Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Discover the key to safety and efficiency in offshore operations for oil, gas, and wind sectors with EnergyEdge's course on marine operations and HSE management.
CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.
About this Training Course This 3 full-day training course will introduce participants to the Microsoft Power BI® software solution for extracting, manipulating, visualising and analysing data. This is a very practical, hands-on course that takes participants through a series of exercises which help users understand the Power BI® environment, how to use the key areas of functionality, and how to apply the tools it contains to design and produce analyses of their own data. The first two days focus on learning the key concepts and practising these using clean, simple datasets. The third day provides participants with the opportunity to apply what they've learned to their own data. This makes the course far more relevant and meaningful for them, it allows our facilitator to help them structure their data models, queries and DAX formulas correctly, and it allows our facilitator to help them solve any additional problems that may arise but which were not covered as part of the standard the course. In addition, at the end of the day, each participant walks away with something of real, practical use for their job role. Many previous participants have remarked that they obtained the most value from the course during the third day because otherwise, they wouldn't be able to do what they need to do. This is an introductory course and although it does not assume any prior experience with Power BI®, participants will gain much more from the course if they have at least used Power BI® a little prior to attending. Participants who have taught themselves Power BI® will also benefit from attending as the course will fill-in a number of gaps in their knowledge and will also extend what they know. A general understanding of databases, Excel formulas, and Excel Pivot Tables is useful though not essential. Comprehensive course notes, exercises and completed solutions are included. Microsoft® PowerBI® is a trademark of Microsoft Corporation in the United States and/or other countries. Training Objectives Upon completion of this training course, participants will be able to: Confidently use the Power BI® solution, including Power BI® Desktop, PowerBI®.com and the Power BI® Gateway Extract data from a variety of data sources and manipulate the data extracted so it is ready for analysis Combine data sources together and gain an introductory understanding of the M language Write formulas using the DAX language for generating custom columns, measures and tables Design reports and dashboards using a wide range of both built-in and custom visuals Publish reports and dashboards to PowerBI®.com Share reports and dashboards with others using PowerBI®.com Customize reports and dashboards so that different user groups automatically see their own personalized views Target Audience This training course is intended for: Financial Analysts Accountants Budgeting and planning specialists Treasury Risk Managers Strategic Planners This is an introductory course and although it does not assume any prior experience with Power BI®, participants will gain much more from the course if they have at least used Power BI® a little prior to attending. Participants who have taught themselves Power BI® will also benefit from attending as the course will fill-in a number of gaps in their knowledge and will also extend what they know. A general understanding of databases, Excel formulas, and Excel Pivot Tables is useful though not essential. Comprehensive course notes, exercises and completed solutions are included. Course Level Basic or Foundation Trainer Your expert course leader has a Masters (Applied Finance & Investment), B.Comm (Accounting & Information Systems), CISA, FAIM, F Fin and is a Microsoft Certified Excel Expert. He has over 20 years' experience in financial modelling, forecasting, valuation, model auditing, and management reporting for clients throughout the world. He is skilled in the development and maintenance of analytical tools and financial models for middle-market companies to large corporates, at all levels of complexity, in both domestic and international settings. He has trained delegates from a wide variety of Oil & Gas companies including Chevron, Woodside, BHP Billiton, Petronas, Carigali, Shell, Nippon, Eni, Pertamina, Inpex, and many more. He provides training in financial modelling for companies throughout the Asia, Oceania, Middle East and African regions. Before his current role, he spent 6 years working in the Corporate and IT Consulting divisions of a large, multinational Chartered Accounting firm. He is the author of a number of white papers on financial modelling on subjects such as Financial Modelling Best Practices and Financial Model Auditing. Highlights from his oil and gas experience include: Development of economic models to assist Decision Analysts modelling for a wide range of scenarios for multinational oil & gas assets. Auditing and further development of life of project models for Chevron's Strategic Planning Division analysing their North West Shelf assets. Development of business plan and budgeting models for multinational oil & gas assets. Development of cash flow and taxation models for a variety of oil gas companies. Consulting on Sarbanes Oxley spreadsheet remediation and risk assessment. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Virtual Instructor Led Training (VILT) The 5 half-day Piping Stress Engineering Virtual Instructor Led Training (VILT) course will systematically expose participants to: The theory and practice of piping stress engineering, with special reference to ASME B 31.1 and ASME B 31.3 Standards. The basic principles and theories of stress and strain and piping stress engineering, through a series of lessons, case study presentations, in-class examples, multiple-choice questions (MCQs) and mandatory exercises. Principal stresses and shear stresses which form the backbone of stress analysis of a material. Expressions for these quantities will be derived using vector algebra from fundamentals. Thermal stress-range, sustained and occasional stresses, code stress equations, allowable stresses, how to increase flexibility of a piping system, cold spring. The historical development of computational techniques from hand calculations in the 1950s to the present-day software. Training Objectives On completion of this VILT course, participants will be able to: Identify potential loads the piping systems and categorise the loads to primary and secondary. Determine stresses that develop in a pipe due to various types of loads and how to derive stress-load relationships, starting from scratch. Treat the primary and secondary stresses in piping system in line with the intent of ASME Standards B 31.1 and B 31.3 and understand how the two codes deal with flexibility of piping systems, concepts of self-springing and relaxation/shake down, displacement stress range and fatigue, what is meant by code compliance. Understand the principles of flexibility analysis, piping elements and their individual effects, flexibility factor, flexibility characteristic, bending of a curved beam and importance of virtual length of an elbow in the flexibility of a piping system. Learn stress intensification factors of bends, branch connections and flanges. Understand how the stresses in the material should be controlled for the safety of the piping system, the user and the environment. Examine how codes give guidance to determine allowable stresses, stress range reduction due to cyclic loading, and effects sustained loads have on fatigue life of piping. Confidently handle terminal forces and moments on equipment. Understand the supplementary engineering standards required to establish acceptance of the equipment terminal loads and what can be done when there are no engineering standard governing equipment terminal loads is available and learn the techniques of local stress analysis. Get a thorough understanding of the concepts and the rules established by the ASME B 31.1 and ASME B 31.3 Standards. Perform flange load analysis calculations based on Kellogg's Equivalent Pressure method & Nuclear Code method. Perform the same using a piping stress analysis software and check for flange stresses and leakage. Confidently undertake formal training of piping stress analysis using any commercial software, with a clear understanding of what happens within the software rather than a 'blind' software training and start the journey of becoming a specialist piping stress engineer. Target Audience The VILT course is intended for: Recent mechanical engineering graduates who desire to get into the specialist discipline of Piping Stress Engineering. Junior mechanical, chemical, structural and project engineers in the industry who wish to understand the basics of Piping Stress Engineering. Engineers with some process plant experience who desire to progress into the much sought-after specialist disciplines of Piping Stress Engineering. Mechanical, process and structural engineers with some process plant experience who desire to upskill themselves with the knowledge in piping stress engineering and to become a Piping Stress Engineer. Any piping engineer with some pipe stressing experience in the industry who wish to understand the theory and practice of Piping Stress Engineering at a greater depth. A comprehensive set of course notes, practice exercises and multiple-choice questions (MCQs) are included. Participants will be given time to raise questions and participants will be assessed and graded based on responses to MCQs and mandatory exercises. A certificate will be issued to each participant and it will carry one of the three performance levels: Commendable, Merit or Satisfactory, depending on how the participant has performed in MCQs and mandatory exercises. Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your expert course leader is a fully qualified Chartered Professional Engineer with over 40 years of professional experience in Oil & Gas (onshore and offshore), Petrochemical and Mining industries in engineering, engineering/design management and quality technical management related to plant design and construction. At present, he is assisting a few Perth based oil & gas and mining companies in detail engineering, piping stress analysis, feasibility study and business development work related to plant design. He is a pioneer in piping stress engineering in Western Australia. His recent major accomplishments include the following roles and challenges: Quality Technical Support Manager of USD 54 billion (Gorgon LNG Project). This encompassed management of quality technical services connected with Welding, Welding Related Metallurgy, Non-Destructive Examination, Insulation /Refractory /Coating, AS2885 Pipelines Regulatory Compliance and Pressure Vessel Registration. Regional Piping Practice Lead and Lead Piping Engineer of Hatch Associates. In this role, he was responsible for providing discipline leadership to several mining projects for BHP Billiton (Ravensthorpe), ALCOA-Australia (Alumina), Maáden Saudi Arabia (Alumina), QSLIC China (Magnesium), COOEC China (O&G Gorgon). He was actively involved in the development of piping engineering practice in WA, including training and professional development of graduate, junior and senior engineers. This also includes the formation of the Piping Engineering Specialist Group. Lead Piping/Pipe Stress Engineer on ConocoPhillips' (COP) Bayu Undan Gas Recycle, Condensate production and processing platform. He was able to develop several novel design methodologies for the project and provided training to engineers on how to implement them. These methodologies were commended by COP and the underwriters of the project Lloyds Register of Shipping, UK. Creator of Piping Engineering Professional Course aimed at global engineering community. Professional Affiliations: Fellow, Institution of Mechanical Engineers, UK (IMechE) Fellow, Institution of Engineers, Australia (EA), National Register of Engineers (NER) Member American Society of Mechanical Engineers, USA (ASME) Honorary Life Member, Institution of Engineers, Sri Lanka (IESL) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
EnergyEdge course offers in-depth training on hydraulic fracturing. Learn about design, execution, and post-frac analysis. Enroll today!
