Duration 3 Days 18 CPD hours This course is intended for System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview Identify the AWS services that support the different phases of Operational Excellence, an AWS Well-Architected Framework pillar Manage access to AWS resources using AWS accounts and organizations and AWS Identity and Access Management (IAM) Maintain an inventory of in-use AWS resources by using AWS services, such as AWS Systems Manager, AWS CloudTrail, and AWS Config Develop a resource deployment strategy using metadata tags, Amazon Machine Images (AMIs), and AWS Control Tower to deploy and maintain an AWS cloud environment Automate resource deployment by using AWS services, such as AWS CloudFormation and AWS Service Catalog Use AWS services to manage AWS resources through CloudOps lifecycle processes, such as deployments and patches Configure a highly available cloud environment that uses AWS services, such as Amazon Route 53 and Elastic Load Balancing, to route traffic for optimal latency and performance Configure AWS Auto Scaling and Amazon EC2 Auto Scaling to scale out your cloud environment based on demand Use Amazon CloudWatch and associated features, such as alarms, dashboards, and widgets, to monitor your cloud environment Manage permissions and track activity in your cloud environment by using AWS services, such as AWS CloudTrail and AWS Config Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service State the purpose, benefits, and appropriate use cases for mountable storage in your AWS Cloud environment Explain the operational characteristics of object storage in the AWS Cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier Build a comprehensive cost model to help gather, optimize, and predict your cloud costs by using services such as AWS Cost Explorer and the AWS Cost & Usage Report This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems. The course also covers specific AWS features, tools, and best practices related to these functions. Prerequisites Successfully completed the AWS Technical Essentials course Background in either software development or systems administration Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows Basic knowledge of networking protocols (TCP/IP, HTTP) 1 - Introduction to Cloud Operations on AWS What is Cloud Operations AWS Well-Architected Framework AWS Well-Architected Tool 2 - Access Management AWS Identity and Access Management (IAM) Resources, accounts, and AWS Organizations 3 - System Discovery Methods to interact with AWS services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config 4 - Deploy and Update Resources Cloud Operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower 5 - Automate Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Hands-On Lab: Infrastructure as Code 6 - Manage Resources AWS Systems Manager Hands-On Lab: Operations as Code 7 - Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 8 - Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager 9 - Monitor and Maintain System Health Monitoring and maintaining healthy workloads Monitoring AWS infrastructure Monitoring applications Hands-On Lab: Monitor Applications and Infrastructure 10 - Data Security and System Auditing Maintaining a strong identity and access foundation Implementing detection mechanisms Automating incident remediation 11 - Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC 12 - Mountable Storage Configuring Amazon Elastic Block Store (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Hands-On Lab: Automating with AWS Backup for Archiving and Recovery 13 - Object Storage Deploying Amazon Simple Storage Service (Amazon S3) Managing storage lifecycles on Amazon S3 14 - Cost Reporting, Alerts, and Optimization Gaining AWS cost awareness Using control mechanisms for cost management Optimizing your AWS spend and usage Hands-On Lab: Capstone lab for CloudOps Additional course details: Nexus Humans Cloud Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for Network Engineers looking to specialize in Azure networking solutions. An Azure Network engineer designs and implements core Azure networking infrastructure, hybrid networking connections, load balance traffic, network routing, private access to Azure services, network security and monitoring. The azure network engineer will manage networking solutions for optimal performance, resiliency, scale, and security. This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, Hybrid Networking connections, load balancing traffic, network routing, private access to Azure services, network security and monitoring. Learn how to design and implement a secure, reliable, network infrastructure in Azure and how to establish hybrid connectivity, routing, private access to Azure services, and monitoring in Azure. Prerequisites Prerequisite courses (or equivalent knowledge and hands-on experience): AZ-104T00 - Microsoft Azure Administrator 1 - Introduction to Azure Virtual Networks Explore Azure Virtual Networks Configure public IP services Design name resolution for your virtual network Enable cross-virtual network connectivity with peering Implement virtual network traffic routing Configure internet access with Azure Virtual NAT 2 - Design and implement hybrid networking Design and implement Azure VPN Gateway Connect networks with Site-to-site VPN