• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2450 Courses

Child Care, Nannying and Safeguarding Children

4.7(160)

By Janets

Follow your dreams by enrolling on the Child Care, Nannying and Safeguarding Children course today and develop the experience, skills and knowledge you need to enhance your professional development. Child Care, Nannying and Safeguarding Children will help you arm yourself with the qualities you need to work towards your dream job. Study the Child Care, Nannying and Safeguarding Children training course online with Janets through our online learning platform and take the first steps towards a successful long-term career. The Child Care, Nannying and Safeguarding Children course will allow you to enhance your CV, impress potential employers, and stand out from the crowd.  This Child Care, Nannying and Safeguarding Children course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Study the Child Care, Nannying and Safeguarding Children course through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the Child Care, Nannying and Safeguarding Children course, to ensure you are supported every step of the way. Get a digital certificate as proof of your Child Care, Nannying and Safeguarding Children course completion. Janets is one of the top online training course providers in the UK, and we want to make education accessible to everyone! Learn the essential skills you need to succeed and build a better future for yourself with the Child Care, Nannying and Safeguarding Children course. The Child Care, Nannying and Safeguarding Children course is designed by industry experts and is tailored to help you learn new skills with ease.  The Child Care, Nannying and Safeguarding Children is incredibly great value and allows you to study at your own pace. With full course access for one year, you can complete the Child Care, Nannying and Safeguarding Children when it suits you. Access the Child Care, Nannying and Safeguarding Children course modules from any internet-enabled device, including computers, tablets, and smartphones. The Child Care, Nannying and Safeguarding Children course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the Child Care, Nannying and Safeguarding Children now and start learning instantly! What You Get Out Of Studying Child Care, Nannying and Safeguarding Children With Janets: Receive a digital Certificate upon successful completion of the Child Care, Nannying and Safeguarding Children course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Description The Child Care, Nannying and Safeguarding Children training course is delivered through Janets' online learning platform. Access the Child Care, Nannying and Safeguarding Children content from any internet-enabled device whenever or wherever you want to. The Child Care, Nannying and Safeguarding Children course has no formal teaching deadlines, meaning you are free to complete the course at your own pace. Method of Assessment  To successfully complete the Child Care, Nannying and Safeguarding Children course, students will have to take an automated multiple-choice exam. This exam will be online and you will need to score 60% or above to pass the Child Care, Nannying and Safeguarding Children course. After successfully passing the Child Care, Nannying and Safeguarding Children course exam, you will be able to apply for a CPD-accredited certificate as proof of your Child Care, Nannying and Safeguarding Children qualification. Certification All students who successfully complete the Child Care, Nannying and Safeguarding Children course can instantly download their digital certificate. You can also purchase a hard copy of the Child Care, Nannying and Safeguarding Children course certificate, which will be delivered by post for £9.99. Who Is This Course For: The Child Care, Nannying and Safeguarding Children is ideal for those who already work in this sector or are an aspiring professional. This Child Care, Nannying and Safeguarding Children course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The Child Care, Nannying and Safeguarding Children is open to