• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2453 Policy courses in Edinburgh delivered Online

Environmental Studies & Public Policy Course

5.0(14)

By Training Express

The Environmental Studies & Public Policy Course brings together essential knowledge from multiple disciplines to explore the dynamic relationships between public health, administration, law, and the environment. Designed for those interested in the growing intersection between policy and sustainability, this course introduces key concepts such as epidemiology, public health systems, environmental legislation, waste and pollution control, and ethical considerations in policymaking. Learners will examine how policy influences health outcomes, environmental quality, and social equity, while gaining insights into strategies that support sustainable governance and environmentally conscious decision-making. With a strong emphasis on policy, leadership, communication, and environmental responsibility, this course weaves together topics ranging from climate change and resource recovery to public realm management and effective time scheduling. It covers everything from understanding air and water quality to the frameworks guiding international environmental agreements like the Paris Agreement and Kyoto Protocol. Whether you're interested in public administration, environmental law, or sustainability planning, this programme offers a solid foundation for those seeking to understand and influence the policies shaping modern environmental challenges. Key Features: CPD QS Certified Instant e-certificate and hard copy dispatch by next working day Fully online, interactive course with audio voiceover Developed by qualified professionals in the field Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum: Public Health Module 1: Introduction to Public Health Module 2: Principles of Public Health Module 3: Understanding Epidemiology Module 4: Disease Control Module 5: Understanding Measures of Disease Frequency Module 6: Maternity and Childbirth Module 7: Environment and Public Health Module 8: Health System and Policy Module 9: Public Health and Ethics Public Administration Module 01: Introduction to Public Relations Module 02: Concepts of Public Relations Module 03: Management and Organisation of Public Relations Module 04: Crisis management Module 05: Meeting Management Module 06: Project Management Module 07: Risk Management Module 08: Team Work Team Building Module 09: Performance Management Module 10: Critical Thinking Implications for Leadership Module 11: Effective Time Management Techniques Module 12: Leadership Skills and Competencies. Module 13: Emotional Intelligence Module 14: Employee Relations Module 15: Avoiding the Unconscious Biases at Workplace Module 16: Effective Decision Making to Prevent Chaos Module 17: Skills of an Effective Administrator Module 18: Communication Skills Module 19: Prioritize Module 20: Scheduling Your Time Module 21: To Do Lists Module 22: Organizing Your Inbox Module 23: Negotiation Techniques Module 24: Conflict Management Module 25: Stress Management Module 26: Linguistics and Psychology Module 27: Communication and Media Studies Module 28: Corporate Social Responsibility Module 29: Stakeholders & the Social Contract Module 30: CRM Strategies Public Realm Manager Module 01: Introduction to Public Realm Management Module 02: Planning and Design Principles Module 03: Management and Maintenance Module 04: Sustainability and Resilience Module 05: Legal and Regulatory Framework Module 06: Public Realm and Social Equity Environmental Health Module 01: Intro to Environmental Health Module 02: Waste, Pollution and Pollutants Module 03: Environment, Pollution, Climate Change and Health Module 04: Recovering Resources and Managing Waste Module 05: Food Waste Module 06: Plastic Module 07: Air Pollution Module 08: Water Module 09: Environmental Sustainability Environmental Law Module 01: Legal System Module 02: What Is Environmental Law Module 03: International Environment Law Module 04: Environmental Organisations Module 05: National Environmental Legacy Act Module 06: The Environment And Economics Part 1 Module 07: The Environment And Economics Part 2 Module 08: Climate Change Module 09: Environmental Impact Assessment Module 10: Nature Conservation Module 11: Kyoto Protocol And Paris Agreement Module 12: Sustainable Development Module 13: Compliance And Governance Of Law Module 14: Right To Information, Participation And Justice Module 15: Enforcement Of Environmental Law Environmental Awareness Training Module 01: Introduction to Environmental Awareness Module 02: Climate Change and the Carbon Footprint Module 03: The Hidden Pollution inside Workplace Module 04: Benefits of Energy Efficiency Module 05: Environmental Planning and Decision-Making Module 06: Sustainable Development for Environment Module 07: Eco Friendly and Green Living Environmental engineering Module 01: Introduction to Environmental Engineering Module 02: Environmental Pollutions Module 03: Wastewater Treatment Module 04: Drinking Water and Groundwater Treatment Module 05: Groundwater Hydrology Module 06: Air Pollution Module 07: Solar Energy Module 08: Waste Disposal and Recycling Module 09: Land Management Module 10: Environmental Law Module 11: Sustainable Development Learning Outcomes: Gain expertise in Public Health principles and practices. Understand the foundations of Public Administration for effective governance. Develop skills as a Public Realm Manager for community development. Explore the intricacies of Environmental Health and its impact. Grasp the complexities of Environmental Law for responsible decision-making. Acquire practical knowledge in Environmental Engineering for sustainable solutions. Accreditation All of our courses, including theCourse are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certification Once you've successfully completed yourCourse, you will immediately be sent your digital certificates. Also, you can have your printed certificate delivered by post (shipping cost £3.99). Our certifications have no expiry dates, although we recommend renewing them every 12 months. Assessment At the end of theCourse, there will be an online assessment, which you will need to pass to complete the course. Answers are marked instantly and automatically, allowing you to know straight away whether you have passed. If you haven't, there's no limit on the number of times you can take the final exam. All this is included in the one-time fee you paid for the course itself. CPD 70 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals passionate about public health and environmental sustainability Aspiring public administrators seeking to make a difference Environmental enthusiasts keen on understanding legal frameworks Professionals aiming to enhance their expertise in environmental engineering Those interested in community welfare and public realm management Requirements Learners do not require any prior knowledge or qualifications to enrol in this course. Career path Environmental Health Officer - £25K to £40K/year. Public Health Analyst - £30K to £45K/year. Environmental Consultant - £28K to £50K/year. Public Administrator - £25K to £45K/year. Environmental Engineer - £30K to £55K/year. Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hard copy certificate Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

