• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2199 Tea courses in Cardiff delivered Live Online

PL-600T00 Power Platform Solution Architect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Senior Consultants (both functional and technical) that aspire to be Solution Architects, or current Solution Architects that are new to the role. The Solution Architect is responsible for the successful design, implementation, deployment and adoption of an overall solution. The Solution Architect ensures that the solution meets the customer?s needs now and in the future. In this course, students will learn about decisions a Solution Architect makes during an implementation, covering security, integrations, Power Apps architecture, Power Automate architecture, and more. This course is designed to give you an introduction to the Solution Architect role. Becoming a Solution Architect/Getting to know your customer Define a Solution Architect Role of a Solution Architect on projects Project Methodology Getting to know your customer Group exercise - Getting to know your customer Conceptualizing the design from requirements How to lead the requirement collection effort Using fit gap analysis Pillars of good architecture Blueprinting the solution architecture Group exercise - Design from requirements Project governance and working as a team Solution Architect's role in project governance Techniques for keeping a project on track Scenarios that could cause a project to fail Group exercise - Project governance and working as a team Power Platform Architecture Key Power Platform architecture components Understand how platform design and limits influence solution architectures Updates and feature releases Understand how to communicate how the platform meets customer needs Data Modeling Data model influences Data model strategy Data types Data relationships Group exercise - Data modeling Analytics and artificial intelligence Planning and evaluating requirements Operational reporting Power BI Enterprise BI Pre-built insights and custom AI Power Apps Architecture Discuss options for apps and how to choose where to start Discuss app composition options Using components as part of your app architecture Considerations for including Portals as an app in your architecture Group exercise - Power Apps Architecture topics Application Lifecycle Management (ALM) Microsoft vision and Solution Architect's role in ALM Environment strategies Defning a solution structure for your deliverable Power Automate Architecture Discuss options for automation and custom logic Review considerations for using triggers and common actions Explore using Business Process Flows (BPF) to guide users through business processes Group Exercise - Evaluate scenarios for Power Automate usage Security Modeling Solution Architect's role in security modeling Discovery and learning your client's environment Controlling access to environments and resources Controlling access to CDS Data Group Exercise - Security Modeling Integration Solution Architects role in Integrations What is an integration and why do we need it Platform features that enable integration CDS Event Publishing Scenarios for group discussion Dynamics 365 Applications Architecture Solution Architect's role when deploying Dynamics 365 apps Architecture Considerations for primary apps Group Exercise - App specific working groups evaluate requirements Power Virtual Agents architecture Introduction Chatbot options Chatbot concepts Best practices Integrate chatbots Power Virtual Agents in Microsoft Teams Robotic Process Automation Introduction Power Automate Desktop Recording and editing tasks Running desktop flows Process advisor Testing and Go Live Solution Architect's role with testing and go live Planning for testing Planning for go live

PL-600T00 Power Platform Solution Architect
Delivered OnlineFlexible Dates
£2,380

55215 SharePoint Online Power User

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for both novice and experienced SharePoint users who wish to make full use of SharePoint Online. Overview #NAME? This course delivers the complete site owner story from start to finish in an engaging and practical way to ensure you have the confidence to plan and create new sites or manage your existing sites in SharePoint Online. Your goal is to learn how to make SharePoint online relevant to your team by using a sites functionality to help you share information and collaborate with your colleagues. During the class, you will also learn best practices and ?what not to do? as you watch live, interactive demonstrations and put theory into practice with hands on exercises in SharePoint Online. 1 - An Introduction to SharePoint Online Introducing Office 365 and SharePoint Getting started with Office 365 The cloud revolution Login to Office 365 What is Office 365 Using the app launcher What is SharePoint Office 365 settings Introducing Office 365 Groups Delve Ownership and Access OneDrive 2 - Creating Sites Planning your sites Create new subsites The Office 365 tenant Site templates Web addresses Apply a them Site collections Building your navigation Create a new site Delete subsites Team site navigation User interface: classic vs modern Site contents: classic vs modern Where does classic come from? 3 - Creating and Managing Web Pages The types of pages found in SharePoint Classic SharePoint pages Modern SharePoint pages How to use classic team site pages Create news and site pages Review features of publishing sites Web parts Save, publish, share and delete pages Communication sites 4 - Working with Apps An introduction to apps Co-authoring Marketplace apps Check In ? Out Adding apps to a site Edit and view file properties Create and manage columns Quick edit view Public and personal views File commands Managing app settings Copy link and Share Content approval Folders Major and minor versioning The recycle bin Document sets Alerts Working with files in a library OneDrive sync Create, Upload and edit files Working with classic lists 5 - Building processes with Flow and PowerApps What are business processes? Design and publish a Flow Classic tools for designing processes Getting started with PowerApps in SharePoint Design and test a classic workflow Enhance data capture with PowerApps Getting started with Flow in SharePoint Test a Flow and PowerApps enriched list 6 - Customizing Security Office 365 Group access Share a file Updating Office 365 Group Security Remove a user Managing access to SharePoint Customizing SharePoint security New sites private vs public Create permission levels and groups Setup access requests Security inheritance Share a site Security best practices 7 - Working with Search Delve Search tips An introduction to SharePoint search Accessing classic search Search in folders, libraries and sites Promoted results Search results 8 - Enterprise Content Management Managed metadata service Information management policies An introduction to content types The records center Create and manage content type In-place records management Deploy content types The content organizer Using content types in apps Durable links The content type hub