connections Connect devices to networks with Point-to-site VPN connections Connect remote resources by using Azure Virtual WANs Create a network virtual appliance (NVA) in a virtual hub 3 - Design and implement Azure ExpressRoute Explore Azure ExpressRoute Design an ExpressRoute deployment Configure peering for an ExpressRoute deployment Connect an ExpressRoute circuit to a virtual network Connect geographically dispersed networks with ExpressRoute global reach Improve data path performance between networks with ExpressRoute FastPath Troubleshoot ExpressRoute connection issues 4 - Load balance non-HTTP(S) traffic in Azure Explore load balancing Design and implement Azure load balancer using the Azure portal Explore Azure Traffic Manager 5 - Load balance HTTP(S) traffic in Azure Design Azure Application Gateway Configure Azure Application Gateway Design and configure Azure Front Door 6 - Design and implement network security Get network security recommendations with Microsoft Defender for Cloud Deploy Azure DDoS Protection by using the Azure portal Deploy Network Security Groups by using the Azure portal Design and implement Azure Firewall Secure your networks with Azure Firewall Manager Implement a Web Application Firewall on Azure Front Door 7 - Design and implement private access to Azure Services Explain virtual network service endpoints Define Private Link Service and private endpoint Integrate private endpoint with DNS Integrate your App Service with Azure virtual networks 8 - Design and implement network monitoring Monitor your networks using Azure monitor Monitor your networks using Azure network watcher
Duration 5 Days 30 CPD hours This course is intended for This course is intended for existing IT professionals who have some networking knowledge and experience and are looking for a single course that provides insight into core and advanced networking technologies in Windows Server. This audience would typically include: Network administrators who are looking to reinforce existing skills and learn about new networking technology changes and functionality in Windows Server. System or Infrastructure Administrators with general networking knowledge who are looking to gain core and advanced networking knowledge and skills on Windows Server. Overview Plan and implement an IPv4 network. Implement Dynamic Host Configuration Protocol (DHCP). Implement IPv6. Implement Domain Name System (DNS). Implement and manage IP address management (IPAM). Plan for remote access. Implement DirectAccess. Implement virtual private networks (VPNs). Implement networking for branch offices. Configure advanced networking features. Implement Software Defined Networking. 55343A is the Community Courseware equivalent of retired Legacy Course 20741BC - Networking with Windows Server 2016. This 5-day classroom-based course provides the fundamental networking skills required to deploy and support Windows Server in most organizations. It covers IP fundamentals, remote access technologies, and more advanced content including Software Defined Networking. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. Prerequisites In addition to professional experience, students who attend this training should already have the following technical knowledge: Experience working with Windows Server Knowledge of the Open Systems Interconnection (OSI) model Understanding of core networking infrastructure components and technologies such as cabling, routers and switches Familiarity with networking topologies and architectures such as local area networks (LANs), wide area networks (WANs) and wireless networking Some basic knowledge of the TCP/IP protocol stack, addressing and name resolution Experience with and knowledge of virtualization Hands-on experience working with the Windows client operating systems such as Windows 10 or Windows 11 1 - Planning and implementing an IPv4 network Planning IPv4 addressing Configuring an IPv4 host Managing and troubleshooting IPv4 network connectivity 2 - Implementing DHCP Overview of the DHCP server role Deploying DHCP Managing and troubleshooting DHCP 3 - Implementing IPv6 Overview of IPv6 addressing Configuring an IPv6 host Implementing IPv6 and IPv4 coexistence Transitioning from IPv4 to IPv6 4 - Implementing DNS Implementing DNS servers Configuring zones in DNS Configuring name resolution between DNS zones Configuring DNS integration with Active Directory Domain Services (AD DS) Configuring advanced DNS settings 5 - Implementing and managing IPAM Overview of IPAM Deploying IPAM Managing IP address spaces by using IPAM 6 - Remote access in Windows Server Overview of remote access Implementing the Web Application Proxy 7 - Implementing DirectAccess Overview of DirectAccess Implementing DirectAccess by using the Getting Started Wizard Implementing and managing an advanced DirectAccess infrastructure 8 - Implementing VPNs Planning VPNs Implementing VPNs 9 - Implementing networking for branch offices Networking features and considerations for branch offices Implementing Distributed File System (DFS) for branch offices Implementing BranchCache for branch offices 10 - Configuring advanced networking features Overview of high performance networking features Configuring advanced Microsoft Hyper-V networking features 11 - Implementing Software Defined Networking Overview of SDN. Implementing network virtualization Implementing Network Controller
