• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1105 Educators providing Courses

Nick Dale Photography

nick dale photography

Here’s a brief biographical profile and outline of my photography career. If you want to see a few pictures of me, click here. If you have any questions, just click the chat button or get in touch at nick@nickdalephotography.com or on +44 7942 800921 . Photographer | Writer | Speaker | Teacher | Judge I dreamed of becoming a photographer when I was 15, but my mother wanted me to go to Oxford instead! I ended up reading English at Oxford and working as a strategy consultant for a few years before retiring at the age of 29. I then travelled round the world for seven years, doing four ski seasons and working on an internet start-up in San Francisco before finally returning to London in 2005. At that point, consulting work felt too stressful, so I decided to go 'quality of life'. I'm now a private tutor and international award-winning wildlife photographer. I became a tutor in 2009 when I happened to read an article in the paper called 'Ten Ways to Beat the Recession', and I started taking pictures again when I received a random email inviting me to go on safari and climb Mount Kenya. I've been a wildlife photographer since 2013, taking pictures in 26 countries on all seven continents and winning various awards including the Sunday Times/Audley Travel Big Shot. I spend a lot of time in Africa, and I’ve been on over 300 game drives and boat rides there. I’ve also worked as a Resident Photographer at various safari lodges: 2019: Klein’s Camp, Serengeti Under Canvas, Grumeti Serengeti Tented Camp and Cottar’s 1920s Safari Camp 2020: Gabus Game Ranch and Etosha National Park in Namibia 2022: Ol Jogi in Kenya and Muchenje in Botswana. I'm always happy to answer questions from guests, whether it’s about camera settings, the rules of composition or just identifying all the different species of wildlife. Back at camp, I'll give the odd talk on camera technique, give feedback on their images and show them some of my own. Maybe I’ll see you out there…! Artist’s Statement I have a passion for wildlife, and I want to celebrate all its facets in my photography, including power, beauty, cuteness and humour. These are the qualities I want to share with people. I’m not a conservationist, so I don’t take pictures of endangered animals to put on posters for Greenpeace or Friends of the Earth. I take them because I love close encounters with the natural world, and I want to share the excitement, relaxation, tenderness and wonder they evoke. I started out taking 'portraits' of animals. That was all very well, and a lion might look beautiful sitting on the African savannah at sunset, but there isn't much energy in that sort of picture. What I try to do now is to focus on action shots. I still take portraits - and sometimes I don't have a choice! - but my ideal image is much more likely to be a cheetah chasing down a Thomson’s gazelle than a bird sitting on a branch! My favourite animals are the predators, and the advantage of a long lens is that it can create the impression of being right up close and personal with some pretty dangerous beasts. It’s that sense of excitement that I try to capture in my work, and I'm happy to use whatever technology I can find to do the job. Cameras 2 x Sony a1 mirrorless cameras 2 x Sony VGC-4EM Vertical Grip for A1 2 x Sony 160GB TOUGH CFexpress Type A Flash Memory Cards Lenses Sony FE 12-24 mm f/2.8 G Master lens Sony FE 24-70 mm f/2.8 G Master lens Sony FE 70-200 mm f/2.8 G Master OSS II lens Sony FE 400 mm f/2.8 G Master lens Sony FE 600 mm f/4 G Master lens Sony SEL E Mount 14TC 1.4x Teleconverter - White Sony SEL E Mount 20TC 2x Teleconverter - White All that, combined with the wonders of Lightroom and Topaz Labs, gives me the best possible chance to show off the wonders of Nature. Contact If you’d like to hire me for a talk, a lesson, a photo shoot or a safari, please contact me on +44 7942 800921 or at nick@nickdalephotography.com. 99 Ormonde Court Upper Richmond Road London SW15 6TR Mobile: +44 7942 800921 Skype: nicholas_dale Facebook: facebook.com/nickdalephotography Flickr: flickr.com/photos/nickdalephotography Instagram: instagram.com/nickdalephotography LinkedIn: linkedin.com/company/nickdalephotography Pinterest: pinterest.com/nickdalephotography Twitter: twitter.com/nickdale_photo YouTube: youtube.com/@nickdalephotography View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize View fullsize Donations If you’d like to support my photographic career by making a donation, please click the button below. DONATE Sales Sold over 25,000 images to buyers including National Geographic, Africa Geographic, BBC Wildlife Magazine, The Evening Standard, The Daily Telegraph, The Guardian, Daily Mail Online, The Sun, The Sunday Express, The Times and Lonely Planet. Sold my best-selling shot of a jumping Adélie penguin over 2,000 times - and it even appeared on a poster inside the hero's locker on the US TV show Atypical! Provided the cover photo for SMT magazine. Sold 65 fine art prints to private collectors around the world. Sold over 1,000 copies of my Expert Photography ebooks on Social Success Strategies and Wonderful Wildlife. Sold over 200 greeting cards and postcards at various exhibitions, Gerhold in Putney and Willow Bough Tea Rooms. Worked for clients including a tennis club, a milliner, a local councillor, a tuition agency and a procurement consultancy. Publications Wrote ebooks on wildlife photography and social media for Expert Photography, books on Predators & Prey, India, Antarctica and a local wedding, plus Resident Photographer: Tanzania & Kenya. Wrote articles for Expert Photography, Fusion Art, Outdoor Photography, Wildlife Photographic, PhotoPXL, Clipping Path Creative and SLR Lounge. Interviewed by Fusion Art for A Day in the Life. Posted articles, images and videos online: Nick Dale Photography website: 1.0k unique monthly visitors Facebook: 4.1k followers, 22.0k engagement, 700.6k people reached, 