Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Embark on a journey into the world of Android app development with our comprehensive Kotlin Programming: Android Coding Bible course. This in-depth training will equip you with the knowledge and skills to master Kotlin, a modern and powerful programming language specifically designed for Android development. Whether you're a complete beginner or an experienced programmer seeking to expand your skillset, this course will guide you through the fundamentals of Kotlin, covering topics such as syntax, data types, variables, operators, control flow statements, functions, error handling, and null safety. You'll gain a solid understanding of object-oriented programming principles and learn how to effectively utilize collections to manage and process data. Learning Outcomes Master the fundamentals of Kotlin programming language for Android development Gain a thorough understanding of syntax, data types, variables, operators, and control flow statements Learn how to create and utilize functions to structure and modularize code Effectively handle errors and exceptions to ensure robust and reliable applications Implement null safety mechanisms to prevent NullPointerExceptions and enhance code stability. Why choose this Kotlin Programming: Android Coding Bible course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Kotlin Programming: Android Coding Bible course for? Aspiring Android developers seeking to master Kotlin programming language Individuals with prior programming experience looking to transition to Android development Software engineers aiming to expand their skillset with Kotlin and Android development expertise Students of computer science or related fields interested in learning Android app development Enthusiasts passionate about creating mobile applications for the Android platform. Career path Android Developer (£35,000 - £55,000) Senior Android Developer (£45,000 - £65,000) Android App Architect (£55,000 - £75,000) Mobile Application Developer (£30,000 - £50,000) Software Engineer (£40,000 - £60,000) Full-Stack Developer (£45,000 - £65,000) Prerequisites This Kotlin Programming: Android Coding Bible does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Kotlin Programming: Android Coding Bible was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction & Setup Introduction To This Course 00:02:00 Windows Setup 00:13:00 Mac Setup 00:10:00 Linux Setup 00:12:00 Online Code Editor 00:02:00 Section 02: Basics Variables 00:06:00 Data Types 00:06:00 String 00:05:00 Array 00:07:00 Data Type Conversion 00:05:00 Comments 00:04:00 Arithmetic Operators 00:07:00 Relational Operators 00:06:00 Assignment Operators 00:06:00 Unary Operators 00:05:00 Bitwise Operators 00:09:00 Logical Operators 00:04:00 Input & Output 00:03:00 Section 03: Control Statements Conditional if Statement 00:05:00 When Statement 00:07:00 For Loop 00:04:00 While Loop 00:04:00 do while Loop 00:04:00 Break Statement 00:04:00 Continue Statement 00:04:00 Section 04: Functions Basic Functions 00:03:00 Function Parameters 00:04:00 Return Values 00:04:00 Recursion 00:04:00 Default & Named Arguments 00:06:00 Lambda Function 00:04:00 Higher Order Function 00:05:00 Inline Function 00:02:00 Section 05: Error/Exception Handling Try Catch Block 00:04:00 Try Catch Expression 00:05:00 Multiple Catch Block 00:05:00 Nested Try Catch Block 00:05:00 Finally Block 00:02:00 Throw Keyword 00:02:00 Section 06: NULL Safety Nullable & Non Nullable Types 00:03:00 Smart Cast 00:02:00 Unsafe and Safe Cast 00:03:00 Elvis Operator 00:04:00 Section 07: Collections List: listOf Function 00:06:00 List: mutableListOf Function 00:05:00 List: arrayListOf Function 00:06:00 Map: mapOf Function 00:07:00 Map: HashMap 00:08:00 Map: hashMapOf Function 00:05:00 Map: mutableMapOf Function 00:04:00 Set: setOf Function 00:04:00 Set: mutableSetOf Function 00:04:00 Set: HashSet 00:04:00 Section 08: Classes & Objects Basic Example 00:07:00 Nested and Inner Class 00:06:00 Constructors 00:05:00 Visibility Modifiers 00:06:00 Inheritance 00:05:00 Method Overriding 00:04:00 Property Overriding 00:02:00 Abstract Class 00:03:00 Superclass 00:03:00 Data Class 00:05:00 Multiple Class Inheritance & Interfaces 00:03:00 Sealed Class 00:03:00 Extension Function 00:03:00 Generics 00:05:00 Section 09: Extras Integer Type Range 00:05:00 Regex 00:04:00 Call Java from Kotlin 00:03:00 Call Kotlin from Java 00:02:00 Section 10: Resource Resource 00:00:00 Assignment Assignment - Kotlin Masterclass Programming Course: Android Coding Bible 00:00:00