Duration 1 Days 6 CPD hours This course is intended for Sales Legal Marketing Business analysts Project managers AWS Academy students Other IT-related professionals Overview Summarize the working definition of AWS Differentiate between on-premises, hybrid-cloud, and all-in cloud Describe the basic global infrastructure of the AWS Cloud Explain the six benefits of the AWS Cloud Describe and provide an example of the core AWS services, including compute, network, databases, and storage Identify an appropriate solution using AWS Cloud services with various use cases Describe the AWS Well-Architected Framework Explain the shared responsibility model Describe the core security services within the AWS Cloud Describe the basics of AWS Cloud migration Articulate the financial benefits of the AWS Cloud for an organization?s cost management Define the core billing, account management, and pricing models Explain how to use pricing tools to make cost-effective choices for AWS services This course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud, independent of specific technical roles. You will learn about AWS Cloud concepts, AWS services, security, architecture, pricing, and support to build your AWS Cloud knowledge. This course also helps you prepare for the AWS Certified Cloud Practitioner exam. Prerequisites General IT technical knowledge, General IT business knowledge 1 - Introduction to Amazon Web Services Summarize the benefits of AWS Describe differences between on-demand delivery and cloud deployments Summarize the pay-as-you-go pricing model 2 - Compute in the Cloud Describe the benefits of Amazon Elastic Compute Cloud (Amazon EC2) at a basic level Identify the different Amazon EC2 instance types Differentiate between the various billing options for Amazon EC2 Describe the benefits of Amazon EC2 Auto Scaling Summarize the benefits of Elastic Load Balancing Give an example of the uses for Elastic Load Balancing Summarize the differences between Amazon Simple Notification Service (Amazon SNS) and Amazon Simple Queue Services (Amazon SQS) Summarize additional AWS compute options 3 - Global Infrastructure and Reliability Summarize the benefits of the AWS Global Infrastructure Describe the basic concept of Availability Zones Describe the benefits of Amazon CloudFront and Edge locations Compare different methods for provisioning AWS services 4 - Networking Describe the basic concepts of networking Describe the difference between public and private networking resources Explain a virtual private gateway using a real life scenario Explain a virtual private network (VPN) using a real life scenario Describe the benefit of AWS Direct Connect Describe the benefit of hybrid deployments Describe the layers of security used in an IT strategy Describe which services are used to interact with the AWS global network 5 - Storage and Databases Summarize the basic concept of storage and databases Describe benefits of Amazon Elastic Block Store (Amazon EBS) Describe benefits of Amazon Simple Storage Service (Amazon S3) Describe the benefits of Amazon Elastic File System (Amazon EFS) Summarize various storage solutions Describe the benefits of Amazon Relational Database Service (Amazon RDS) Describe the benefits of Amazon DynamoDB Summarize various database services 6 - Security Explain the benefits of the shared responsibility model Describe multi-factor authentication (MFA) Differentiate between the AWS Identity and Access Management (IAM) security levels Describe security policies at a basic level Explain the benefits of AWS Organizations Summarize the benefits of compliance with AWS Explain primary AWS security services at a basic level 7 - Monitoring and Analytics Summarize approaches to monitoring your AWS environment Describe the benefits of Amazon CloudWatch Describe the benefits of AWS CloudTrail Describe the benefits of AWS Trusted Advisor 8 - Pricing and Support Understand AWS pricing and support models Describe the AWS Free Tier Describe key benefits of AWS Organizations and consolidated billing Explain the benefits of AWS Budgets Explain the benefits of AWS Cost Explorer Explain the primary benefits of the AWS Pricing Calculator Distinguish between the various AWS Support Plans Describe the benefits of AWS Marketplace 9 - Migration and Innovation Understand migration and innovation in the AWS Cloud Summarize the AWS Cloud Adoption Framework (AWS CAF) Summarize six key factors of a cloud migration strategy Describe the benefits of various AWS data migration solutions, such as AWS Snowcone, AWS Snowball, and AWS Snowmobile Summarize the broad scope of innovative solutions that AWS offers Summarize the five pillars of the AWS Well-Architected Framewor 10 - AWS Certified Cloud Practitioner Basics Determine resources for preparing for the AWS Certified Cloud Practitioner examination Describe benefits of becoming AWS Certified