Environmental Studies & Public Policy Course
Delivered Online On Demand1 hour
£42

Cultural Heritage Management: Conservation and Policy

4.3(43)

By John Academy

Explore the intricate world of Cultural Heritage Management in this comprehensive course. Delve into conservation techniques, legal frameworks, and community engagement strategies. Uncover the significance of heritage value and the delicate balance between preservation and development. Join us to gain insights into shaping policies, fostering community involvement, and promoting sustainable heritage tourism. Become a steward of cultural legacies with a deep understanding of conservation and policy in cultural heritage management.

Cultural Heritage Management: Conservation and Policy
Delivered Online On Demand2 hours
£23.99

F5 Networks Configuring BIG-IP APM : Access Policy Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager. This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Module 3: Exploring the Access Policy Navigating the Access Policy Module 4: Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Module 5: Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Module 6: Understanding Assignment Agents List of Assignment Agents Module 7: Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Module 8: Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Module 9: Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Module 10: Exploring Client-Side Checks Client-Side Endpoint Security Module 11: Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Module 12: Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Module 13: Configuring App Tunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Module 14: Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Module 15: Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Module 16: Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Module 17: Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Module 18: Deploying SAML SAML Conceptual Overview SAML Configuration Overview Module 19: Exploring Webtops and Wizards Webtops Wizards Module 20: Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Module 21: Configuration Project Configuration Project Additional course details: Nexus Humans F5 Networks Configuring BIG-IP APM : Access Policy Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Configuring BIG-IP APM : Access Policy Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Networks Configuring BIG-IP APM : Access Policy Manager
Delivered OnlineFlexible Dates
Price on Enquiry

SRA Accounts Rules: A Practical Guide

By DG Legal

This online course is suitable for those who are familiar with the accounts rules, such as COFA’s and legal cashiers, but wish to expand their technical knowledge on the day to day application of them.  This course will reflect on the 2019 rule changes and where firms might have gone wrong in implementing these. It will also consider what ‘good’ systems, policies and procedures look like as well as providing you with tools to evaluate if your interest policy is ‘fair and reasonable’ and practical scenarios to identify banking facilities. Target Audience This online course is suitable for COFAs, those supporting the COFA, legal cashiers and for those that wish to expand their technical knowledge on the day to day application of the SRA accounts rules. Resources An information pack including the course slides will be provided to all delegates, which may be useful for ongoing reference. Please note a recording of the course will not be made available. Speaker Sarah Charlton, Consultant, DG Legal Sarah has a BSc (Hons) in Applied Accounting and is a Fellow member of the Association of Chartered and Certified Accountants. Her career spans over 35 years working within the legal sector, fulfilling roles from COFA through to CEO. During her career she has worked with a number of legal regulators, professional bodies and government organisations. Sarah has been a member of the Institute of Legal Finance and Management throughout her career, qualifying as a Fellow member in 2005. Sarah also served as chairperson between 2010-2012 and continues to serve as an Executive Council Member.