all students and has no formal entry requirements. To study the Child Care, Nannying and Safeguarding Children course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Career Path: The Child Care, Nannying and Safeguarding Children is ideal for anyone who wants to pursue their dream career in a relevant industry. Learn the skills you need to boost your CV and go after the job you want. Complete the Child Care, Nannying and Safeguarding Children and gain an industry-recognised qualification that will help you excel in finding your ideal job. Course Content Child Care, Nannying and Safeguarding Children - Updated Version Childcare and Education Module 1: Caring for Children 00:28:00 Module 2: Healthy Food, Healthy living 00:27:00 Module 3: Keeping Children Healthy & Safe 00:34:00 Module 4: Child Protection 00:26:00 Module 5: Play, Imagination and Creativity 00:28:00 Module 6: Introduction to EYFS 00:15:00 Module 7: Importance of Early Years in Development 00:22:00 Module 8: EYFS Teaching Techniques 00:17:00 Module 9: Working as an EYFS Teacher 00:21:00 Module 10: Promoting Learning and Development 00:33:00 Module 11: Children Having Special Education Needs or Disabilities 00:19:00 Nanny Care Worker Introduction to Nanny Care Workers 00:24:00 Understanding Child Development 00:24:00 Care for Children 00:17:00 Healthy Food, Healthy living 00:24:00 Keeping Children Healthy & Safe 00:31:00 Early Years Provision 00:19:00 Establishing Relationship and Routines 00:16:00 Time Management for Nannies 00:18:00 Nanny's Job Profile 00:28:00 Establishing a Nanny's Career 00:19:00 Safeguarding Children Introduction to Safeguarding 00:27:00 Laws and Guidance 00:43:00 Child Abuse 00:48:00 Child Sexual Exploitation 00:36:00 Responding to Disclosure and Reporting 00:25:00 Risks and Risk Assessment 00:16:00 Things to Do after Referral 00:23:00 Record Keeping 00:18:00 Child Care, Nannying and Safeguarding Children - Old Version Nannying What is a Nanny? 00:30:00 Time Management for Nannies 00:15:00 A Day in the Life of Martha, the Nanny 00:30:00 Caregiver and Team Player 00:15:00 It Takes a Village to Raise a Child 00:15:00 The Nanny's Job Profile 00:15:00 Meet the Needs of the Child 01:00:00 Childcare Child Care Guidelines 00:30:00 Outdoor Safety 00:15:00 Plants That Poison 00:15:00 Guidelines for Food Preparation and Handling 00:30:00 Changing Diapers 00:30:00 Symptoms of Illness 00:30:00 Taking Care of Babies Baby Products For Bath 00:30:00 Tips To Manage Your Baby Sleeping Schedules 00:30:00 Baby Weaning Difficulties And Tips To Cope With It 00:30:00 Choosing The Right Baby Care 00:30:00 Choosing The Right Baby Formula 00:30:00 Coping With Colic 00:20:00 Diaper Rash Help 00:30:00 Feeding Schedules Tips to Get it Right 00:30:00 How To Get Rid Of A Pacifier 00:30:00 Premature Baby Help 00:30:00 Reading To Baby 00:30:00 Reducing Baby's Risk Of Choking 00:30:00 Safety Measures For Food Borne Illnesses 01:00:00 The Benefits of Breastfeeding 00:25:00 Why Do Babies Cry 00:30:00 Baby Car Seat Buying Tips 00:30:00 When You Spot Something Wrong 00:30:00 Baby Care and Breastfeeding 00:20:00 Baby Care And Television 00:15:00 Baby Hazards: Be Careful Or You May Not Know 00:30:00 Baby Pacifiers: Yes Or No 00:30:00 What's In The Nursery 00:30:00 Baby Bathing Is This Hard To Do 00:20:00 5 Things To Keep In Mind With Baby Care 00:30:00 Babies At Work Good Or Bad 00:15:00 Baby Care Bonding Time With My First Baby 00:30:00 Communicating With My First Baby 00:30:00 Fashion Tips For My First Baby 00:30:00 How To Change My First Baby's Diaper 00:30:00 My First Baby Essentials 00:30:00 My First Baby Feeding Guide 00:30:00 My First Baby Learning The Basics 00:30:00 My First Baby: Understanding The Crying Game 00:30:00 Nutritious Bites For My First Baby 00:30:00 The Joys And Angst Of Holding My First Baby 00:30:00 Mock Exam Mock Exam- Child Care, Nannying and Safeguarding Children 00:30:00 Final Exam Final Exam- Child Care, Nannying and Safeguarding Children 00:30:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Child Care, Nannying and Safeguarding Children
Delivered Online On Demand35 hours
£25