Duration 1 Days 6 CPD hours This course is intended for Individuals responsible for articulating the technical benefits of AWS services Individuals interested in learning how to get started with using AWS SysOps Administrators, Solution Architects and Developers interested in using AWS services Overview Recognize terminology and concepts as they relate to the AWS platform and navigate the AWS Management Console. Understand the foundational services, including Amazon Elastic Compute Cloud (EC2), Amazon Virtual Private Cloud (VPC), Amazon Simple Storage Service (S3), and Amazon Elastic Block Store (EBS). Understand the security measures AWS provides and key concepts of AWS Identity and Access Management (IAM). Understand AWS database services, including Amazon DynamoDB and Amazon Relational Database Service (RDS). Understand AWS management tools, including Auto Scaling, Amazon CloudWatch, Elastic Load Balancing (ELB), and AWS Trusted Advisor. AWS Technical Essentials introduces you to AWS services, and common solutions. It provides you with fundamental knowledge to become more proficient in identifying AWS services. It helps you make informed decisions about IT solutions based on your business requirements and get started working on AWS. Prerequisites Working knowledge of distributed systems Familiarity with general networking concepts Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 1 - AWS introduction and history AWS Global Infrastructure Demonstration: AWS Management Console 2 - AWS Storage Identify key AWS storage options Describe Amazon EBS Create an Amazon S3 bucket and manage associated objects 3 - Compute, network and storage services Amazon Elastic Compute Cloud (EC2) Amazon Virtual Private Cloud (VPC) Amazon Simple Storage Service (S3) Amazon Elastic Block Store (EBS) Demonstration: Amazon Simple Storage Service (S3) Hands-on lab: Build your VPC and launch a web server 4 - AWS Security, AWS Identity and Access Management (IAM) AWS Identity and Access Management (IAM) Demonstration: AWS Identity and Access Management (IAM) 5 - Compute Services & Networking Identify the different AWS compute and networking options Describe an Amazon Virtual Private Cloud (VPC) Create an Amazon EC2 instance Use Amazon EBS with Amazon EC2 6 - Managed Services & Database Describe Amazon DynamoDB Understand key aspects of Amazon RDS Launch an Amazon RDS instance 7 - Databases (RDS, DynamoDB) SQL and NoSQL databases Data storage considerations Hands-on lab: Build your database server and connect to it 8 - AWS elasticity and management tools Auto scaling Load balancing Cloud Watch Trusted Advisor Hands-on lab: Scale and load balance your architecture 9 - Deployment and Management Identify what is CloudFormation Describe Amazon CloudWatch metrics and alarms Describe Amazon Identity and Access Management (IAM)
Essential skill for all mental health professionals This 2-day workshop gives you the opportunity to see demonstrated, experience, and practice the steps of this powerful technique in a small group under the careful guidance of our expert tutor… Accredited CPD Certificate : 12 hours Length 2 days (9:30am - 4:00pm) Excellent course. A brilliantly encouraging and supportive environment in which to learnHARRIET, WORKSHOP PARTICIPANT Life-changing! A great weight has been lifted off my shoulders.NURSE (PREVIOUSLY TRAUMATISED BY A CAR ACCIDENT) Why take this course We have over 20 years of experience in teaching the rewind technique to health and welfare professionals – we’ve drawn on that experience to develop a course which gives you enough time to thorough absorb and practice the technique, understand why it works and to experience it yourself, so that you leave confident in your ability to use the rewind safely and effectively. The Rewind Technique* is an effective psychological intervention for successfully treating trauma and phobias and one of the most important skills you need to master to be able to work successfully with any anxiety disorder or condition which may have developed as a result of unresolved trauma. Even the most severe phobic and post-traumatic stress (PTSD) symptoms can be successfully addressed using the the rewind technique taught on this 2-day course, which has been refined* in line with understandings from neuroscience to make it as safe and reliably effective as possible. An essential therapeutic technique to have in your therapeutic ‘toolkit’, it is important to learn and practice it under the careful guidance of our expert tutor – you will leave the course knowing how to use the rewind technique safely and effectively having watched live demonstrations, had plenty of time to practice the steps involved with fellow students, the opportunity to experience the technique yourself and more. Our workshop has limited numbers so you will have plenty of opportunities for asking questions and the tutor, who has extensive clinical experience. Using the rewind technique you can, often surprisingly quickly, detraumatise bad memories, stop flashbacks and other PTSD symptoms, cure phobias, banish nightmares and reduce anxiety so you can help the victims of abuse, rape, violence, car accidents, fire, terrorism and panic attacks, heart attacks and other life-threatening experiences. Another key benefit of this technique is non disclosure – there is no need for people to repeatedly revisit or talk about specific details of the events that have traumatised them. This helps avoid embedding the trauma further and making the situation worse – as can sometimes inadvertently happen in other therapeutic approaches to treating trauma – and helps prevent the therapist or counsellor being vicariously traumatised by what they might hear. It is also invaluable when working