SRA Accounts Rules: A Practical Guide
Delivered Online + more
£112.50 to £150

INCLUSION POLICIES

By Inclusive Solutions

This day is relevant to anyone involved in the task of developing an Inclusion Policy. How to create a real policy built around shared vision with true community commitment. Participate in this very practical workshop to take your first very real steps forward. The day gives those present opportunities to reflect on their attitudes and practice in relation to the inclusion of pupils who are different and the policy and practice which currently exist. Course Category Strategic Work Description This day is relevant to anyone involved in the task of developing an Inclusion Policy. How to create a real policy built around shared vision with true community commitment. Participate in this very practical workshop to take your first very real steps forward. The day gives those present opportunities to reflect on their attitudes and practice in relation to the inclusion of pupils who are different and the policy and practice which currently exist. Testimonials Be the first… Learning Objectives Increased confidence regarding developing an inclusion policy Understanding of essential steps to be taken to make inclusion policy a reality Deeper understanding of core values surrounding inclusion of disabled children Who Is It For? Anyone needing to create an inclusion policy Course Content The course answers the questions: Why an inclusion policy? What is the scope of an inclusion policy? How can an inclusion policy become a reality? How do I roll this out? We will cover: Legal and ethical background Local requirements Vision and Values Aims and Objectives Scope Evaluation and monitoring Complaints procedures Community involvement Consultation Implementation Practical steps If you like this you may like: KEYS TO INCLUSION

INCLUSION POLICIES
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

F5 Configuring BIG-IP APM - Access Policy Manager v13.x

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager Overview This course provides the skills to create and manage BIG-IP APM system. This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers. In lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC. Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Exploring the Access Policy Navigating the Access Policy Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Understanding Assignment Agents List of Assignment Agents Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Exploring Client-Side Checks Client-Side Endpoint Security Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Configuring AppTunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Deploying SAML SAML Conceptual Overview SAML Configuration Overview Exploring Webtops and Wizards Webtops Wizards Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Lesson Configuration Project Additional Training and Certification Getting Started Series Web-Based Training F5 Instructor Led Training Curriculum F5 Professional Certification Program F5 Instructor Led Training Curriculum F5 Professional Certification Program Additional course details: Nexus Humans F5 Configuring BIG-IP APM - Access Policy Manager v13.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Configuring BIG-IP APM - Access Policy Manager v13.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Configuring BIG-IP APM - Access Policy Manager v13.x
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Developing A Workplace Mental Health Policy

5.0(5)

By Wimbledon Training Services

When people have good mental health, they are more likely to fulfil their potential. That means they enjoy work and cope easily with work situations. They have a happy family life and good social relationships. This course covers the steps that organisations should consider when developing and implementing a comprehensive workplace Mental Health Policy.

Developing A Workplace Mental Health Policy
Delivered Online On Demand
£50.40

55344 Identity with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server. This would typically include: ?AD DS administrators who are looking to train in identity and access technologies with Windows Server 2016, Windows Server 2019 or Windows Server 2022. ?System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2016, Windows Server 2019 or Windows Server 2022. Overview Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement and administer Active Directory Rights Management Services (AD RMS). Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement synchronization between AD DS and Azure AD. Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. Monitor, troubleshoot, and establish business continuity for AD DS services. This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory - related issues with Windows Server. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS). Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. 1 - Installing and configuring domain controllers Overview of AD DS Overview of AD DS domain controllers Deploying a domain controller 2 - Managing objects in AD DS Managing user accounts Managing groups in AD DS Managing computer objects in AD DS Using Windows PowerShell for AD DS administration Implementing and managing OUs 3 - Advanced AD DS infrastructure management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts 4 - Implementing and administering AD DS sites and replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication 5 - Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs 6 - Managing user settings with Group Policy Implementing administrative templates Configuring Folder Redirection, software installation, and scripts Configuring Group Policy preferences 7 - Securing Active Directory Domain Services Securing domain controllers Implementing account security Implementing audit authentication Configuring managed service accounts 8 - Deploying and managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs 9 - Deploying and managing certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards 10 - Implementing and administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Web Application Proxy Overview 11 - Implementing and administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection 12 - Implementing AD DS synchronization with Microsoft Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization 13 - Monitoring, managing, and recovering AD DS Monitoring AD DS Managing the Active Directory database Active Directory backup and recovery options for AD DS and other identity and access solutions

55344 Identity with Windows Server
Delivered OnlineFlexible Dates
£2,975

HoardingUK Motivational Interviewing for Hoarding Behaviour

4.5(2)

By HoardingUK

Key Components Case study work (throughout) Introduction to Motivational Interviewing MI Strategies Facilitating Behaviour Change Care Act 2014 Cognitive Behavioural interventions Outcomes are policy and practice tools as well as an action plan

HoardingUK Motivational Interviewing for Hoarding Behaviour
Delivered Online + more
FREE to £95