Do you want to learn to use a sewing machine but don’t know where to start? YOUR SEWING JOURNEY STARTS HERE I’ve been teaching complete beginners to sew since 2009 LEARN A LIFE-SKILL, SAVE MONEY & BOOST FEELINGS OF WELLBEING I’ve created an online video course based on my successful classes running since 2009 using the easiest-to-follow methods. It’s been tried & tested by children as young as 8 years old for a whole year….They LOVED it & we guarantee you will too! THIS COURSE IS FOR ANYONE AGED 10-100 YEARS If you’re a beginner your age doesn’t matter! Both children & adults have used this course with ease. In fact the kids are often quicker learners! ✂️ THINKING ABOUT BUYING A SEWING MACHINE? My advice is to buy BASIC. No whistles & bells! As long as the machine can do a straight stitch & a zig zag stitch that’s all you’ll need. Most machines have a few embroidery stitches too. Avoid toy machines & go for the most basic version of a good brand. USING OUR HANDS CREATIVELY IS PROVEN TO MAKE US 🖐✂️🧵😃 FEEL HAPPY 😃🧵✂️🖐 You can do everything you need on a basic machine including free style embroyery Amanda Recommends… WHAT YOU’LL LEARN BLOCK 1 - FIRST THINGS FIRST ✔️Let’s look at a sewing machine ✔️Speed control & turning corners ✔️How to sew a seam ✔️How to pin, cut & place a template BLOCK 2 - THREADING UP ✔️Winding a bobbin ✔️The top thread-up ✔️Inserting a bobbin on top loaders ✔️Inserting a bobbin on front loaders BLOCK 3 - SEW A SUNGLASSES CASE ✔️Practise what you’ve learned & achieve your first little project make ✔️Learn all about backstitch & why it’s important BLOCK 4 - ALL THE HELP YOU'LL NEED ✔️How to solve stitching issues ✔️Choosing & changing needles ✔️Getting unstuck ✔️Looking after your machine LEARNING TO SEW HAS COUNTLESS BENEFITS….. Sewing helps to extend focus & concentration. As we must concentrate for longer periods of time. It’s great for those who struggle to stay focused. It reduces time spent on social media. Instead of scrolling we use our hands creatively making. Sewing promotes good mental health. It increases self-esteem through empowerment & creativity. It makes us happy! Dexterity & hand strength improve. Cutting, pinning & making are ways of strengthening hands our tools for life! We help to save the planet by extending the life of clothes. Clothing won’t end up in landfill if we upcycle it. Extending the life of clothes by 9 months reduces their carbon footprint by 20-30% It teaches us how to save money. It’s a useful life-skill we can use to alter, update, customise, remake or repair instead of buying new things. It’s such a great feeling to be able to say “ I made it myself” WHAT DO I NEED? Not that much! You’ve probably got most things at home already. ✂️🧵📍✏️🎧👖📄📏 You can learn at your own speed at home or sew with your friends It’s much cheaper than attending classes MEET YOUR INSTRUCTOR…..AMANDA RILEY Amanda Riley is a Fashion Designer & environmentalist. She has been teaching complete beginners the art of diy fashion and eco-sewing since 2009. After realising the horrendous environmental impact of fashion she started her masterclass workshops at The Fashion Factory, for 8-16 year olds as an antidote to fast fashion. “ I saw an increase in social media use & the reduction of practical & creative subjects in schools. Many children are missing out on life skills, creativity, dexterity & the ability to focus. I felt I had to do something” “My eco-sewing programme focuses on learning via upcycling unwanted textiles into cool new stuff. The products & video lessons are designed to keep young people engaged and coming back for more. I’ve ripped up the sewing rule books and introduced a new way of learning this hugely rewarding life skill.” Her students have appeared in Vogue, in the Fashion Factory book (Amazon) & many have gone on to study for creative careers. She was selected as a top 100 changemaker in 2021 by the Big Issue.
