explore feature branch workflow Explore Git branch model for continuous delivery Explore GitHub flow Explore fork workflow Version Control with Git in Azure Repos 11 - Collaborate with pull requests in Azure Repos Collaborate with pull requests Examine GitHub mobile for pull request approvals 12 - Identify technical debt Examine code quality Examine complexity and quality metrics Measure and manage technical debt Integrate other code quality tools Plan effective code reviews 13 - Explore Git hooks Implement Git hooks 14 - Plan foster inner source Explore foster inner source Implement the fork workflow Describe inner source with forks 15 - Manage Git repositories Work with large repositories Purge repository data Manage releases with GitHub Repos Automate release notes with GitHub 16 - Explore Azure Pipelines Explore the concept of pipelines in DevOps Describe Azure Pipelines Understand Azure Pipelines key terms 17 - Manage Azure Pipeline agents and pools Choose between Microsoft-hosted versus self-hosted agents Explore job types Explore predefined agent pool Understand typical situations for agent pools Communicate with Azure Pipelines Communicate to deploy to target servers Examine other considerations Describe security of agent pools Configure agent pools and understanding pipeline styles 18 - Describe pipelines and concurrency Understand parallel jobs Estimate parallel jobs Describe Azure Pipelines and open-source projects Explore Azure Pipelines and Visual Designer Describe Azure Pipelines and YAML 19 - Explore continuous integration Learn the four pillars of continuous integration Explore benefits of continuous integration Describe build properties Enable Continuous Integration with Azure Pipelines 20 - Implement a pipeline strategy Configure agent demands Implement multi-agent builds Explore source control types supported by Azure Pipelines 21 - Integrate with Azure Pipelines Describe the anatomy of a pipeline Understand the pipeline structure Detail templates Explore YAML resources Use multiple repositories in your pipeline 22 - Introduction to GitHub Actions What are Actions? Explore Actions flow Understand workflows Describe standard workflow syntax elements Explore events Explore jobs Explore runners Examine release and test an action 23 - Learn continuous integration with GitHub Actions Describe continuous integration with actions Examine environment variables Share artifacts between jobs Examine Workflow badges Describe best practices for creating actions Mark releases with Git tags Create encrypted secrets Use secrets in a workflow Implement GitHub Actions for CI/CD 24 - Design a container build strategy Examine structure of containers Work with Docker containers Understand Dockerfile core concepts Examine multi-stage dockerfiles Examine considerations for multiple stage builds Explore Azure container-related services Deploy Docker containers to Azure App Service web apps 25 - Introduction to continuous delivery Explore traditional IT development cycle What is continuous delivery? Move to continuous delivery Understand releases and deployments Understand release process versus release 26 - Create a release pipeline Describe Azure DevOps release pipeline capabilities Explore release pipelines Explore artifact sources Choose the appropriate artifact source Examine considerations for deployment to stages Explore build and release tasks Explore custom build and release tasks Explore release jobs Configure Pipelines as Code with YAML 27 - Explore release recommendations Understand the delivery cadence and three types of triggers Explore release approvals Explore release gates Use release gates to protect quality Control Deployments using Release Gates 28 - Provision and test environments Provision and configure target environments Configure automated integration and functional test automation Understand Shift-left Set up and run availability tests Explore Azure Load Testing Set up and run functional tests 29 - Manage and modularize tasks and templates Examine task groups Explore variables in release pipelines Understand variable groups 30 - Automate inspection of health Automate inspection of health Explore events and notifications Explore service hooks Configure Azure DevOps notifications Configure GitHub notifications Explore how to measure quality of your release process Examine release notes and documentation Examine considerations for choosing release management tools Explore common release management tools 31 - Introduction to deployment patterns Explore microservices architecture Examine classical deployment patterns Understand modern deployment patterns 32 - Implement blue-green deployment and feature toggles What is blue-green deployment? Explore deployment slots Describe feature toggle maintenance 33 - Implement canary releases and dark launching Explore canary releases Examine Traffic Manager Understand dark launching 34 - Implement A/B testing and progressive exposure deployment What is A/B testing? Explore CI-CD with deployment rings 35 - Integrate with