1.1m impressions (last 28 days) Instagram: 322 accounts engaged, 2.6k accounts reached, 14.4k total followers (last 30 days) LinkedIn: 492 connections Pinterest: 399 followers, 64k impressions, 2.4k engagements, 49k total audience, 1.8k engaged audience (last 30 days) Twitter: 18 followers YouTube: 50.1k subscribers, 205k watch hours and seven videos with more than a million views - (here, here, here, here, here, here and here). Awards Shoot The Frame’s October 2022 and May 2020 Shoot The Wild competitions The Best Modern and Contemporary Artists Prize 2022 The Faces of Peace Art Prize 2022 Tailor-Made Tour Company of the Year 2022 for England in the Travel & Hospitality Awards International Prize Leonardo da Vinci - The Universal Artist 2022 ATIM's Top 60 Masters for 2022 (see magazine feature on p25 and video starting at 26:26) Wildlife category in the Professional Photographer of the Year 2021 Best International Wildlife Photographer 2021 in the Southern Enterprise Awards hosted by SME News 2021 LUX Life Photography Coach of the Year - UK National Geographic: Photo of the Day award twice (here and here), both images being chosen for the Daily Dozen and Best of Photo of the Day 2017 and winning over 25,000 likes on Instagram Monthly finalist in the Greatest Maasai Mara Photographer of the Year 2021 Gold in the Animal Portrait category of the 2020 World Nature Photography Awards Sunday Times/Audley Travel Big Shot competition Wildlife Series in the 15th Pollux Awards/The Worldwide Photography Gala Awards Best of Contest in 35 Awards’ Wildlife: Mammals competition Guru’s Top Pick in the Gurushots Up Close with Birds challenge Best of Show in Grey Cube Gallery's Nature exhibition (see video) February 2020 Arthola competition Wildlife Worldwide Photography Competition 2019 (Animal Action category) Fusion Art: Artist Spotlight (Photography & Digital) in April 2020 (see video) and Best in Show at the 3rd Annual Animal Kingdom Art Exhibition (see video) Art Room Gallery: Nature competition (see video) Exodus Travels Monthly Photo Competition The Societies of Photographers: Gold Awards in the Wildlife, Nature and The Natural World categories Society of International Nature & Wildlife Photographers (SINWP): In the Wild Photography Competition (leading to stories in The Times, Express, The Sun, The Daily Star and the Mail Online, followed by an interview on London Live!) Various: Picture Frames Express's All Creatures Great and Small plus BBC Wildlife, Chiiz, Digital Photographer, Dodho, Wild Planet and Outdoor Photography competitions ePHOTOzine: two Daily Competitions, two Photos of the Week, 10 Editor’s Choice, 26 Highly Commended, 19 Guest Editor, 119 Readers' Choice and 213 User Awards Exodus Travels: 2018 calendar (February image) Facebook groups EP Cover Photo of the Week and Admin’s Choice from Expert Photography Photo of the Day and Photo of the Week for the International Photography Group Photo of the Day and Administrator’s Choice for Light and Shade Top Post of the Day from Nature & Creativity Cover Page and Weekly Contest for Nature Photography Administrator Choice for Photographers of the World Photo of the Week for Photography Certificate of Excellence, Weekly Contest, Cover Page and Admin Choice for the Professional Photographers Community Faunistic Selection for Renaissance Photography Top of the Day, Photo of the Day and Cracker of the Day for Save Earth Admin’s Choice from Superb Photography Cover photo for Wildlife & Nature Photography Certificate of Excellence from World Photographer - Wonderful Photography Magazine Award for World’s Top Photographers Instagram: Featured photo for @wildlifeplanet.ig, Featured Artist for @all_animals_addiction and @raw_africa_ and Daily Features for @instaperfect_capture, @wildlife__perfection, @OnlyAfrica, @kings_animals_love and Bonvac_Fauna Artist of the Week for Artlimes, Photographer of the Month for Picture Frames Express, Artist in Focus for LUMIarts and featured in Pond5’s Instagram Takeover and the May 2020, January 2021 February 2021 and March 2021 APÉRO catalogues. Exhibitions Chosen to take part in the Butterfly Effect online art exhibition put on by Contemporary Art Curator Magazine. Held solo exhibitions at the Norman Plastow Gallery in Wimbledon Village, Lumi Arts in Pimlico and 508 King's Road, where I am an artist-in-residence. Took part in Glaziers' Art Fair, Parallax Art Fair, PhotoX Awards 2018 at the Menier Gallery and various group shows at 508 King's Road and Gabriel Fine Arts. Took part in the Indian Photography Festival Exhibition and see | me exhibitions on Facebook and in New York. Was chosen for the online art galleries at Art Bridge, Artfinder, Art Gallery, Arthola, The Art Online Gallery, Artlimes, Printscapes and Saatchi Art. Sold six prints of a leopard at Greatest Maasai Mara Photographer of the Year exhibitions in Melbourne, Brisbane, Cape Town, Atlanta, Dallas and Johannesburg. Other Worked as Resident Photographer at Klein’s Camp, Serengeti Under Canvas, Grumeti Serengeti Tented Camp and Cottar’s 1920s Safari Camp in Africa for four months in 2019. Worked as Resident Photographer at Gabus Game Ranch in 2020. Gave talks for The Societies of Photographers, on two Antarctic cruise ships and at The Athenaeum Club, Grumeti Serengeti Tented Camp, Cottar’s 1920s Safari Camp, the SW19 Women's Institute, the Putney Women’s Institute, Malden Camera Club, Watford Camera Club, Putney Library, the London Institute of Photography and Beckenham Photographic Society. Helped judge the 2019 Canary Wharf Wildlife Photography Competition. Ran photography workshops at Canary Wharf and Putney Library. Gave private lessons to various amateur photographers. Recorded six wildlife photography videos with Coinaphoto, covering Africa, Asia, Europe, North America, South America and the polar regions. Had my work reviewed by Anthony Morganti on YouTube Became lifetime member of the Circle for the Foundation of the Arts (CFA). Joined the Society of International Nature and Wildlife Photographers in October 2013.

