• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2144 Courses

Goldwork embroidery, Incognito: Live Zoom class

By Ecole Saint Clare

Improve your knowledge of goldwork with this intricate design

Goldwork embroidery, Incognito: Live Zoom class
Delivered OnlineFlexible Dates
£197

Network and Cyber Security Traineeship Program with Career Support & Money Back Guarantee

4.7(47)

By Academy for Health and Fitness

Earn up to 85k as a 'Cyber Security Analyst' or Your 100% Money Back Are you concerned about the rising threat of cybercrime? In the UK alone, cyberattacks cost businesses an estimated £3.1 billion annually, and the demand for skilled cybersecurity professionals is booming. With an average salary of £45,000, a career in cybersecurity offers promising opportunities for those seeking stability and growth. Are you looking to join the high-demand field of cyber security and earn a handsome salary? Our Network and Cyber Security Traineeship Program is here to guide you all the way until you get the job you want. This Network and Cyber Security Traineeship Program is your all-in-one solution to learn cyber security from scratch and also secure a job in this exciting industry. With our unique blend of comprehensive courses and career support, your dream job is within reach. We understand the challenges of transitioning into a new field, which is why our program is tailored to guide you every step of the way - from mastering core skills to landing your first job as a Cyber Security Analyst. By choosing our Cyber Security Job Guarantee Programme, you're not just gaining skills; you're gaining a lifelong career partner. Our mission is simple - to be your trusted partner every step of the way, from training to employment. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring Programmers, so we can help you get your foot in the door. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our Cyber Security Job Guarantee Programme today and start your journey to become successful in Cyber Security field! Why Choose Us? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our Certified Cyber Security Job Guarantee Programme: Personalised Guidance: We believe in the power of individual attention. Our experienced mentors will provide one-on-one counselling sessions tailored to your specific needs. Whether you're a beginner or have some Cyber Security experience, we will guide you towards honing your skills and developing a strong foundation in Cyber Security. One-On-One Consultation: Gain invaluable insights and guidance from seasoned professionals who have thrived in the Cyber Security field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking Certified Cyber Security Job Guarantee Programme. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Interview Preparation: No more stress over unexpected interview questions. We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Courses we will provide once you enrol in the program: Course 01: Cyber Security Programming Course 02: Cyber Security Advanced Training Course 03: Cyber Security Incident Handling and Incident Response Course 04: IT Support Technician Course 05: General Data Protection Regulation (GDPR) & Cyber Security Management Course 06: CompTIA Security+ (SY0-601) Course 07: CompTIA A+ (220-1001) Course 08: CompTIA A+ (220-1002) Course 09: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 10: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 11: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 12: CompTIA Network+ Certification (N10-007) Course 13: Diploma in CompTIA Network+ Training at QLS Level 7 Course 14: CompTIA PenTest+ (Ethical Hacking) Course 15: Cisco ASA Firewall Training Course 16: Cryptography Course 17: IT Administration and Networking Course 18: IGCSE ICT: Network Essentials Course 19: Cyber Security Law Course 20: Cyber Security Awareness Training How Can We Offer Job Guarantees? HF Online provides consultancy, professional and educational services to many of the companies in the UK. During our intense exclusive training program, you will not just gain and complete the industry valuable certification but will gain industry experience as well, which is imperative to get your 1st job in the sector. The Network and Cyber Security Traineeship Program Programme is completed in 9 easy steps: Step 1: Enrol in the Programme Begin your exciting journey with us by enrolling in the Cyber Security Job Guarantee Programme. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 20 Premium Courses related to Cyber Security Job Guarantee Programme. These courses will teach you the knowledge and skills required to become successful in Cyber Security field. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3 - Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the programming/development industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in Cyber Security, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful career in Cyber Security field begins with us. CPD 1000 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Cyber Security Job Guarantee Programme Course is suitable for: Beginners with no prior programming experience who are looking to enter the world of coding. Intermediate programmers who wish to expand their skills and explore Cyber Security's extensive usage. IT professionals seeking to diversify their skill sets and stay relevant in today's tech-driven market. Data analysts and scientists who want to leverage Cyber Security's powerful libraries for their data processing needs. Students and recent graduates looking to enhance their employability in the thriving tech industry. Entrepreneurs who wish to understand and utilise Cyber Security to automate tasks and analyse data for their businesses. Anyone with a keen interest in Cyber Security and a desire to delve into its applications in diverse fields like web development, data science, machine learning, and more. Requirements No experience required. Just enrol & start learning. Career path Cyber Security Analyst: £35,000 - £85,000 annually Incident Response Specialist: £40,000 - £90,000 annually IT Support Technician: £25,000 - £55,000 annually GDPR Compliance Officer: £30,000 - £70,000 annually Cloud Security Architect: £50,000 - £120,000 annually Ethical Hacker/Penetration Tester: £35,000 - £95,000 annually Network Security Engineer: £40,000 - £100,000 annually Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included

Network and Cyber Security Traineeship Program with Career Support & Money Back Guarantee
Delivered Online On Demand3 hours
£1,999

Rust for Absolute Beginners: Learn Rust in 4 Hours

By Packt

This course is for absolute beginners to programming. In this course, you'll learn the foundation of programming and build your skill to become a Rust programmer. We'll start by building the Rust programming foundation and then implement our learning in a simple Rust project. No previous programming experience required.