55215 SharePoint Online Power User
Delivered OnlineFlexible Dates
£2,380

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. Prerequisites An understanding of the following concepts as related to Windows Server technologies: High availability and disaster recovery Automation Monitoring Troubleshooting 1 - Secure Windows Server user accounts Configure user account rights Protect user accounts with the Protected Users group Describe Windows Defender Credential Guard Block NTLM authentication Locate problematic accounts 2 - Hardening Windows Server Describe Local Password Administrator Solution Configure Privileged Access Workstations Secure domain controllers Analyze security configuration with Security Compliance Toolkit Secure SMB traffic 3 - Windows Server update management Explore Windows Update Outline Windows Server Update Services server deployment options Define Windows Server Update Services update management process Describe the process of Update Management 4 - Secure Windows Server DNS Implement split-horizon DNS Create DNS policies Implement DNS policies Secure Windows Server DNS Implement DNSSEC 5 - Implement Windows Server IaaS VM network security Implement network security groups and Windows IaaS VMs Implement adaptive network hardening Implement Azure Firewall and Windows IaaS VMs Implement Windows firewall with Windows Server IaaS VMs Choose the appropriate filtering solution Deploy and configure Azure firewall using the Azure portal Capture network traffic with network watcher Log network traffic to and from a VM using the Azure portal 6 - Audit the security of Windows Server IaaS Virtual Machines Describe Azure Security Center Enable Azure Security Center in hybrid environments Implement and assess security policies Protect your resources with Azure Security Center Implement Azure Sentinel 7 - Manage Azure updates Describe update management Enable update management Deploy updates View update assessments Manage updates for your Azure Virtual Machines 8 - Create and implement application allowlists with adaptive application control Describe adaptive application control Implement adaptive application control policies 9 - Configure BitLocker disk encryption for Windows IaaS Virtual Machines Describe Azure Disk Encryption and server-side encryption Configure Key Vault for Azure Disk Encryption Encrypt Azure IaaS Virtual Machine hard disks Back up and recover data from encrypted disks Create and encrypt a Windows Virtual Machine 10 - Implement change tracking and file integrity monitoring for Windows IaaS VMs Implement Change Tracking and Inventory Manage Change Tracking and Inventory Manage tracked files Implement File Integrity Monitoring Select and monitor entities Use File Integrity Monitoring 11 - Introduction to Cluster Shared Volumes Determine the functionality of Cluster Shared Volumes Explore the architecture and components of Cluster Shared Volumes Implement Cluster Shared Volumes 12 - Implement Windows Server failover clustering Define Windows Server failover clustering Plan Windows Server failover clustering Implement Windows Server failover clustering Manage Windows Server failover clustering Implement stretch clusters Define cluster sets 13 - Implement high availability of Windows Server VMs Select high-availability options for Hyper-V Consider network load balancing for Hyper-V VMs Implement Hyper-V VM live migration Implement Hyper-V VMs storage migration 14 - Implement Windows Server File Server high availability Explore the Windows Server File Server high-availability options Define Cluster Shared Volumes Implement Scale-Out File Server Implement Storage Replica 15 - Implement scale and high availability with Windows Server VM Describe virtual machine scale sets Implement scaling Implement load-balancing VMs Create a virtual machine scale set in the Azure portal Describe Azure Site Recovery Implement Azure Site Recovery 16 - Implement Hyper-V Replica Define Hyper-V Replica Plan for Hyper-V Replica Configure and implement Hyper-V Replica Define extended replication Define Azure Site Recovery Implement Site Recovery from on-premises site to Azure Implement Site Recovery from on-premises site to on-premises site 17 - Protect your on-premises infrastructure from disasters with Azure Site Recovery Azure Site Recovery overview Workloads supported for protection with Azure Site Recovery Run a disaster recovery drill Failover and failback 18 - Implement hybrid backup and recovery with Windows Server IaaS Describe Azure Backup Implement recovery vaults Implement Azure Backup policies Recover Windows IaaS Virtual Machines Perform file and folder recovery Perform backup and restore of on-premises workloads Manage Azure Virtual Machine backups with Azure Backup service 19 - Protect your Azure infrastructure with Azure Site Recovery What is Azure Site Recovery Prepare for disaster recovery with Azure Site Recovery Run a disaster recovery drill Failover and failback using Azure Site Recovery 20 - Protect your virtual machines by using Azure Backup Azure Backup features and scenarios Back up an Azure virtual machine by using Azure Backup Restore virtual machine data 21 - Active Directory Domain Services migration Examine upgrade vs. migration Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version Explore the Active Directory Migration Tool 22 - Migrate file server workloads using Storage Migration Service Storage Migration Service overview and usage scenarios Storage migration requirements Migrate a server with Storage migration Evaluate storage migration considerations 23 - Migrate Windows Server roles Describe the Windows Server Migration Tools Install the Migration Tools Migrate roles using the Migration Tools 24 - Migrate on-premises Windows Server instances to Azure IaaS virtual machines Plan your migration Describe Azure Migrate Perform server assessment Assess physical servers with Azure Migrate Migrate Windows Server workloads by using Azure Migrate 25 - Upgrade and migrate Windows Server IaaS virtual machines Describe Azure Migrate Migrate Windows Server workloads by using Azure Migrate Describe storage migration Migrate file servers by using Storage Migration Service 26 - Containerize and migrate ASP.NET applications to Azure App Service Azure Migrate App Containerization overview 27 - Monitor Windows Server performance Use Performance Monitor to identify performance problems Use Resource Monitor to review current resource usage Review reliability with Reliability Monitor Implement a performance monitoring methodology Use Data Collector Sets to analyze server performance Monitor network infrastructure services Monitor virtual machines running Windows Server Monitor performance with Windows Admin Center Use System Insights to help predict future capacity issues Optimize the performance of Windows Server 28 - Manage and monitor Windows Server event logs Describe Windows Server event logs Use Windows Admin Center to review logs Use Server Manager to review logs Use custom views Implement event log subscriptions 29 - Implement Windows Server auditing and diagnostics Describe basic auditing categories Describe advanced categories Log user access Enable setup and boot event collection 30 - Troubleshoot Active Directory Recover objects from the AD recycle bin Recover the AD DS database Recover SYSVOL Troubleshoot AD DS replication Troubleshoot hybrid authentication issues 31 - Monitor Windows Server IaaS Virtual Machines and hybrid instances Enable Azure Monitor for Virtual Machines Monitor an Azure Virtual Machine with Azure Monitor Enable Azure Monitor in hybrid scenarios Collect data from a Windows computer in a hybrid environment Integrate Azure Monitor with Microsoft Operations Manager 32 - Monitor your Azure virtual machines with Azure Monitor Monitoring for Azure VMs Monitor VM host data Use Metrics Explorer to view detailed host metrics Collect client performance counters by using VM insights Collect VM client event logs 33 - Troubleshoot on-premises and hybrid networking Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered OnlineFlexible Dates
£2,380