Microsoft Project 2016 Beginners Level

3.0(2)

By Alpha Academy

Do you want to master the most popular project management tool? Enhance your skills with Microsoft Project 2016 in this comprehensive course. Microsoft Project is a beast of a software application, possibly found best so far. It has every imaginable feature built into it by now and then even some more. With the help of this Microsoft Project 2016 Beginners Level course, you'll be able to create, manage and track world class schedules with complex requirements of resources, allocations, budgets, reporting and tracking all the way to project conclusion. You'll also discover working with costs, deadlines, and succeed in scheduling issues effectively. Course Highlights The price is for the whole course including final exam - no hidden fees FREE accredited certificate upon successful completion Efficient exam system with instant results Track progress within own personal learning portal 24/7 customer support via live chat Microsoft Project 2016 Beginners Level has been given CPD accreditation and is one of the best-selling courses available to students worldwide. This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then Microsoft Project 2016 Beginners Level is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the full CPD accredited qualification. And, there are no hidden fees or exam charges. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. Assessment and Certification At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. Career Path Not only does our CPD and CiQ accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £20,000. The sky really is the limit. Course Curriculum Starting a Project Project Management 101 00:15:00 ACTIVITY - PROJECT MANAGEMENT 101 00:05:00 Navigate and Customize the Project 2016 Interface 00:30:00 ACTIVITY - NAVIGATING AND CUSTOMIZING THE PROJECT 2016 INTERFACE 00:05:00 Add Tasks to a Project 00:15:00 ACTIVITY - ADDING TASKS TO A PROJECT 00:05:00 Add Resources to a Project 00:15:00 ACTIVITY - ADDING RESOURCES TO A PROJECT 00:05:00 Save a Project 00:15:00 ACTIVITY - SAVING A PROJECT 00:05:00 Working with Project Calendars Manage Project Time Frames 00:15:00 ACTIVITY - MANAGING PROJECT TIME FRAMES 00:05:00 Change Working Time 00:15:00 ACTIVITY - CHANGING THE WORKING TIME FOR A PROJECT 00:05:00 Working with Project Tasks Manage Project Tasks 00:15:00 ACTIVITY - MANAGING PROJECT TASKS 00:05:00 Add Summary Tasks and Milestones 00:15:00 ACTIVITY - ADDING SUMMARY TASKS AND MILESTONES 00:05:00 Working with Project Resources Manage Project Resources 00:15:00 ACTIVITY - MANAGING PROJECT RESOURCES 00:05:00 Allocate and Level Work Resources 00:15:00 ACTIVITY - LEVELING RESOURCES 00:05:00 Delivering a Project Plan Print Project Views 00:15:00 ACTIVITY - PRINTING A PROJECT VIEW 00:05:00 Share Projects 00:15:00 ACTIVITY -SHARING PROJECTS 00:05:00 Export Projects 00:15:00 ACTIVITY - EXPORTING A PROJECT 00:05:00 Activities - Microsoft Project 2016 Beginners Level 00:00:00

Microsoft Project 2016 Beginners Level
Delivered Online On Demand
£10.99

Data storytelling

By Fire Plus Algebra

Data has become the most important resource for every organisation – but the insights gained from data analysis will only ever be truly valuable if they can be clearly expressed to other people.  This course is for anybody who works with data, and needs to communicate the meaning that's in the numbers to colleagues, customers, bosses or external stakeholders.  It will give you or your team the confidence and skills to translate raw data into compelling visual stories for your key audiences. The principles and skills covered apply to the simplest PowerPoint chart, to more complex interactive visualisations.  We’ll work with you before the course to ensure that we understand your organisation and what you’re hoping to achieve.  Sample learning content Session 1: What makes a great data-driven story The key elements of a successful infographic or presentation. Industry best practice, and discussion of good (and bad) examples. A simple framework for identifying the Audience, Story and Action. Session 2: Data in context How to balance function and aesthetic appeal. Identifying the right graph, chart, infographic or other visual. Framing the data and providing contextual information. Session 3: Designing for the human brain Using colours to add emphasis and meaning. Design and layout principles, and creating hierarchies of information. The principle of ‘self-sufficiency’, and removing clutter. Session 4: Navigation and narrative Tailoring visualisations for different types of communications. Structuring presentations and longer reports. Thinking in layers to create interactive dashboards. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people.  Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets.
 Testimonial “I was familiar with Alan’s work as a Guardian Masterclass instructor on data visualisation and digital journalism, which made it easy for me to recommend him for onsite training at the Liverpool School of Tropical Medicine. We had a large group of people interested in honing their abilities to depict their research and stories in engaging ways. Alan’s course provided great insight about common communication pitfalls and how to avoid them, how to become better communicators by understanding the audience diversity, and it showcased some great online tools for creating infographics. This should be mandatory training for all students, academics, report writers and those involved with conveying research to the media as it will help increase the clarity and accessibility of our own research stories.”
 Dr Lee Haines | Liverpool School of Tropical Medicine