identity management systems Integrate GitHub with single sign-on (SSO) Explore service principals Explore Managed Identity 36 - Manage application configuration data Rethink application configuration data Explore separation of concerns Understand external configuration store patterns Examine Key-value pairs Examine App configuration feature management Integrate Azure Key Vault with Azure Pipelines Manage secrets, tokens and certificates Examine DevOps inner and outer loop Integrate Azure Key Vault with Azure DevOps Enable Dynamic Configuration and Feature Flags 37 - Explore infrastructure as code and configuration management Explore environment deployment Examine environment configuration Understand imperative versus declarative configuration Understand idempotent configuration 38 - Create Azure resources using Azure Resource Manager templates Why use Azure Resource Manager templates? Explore template components Manage dependencies Modularize templates Manage secrets in templates Deployments using Azure Bicep templates 39 - Create Azure resources by using Azure CLI What is Azure CLI? Work with Azure CLI 40 - Explore Azure Automation with DevOps Create automation accounts What is a runbook? Understand automation shared resources Explore runbook gallery Examine webhooks Explore source control integration Explore PowerShell workflows Create a workflow Examine checkpoint and parallel processing 41 - Implement Desired State Configuration (DSC) Understand configuration drift Explore Desired State Configuration (DSC) Explore Azure Automation State configuration (DSC) Examine DSC configuration file Explore hybrid management Implement DSC and Linux Automation on Azure 42 - Implement Bicep What is Bicep? Install Bicep Understand Bicep file structure and syntax 43 - Introduction to Secure DevOps Describe SQL injection attack Understand DevSecOps Explore Secure DevOps Pipeline Explore key validation points Explore continuous security validation Understand threat modeling 44 - Implement open-source software Explore how software is built What is open-source software Explore corporate concerns with open-source software components Explore common open-source licenses Examine license implications and ratings 45 - Software Composition Analysis Inspect and validate code bases for compliance Explore software composition analysis (SCA) Integrate Mend with Azure Pipelines Implement GitHub Dependabot alerts and security updates Integrate software composition analysis checks into pipelines Examine tools for assess package security and license rate Interpret alerts from scanner tools Implement security and compliance in an Azure Pipeline 46 - Static analyzers Explore SonarCloud Explore CodeQL in GitHub Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP and Dynamic Analyzers Plan Implement OWASP Secure Coding Practices Explore OWASP ZAP penetration test Explore OWASP ZAP results and bugs 48 - Security Monitoring and Governance Implement pipeline security Explore Microsoft Defender for Cloud Examine Microsoft Defender for Cloud usage scenarios Explore Azure Policy Understand policies Explore initiatives Explore resource locks Explore Azure Blueprints Understand Microsoft Defender for Identity 49 - Explore package dependencies What is dependency management? Describe elements of a dependency management strategy Identify dependencies Understand source and package componentization Decompose your system Scan your codebase for dependencies 50 - Understand package management Explore packages Understand package feeds Explore package feed managers Explore common public package sources Explore self-hosted and SaaS based package sources Consume packages Publish packages Package management with Azure Artifacts 51 - Migrate consolidating and secure artifacts Identify existing artifact repositories Migrate and integrating artifact repositories Secure access to package feeds Examine roles Examine permissions Examine authentication 52 - Implement a versioning strategy Understand versioning of artifacts Explore semantic versioning Examine release views Promote packages Explore best practices for versioning 53 - Introduction to GitHub Packages Publish packages Install a package Delete and restore a package Explore package access control and visibility 54 - Implement tools to track usage and flow Understand the inner loop Explore Azure Monitor and Log Analytics Examine Kusto Query Language (KQL) Explore Application Insights Implement Application Insights Monitor application performance with Application Insights 55 - Develop monitor and status dashboards Explore Azure Dashboards Examine view designer in Azure Monitor Explore Azure Monitor workbooks Explore Power BI Build your own custom application 56 - Share knowledge within teams Share acquired knowledge within development teams Integrate with Azure Boards Share team knowledge using Azure Project Wiki 57 - Design processes to automate application analytics Explore rapid responses and augmented search Integrate telemetry Examine monitoring tools and technologies 58 - Manage alerts, blameless retrospectives and a just culture Examine when get a notification Explore how to fix it Explore smart detection notifications Improve performance Understand server response time degradation Reduce meaningless and non-actionable alerts Examine blameless retrospective Develop a just culture