Act Fast Nl

act fast nl

Scunthorpe

Act Fast is a well-established Independent School near Scunthorpe in North Lincolnshire. Act Fast has grown organically as the need for a high standard of provision has emerged and developed. The premise of Act Fast’s provision is that we are promoting the value of education to previously disaffected young people. what we do We operate a bespoke curriculum at Act Fast, which is both written and delivered by in house staff and is in line with the DfE Independent Schools Standards. We overtly deliver lessons in the following subject areas: Maths up to Functional Skills level 2 standard English up to Functional Skills level 2 standard Motor Vehicle Technology with the Institute of the Motor Industry up to level 2 standard PSHE (Including RSE) against a verified and recognised scheme Motocross, delivered by qualified and experienced staff Physical Education through a range of on-site and off-site activities. Art/Crafts Music Further to this, lessons in the following subject areas are delivered as embedded features of the timetabled lessons. Human and Social Understanding Aesthetic and Creative Scientific Technological British Values Our learners know if they work hard, they are awarded by riding the motorcycles here at Act Fast. This has proven to be successful, helping young adults to achieve their qualifications and have a positive attitude towards learning. Curriculum Act Fast has made a commitment to give every young person who is capable of the opportunity to reintegrate and to take a range of exams. For those subjects that Act Fast does not currently deliver, as we develop learners opportunities will increase. We are an accredited exam centre through OCR, NCFE, ABC, D of E, and when required will extend this to meet the needs of our learners. Our curriculum also enables and encourages learners to develop their interests and talents. We have a number of students here who have found their passion for music, learning how to play the guitar, as well as a large number of young, talented motorbike riders who love learning about riding, fixing and maintaining the bikes. It’s important to us to support our learners in keeping them physically and mentally healthy. We have access to: Mental Health Champions, outreach support and therapeutic counselling services, available to all our learners. We have regular sports activities within our timetable to encourage physical exercise, as well as access to local gyms and leisure centres. These activities help to prepare young people to access their community in adulthood. Hidden Curriculum Act Fast’s curriculum, throughout the range of its delivery, is heavily invested in the “Hidden Curriculum”. The Hidden Curriculum argument is that the most valuable lessons our young people receive here are to arrive on time, respect authority, follow instructions, keep regard for safety, take responsibility for their actions, behave in an acceptable standard, liaise with other people respectfully, and respect other people’s personal choices, encouraging equality and diversity. Other ways in which we promote equality and diversity include: Challenging negative attitudes amongst students. Setting clear rules regarding how people treat each other. Treating all students and staff equally and fairly. Using resources that have multicultural themes. Creating lessons that reflect and promote diversity in the classroom. Making sure that all students have equal access to participation and opportunities. Ensuring that all procedures and policies are non-discriminatory. Making sure that classroom materials never discriminate against anyone. Safeguarding protected characteristics throughout our culture and ethos. All of these things, to a greater extent than formalised subject lessons, will make them responsible, independent, resilient and above all else employable young people once they finish their school career. Act Fast has trained and qualified staff to recognise some of the barriers to learning that students face. These barriers might be due to Adverse Childhood Experiences and with knowledge and understanding of such issues Act Fast staff can help students overcome them to maximise their potentials. Referral, Application and Introduction After a referral is made to Act Fast, we invite a representative from the referring body (usually the Inclusion Officer), the learner and the learner’s parents into Act Fast for a familiarisation visit. During that visit the learner is given a tour of the facility, is introduced to key staff members and receives an explanation of the culture of Act Fast. Learners are given the opportunity to voice any concerns and any questions they have are answered. We set a high expectation on behaviour here, and partly because expectations are high, but also because more established learners mentor new arrivals, new learners very soon fall into compliance with our way of doing things. Act Fast works because our learners buy into the culture. This is the first opportunity that a young person has to involve themselves in how we operate here. Application forms must be completed prior to a young person starting at Act Fast. Once applications are complete, the referring body typically takes a few days (sometimes up to a week) to arrange their transport. Personal data will be stored and processed at this point, and details entered into our MIS system, Arbor. We insist on a Personal Learning Plan (PLP) meeting with stakeholders and the young person present within the first month. This allows any teething troubles to be voiced and solutions to be sought. Further PLP meetings are held regularly, no less frequently than once a term. At those meetings, Act Fast staff will deliver a report detailing the engagement of the young person, levels of educational attainment, attendance, general engagement, and commentary on the likelihood of a reintegration being successful. Reintegration planning must be tailored to suit the needs of the individual. Staff Investment Our staff all take part in quality training including regular CPD sessions and ongoing programmes of accreditation such as SSS online training (recently completed by all staff members). Training needs identified are acted on as soon as practical. The organisation believes and invests in the continuous professional development of its people. Our commitment to CPD is such that every member of staff has received CPD accredited training in the last 12 months. Our qualified teachers ensure pedagogical content methods are in place to deliver