Take your spray tanning skills to the next level with our Black Magic Brand Training. Designed for beauty professionals, this comprehensive online course teaches you everything you need to confidently deliver flawless tans using the full range of Black Magic Tan products and equipment. Whether you are new to the brand or looking to deepen your knowledge, this training will give you the tools to deliver exceptional results and grow your tanning business. What the Online Training Covers 1. Product Knowledge Full introduction to the Black Magic Tan product range, including Chocolate Base, Argan Base, Rapid Tans, and Competition Solutions How to select the right solution for every skin tone and event 2. Equipment Training Overview of spray tan machines and guns How to set up, maintain, and use your equipment for the best results 3. Application Technique Step-by-step Black Magic spray tan application method Tips for achieving even coverage, smooth blending, and avoiding common tanning mistakes 4. Professional Tanning Protocol Pre-tan consultation and skin preparation advice Full client treatment flow from start to finish Aftercare recommendations for long-lasting, flawless tans Client care, hygiene, and professionalism standards 5. Certification Upon successful completion, you will receive an official Black Magic Brand Training Certificate, recognising your expertise and commitment to professional standards. Exclusive Offer for Online Students If you complete our online training and later book an In-Person Masterclass or Advanced Spray Tan Training, you will receive a £50 discount towards your next course. This makes our online course the perfect first step before progressing to advanced techniques, contouring training, and business growth opportunities. Who This Course is Perfect For Spray tanning professionals new to Black Magic Tan products Beauty professionals wanting to offer a premium tanning service Technicians planning to attend our advanced training in the future Mobile tanners and salon owners looking to upskill their team How to Enrol To start your Black Magic Brand Training today, contact us today Learn at your own pace, master Black Magic Tan products, and start delivering flawless, professional results that set you apart.
Embark on a creative journey with our Candle Making Diploma. Unlock the art and science of crafting exquisite candles with our comprehensive online course. Learn essential techniques, explore diverse styles, and master the secrets of creating beautiful, fragrant candles. Elevate your skills, ignite your passion, and earn a Candle Making Diploma that shines as brightly as your handcrafted creations. Enroll now to illuminate your path to a world of endless candle-making possibilities!
A personal trainer is someone who develops and delivers safe and effective exercise programmes for seemingly healthy individuals and groups, as well as those who have medical clearance to exercise. They motivate clients by working together to set goals, providing meaningful feedback, and being a trustworthy source of accountability. Do you have an interest in the fitness trainer profession? Are you looking for the best Personal Trainer + Personal Exercise + Nutrition and Health certification in the industry? If this is the case, you should not be concerned. We are here to meet your needs. Our professionals created this course to provide you with advanced skills, knowledge, and confidence to help you build a long-term career in this field. This Personal Trainer + Personal Exercise + Nutrition and Health course is ideal for those who are currently working or hoping to start a career in the trainer profession. This course is also appropriate for anyone with an interest in or desire to learn a variety of fundamental skills required to become a successful personal trainer. This course is a comprehensive, online course that will provide you with a complete understanding of the topic. Learning Outcomes After completing this Personal Trainer + Personal Exercise + Nutrition and Health Bundle course, the learner will be able to Gain a range of core skills needed to become a successful personal trainer. Gain in-depth knowledge of the science of losing weight and gaining muscle. Understand how to warm up safely before exercising and monitor heart rate. Understand how to perform a range of cardio, endurance and resistance exercises. Know how to build stamina and lean muscle. Understand how to perform a range of stretches safely to increase flexibility. Why Choose Personal Trainer + Personal Exercise + Nutrition and Health Bundle Course from Us Self-paced course, access available from anywhere. Easy to understand, high-quality study materials. This Masterclass Course developed by industry experts. MCQ quiz after each module to assess your learning. Automated and instant assessment results. 