Corporate Wellbeing Packages

5.0(62)

By Club Azucar - Latin Dance

HOW DANCING CAN IMPROVE YOUR MENTAL AND PHYSICAL HEALTH Move your body to your favourite tunes – it’s the ultimate feel-good exercise and has some surprising effects on both the body and mind Music and dance have been fundamental parts of the human experience for thousands of years. No matter what your favourite tune may be, music can have a huge effect on your wellbeing – Charles Darwin even thought that our ability to make and understand rhythmic beats worked as an early form of communication. Whether or not we still share messages through music, we all know that it can change our mood and studies have shown that we share a natural sense of rhythm (no matter how much you might protest). Dance is therefore a natural outlet, and one which can do a lot to make us feel good. Club Azucar offers corporate dance packages for the workplace in order for your organisation (Companies, Institutions & Schools) not only function at its best, but to be happy and healthy in life. These are the expected benefits for the individual employee which have been also confirmed by the participants: Physical Health: Salsa/Zumba or any Latin Dance Classes improves mobility, coordination / motor skills and fitness level.while being a low-impact exercise which includes people of all ages, abilities and fitness levels Mental Health: Dancing requires full concentration so for one hour away from their desk ,participants will experience reduced stress levels, , feel refreshed and more alert and able to concentrate better following the lesson Music in combination with physical exercise has an uplifting effect through the release of endorphins and dopamine in the body & brain Learning a new skill is proven to train your brain, contribute to prevention of dementia and give the confidence to face new tasks and challenges in other areas of work and life The patience and encouragement of the teachers has furthered this new confidence and sense of achievement and contributed to participants’ belief in themselves and their ability to take themselves out of their “comfort zones” and take on new challenges Getting to know each other in a social rather than work context and learning a new skill together, dancing and laughing together, gives participants a sense of belonging and furthers team buildingDo you want more proof? Get involved and hire us!!! Booking Terms & Conditions 1. The above prices are only for Greater London  2. Fees are non refundable 3. Courses are subject to availability from both parties  4. Train, plane. petrol, or any sort of transport fares are to be refunded.  5. Cancellation must be before 24 hours every class

Corporate Wellbeing Packages
Delivered in London or UK Wide or OnlineFlexible Dates
£150 to £2,600

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered OnlineFlexible Dates
£2,380

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students for AZ-140: Configuring and Operating Microsoft Azure Virtual Desktop are interested in delivering applications on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. As an Azure Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Azure Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Azure Virtual Desktop performance, and automate Azure Virtual Desktop management tasks. This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. Lessons include implementing and managing networking for Azure Virtual Desktop, configuring host pools and session hosts, creating session host images, implementing, and managing FSLogix, monitoring Azure Virtual Desktop performance and health, and automating Azure Virtual Desktop management tasks. Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. Candidates of this course must have solid Azure administration skills. This course assumes prior experience, including virtualization, networking, identity, storage, backup and restore, and disaster recovery. Students should have knowledge of on-premises virtual desktop infrastructure technologies as they relate to migrating to Azure Virtual Desktop. Students are expected to have used the tools common to the Azure environment, such as the Azure PowerShell and Cloud Shell. 1 - Azure Virtual Desktop Architecture Azure Virtual Desktop for the enterprise Azure Virtual Desktop components Personal and pooled desktops Service updates for Azure Virtual Desktop desktops Azure limitations for Azure Virtual Desktop Virtual machine sizing for Azure Virtual Desktop Azure Virtual Desktop pricing 2 - Design the Azure Virtual Desktop architecture Assess network capacity and speed requirements for Azure Virtual Desktop Azure Virtual Desktop Experience Estimator Recommend an operating system for an Azure Virtual Desktop implementation Balancing host pools Recommendations for using subscriptions and management groups Configure a location for the Azure Virtual Desktop metadata Recommend a configuration for performance requirements 3 - Design for user identities and profiles Select an appropriate licensing model for Azure Virtual Desktop based on requirements Personal and multi-session desktop scenarios Recommend an appropriate storage solution Plan for a desktop client deployment Plan for Azure Virtual Desktop client deployment - Remote Desktop Protocol (RDP) Windows Desktop client to multiple devices Hybrid Identity with Azure Active Directory Plan for Azure Active Directory (AD) Connect for user identities 4 - Implement and manage networking for Azure Virtual Desktop Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Azure Virtual Desktop network connectivity Implement and manage network security for Azure Virtual Desktop Configure Azure Virtual Desktop session hosts using Azure Bastion Monitor and troubleshoot network connectivity for Azure Virtual Desktop Plan and implement Remote Desktop Protocol Shortpath Configure Remote Desktop Protocol Shortpath for managed networks Configure Windows Defender Firewall with Advanced Security for RDP Shortpath Plan and implement Quality of Service for Azure Virtual Desktop 5 - Implement and manage storage for Azure Virtual Desktop Storage for FSLogix components Configure storage for FSLogix components Configure storage accounts Create file shares Configure disks 6 - Create and configure host pools and session hosts for Azure Virtual Desktop Automate creation of an Azure Virtual Desktop host pool using PowerShell Configure host pool assignment type Customize Remote Desktop Protocol (RDP) properties for a host pool Manage licensing for session hosts that run Windows client Deploying Azure AD-joined virtual machines in Azure Virtual Desktop 7 - Create and manage session host image for Azure Virtual Desktop Create a managed virtual machine (VM) image Modify a session host image Plan for image update and management Create and use an Azure Compute Gallery using the portal Create an Azure Virtual Desktop image by using VM Image Builder Install Microsoft 365 Apps on a master Virtual Hard Disk image Install language packs in Azure Virtual Desktop 8 - Manage access for Azure Virtual Desktop Role-based access control (RBAC) for Azure Virtual Desktop Plan and implement Azure roles and role-based access control (RBAC) for Azure Virtual Desktop Using Azure Virtual Desktop with Microsoft Intune Configuring screen capture protection for Azure Virtual Desktop 9 - Manage security for Azure Virtual Desktop Plan and implement Conditional Access policies for connections to Azure Virtual Desktop Plan and implement multifactor authentication (MFA) in Azure Virtual Desktop Understand Conditional Access policy components Manage security by using Azure Security Center Security posture management and threat protection 10 - Implement and manage FSLogix Plan for FSLogix FSLogix profile containers and Azure files Install FSLogix Storage options for FSLogix profile containers Profile Container vs Office Container Configure Office Containers Installing Microsoft Office using FSLogix application containers Configure Cloud Cache Configure Profile Containers Create a profile container with Azure NetApp Files and capacity pool Manage Rule Sets and application masking 11 - Configure user experience settings Virtual desktop optimization principles Persistent virtual desktop environments Configure user settings through group policies Configure user settings through Endpoint Manager policies Configure session timeout properties Configure device redirections Configure Universal Print Implement the Start Virtual Machine on Connect feature Troubleshoot user profile issues Troubleshoot Azure Virtual Desktop clients 12 - Install and configure apps on a session host MSIX app attach How MSIX app attach works Set up a file share for MSIX app attach Upload MSIX images to Azure NetApp Files in Azure Virtual Desktop How to configure apps for users Using the OneDrive sync app on virtual desktops Using Microsoft Teams on Azure Virtual desktop Publish built-in apps in Azure Virtual Desktop Troubleshoot application issues for Azure Virtual Desktop 13 - Plan for disaster recovery Disaster recovery for Azure Virtual Desktop Virtual machine replication FSLogix configuration 14 - Automate Azure Virtual Desktop management tasks Scale session hosts using Azure Automation Create or update an Azure Automation account Create an Azure Automation Run As account Create the Azure Logic App and execution schedule 15 - Monitor and manage performance and health Monitor Azure Virtual Desktop by using Azure Monitor Log Analytics workspace for Azure Monitor Monitor Azure Virtual Desktop by using Azure Advisor How to resolve Azure Advisor recommendations Diagnose graphics performance issues Additional course details: Nexus Humans AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop
Delivered OnlineFlexible Dates
£2,380

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. Prerequisites Experience with managing Windows Server operating system and Windows Server workloads in on-premises scenarios, including AD DS, DNS, DFS, Hyper-V, and File and Storage Services Experience with common Windows Server management tools (implied in the first prerequisite). Basic knowledge of core Microsoft compute, storage, networking, and virtualization technologies (implied in the first prerequisite). Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts Basic experience with implementing and managing IaaS services in Microsoft Azure Basic knowledge of Azure Active Directory Experience working hands-on with Windows client operating systems such as Windows 10 or Windows 11 Basic experience with Windows PowerShell 1 - Introduction to AD DS Define AD DS Define users, groups, and computers Define AD DS forests and domains Define OUs Manage objects and their properties in AD DS 2 - Manage AD DS domain controllers and FSMO roles Deploy AD DS domain controllers Maintain AD DS domain controllers Manage the AD DS Global Catalog role Manage AD DS operations masters Manage AD DS schema 3 - Implement Group Policy Objects Define GPOs Implement GPO scope and inheritance Define domain-based GPOs Create and configure a domain-based GPO Define GPO storage Define administrative templates 4 - Manage advanced features of AD DS Create trust relationships Implement ESAE forests Monitor and troubleshoot AD DS Create custom AD DS partitions 5 - Implement hybrid identity with Windows Server Select a Microsoft Entra integration model Plan for Microsoft Entra integration Prepare on-premises Active Directory for directory synchronization Install and configure directory synchronization with Microsoft Entra Connect Implement Seamless Single Sign-On Enable Microsoft Entra login in for Windows VM in Azure Describe Microsoft Entra Domain Services Implement and configure Microsoft Entra Domain Services Manage Windows Server 2019 in a Microsoft Entra Domain Services environment Create and configure a Microsoft Entra Domain Services instance Join a Windows Server VM to a managed domain 6 - Deploy and manage Azure IaaS Active Directory domain controllers in Azure Select an option to implement directory and identity services using Active Directory Domain Services in Azure Deploy and configure Active Directory Domain Services domain controllers in Azure VMs Install a replica Active Directory domain controller in an Azure VM Install a new Active Directory forest on an Azure VNet 7 - Perform Windows Server secure administration Define least privilege administration Implement delegated privileges Use privileged access workstations Use jump servers 8 - Describe Windows Server administration tools Explore Windows Admin Center Use Server Manager List Remote Server Administration Tools Use Windows PowerShell Use Windows PowerShell to remotely administer a server 9 - Perform post-installation configuration of Windows Server List the available post-installation configuration tools Configure Server Core using Sconfig Use DSC to configure Windows Server Perform post-installation configuration with Windows Admin Center Configure a server with answer files 10 - Just Enough Administration in Windows Server Explain the concept of Just Enough Administration (JEA) Define role capabilities for a JEA endpoint Create a session configuration file to register a JEA endpoint Describe how JEA endpoints work to limit access to a PowerShell session Create and connect to a JEA endpoint Demonstration: Connect to a JEA endpoint 11 - Administer and manage Windows Server IaaS Virtual Machine remotely Select the appropriate remote administration tool Manage Windows Virtual Machines with Azure Bastion Create an Azure Bastion host Configure just-in-time administration 12 - Manage hybrid workloads with Azure Arc Describe Azure Arc Onboard Windows Server instances Connect hybrid machines to Azure from the Azure portal Use Azure Arc to manage Windows Server instances Restrict access with RBAC 13 - Configure and manage Hyper-V Define Hyper-V Define Hyper-V Manager Configure Hyper-V hosts using best practices Configure Hyper-V networking Assess advanced Hyper-V networking features Define nested virtualization 14 - Configure and manage Hyper-V virtual machines List the virtual machine configuration versions List the virtual machine generation versions List available VHD formats and types Create and configure VMs Determine storage options for VMs Define shared VHDs and VHD Sets Implement guest clusters using shared VHDX 15 - Secure Hyper-V workloads Define guarded fabric Define the Host Guardian Service Explore TPM-trusted attestation Define KPS Determine key features of shielded VMs Compare encryption-supported and shielded VMs in a guarded fabric Implement a shielded VM 16 - Run containers on Windows Server Define containers List the differences between containers and VMs Define Windows Server and Hyper-V containers and isolation modes Explore Docker Prepare a Windows Server 2019 host for container deployment Security, Storage, and Networking with Windows containers 17 - Orchestrate containers on Windows Server using Kubernetes Define orchestration Define Kubernetes Deploy Kubernetes resources Create a Kubernetes cluster on Windows Define Azure Arc Connect an Azure Arc-enabled Kubernetes cluster to Azure Arc 18 - Plan and deploy Windows Server IaaS Virtual Machines Describe Azure compute Describe Virtual Machine storage Deploy Azure Virtual Machines Create a windows Virtual Machine using the portal Create a windows Virtual Machine using Azure CLI Deploy Azure Virtual Machines using templates Describe additional management optimization options 19 - Customize Windows Server IaaS Virtual Machine images Create a generalized image Create a new Virtual Machine from a managed image Create a managed image of a generalized virtual machine in Azure Create a Virtual Machine from a managed image Implement Azure Image Builder Create a windows Virtual Machine using Azure Image Builder template Create a Windows Virtual Machine with Azure Image Builder using PowerShell 20 - Automate the configuration of Windows Server IaaS Virtual Machines Describe Azure Automation Implement Azure Automation with DSC Remediate noncompliant servers Describe Custom Script Extensions Configure a Virtual Machine by using DSC 21 - Deploy and manage DHCP Use DHCP to simplify IP configuration Install and configure the DHCP role Configure DHCP options Configure DHCP scopes Select DHCP high availability options Implement DHCP Failover 22 - Implement Windows Server DNS Explore the DNS architecture Work with DNS zones and records Install and configure the DNS role Implement DNS forwarding 23 - Implement IP Address Management Define IP Address Management Deploy IP Address Management Administer IP Address Management Configure IP Address Management options Manage DNS zones with IP Address Management Manage DHCP servers with IP Address Management Use IP Address Management to manage IP addressing 24 - Implement remote access Examine the remote access options in Windows Server Select and set up VPNs Use NPS to create and enforce network access policies Plan and implement NPS Deploy a PKI for remote access Use WAP as a reverse web proxy 25 - Implement hybrid network infrastructure Describe Azure network topologies Implement Azure VPN options Create a route-based VPN gateway using the Azure portal Implement Azure ExpressRoute Configure Azure Virtual WAN Implement DNS in hybrid environments 26 - Implement DNS for Windows Server IaaS VMs Understand Azure DNS Implement Azure DNS Create an Azure DNS zone and record using the Azure portal Implement DNS with Azure IaaS virtual machines Implement split-horizon DNS in Azure Troubleshoot DNS 27 - Implement Windows Server IaaS VM IP addressing and routing Implement a virtual network Implement IaaS VM IP addressing Assign and manage IP addresses Configure a private IP address for a virtual machine using the Azure portal Create a virtual machine with a static public IP address using the Azure portal Implement IaaS virtual machine IP routing Implement IPv6 for Windows Server IaaS virtual machines 28 - Manage Windows Server file servers Define the Windows Server file system List the benefits and uses of File Server Resource Manager Define SMB and its security considerations Configure SMB protocol Define Volume Shadow Copy Service 29 - Implement Storage Spaces and Storage Spaces Direct Define the Storage Spaces architecture and its components List the functionalities, benefits, and use cases of Storage Spaces Implement Storage Spaces List the functionalities, components, benefits, and use cases of Storage Spaces Direct Implement Storage Spaces Direct 30 - Implement Windows Server Data Deduplication Define the architecture, components, and functionality of Data Deduplication Define the use cases and interoperability of Data Deduplication Implement Data Deduplication Manage and maintain Data Deduplication 31 - Implement Windows Server iSCSI List the functionalities, components, and use cases of iSCSI List the considerations for implementing iSCSI Implement iSCSI Configure high availability for iSCSI 32 - Implement Windows Server Storage Replica List the functionalities and components of Storage Replica Examine the prerequisites for implementing Storage Replica Implement Storage Replica by using Windows Admin Center Implement Storage Replica by using Windows PowerShell 33 - Implement a hybrid file server infrastructure Describe Azure File services Configure Azure Files Configure connectivity to Azure Files Describe Azure File Sync Implement Azure File Sync Deploy Azure File Sync Deploy Azure File Sync 2 Manage cloud tiering Migrate from DFSR to Azure File Sync