Duration 5 Days 30 CPD hours This course is intended for Microsoft Dynamics 365 Finance and Operations Apps Developers Overview By the end of this course, you will learn to develop fully realized solutions by using standardized application coding patterns. In this course, you will learn the tasks needed to fulfill the role of developer in Dynamics 365 Finance and Operations Apps. The Dynamics 365 for Finance and Operations (FO) developer is a key technical resource that implements and extends the application to meet the requirements of the business. Module 1: Overview & Architecturen Explore the ecosystem and main components Explore the technical architecture Explore design and deployment considerations Module 2: Developer Tools Manage implementations by using Lifecycle Services Manage source code by using version control Customize by using Visual Studio Module 3: Solution Design Implement application lifecycle management Module 4: AOT Elements Build extended data types and enumerations Build tables Build forms and optimize form performance Create classes Create other user interface elements Module 5: Code Development & Testing Explore the test framework and use tools Get started with development using X++ Develop object-oriented code Use RSAT tool Module 6: Data Migration Prepare data for migration Module 7: Frameworks Introduction Explore extensions and the extension framework Extend elements SysOperationSandbox framework Summary Module 8: Integration Identify data integration patterns and scenarios Implement data integration concepts and solutions Implement the data management package API Data integrations Integrate with Microsoft Azure Connecting to Power Platform services Consume business events Integrate Finance and Operations apps with Microsoft Dataverse Module 9: Reporting Explore the reporting tools Build reports Build workspaces Manage data sources with external data stores Module 10: Security & Performance Work with performance and monitoring tools Implement role-based security Apply basic performance optimization techniques Additional course details: Nexus Humans MB-500T00 Dynamics 365 - Finance and Operations Apps Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-500T00 Dynamics 365 - Finance and Operations Apps Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of programming fundamentals and object-oriented programming concepts. They will typically be high school students, post-secondary school students, or career changers, with no prior programming experience. They might want to gain an understanding of the core programming fundamentals before moving on to more advanced courses such as Programming in C#. Overview Explain core programming fundamentals such as computer storage and processing. Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and queues. Implement object-oriented programming concepts. Create and use classes in a computer program. Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle errors. Identify the performance considerations for applications. In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2022 and the Visual C# and Visual Basic programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, Programming in C#. The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management. 1 - Introduction to Core Programming Concepts Computer Data Storage and Processing Application Types Application Lifecycle Code Compilation 2 - Core Programming Language Concepts Syntax Data Types Variables and Constants 3 - Program Flow Introduction to Structured Programming Concepts Introduction to Branching Using Functions Using Decision Structures Introducing Repetition 4 - Algorithms and Data Structures Understand How to Write Pseudocode Algorithm Examples Introduction to Data Structures 5 - Error Handling and Debugging Introduction to Program Errors Introduction to Structured Error Handling Introduction to Debugging 6 - Introduction to Object-Oriented Programming Introduction to Complex Structures Introduction to Structs Introduction to Classes Introducing Encapsulation 7 - More Object-Oriented Programming Introduction to Inheritance Introduction to Polymorphism Introduction to .NET and the Base Class Library 8 - Introduction to Application Security Authentication and Authorization Code Permissions on Computers Introducing Code Signing 9 - Core I/O Programming Using Console I/O Using File I/O 10 - Application Performance and Memory Management Value Types vs Reference Types Converting Types The Garbage Collector Additional course details: Nexus Humans 55337 Introduction to Programming training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55337 Introduction to Programming course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.