Data storytelling
Delivered OnlineFlexible Dates
£2,405.97

JSEC - Junos Security

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JSEC - Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry

XERO TRAINING "DAY VISIT" (IN PERSON)

5.0(4)

By Progression Accountancy

Our bespoke Xero Training sessions are designed to get your Xero working properly & showing you the correct information, and to save you time for the important things... Get Xero set up properly, working as it should, error free Fix all of your Xero issues, once & for all Learn how to deal with your transactions correctly Use reporting to understand how your business is performing Gain confidence using Xero Save oodles of time on your accounting every single day with our bespoke Xero Training!

XERO TRAINING "DAY VISIT" (IN PERSON)
Delivered In-Person in Chesterfield or UK WideFlexible Dates
£595

Planning and Control with Oracle Primavera P6 PPM Professional

By Packt

Master the art of project planning, scheduling, and resource management with Oracle Primavera P6 PPM Professional. The course offers a streamlined approach to efficiently manage projects and includes workshops for intermediate-level users to apply their knowledge in practice.

Planning and Control with Oracle Primavera P6 PPM Professional
Delivered Online On Demand17 hours 53 minutes
£123.99

CHILD PROTECTION ADVANCED ONE DAY COURSE

By Child Protection Training Uk

Everyone shares responsibility for safeguarding and promoting the welfare of children and young people, irrespective of individual roles. This course is for those who have already completed a Level 1 course and need to gain an advanced knowledge of Child Protection, including working towards becoming a Designated Safeguarding Lead (DSL), manager or policy writer. This course is designed for individuals who work with children in either a paid or voluntary capacity. It relates to the issues surrounding safeguarding children by exploring the concepts of "child vulnerability", "child protection" and "significant harm"; coupled with the individual and organisational responsibilities of protecting children from abuse.

CHILD PROTECTION ADVANCED ONE DAY COURSE
Delivered In-Person in London or UK WideFlexible Dates
Price on Enquiry

20703-1 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview After completing this course, students will be able to: •Analyze data by using queries and reports. •Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server. •Deploy and manage the Configuration Manager client. •Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. •Identify and configure the most appropriate method to distribute and manage content used for deployments. •Distribute, deploy, and monitor applications for managed users and systems. •Maintain software updates for PCs that Configuration Manager manages. •Implement Endpoint Protection for managed PCs. •Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices. •Configure an operating-system deployment strategy by using Configuration Manager. •Manage and maintain a Configuration Manager site. In this course, students will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot Lab : Creating and running queries Lab : Configuring SSRS Lab : Analyzing the real-time state of a device by using CMPivot Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections Lab : Configuring boundaries and resource discovery Lab: Configuring user and device collections Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations Lab : Deploying the Microsoft System Center Configuration Manager client software Lab: Configuring and monitoring client status Lab : Managing client settings Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Lab : Configuring software metering Lab : Configuring and managing Asset Intelligence Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Lab : Managing application supersedence and removal Lab : Deploying virtual applications by using Configuration Manager (Optional) Lab : Using Configuration Manager to deploy Windows Store apps Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates Lab : Configuring the site for software updates Lab : Deploying and managing software updates Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies Lab : Implementing Microsoft System Center Endpoint Protection Lab : Implementing advanced threat policies Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access Lab : Managing compliance settings Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service Lab : Preparing the site for operating -system deployment Lab : Deploying operating -system images for bare-metal installations Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance Backing up and recovering a Configuration Manager site Lab : Configuring role-based administration Lab : Configuring Remote Tools Lab : Maintaining a Configuration Manager site Additional course details: Nexus Humans 20703-1 Administering System Center Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20703-1 Administering System Center Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

20703-1 Administering System Center Configuration Manager
Delivered OnlineFlexible Dates
Price on Enquiry

Wed 11 Jun 2025 - Legacy marketing around Hospice UK's national campaign

By Hospice Income Generation Network

Sharing & Networking - Legacy marketing plans around Hospice UK's national campaign Session aimed at legacy fundraisers and marketers THIS SESSION WON'T BE RECORDED

Wed 11 Jun 2025 - Legacy marketing around Hospice UK's national campaign
Delivered Online
FREE