24/7 support via live chat, phone call or email. Free PDF certificate as soon as completing the course. ***Courses are included in this Personal Trainer + Personal Exercise + Nutrition and Health Bundle Course*** Course 01: Personal Trainer Course 02: Level 2 Award in Improving Personal Exercise, Health and Nutrition Course 03: Level 2 Award in Nutrition and Health ***Other Benefits of Personal Trainer + Personal Exercise + Nutrition and Health Bundle Course*** Free 3 PDF Certificate Access to Content - Lifetime Exam Fee - Totally Free Free Retake Exam [ Note: Free PDF certificate will provide as soon as completing the Personal Trainer + Personal Exercise + Nutrition and Health course ] Detailed course curriculum *** Personal Trainer + Personal Exercise + Nutrition and Health*** Module 1: Professionalism and Presentation Personal Training Examining the Sector of Personal Training The professionalism of Personal Trainers in Business Presentation and Qualifications in Personal Training Marketing and Sales Module 2: Planning a Personal Training Session Principles and Characteristics of Personal Training Planning Activities Module 3: Delivering a Personal Training Session Monitoring and Adjusting Exercise Maintaining Good Communication and Motivation Different Personal Training Environments Extending Frequent and Good Communication to Clients Module 4: Skeletal Articulations and Joint Movement Connective Tissue Joint Structure Lever Systems Effects of Resistance Training on Joints Module 5: Injury Prevention Osteoporosis Spinal Injury Prevention Shoulder Stabilisation Ligamentous Damage Module 6: Muscular System Contraction Types and Their Characteristics Acute Muscle Adaptations to Different Training Types Chronic Muscle Adaptation to Training Muscle Functions of the Hip and Thoracolumbar Fascia Module 7: Energy Systems Three Energy Systems Acute Variables and Energy Systems Effects of EPOC and Interval Training on Metabolism Fat Burning METs and Calories Methods for Monitoring Exercise Use of Energy From Nutrients Module 8: Cardiorespiratory System Cardiovascular System Respiratory System Module 9: Nervous System The organisation of the Nervous System The function of the Nervous System Nervous System and Exercise Module 10: Hormonal Responses to Exercise Structural Overview of the Endocrine System Classification of Hormones Hormone Interactions With Target Cells Hormonal Responses to Acute Exercise Hormonal Adaptations to Chronic Exercise Training Module 11: Health and Fitness Assessment Defining Health and Fitness Preliminary Health Assessment Fitness Assessments Module 12: Psychological Aspects of Personal Training Role of Psychology in Personal Training Goals and Goal Setting Beliefs and Expectations Emotions, Stress and Coping Module 13: Nutrition Energy Requirement Estimating Energy Expenditure Calculating Energy Needs Recommended Dietary Intakes Healthy Eating Patterns How Dietary Intake Influences Health Micronutrient Deficiency and Health Fads and Popular Diets Developing a Healthy, Balanced Way of Eating Tobacco, Alcohol and Caffeine Fat and Lipoprotein Safe and Effective Weight Loss and Gain Module 14: Training Adaptations Adaptations to Training Principles Adaptations to Resistance Training Adaptations to Aerobic Training Adaptations to Range of Motion Training Module 15: Exercise Planning and Programming Planning for Resistance Training Planning for Aerobic Endurance Training Applied Training Programming Examples of Exercise Programming -------------------- [ Bundle Course 02 ] *Level 2 Award in Improving Personal Exercise, Health and Nutrition Course Curriculum Module 01: Understand Health, Well-being and Exercise Module 02: Understand the Role of Nutrition in Exercise Module 03: Plan and Prepare for Personal Exercise and Nutrition -------------------- [ Bundle Course 03 ] *Level 2 Award in Nutrition and Health Course Curriculum Module 01: Explore Principles of Healthy Eating Module 02: Consider Nutritional Needs of a Variety of Individuals Module 03: Use Food and Nutrition Information to Plan a Healthy Diet Assessment Method After completing each module of the Personal Trainer + Personal Exercise + Nutrition and Health Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Once you complete all the modules in this manner, you will be qualified to request your certification. Certification After completing the MCQ/Assignment assessment for this Personal Trainer + Personal Exercise + Nutrition and Health course, you will be entitled to a Certificate of Completion from Training Tale. It will act as proof of your extensive professional development. The certificate is in PDF format, which is completely free to download. A printed version is also available upon request. It will also be sent to you through a courier for £13.99. Who is this course for? Personal Trainer + Personal Exercise + Nutrition and Health course is designed for those who want to learn the skills