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure
Delivered OnlineFlexible Dates
£2,380

Best Practices Procurement for Carbon Offsets in the Energy Industry

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course More energy companies today are setting ambitious net-zero targets and are expected to pour billions into the voluntary carbon offset market by the end of this decade. To get to net zero emissions, companies will need to balance emissions with nature and technology-based offsets. Markets are the best tool for connecting carbon sources and sinks. Many countries will not have enough supply inside their borders and will need to co-operate with those who have extra greenhouse gas removal potential. The energy industry is in search of effective climate tools as pressure mounts from investors and consumers for more progress on fighting rising emissions. Corporations fighting to cut their carbon footprint have for years focused on internal reduction measures. Many are now adding to that effort by turning to carbon credits, a process made easier as verification and registration tools mature. One particular category of carbon offsets leads the way: high-quality, nature-based carbon credits. These represent the largest category of carbon credit projects in the voluntary carbon market, comprising nearly half of credits issued. Public concern about this practice focused on the additionality, leakage, and integrity of carbon offsets that are created through reforestation, land preservation, carbon capture and other projects. Lack of standardization and government regulation has also increased uncertainty for all participants in carbon markets, creating risks for developers of credit-generating projects and offset purchasers. Demand for higher-quality offsets will value projects that were subjected to due diligence and rely upon reputable third-party verification. Companies purchasing offsets generated by permanent and quantifiable projects will therefore be in the best position moving forward. In this highly interactive training course, your course instructor will guide you through the latest developments and best procurement practices to successfully operate in the voluntary carbon market. Training Objectives At the end of this course, the participants will be able to: Discover the current state of the carbon economy Gain insights into the voluntary carbon market Learn about the different type carbon credits available Examine how companies can reach net zero target by using carbon offsets Uncover best practices in carbon credit procurement strategy Learn the pricing dynamics carbon credits Examine how to identify and ensure high quality credits Obtain key learning from flawed carbon offset projects Target Audience This course is intended for: Energy transition team leaders Carbon credit procurement professionals ESG strategy team leaders Finance and accounting professionals Low carbon business analysts or economists Corporate business sustainability professionals Legal, compliance and regulatory professionals Carbon trading professionals Course Level Intermediate Trainer Your expert course leader is a skilled and accomplished professional with over 25 years of extensive C-level experience in the energy markets worldwide. He has a strong expertise in all the aspects of (energy) commodity markets, international sales, marketing of services, derivatives trading, staff training and risk management within dynamic and high-pressure environments. He received a Master's degree in Law from the University of Utrecht in 1987. He started his career at the NLKKAS, the Clearing House of the Commodity Futures Exchange in Amsterdam. After working for the NLKKAS for five years, he was appointed as Member of the Management Board of the Agricultural Futures Exchange (ATA) in Amsterdam at the age of 31. While working for the Clearing House and exchange, he became an expert in all the aspects of trading and risk management of commodities. In 1997, he founded his own specialist-consulting firm that provides strategic advice about (energy) commodity markets, trading and risk management. He has advised government agencies such as the European Commission, investment banks, major utilities and commodity trading companies and various energy exchanges and market places in Europe, CEE countries, North America and Asia. Some of the issues he has advised on are the development and implementation of a Risk Management Framework, investment strategies, trading and hedging strategies, initiation of Power Exchanges (APX) and other trading platforms, the set-up of (OTC) Clearing facilities, and feasibility and market studies like for the Oil, LNG and the Carbon Market. The latest additions are (Corporate) PPAs and Artificial Intelligence for energy firms. He has given numerous seminars, workshops and (in-house) training sessions about both the physical and financial trading and risk management of commodity and carbon products. The courses have been given to companies all over the world, in countries like Japan, Singapore, Thailand, United Kingdom, Germany, Poland, Slovenia, Czech Republic, Malaysia, China, India, Belgium and the Netherlands. He has published several articles in specialist magazines such as Commodities Now and Energy Risk and he is the co-author of a book called A Guide to Emissions Trading: Risk Management and Business Implications published by Risk Books in 2004. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Best Practices Procurement for Carbon Offsets in the Energy Industry
Delivered in Internationally or OnlineFlexible Dates
£2,751 to £3,199

Definitive IP CCTV for engineers

5.0(3)