therapeutically with people who have suffered persistent physical or sexual abuse, and people with OCD. People suffering from other conditions, such as depression, addictions or uncontrollable anger, may have experienced a traumatic event, which needs to be successfully detraumatised in order for them to move on with their lives. As a result of our training in the rewind technique – which we have been delivering for over 20 years – our graduates have brought relief to literally thousands of people (eg. case history / PTSD Resolution). Please note This is a powerful technique, which needs to be implemented with care – we recommend you take the time to learn it in person in a small group with a skilled and highly experienced tutor who can guide you through the important steps involved, oversee you as you practise them, answer your questions and give you crucial direct feedback. The version of the rewind technique* you will learn on this course has been refined in line with understandings from neuroscience to make it as safe and reliably effective as possible. The course is taught over two days to ensure you have enough time to thoroughly absorb and practice the steps involved so that you are confident in using it and know how to do so safely and effectively with clients. You will also learn when it is NOT appropriate to use this technique and how to ensure you avoid embedding any trauma further, or making a phobia worse. Guided imagery and visualisation skills form an essential part of the rewind technique, which is why they are a requirement for attending this course. This has huge potential to change people's lives for the better. I can't wait to put what I've learnt here to good usePSYCHIATRIC SUPPORT WORKER What will you learn How to detraumatise people quickly and safely The necessary skills to treat even severe phobias Why this version of the rewind technique is so effective, and how it works Under careful guidance from the tutor, you will: revisit key skills for relaxing clients in order to successfully work using the technique walk and talk through a step-by-step breakdown of the rewind technique see a live demonstration of working with a phobia or trauma practice each stage of the rewind technique in pairs practice the entire process, with other course participants, under supervision You will also gain: Vital tools for psycho-education – both adding to your own understanding and to pass on to clients A clear understanding of the fear response and how PTSD and phobias develop The detrimental impact traumas and phobias can have on a person’s life The crucial role of the pattern-matching processes in the brain in triggering phobic responses and post traumatic stress symptoms How the main treatment techniques for treating post traumatic stress disorder (PTSD), sub-threshold trauma and phobias (including EMDR, EFT and CBT) work – their advantages and disadvantages Why the rewind technique draws on the innate ability we all have to recover from trauma Pre-disposing factors for suffering a problematic post-traumatic response (or developing a phobia) Why critical incident debriefing increases the incidence of PTSD How this version of the rewind technique has been modified to make it safer and more reliable Trauma-focused rewinding: the psycho-biological reason why this refined rewind technique works so consistently well A step-by-step breakdown of the essential stages of the rewind technique The chance to see a live demonstration of working with a phobia or trauma You will leave with: The confidence to begin using the technique ethically and safely A clear understanding of the advantages of using a non-intrusive psychological technique to treat trauma, PTSD and phobias (where the client does not have to go into details about or repeatedly ‘revisit’ what has traumatised them) What to do if a client as an abreaction Important information about when not to use this technique – and what can be done instead An understanding of how the rewind technique can be used to work with Complex Trauma and cases involving ‘freeze’, shutdown or dissociative responses How you can carefully apply this technique to relieve a huge range of anxiety disorders Greater confidence in dealing with anxiety disorders and distress caused by trauma, phobias and flashbacks An understanding of how rapidly transformative this technique can be; on the last afternoon we view a filmed therapy session (and follow up) in which Joe Griffin uses the rewind technique to relieve a young man of his severe shark phobia There is also plenty of opportunity for you to ask questions and to experience and practice, under careful guidance, the various stages of the rewind technique yourself. Who is this course suitable for? Anyone working with distressed, phobic or traumatised people, who has already taken our Guided Imagery and Visualisation workshop (and ideally the Therapeutic Power of Language workshop too) as these skills are essential components of the rewind technique. If you help traumatised people (including children) or people suffering from any form of phobia or anxiety disorder – this includes: psychotherapists, counsellors, mental health nurses, OTs, health visitors, social workers, psychiatrists, GPs, clinical psychologists, midwives, welfare officers, youth workers, hypnotherapists and those working with traumatised