needed to start a successful career in the fitness industry. Our course is also suitable for anyone interested in learning the science of weight loss and developing the ideal workout routine to achieve their long-term fitness goals. Requirements Students who intend to enrol in this Personal Trainer + Personal Exercise + Nutrition and Health course must meet the following requirements: Good command of the English language Must be vivacious and self-driven Basic computer knowledge A minimum of 16 years of age is required Career path After completing Personal Trainer + Personal Exercise + Nutrition and Health course, you will have the necessary knowledge and skillset to start your training business. You can also make it a full-time job by working in gyms, clients' homes, fitness centres, and other professional settings. Such as: Fitness Instructor Fitness Coach Gym Instructor etc. Certificates Certificate of completion Digital certificate - Included
Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals such as PC, desktop, and help desk technicians who have experience supporting PC hardware who wish to make the transition to become server hardware and support specialists. This course is also designed for existing server managers who are preparing to take the CompTIA Server+ Exam SKO-005. Overview Upon successful completion of this course, you will be able to perform the duties of a server administrator. In this course, you will: - Manage server hardware. - Install server hardware and operating systems. - Configure networking hardware and protocols. - Perform basic server configuration tasks. - Create a virtual server environment. - Administer servers. - Implement server storage solutions. - Secure the server. - Plan and test disaster recovery. - Troubleshoot server issues. This course can also benefit you if you are preparing to take the CompTIA Server+ examination (Exam SK0-004). This course builds on existing professional experience with personal computer hardware support to present the next tier of skills & concepts students will use on the job when administering any type of network server. 1 - Outline Lesson 1: Understanding Server Administration Concepts Lesson 2: Understanding Virtualization and Cloud Computing Lesson 3: Understanding Physical and Network Security Concepts Lesson 4: Managing Physical Assets Lesson 5: Managing Server Hardware Lesson 6: Configuring Storage Management Lesson 7: Installing and Configuring an Operating System Lesson 8: Troubleshooting OS, Application, and Network Configurations Lesson 9: Managing Post-Installation Administrative Tasks Lesson 10: Managing Data Security Lesson 11: Managing Service and Data Availability Lesson 12: Decommissioning Servers Additional course details: Nexus Humans CompTIA Server Plus Certification (Exam SKO-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Server Plus Certification (Exam SKO-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. Overview On course completion, participants will be able to: - Set up a computer workstation and use basic software applications. - Explain the functions and types of devices used within a computer system. - Apply basic computer maintenance and support principles. - Describe some principles of software and database development. - Configure computers and mobile devices to connect to home networks and to the Internet. - Identify security issues affecting the use of computers and networks. This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. 1 - Identifying Computer Hardware Identify Types of Computing Devices Identify Internal Computer Components Common Computer Connector Types Identify Common Peripheral Devices 2 - Identifying Computer Software Compare Functions and Features of Common Operating Systems Identify Application Software 3 - Setting Up a Basic Workstation Connect Hardware Install and Configure Operating Systems Install and Configure Applications Configure Accessibility Options 4 - Configuring Network Access Network Connection Types Install and Configure a SOHO Router Network and Alternative Technologies Sharing and Storage Methods 5 - Working with Files, Folders, and Applications Create Files Navigate a File Structure Manage Files and Folders Compress and Extract Files Create Screen Captures 6 - Configuring and Using Wireless Devices Configuring Wireless Devices Use Wireless Devices 7 - Securing Computing Devices Identify Security Threats Apply Security Best Practices Perform Secure Web Browsing 8 - Supporting Computers and Users Environmental and Safety Concepts Back Up and Restore Data Manage Software Implement Basic Support Measures Additional course details: Nexus Humans CompTIA IT Fundamentals Plus Certification (ITF Plus) (Exam FCO-U61) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA IT Fundamentals Plus Certification (ITF Plus) (Exam FCO-U61) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.