HIGHLY SOUGHT-AFTER AND ALREADY AN EXTREMELY LUCRATIVE INDUSTRY, LASER TATTOO REMOVAL IS SET TO BE THE BIGGEST BEAUTY TREND OF 2023!
HIGHLY SOUGHT-AFTER AND ALREADY AN EXTREMELY LUCRATIVE INDUSTRY, LASER TATTOO REMOVAL IS SET TO BE THE BIGGEST BEAUTY TREND OF 2023!
What you'll learn Learn the fundamentals of digital marketing and e-commerce to gain the skills needed to land an entry-level job Attract and engage customers through digital marketing channels like search and email Measure marketing performance through analytics and present insights Build e-commerce stores, analyze online performance, and grow customer loyalty
About this Training Course This 3 full-day course provides a sound review of Pipeline Integrity Management strategies, in compliance with regulatory requirements, including self-assessment. The course is highly interactive and takes the form of lectures and case studies. On completion of the course, the participants will have a solid understanding of the procedures, strengths, limitations, and applicability of the main issues that comprise a Pipeline Integrity Management Program. The course incorporates API 1160 / 1173 and ASME B31.8S, and explains in detail the pipeline integrity requirements described in these standards. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Objectives of this course: Explore the latest techniques used to develop a comprehensive integrity management program covering both pipelines and their associated facilities Determine the necessary elements of such a program described in detail with examples of typical program content including an overarching view of where detailed risk analysis and defect assessment fits in the program Understand the scopes and contents of pipeline integrity standards i.e. API 1160 / 1173 and ASME B31.8S On completion of this course, the participants will be able to understand: Codes used in developing Integrity Management Plans, API 1160 / 1173 and ASME B31.8S, others The elements of an Integrity Management Plan Threat assessment Critical aspects of risk assessment Prevention and mitigation measures Characteristics and limitations of different inspection methods A risk-based approach to maintenance Target Audience The course is intended for supervisors, engineers and technicians responsible for ensuring the adequate protection of pipeline assets. In addition, maintenance planners, regulators and service providers to the pipeline industry will also benefit from attending this course. Course Level Basic or Foundation Trainer Your expert course leader is a Ph.D. Metallurgical Engineer with advanced expertise in asset integrity management of oil & gas production facilities, corrosion control, materials selection, chemical treatments, pipeline pigging, inspections, fitness-for-service evaluations, failure analysis and related consulting. He has 40 years of experience working for BP in Asia and South America, Amoco in the US, Intertek, and four years with Applus-Velosi in Southeast Asia. Practical Work Experience: AIM consultant with focus on Southeast Asia operations and clients Direct technical interface with clients on Velosi services Technical consultant for ongoing regional contracts and lead roles as auditor, instructor or facilitator Main clients have included the following organisations: BP and Vico Indonesia, Pertamina Offshore Northwest Java and West Madura Offshore (Indonesia), NCSP (Vietnam), ADCO-OPCO (Abu Dhabi), Thang Long (Vietnam), Exxon-Mobil (Malaysia) and Mubadala Petroleum (Indonesia). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable