Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This course is designed to give you the theoretical knowledge (and a lot more) to understand how to help in road related medical injuries. The First Aid for Motorcyclists course is an excellent First Aid Training package for people wishing to gain invaluable knowledge and vital skills at their own time and pace. The course includes topics such as how to help in a Road Traffic Accident, the recovery position, CPR, when and how to remove someone's motorcycle helmet, major crush - when is it safe to release someone? The course consists of illustrated step by step directions, flow charts, diagrams, videos and test yourself sections fully compatible with all computers and mobile devices. You will be able to stop and start as often as you like and print your Certificate on completion. You will have continuous access to the course for 12 months. It is impossible to cover all eventualities within this course, or to equip you with the knowledge and skills to appropriately diagnose and treat in unpredictable real life situations. If you suspect serious illness or injury, you should always seek immediate professional medical advice. The Author has made every effort to ensure the accuracy of the information contained within the course, however this course is merely a guide and the Author does not accept any liability or responsibility for any inaccuracies or for any mistreatment or misdiagnosis of any person, however caused. The course material has been written by Emma Hammett, Qualified Nurse, First Aid Trainer and founder of First Aid for Life in conjunction with other medical and first aid professionals. If you have any queries concerning this course, please contact emma@firstaidforlife.org.uk Course Contents: Action in an emergency Unresponsive and Breathing Resuscitation Unconscious and not breathing Recovery Position Choking Asthma Heart Attack and Angina Wounds and bleeding Shock Bites and Stings Burns Breaks, Sprains and Dislocations Head Injuries Spinal Injuries Road Traffic Accidents Fitting / Seizures / Convulsions
Special Executive Masters Programme (S.E.M.P) This programme is geared at enhancing professionals' careers. The SEMP is an encapsulated Senior Management Programmes are short certificate modules designed for anyone who would benefit from more in-depth business knowledge delivered in a short and intensive programme What makes us different? We are a world class business school located in the heart of London, Dubai, Islamabad and Lagos. We are one of the fastest growing British business schools with a stylish blended learning model that is both online and on campus. Learn more about the programme Special Executive Master's Programme in Information Systems Course Overview The MSBM Special Executive Masters Programmes (SEMP) allows you to update your skills, develop new skills, and explore and develop interests in a wide range of topics. These courses can be taken as personal or professional development and may enhance your employability. Information systems are the lifeblood of the modern enterprise, Information System Specialist has the power to create and restructure industries, empower individuals and firms, and dramatically reduce costs. As a result, organizations desperately need well-trained information systems specialists and technology-savvy managers. Today’s managers simply cannot effectively perform without a solid understanding of the role of information systems in organizations, competition, and society. SEMP Information System provides students with the knowledge and skills required to plan, develop, and deploy technology-based business solutions. Students are equipped with a solid understanding of the strategic role of information systems in organizations and the influential role of technology in society. Course Details Mode of Study Using Web-based technology, this program provides self-paced, individualized instruction that can be taken anywhere and anytime an individual has access to a computer and the Internet. This Programme is suitable for successful professionals or specialists in the private, public, or voluntary sectors who have new management responsibilities and need to quickly expand their management knowledge. This Programme serves as a refresher course for those who have had their Masters a long time ago and need quick reminders and professional/ academic updates while it serves as a primer for those very experienced Professionals who never made time out for their masters yet they require the academic and practical relevance of this master’s experience. It is a short executive training that runs online for 3 months. Candidates will run 2 months of active lectures and series of assignments and 1 month for their dissertation. Upon successful completion of the Programme, candidates will be awarded a Continuing Professional Development (CPD) certificate in the specific Programme they have completed. What is a CPD Course? Continuing Professional Development (CPD) is the means by which professionals maintain and enhance their knowledge and skills. The world is constantly moving at a very fast pace so undertaking CPD is essential to support a professional in his/her current role as well as helping them with career progression. CPD is all about upgrading knowledge, skills, and capabilities to remain effective and compliant. A CPD course is an investment that you make in yourself. It’s a way of planning your development that links learning directly to practice. CPD can help you keep your skills and knowledge up to date and prepare you for greater responsibilities. It can boost your confidence, strengthen your professional credibility, and help you become more creative in tackling new challenges. Is the SEMP Information System Programme right for me? Studying Information Systems will equip you to develop creative and innovative solutions to problems in government, businesses, and non-profit organizations. You will learn how to work in creative teams to develop cutting-edge products and solutions that might save lives, improve the environment or standard of living, and keep people connected. You may choose to concentrate on the analysis of systems, the design of systems, or the use of information systems in organizations. Why SEMP Information System? It is impossible to think of any organization without the need for information. Through the use of computer technology, an information system provides the right information to the right person, at the right time, and at the lowest possible cost. It is used at all levels of management from the operational to the strategic; it is also used in all functional areas of an organization. Business organizations use an information system because it helps them to be highly efficient as well as competitive. It is also used in government organizations. Who should enrol in this online Certificate Program? This non-credit bearing course benefits professionals at all levels who want to contribute to their organization’s performance. Here are some of the people who will benefit from the online Programme: Executives with responsibility for, corporate communications, and/or investor relations. Functional leaders who are involved with defining or executing brand and reputation strategies, such as leaders from human resources, public affairs, environmental relations, and legal Managers seeking to move into leadership positions in their organization Individuals seeking knowledge for career advancement in the field of Information management Cross-functional teams from within an organization can take the program, as that accelerates the impact and engenders a common language and understanding in the organization Accreditation The content of this course has been independently certified as conforming to universally accepted Continuous Professional Development (CPD) guidelines. Entry Requirements There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. Workshops This is a self-study programme with unlimited tutor support. You will never be more than a message or phone call away from our tutors. Visa Requirements There are no Visa Requirements for this Course as it's as Online Course.
AML Investigation Overview Have you ever wondered how criminals hide their stolen money? Ever wished you could stop them? This 'AML Investigation' course turns you into a financial detective, uncovering fishy activities and protecting your community. Forget confusing lectures; think exciting puzzles! Step into the shoes of a detective and learn how laws like the 'Proceeds of Crime Act' track down stolen cash. See how banks and businesses fight financial crime, and discover your role as a 'Money Laundering Reporting Officer': spotting suspicious activity and sounding the alarm. Become a risk assessment whiz, figuring out who's most likely to be involved. Learn to analyze people and businesses like a pro, searching for hidden clues. You'll even master record-keeping, ensuring everything is documented for future investigations. Plus, develop a keen eye for suspicious transactions, catching criminals in their tracks. This course unlocks exciting career paths. Whether you see yourself in banks, law enforcement, or government agencies, your knowledge will make a real difference. So, if you're ready to fight financial crime and protect your community, enrol today and become a financial detective! Learning Outcomes: Understand the fundamentals of money laundering and its impact on society. Analyze the Proceeds of Crime Act and its implications for financial investigations. Apply a risk-based approach to identify and assess money laundering risks. Conduct thorough customer due diligence to mitigate financial crime threats. Implement effective record-keeping practices for investigative purposes. Recognize and report suspicious conduct and transactions with confidence. Stay up-to-date with the latest anti-money laundering regulations and best practices. Why You Should Choose AML Investigation Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? AML Investigation is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our AML Investigation is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. AML Investigation Module 01: Introduction to Money Laundering Introduction to Money Laundering 00:15:00 Module 02: Proceeds of Crime Act 2002 Proceeds of Crime Act 2002 00:19:00 Module 03: Development of Anti-Money Laundering Regulation Development of Anti-Money Laundering Regulations 00:25:00 Module 04: Responsibility of the Money Laundering Reporting Officer Responsibility of the Money Laundering Reporting Officer 00:19:00 Module 05: Risk-based Approach Risk-based Approach 00:20:00 Module 06: Customer Due Diligence Customer Due Diligence 00:22:00 Module 07: Record Keeping Record Keeping 00:15:00 Module 08: Suspicious Conduct and Transactions Suspicious Conduct and Transactions 00:20:00 Module 09: Awareness and Training Awareness and Training 00:18:00
Participating in the implementation and enhancement of quality, health, safety, and environmental management system is the responsibility of everyone in an organization. This foundation course is designed for basic knowledge of quality, health, safety, and environmental management system based on ISO 9001:2015, ISO 14001:2015 & ISO 45001:2018 for all types of learners working in any industry or sector. This course gives knowledge on the background of ISO 9001:2015, ISO 14001:2015 & ISO 45001:2018, and discusses the requirements of each clause in general. Attendees of this course will be having complete knowledge of ISO 9001:2015, ISO 14001:2015 & ISO 45001:2018 which will, of course, help the organization to improve their QHSE management system with the contribution of each employee. We have developed this course in simple English to make understanding easy and consistent for all. Who should attend this? This course is highly recommended to be attended by each employee including Top Management, Managers, Supervisors, and workers of an organization who is implementing ISO 9001:2015, ISO 14001:2015 & ISO 45001:2018. Certificate Validity: Life time Language of Course: English
Cloud Computing Essentials Overview Imagine accessing computing power as vast as the sky, scaling it up or down with the agility of a feather, and only paying for what you use. Cloud computing makes this dream a reality, revolutionizing the way we store, manage, and process data. This 'Cloud Computing Essentials' course is your launchpad into this transformative technology, empowering you to navigate the digital stratosphere with confidence. Unravel the mysteries of the cloud as we delve into its core principles and delve into its diverse service models. Explore the compelling reasons businesses are migrating to the cloud, discovering the cost-efficiency, scalability, and agility it offers. Compare and contrast public, private, and hybrid cloud deployments, understanding their unique strengths and suitability for different scenarios. Master key cloud concepts like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), uncovering their functionalities and use cases. Grasp the economic advantages of cloud computing, including economies of scale and the shared responsibility model. By the end of this journey, you'll be equipped to harness the power of the cloud and elevate your career to new heights. Why You Should Choose Cloud Computing Essentials Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Cloud Computing Essentials is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Cloud Computing Essentials is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Cloud Computing Essentials Introduction 00:04:00 The Need for Cloud Computing 00:13:00 What is Cloud Computing - I 00:05:00 What is Cloud Computing- II 00:06:00 Benefits of Cloud Computing 00:09:00 CapEx Vs OpEx 00:03:00 What are Public Clouds 00:02:00 Characteristics of Public Cloud 00:01:00 What are Private Clouds 00:01:00 Characteristics of Private Cloud 00:02:00 What are Private Clouds 00:01:00 What is Hybrid Cloud 00:01:00 Characteristics of Hybrid Cloud 00:01:00 Review and What Next!! 00:01:00 What is Infrastructure as a service 00:04:00 Use cases of IAAS 00:02:00 What is Platform as a Service? 00:02:00 Use cases of PAAS 00:04:00 What is Software as a Service 00:02:00 Key Concepts and Terminology 00:06:00 Economies of Scale 00:01:00 What is Shared Responsibility model 00:09:00