members of public services, such as: firefighters, police, paramedics and military personnel – you will find the rewind technique and associated skills hugely helpful. Course requirements Guided imagery, relaxation and visualisation are an integral component of the Rewind Technique – if you don’t already have experience in using these skills therapeutically with others you must complete our Guided Imagery and Visualisation for Therapeutic Change workshop before attending this course (this is always run the day before our rewind technique training). This is to ensure you get the most out of this 2-day course and also have the necessary skills for practising the rewind technique safely and effectively. You would also find it useful to attend the Therapeutic Power of Language workshop beforehand if you can. All 3 workshops count towards Part 1 of the HG Diploma. Ros Townsend’s live online training Trauma: Patterns of the past is also useful for anyone working with or supporting someone suffering from unresolved trauma, or who would like to understand their own experiences of trauma better. She also runs a workshop on working with Complex Trauma. *About the Rewind Technique The Rewind Technique originated from one developed by Richard Bandler, one of the founders of NLP, when it was called the Visual/Kinaesthetic Dissociation protocol. A variant of this was developed by Dr David Muss, who called it the Rewind Technique. The version of the Rewind Technique you will learn on this 2-day course was refined by Joe Griffin and Ivan Tyrrell, co-founders of the human givens approach, to make it as reliably effective and safe as is possible by aligning the method with their insights into how trauma and phobias are processed in the brain. HG Therapists now follow a specific Rewind Protocol which follows the essential steps of the process that Griffin and Tyrrell set out. Course format This intense 2-day training proceeds through a blend of talks, live demonstrations, skill-developing exercises, practice sessions (under careful guidance) and deconstruction of filmed examples of the technique being used, including one with a severely traumatised young woman. There is also plenty of opportunity for networking and discussion during the breaks. The course was previously entitled: The fast phobia and trauma (PTSD) cure – a 2-day workshop in the rewind technique This course has been independently accredited by the internationally recognised CPD Standards Office for 12 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.
Hypnotherapy Learning Retreat, immersive four-day retreat designed to elevate your skills and knowledge in the serene environment of our exclusive venue. Whether you are a seasoned professional or just beginning your journey, this retreat offers a unique opportunity to learn, grow, and connect with like-minded individuals.
Hypnotherapy Learning Retreat, immersive four-day retreat designed to elevate your skills and knowledge in the serene environment of our exclusive venue. Whether you are a seasoned professional or just beginning your journey, this retreat offers a unique opportunity to learn, grow, and connect with like-minded individuals.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks. The job roles best suited to the material in this course are: Entry-level network engineer Network administrator Network support technician Help desk technician Overview This course will help you: Learn the knowledge and skills to install, configure, and operate a small- to medium-sized network Gain a foundation in the essentials of networking, security, and automation Earn 30 CE credits toward recertification The Implementing and Administering Cisco Solutions (CCNA) v2.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. This course helps you prepare to take the 200-301 Cisco© Certified Network Associate (CCNA©) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification. Course Outline Exploring the Functions of Networking ? Lecture Introducing the Host-to-Host Communications Model ? Lecture Operating Cisco IOS Software ? Lecture Introducing LANs ? Lecture Exploring the TCP/IP Link Layer ? Lecture Starting a Switch ? Lecture Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets ? Lecture Explaining the TCP/IP Transport Layer and Application Layer ? Lecture Exploring the Functions of Routing ? Lecture Configuring a Cisco Router ? Lecture Exploring the Packet Delivery Process ? Lecture Troubleshooting a Simple Network ? Lecture Introducing Basic IPv6 ? Lecture Configuring Static Routing ? Lecture Implementing VLANs and Trunks ? Lecture Routing Between VLANs ? Lecture Introducing OSPF ? Lecture Building Redundant Switched Topologies ? Self-study Improving Redundant Switched Topologies with EtherChannel ? Lecture Exploring Layer 3 Redundancy ? Self-study Introducing WAN Technologies ? Self-study Explaining Basics of ACL ? Lecture Enabling Internet Connectivity ? Lecture Introducing QoS ? Self-study Explaining Wireless Fundamentals ? Self-study Introducing Architectures and Virtualization ? Self-study Explaining the Evolution of Intelligent Networks ? Lecture Introducing System Monitoring ? Lecture Managing Cisco Devices ? Lecture Examining the Security Threat Landscape ? Self-study Additional course details: Nexus Humans Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.