By Systems & Network Training

IP CCTV training course description This hands on course covers the technologies used in IP CCTV systems. The focus is not on operating or cabling but more advanced configuration and troubleshooting. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install IP CCTV. Configure IP CCTV. Explain how IP CCTV protocols work. Troubleshoot IP CCTV. IP CCTV training course details Who will benefit: Technical staff working with IP CCTV. Prerequisites: None. Duration 2 days IP CCTV training course contents Introduction What is IP CCTV? Camera types, Video, Audio, two way audio, IP CCTV software. Hands on Installing IP CCTV. CCTV architecture Components, servers, storage, LANs, WANs. Centralised versus decentralised. Hands on Using IP CCTV. Ethernet What is Ethernet? Ethernet cabling, Inside versus outside, hubs, switches, PoE, VLANs. Hands on Ethernet connectivity. Wireless WiFi, other wireless solutions, 802.11, variations, frequencies, Access Points, bridges, repeaters. WEP, WPA, WPA2, Hands on WiFi Configuration Ways to configure, IP addresses, subnet mask, default gateway, DHCP, NAT, access from the Internet. Hands on CCTV configuration. How IP CCTV works TCP, UDP, IP, RTP, RTSP, SIP, PTZ, NTP, Wireshark. Port numbers. Hands on Using Wireshark to troubleshoot IP CCTV. Network issues with IP CCTV Bandwidth, video resolution, compressions, codecs, frame rates, audio. QoS. One way versus two way traffic. Hands on Analysing CCTV traffic. Security VPNs, Firewalls. Hands on CCTV through a firewall. Troubleshooting ping, tracert, arp, ipconfig, pathping, tracert. Cable issues, switch issues, WiFi issues.CCTV issues. Hands on CCTV troubleshooting. Miscellaneous Design issues, multicasting, gateways. DVR technology. Calculating storage requirements.

Definitive IP CCTV for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

LTE optimisation and capability

5.0(3)

By Systems & Network Training

LTE optimization training course description This course gives delegates an understanding of the Key Performance Indicators used within the 3G LTE (4G) network environment. We investigate the 3GPP standards for KPIs (including TR 32.814, TS 32.410 & TS 32.455) these cover GERAN, UMTS & LTE environments. The course details the optimisation procedures and the use of Self optimisation, Selforganising & Self-healing equipment now being deployed across all releases of mobile networks. What will you learn Explain the RF optimisation flowchart. Describe the importance of Reference Signal Received Power (RSRP). List many of the 3GPP recommended KPIs. Describe the concept of APN AMBR and UE AMBR within LTE. Describe the use of planning and optimisation computer tools. LTE optimization training course details Who will benefit: Anyone working with LTE. Prerequisites: Essential LTE Duration 2 days LTE optimization training course contents Introduction to the cellular environment The architecture, 2G (GSM), GPRS/EDGE, The NGMN (Next Generation Mobile Network), media gateway controller, 3GPP Rel99 the 3G introduction, HSPA deployments, 3G LTE (4G). Cellular network procedures GSM/GPRS call setup, GPRS data call setup, 3G UMTS data call setup, Data call (Voice over LTE) in LTE (using IMS), Circuit Switched Fall Back (CSFB) in LTE, IP packet session in LTE. Introduction to the standards The 3GPP specifications body, The numbering structure for KPIs, 2G KPIs, 3G/UMTS KPIs, 3G LTE KPIs, IMS KPIs. Introduction to the KPI definitions KPI definitions, accessibility KPIs, retainability KPIs, mobility KPIs, utilisation KPIs. In-depth overview of the air Interfaces GSM/GPRS FDMA & TDMA solution, 3G UMTS WCDMA solution, HSPA+ sharing spare power (Codes), The 3G LTE uplink & downlink interface explained, Initial attach procedures explained. Problem analysis Reference Signal Received Power (RSRP), Signal to Interference Noise Ratio (SINR), handover success rates, power adjustments, classification of coverage problems, weak coverage & coverage holes, lack of dominant cells, cross coverage, improper tilt settings, uplink/downlink imbalance, signal quality, Azimuths & tilts to reduce interference, Handover failure due to interference, Service drop causes. Mobile RF performance in 2G/3G Performance counters, KPIs, testing & measurement, Drive testing and survey, Data collection and post processing of data, LTE service optimization, bandwidth, poor coverage, Quality, optimization process, KPI optimization, Root Cause Analysis (RCA) applied to RF issues, optimization tools and software. Advanced LTE network planning & optimization LTE UE measurements (RSRP/RSRQ), LTE capacity planning, RF configuration parameters, LTE cell selection/reselection planning, LTE radio network KPIs, LTE user-centric KPIs, LTE network performance KPIs, LTE system utilization KPIs, LTE RF channel performance predictions, LTE channel information processing, LTE channel multiplexing, Physical layer and structure, MIMO in LTE, LTE resource plan LTE and Self-Organizing Networks (SON). Radio network optimization work flow Work flow, the existing network, Optimization team establishment and cluster division, Single site verification, Alarm check, Cell state check, Radio parameters check, Site verification, Statistics analysis, Coverage problem analysis. Mobile internet and QoS issues Cellular QoS reference models. How QoS impact on KPIs and measurements, Introduction to mobile internet, The concept of shared access technologies, Support for QoS in the WCDMA environment, The PDP context model, Supporting end-to-end QoS, EPS bearer concepts, Default EPS bearer, Dedicated EPS bearer, APN-AMBR, UE-AMBR.

LTE optimisation and capability
Delivered in Internationally or OnlineFlexible Dates
£2,477