high standards of teaching for our young learners. We engage with our staff continuously here and know of the main pressures on them, including managing workload. We aim to support every staff member to help guide them throughout their career at Act Fast. Educational Framework It is our aim to provide an educational framework which is heavily invested in the hidden curriculum. By that, we mean that as well as lessons formalised in Maths and English for example, our young people develop an understanding of: working to a process arriving on time respecting authority abiding by the rules accepting that their first choice may not always be the right choice following instructions not expecting to leave early attending every day These are the skills whereby a young person will be employable post 16. Without these key skills, a young person is unlikely to be able to function in the workplace. We develop the hidden curriculum, embedded in everything we do, in order that our learners gain an understanding of their expectations being matched by the expectations of attendance, compliance and engagement We have a tracking system in place for our core subjects. We also use a “readiness to learn” scale, whereby a learners attitude, engagement, and involvement in their own work is measured. Bespoken When evolving Act Fast into an independent school I was very mindful that Mainstream school had not been a successful outcome for the majority if not all of our learners. It was imperative that we were bespoke and able to meet the needs of all our learners and not just the few. For this reason we created our own curriculum that is more sympathetic to our learners’ needs. Our teachers create an environment that allows our young people to focus on learning. 1:1 support as well as small group teaching (where appropriate) is in place to make teaching more effective, allowing tutors to concentrate on each individual learner’s needs. We believe in student voice here at Act Fast. Our EHCP’s (Educational Health Care plans) allow us to capture our learners’ views. It’s not only in our annual reviews that we give learner’s opportunity to be heard. For example, one young adult suggested we invested in a bigger bike here, so we put arrangements in place and made this happen. We encourage our learners to make their voices heard. Below are some examples of student voice council meetings held at Act Fast and how they shape decisions made at the school. Student Voice Meeting 040322 We have effective arrangements to identify learners who may need early help or are at risk of neglect, abuse, grooming or exploitation. We strongly promote our policies and legislation such as safeguarding, diversity and equality of our staff and learners at Act Fast. Ofsted Report 2022 Best Bits: “Act Fast school is a place where the proprietor and staff go the extra mile to support the pupils who attend. It has a unique vision of how to ‘hook’ pupils back into education, and it is successful in doing so. Act Fast has started to re-engage pupils who have experienced difficulties in their education”. “Parents believe that, finally, a school ‘gets’ their child. The wider curriculum, built around motor-cross, is a distinctive feature of the school. It motivates pupils to attend and to behave well. For those pupils who do not wish to ride the bikes, staff work with them to find alternatives. The proprietor and staff have limitless ambition for what pupils can achieve in their personal development. At the heart of this is a patient, careful building of relationships, and, in many cases, a re-building of trust between the pupil and their experience of education.” “The special educational needs coordinator (SENCo) has a strong understanding of the requirements of pupils with special educational needs and/or disabilities (SEND). Recently, the SENCo has started to work with a senior leader to more effectively incorporate pupils’ SEND targets from their education, health and care (EHC) plans into teachers’ planning.” “Leaders have also recently taken action to improve the school’s support for pupils’ reading. For instance, a primary specialist has been appointed with experience of teaching phonics to the weakest readers. The English lead is in the process of building a programme to encourage pupils to read widely and for enjoyment. Leaders’ wider curriculum for pupils’ personal development is, to very large extent, a strength of the school.” “The proprietor’s vision for getting young people who have had difficult experiences of school back into education is impressive. It is backed up by an innovative personal development curriculum, built on a range of activities that take place in the afternoons. These include a variety of motor vehicle-related opportunities, as well as visits out of school to a range of venues. Recently, for instance, pupils have started to be taken to a local engineering firm to participate in a scheme to broaden their career aspirations. Pupils know that there is a plan in place for them to make a suitable next step into further education or training at the end of Year 11.” Improvements: “Leaders’ PSHE curriculum includes reference to the protected characteristics and the school is a respectful community: however, coverage of the protected characteristics in the curriculum strategy is not as detailed as it could be, so pupils’ understanding is not as developed as it could be. Leaders should revisit their curriculum thinking for PSHE so that teaching of the protected characteristics is made more overt.” “The current curriculum is based on a limited set of qualifications in two subjects. For a registered special school, this lacks ambition. As a result, pupils experience a narrow curriculum, including a limited suite of qualifications. Leaders should take action to broaden and deepen their curriculum so that pupils have opportunities to study a wider range of subject content, organised coherently and cumulatively over the entire secondary and post-16 phases; and, for those who are capable, to a higher level of accreditation.” “Leaders have not taken the required action with regard to the statutory guidance for the teaching of RSHE. Consequently, parents have not been made aware of the school’s policy and their parental rights within the policy. Also, the teaching of Inspection report: Act Fast NL Ltd. RSHE is not clearly planned in the school’s curriculum. Leaders should take action to be compliant with the statutory guidance and to ensure that curriculum thinking incorporates structured RSHE teaching.”

Courses matching "Strategy"

Show all 3376

Review and Planning Party

5.0(2)

By The Flo Coach

Where do you want to be this time next year in your business? Review 2024 and Plan 2025.

Review and Planning Party
Delivered Online
£35.75

How can I ensure my business is digital-ready in 2024 and beyond?

5.0(1)

By Let’s Do Business Group

Continuously evolving business and technology landscapes create new and transforming opportunities for entrepreneurs and companies that are prepared.

How can I ensure my business is digital-ready in 2024 and beyond?
Delivered Online
FREE

An Introduction to Real Estate (12 Hours Online Self-Study)

4.3(5)

By Bayfield Training

Are you looking to enter the dynamic world of real estate? Our course is designed to equip you with the knowledge and tools you need to communicate effectively with real estate professionals and develop key skills in real estate investment strategy and analytics. At the end of the course, you'll be able to read and interpret real estate market reports, and have a firm grasp of how iconic buildings, cities, and companies fit into the overall picture of the real estate sector. On this course, you will… Become familiar with the players, structure, general terminology and overall needs of Real Estate. Learn what is Real Estate and why it is different from other asset classes Get to grips with the overall size and structure of the UK Real Estate Market Learn and analyse the links between the different parts of the property market Understand who works in the Real Estate Market, their qualifications and their job descriptions Recognise how and when to use basic real estate concepts: Rent, Value, Yield, Risk and Return, etc… Learn how to read a real estate market report Understand how current affairs, politics and economics affects Real Estate Investment Use household names and iconic companies, cities and buildings to help consolidate your appreciation of this exciting sector Who will benefit from this course: Graduates or undergraduates studying economics, finance. Professionals working in Marketing or Accounting teams within Real Estate firms. APC students. Anyone interested in Real Estate. School leavers/A-Level Students looking to gain an understanding of Real Estate. Non cognate students who wish to transfer into Real Estate/Finance careers. Course Outline Module 1: What is and why buy Real Estate? The property Market The Size and Structure of the UK property market The impact of Real Estate in the Economy Module 2: The Real Estate Market System The Space Market The Asset Market The Development Market Module 3: How to value Real Estate An Introduction to Financial Mathematics The difference between Price, Value and Worth Property Yield Conventional Valuation Methods Module 4: How to read a Real Estate Market Report Property Market Indicators: Stock Indicators Property Market Indicators: Investment Indicators Module 5: Who works in Real Estate? The build Environment by Cobalt Recruitment Rea; Estate Agents Examples of Real Estate Market Agents CVs Real Estate Network

An Introduction to Real Estate (12 Hours Online Self-Study)
Delivered in person or Online + more
£1,500

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online + more
£2,975

55341 Installation, Storage, and Compute with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server. This course will help them update their knowledge and skills related to storage and compute for Windows Server. Overview Prepare and install Windows Server and plan a server upgrade and migration strategy. Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes. Describe enterprise storage solutions, and select the appropriate solution for a given situation. Implement and manage Storage Spaces and Data Deduplication. Install and configure Microsoft Hyper-V, and configure virtual machines. Deploy, configure, and manage Windows and Hyper-V containers. Describe the high availability and disaster recovery technologies in Windows Server. Plan, create, and manage a failover cluster. Implement failover clustering for Hyper-V virtual machines. Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation. Create and manage deployment images. Manage, monitor, and maintain virtual machine installations. This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites A basic understanding of networking fundamentals. An awareness and understanding of security best practices. An understanding of basic Active Directory concepts. Basic knowledge of server hardware. Experience supporting and configuring Windows client operating systems such as Windows 10 or Windows 11. 1 - Installing, upgrading, and migrating servers and workloads Introducing Windows Server Preparing and installing Server Core Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models 2 - Configuring local storage Managing disks in Windows Server Managing volumes in Windows Server 3 - Implementing enterprise storage solutions Overview of DAS, NAS, and SANs Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet Understanding iSNS, DCB, and MPIO Configuring sharing in Windows Server 4 - Implementing Storage Spaces and Data Deduplication Implementing Storage Spaces Managing Storage Spaces Implementing Data Deduplication 5 - Installing and configuring Hyper-V and virtual machines Overview of Hyper-V Installing Hyper-V Configuring storage on Hyper-V host servers Configuring networking on Hyper-V host servers Configuring Hyper-V virtual machines Managing virtual machines 6 - Deploying and managing containers Overview of containers in Windows Server Deploying Windows Server and Hyper-V containers Installing, configuring, and managing containers by using Docker 7 - High availability and disaster recovery Defining levels of availability Planning high availability and disaster recovery solutions with Hyper-V virtual machines Backing up and restoring by using Windows Server Backup High availability with failover clustering in Windows Server 8 - Implementing failover clustering Planning a failover cluster Creating and configuring a new failover cluster Maintaining a failover cluster Troubleshooting a failover cluster Implementing site high availability with stretch clustering 9 - Implementing failover clustering with Windows Server Hyper-V Overview of the integration of Hyper-V with failover clustering Implementing Hyper-V VMs on failover clusters Key features for VMs in a clustered environment 10 - Implementing Network Load Balancing Overview of NLB Configuring an NLB cluster Planning an NLB implementation 11 - Creating and managing deployment images Introduction to deployment images Creating and managing deployment images by using MDT Virtual machine environments for different workloads 12 - Managing, monitoring, and maintaining virtual machine installations WSUS overview and deployment options Update management process with WSUS Overview of Windows PowerShell DSC Overview of Windows Server monitoring tools Using Performance Monitor Monitoring event logs

55341 Installation, Storage, and Compute with Windows Server
Delivered Online
£2,975

ITIL© 4 Strategist - Direct Plan and Improve (DPI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in IT Service Management. The ITIL 4 DPI Qualification would most likely suit the following delegates: Individuals continuing of their journey in service management ITSM managers and aspiring ITSM managers Managers of all levels involved in shaping direction and strategy or developing a continually improving team Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview The purpose of the ITIL 4 Direct Plan and Improve Qualification is: To provide the candidate with the practical skills necessary to create a ?learning and improving? IT organization, with a strong and effective strategic direction To provide practitioners with a practical and strategic method for planning and delivering continual improvement with the necessary agility The objectives of this course are to: Understand the Key Concepts of Direct, Plan & Improve Understand the scope of what is to be directed and/or planned, and know how to use key principles and methods of direction and planning in that context Understand the role of GRC (Governance, Risk & Compliance) and know how to integrate the principles and methods into the service value system Understand and know how to use the key principles and methods of continual improvement for all types of improvements Understand and know how to use the key principles and methods of Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in directing, planning and improvement Understand and know how to direct, plan and improve value streams and practices This unique and central course covers requirements in both the ITIL Managing Professional and ITIL Strategic Leader designations. As such, this course is a must-have in any ITIL 4 professional development plan. You will gain the practical skills needed to establish a ?learning and improving? IT organization that possess a strong and targeted strategic direction. This class includes an exam voucher. Prerequisites ITIL© 4 Foundation 1 - KEY CONCEPTS OF DIRECT, PLAN AND IMPROVE Knowing key terms Differentiating between principle concepts Defining the relationship of Values, Outcomes, Costs and Risks 2 - SCOPING WHAT IS TO BE DIRECTED Cascading goals and requirements Deciphering effective policies, controls and guidelines Placing decision-making authority at the correct level 3 - THE ROLE OF GRC IN THE SERVICE VALUE SYSTEM The role of risk management How governance impacts DPI Ensuring that controls are sufficient but not excessive 4 - PRINCIPLES AND METHODS FOR CONTINUAL IMPROVEMENT Leverage the ITIL CI model Identify assessment objectives and outputs Select the appropriate assessment method Prioritize desired outcomes Build, justify and advocate your business case Conduct improvement reviews and lessons learned sessions Embed CI at all levels of the service value stream 5 - APPLYING COMMUNICATION AND ORGANIZATIONAL CHANGE MANAGEMENT The nature and benefits of OCM Manage, communicate effectively, and influence stakeholders Establish valuable interfaces across the value chain 6 - EFFECTIVE MEASURING AND REPORTING Defining indicators and metrics to support objectives 7 - DIRECT, PLAN AND IMPROVE VALUE STREAMS Recognizing the differences between value streams and practices Choosing the right methods and techniques to direct, plan and improve value streams Additional course details:Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 Nexus Humans ITIL 4 Strategist Direct Plan and Improve (DPI) with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ITIL 4 Strategist Direct Plan and Improve (DPI) with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ITIL© 4 Strategist - Direct Plan and Improve (DPI)
Delivered Online
£2,385

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online
£2,975

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Prerequisites Before attending this course, students must have previous experience deploying or administering Azure resources and conceptual knowledge of: Azure Active Directory Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability AZ-104T00 - Microsoft Azure Administrator 1 - Design governance Design for governance Design for management groups Design for subscriptions Design for resource groups Design for resource tags Design for Azure Policy Design for role-based access control (RBAC) Design for Azure landing zones 2 - Design an Azure compute solution Choose an Azure compute service Design for Azure Virtual Machines solutions Design for Azure Batch solutions Design for Azure App Service solutions Design for Azure Container Instances solutions Design for Azure Kubernetes Service solutions Design for Azure Functions solutions Design for Azure Logic Apps solutions 3 - Design a data storage solution for non-relational data Design for data storage Design for Azure storage accounts Design for data redundancy Design for Azure Blob Storage Design for Azure Files Design for Azure managed disks Design for storage security 4 - Design a data storage solution for relational data Design for Azure SQL Database Design for Azure SQL Managed Instance Design for SQL Server on Azure Virtual Machines Recommend a solution for database scalability Recommend a solution for database availability Design security for data at rest, data in motion, and data in use Design for Azure SQL Edge Design for Azure Cosmos DB and Table Storage 5 - Design data integration Design a data integration solution with Azure Data Factory Design a data integration solution with Azure Data Lake Design a data integration and analytic solution with Azure Databricks Design a data integration and analytic solution with Azure Synapse Analytics Design strategies for hot, warm, and cold data paths Design an Azure Stream Analytics solution for data analysis 6 - Design an application architecture Describe message and event scenarios Design a messaging solution Design an Azure Event Hubs messaging solution Design an event-driven solution Design a caching solution Design API integration Design an automated app deployment solution Design an app configuration management solution 7 - Design authentication and authorization solutions Design for identity and access management (IAM) Design for Microsoft Entra ID Design for Microsoft Entra business-to-business (B2B) Design for Azure Active Directory B2C (business-to-customer) Design for conditional access Design for identity protection Design for access reviews Design service principals for applications Design managed identities Design for Azure Key Vault 8 - Design a solution to log and monitor Azure resources Design for Azure Monitor data sources Design for Azure Monitor Logs (Log Analytics) workspaces Design for Azure Workbooks and Azure insights Design for Azure Data Explorer 9 - Design network solutions Recommend a network architecture solution based on workload requirements Design patterns for Azure network connectivity services Design outbound connectivity and routing Design for on-premises connectivity to Azure Virtual Network Choose an application delivery service Design for application delivery services Design for application protection services 10 - Design a solution for backup and disaster recovery Design for backup and recovery Design for Azure Backup Design for Azure blob backup and recovery Design for Azure files backup and recovery Design for Azure virtual machine backup and recovery Design for Azure SQL backup and recovery Design for Azure Site Recovery 11 - Design migrations Evaluate migration with the Cloud Adoption Framework Describe the Azure migration framework Assess your on-premises workloads Select a migration tool Migrate your structured data in databases Select an online storage migration tool for unstructured data Migrate offline data 12 - Introduction to the Microsoft Azure Well-Architected Framework Azure Well-Architected Framework pillars Cost optimization Operational excellence Performance efficiency Reliability Security 13 - Microsoft Azure Well-Architected Framework - Cost Optimization Develop cost-management discipline Design with a cost-efficiency mindset Design for usage optimization Design for rate optimization Monitor and optimize over time 14 - Microsoft Azure Well-Architected Framework - Operational excellence Embrace DevOps culture Establish development standards Evolve operations with observability Deploy with confidence Automate for efficiency Adopt safe deployment practices 15 - Microsoft Azure Well-Architected Framework - Performance efficiency Negotiate realistic performance targets Design to meet capacity requirements Achieve and sustain performance Improve efficiency through optimization 16 - Microsoft Azure Well-Architected Framework - Reliability Design for business requirements Design for resilience Design for recovery Design for operations Keep it simple 17 - Microsoft Azure Well-Architected Framework - Security Plan your security readiness Design to protect confidentiality Design to protect integrity Design to protect availability Sustain and evolve your security posture 18 - Getting started with the Microsoft Cloud Adoption Framework for Azure Customer narrative Common blockers 19 - Prepare for successful cloud adoption with a well-defined strategy Customer narrative Capture strategic motivation Define objectives and key results Evaluate financial considerations Understand technical considerations Create a business case 20 - Prepare for cloud adoption with a data-driven plan Customer narrative 21 - Choose the best Azure landing zone to support your requirements for cloud operations Customer narrative Common operating models Design areas for Azure landing zones Design principles for Azure landing zones Journey to the target architecture Choose an Azure landing zone option Deploy the Azure landing zone accelerator Enhance your landing zone 22 - Migrate to Azure through repeatable processes and common tools Customer narrative Migration process Migration tools Common tech platforms 23 - Address tangible risks with the Govern methodology of the Cloud Adoption Framework for Azure Customer narrative Govern methodology Corporate policies Governance disciplines Deploy a cloud governance foundation The Cost Management discipline 24 - Ensure stable operations and optimization across all supported workloads deployed to the cloud Establish business commitments Deploy an operations baseline Protect and recover Enhance an operations baseline Manage platform and workload specialization 25 - Innovate applications by using Azure cloud technologies Follow the innovation lifecycle Azure technologies for the build process Infuse your applications with AI Azure technologies for measuring business impact Azure technologies for the learn process 26 - Prepare for cloud security by using the Microsoft Cloud Adoption Framework for Azure Customer narrative Methodology Security roles and responsibilities Simplify compliance and security Simplify security implementation Security tools and policies Additional course details: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered Online
£2,380

Java Bootcamp, 12-weeks

4.6(12)

By PCWorkshops

Full stack, in depth , comprehensive in classroom 3 month training on Java programming. 1 lesson a week, the other days you work on your own on structured homework and supported with a 1-1 mentor.

Java Bootcamp, 12-weeks
Delivered In-Person in London + more
£2,100

ITIL© 4 Strategic Leader: Digital and IT Strategy (DITS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is aimed at people in senior roles including CIOs, chief digital officers and other aspiring CxOs, as well as consultants and others involved in digital transformations, service delivery and strategic delivery. Overview By the end of this course, you will understand: The internal and external factors to consider while crafting digital strategy How IT strategy differs from digital strategy and how they can be integrated Creating a digital strategy that achieves the most value from digital Implementing and sustaining digital strategy Developing and nurturing digital capabilities for continual business innovation and value co-creation This course takes you on a digital strategy journey. Its iterative, eight-step model moves from ?vision? through to ?actions? and is about creating sustainable, digital momentum. You experience the four key capabilities to develop a holistic, digital capability framework: digital leadership, managing innovation and emerging technologies, risk management and structuring a digital enterprise. This class includes an exam voucher. Prerequisites Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in IT Service Management. 1 - ITIL GUIDING PRINCIPLES TO ALL ASPECTS OF DIGITAL AND IT STRATEGY Focus on Value Start Where You Are Progress Iteratively with Feedback Collaborate and Promote Visibility Think and Work Holistically Keep It Simple and Practical Optimise and Automate 2 - LEVERAGE DIGITAL STRATEGY TO REACT TO DIGITAL DISRUPTION Digital Technology Digital Business Digital Organisation Digitisation Digital Transformation Business Strategy and Business Models Digital and IT Strategy Products Services Relationship Between Digital, IT Strategy and Components of ITIL SVS. 3 - RELATIONSHIP BETWEEN CONCEPTS OF DIGITAL AND IT STRATEGY, SERVICE VALUE SYSTEM AND SERVICE VALUE CHAIN Environmental Analysis External Analysis: PESTLE Internal Analysis: Four Dimensions of Service Management 4 - HOW AN ORGANISATION USES DIGITAL AND IT STRATEGY TO REMAIN VIABLE IN ENVIRONMENTS How an Organisation?s Viability is Related to Agile, Resilient, Lean, Continuous and Co-Creational it is How to Analyse the VUCA Factors and Address them in a Digital and IT Strategy Organisation?s Position in a Particular Market or Industry Digital Positioning Tool to Determine Appropriate Position for a Digital Organization 5 - EXPLAIN AND COMPARE THREE LEVELS OF DIGITAL DISRUPTION Ecosystem Industry/Market Organisational Influenced factors Achieving Customer/Market Relevance Achieving Operational Excellence Internal and External Focus Balanced Approach 6 - STRATEGIC APPROACHES BY DIGITAL AND IT TO ACHIEVE CUSTOMER/MARKET RELEVANCE AND OPERATIONAL EXCELLENCE How to Apply Approaches to Achieve Customer/Market Relevance Customer Journeys Omnichannel Delivery and Support Context-Sensitive Delivery and Support Customer Analytics Customer Feedback and 360ø Approaches How to Achieve Operational Excellence in the Four Dimensions of Service Management Understand the Financial Aspects of Digital and IT Strategy in Terms of the Following Financial Policies Portfolio Optimization Funding Projects, Products and Services Balancing Cost of Innovation and Operation Charging Models Assess Strategic Approaches for Digital Organizations 7 - RISKS AND OPPORTUNITIES OF DIGITAL AND IT STRATEGY Concept of Risk Management in the Context of a Digital Organisation Context of Digital and IT Strategy Identify Risk Assess Risk Concept of Risk Posture and Show How to Determine an Acceptable Balance Between Opportunity and Risk Explain the Concept of Innovation, Including its Key Elements and Techniques Apply Techniques to Develop and Maintain a Culture of Innovation 8 - STEPS AND TECHNIQUES INVOLVED IN DEFINING AND ADVOCATING FOR DIGITAL AND IT STRATEGY How to Use Digital Readiness Assessment to Perform Gap Analysis Between an Organisation?s Current and Desired Positions Approaches for Scraping Data from Dynamic Websites How to Define and Communicate a Vision and a Strategy How to Use Business Cases to Advocate for a Digital and IT Strategy 9 - IMPLEMENTATION OF A DIGITAL AND IT STRATEGY How to Define Operating Models for Digital Organisations Major Skills Required of Leaders in Digital Organisation Apply Approaches to Strategy Coordination and Implementation: Large-Scale Transformation Incremental Transformation Mergers and Acquisitions Individual Changes Approaches to POMs (Parallel Operating Models) How to Assess Success of a Digital and IT Strategy Typical Activities of a Digital Transformation Programme

ITIL© 4 Strategic Leader: Digital and IT Strategy (DITS)
Delivered Online
£1,785