Rust for Absolute Beginners: Learn Rust in 4 Hours
Delivered Online On Demand3 hours 54 minutes
£64.99

Network Engineer Job Guarantee Programme

4.7(47)

By Academy for Health and Fitness

Earn up to 90k as a 'Network Engineer' or Your 100% Money Back Network outages cost UK businesses £100 billion annually. With over 50,000 open network engineer jobs paying £54,000 per year on average, skilled professionals are in high demand. Do you have what it takes to design, build, and protect company infrastructure? This Network Engineer Job Guarantee Programme is your all-in-one solution to learn networking skills from scratch and also secure a job in this exciting industry. With our unique blend of comprehensive courses and career support, your dream job is within reach. We understand the challenges of transitioning into a new field, which is why our program is tailored to guide you every step of the way - from mastering core skills to landing your first job as a Network Engineer. By choosing our Network Engineer Job Guarantee Programme, you're not just gaining skills; you're gaining a lifelong career partner. Our mission is simple - to be your trusted partner every step of the way, from training to employment. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring Programmers, so we can help you get your foot in the door. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our Network Engineer Job Guarantee Programme today and start your journey to becoming a successful Network Engineer! Why Choose Us? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our Certified Network Engineer Programme: Personalised Guidance: We believe in the power of individual attention. Our experienced mentors will provide one-on-one counselling sessions tailored to your specific needs. Whether you're a beginner or have some Network Engineering experience, we will guide you towards honing your skills and developing a strong foundation in Network Engineering. One-On-One Consultation: Gain invaluable insights and guidance from seasoned professionals who have thrived in the Network Engineering field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking Certified Network Engineers. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Interview Preparation: No more stress over unexpected interview questions. We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Courses we will provide once you enrol in the program: Course 01: Network Security Level 2 Course 02: IGCSE ICT: Network Essentials Course 03: Computer Networks Security Course 04: CompTIA Networking Course 05: AWS Certified Cloud Practitioner Course 06: IT Support Technician Course 07: CompTIA A+ (220-1001) Course 08: CompTIA Network (N10-007) Course 09: CompTIA A+ (220-1002) Course 10: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 11: CompTIA PenTest+ (Ethical Hacking) Course 12: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 13: Cisco ASA Firewall Training Course 14: CompTIA Network+ Certification Course 15: Penetration Testing with OWASP ZAP: Mastery course Course 16: GDPR Data Protection Course 17: Data Center Training Essentials: Mechanical & Cooling Course 18: Cyber Security Awareness Training How Can We Offer Job Guarantees? HF Online provides consultancy, professional and educational services to many of the companies in the UK. During our intense exclusive training program, you will not just gain and complete the industry valuable certification but will gain industry experience as well, which is imperative to get your 1st job in the sector. The is completed in 9 easy steps: Step 1: Enrol in the Programme Begin your exciting journey with us by enrolling in the Network Engineer Job Guarantee Programme. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 18 Premium Courses related to Network Engineering. These courses will teach you the knowledge and skills required to become a successful Network Engineer. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about anything! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3 - Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the programming/development industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in Network Engineering, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful career in Network Engineering begins with us. CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Network Engineering Course is suitable for: Beginners with no prior programming experience who are looking to enter the world of coding. Intermediate programmers who wish to expand their skills and explore Network Engineering's extensive usage. IT professionals seeking to diversify their skill sets and stay relevant in today's tech-driven market. Data analysts and scientists who want to leverage Network Engineering's powerful libraries for their data processing needs. Students and recent graduates looking to enhance their employability in the thriving tech industry. Entrepreneurs who wish to understand and utilise Network Engineering to automate tasks and analyse data for their businesses. Anyone with a keen interest in Network Engineering and a desire to delve into its applications in diverse fields like web development, data science, machine learning, and more. Requirements No experience required. Just enrol & start learning. Career path Network Engineer: £30,000 - £70,000 annually Network Security Analyst: £35,000 - £85,000 annually Cloud Solutions Architect: £40,000 - £100,000 annually IT Support Specialist: £25,000 - £55,000 annually Cyber Security Consultant: £40,000 - £90,000 annually Systems Administrator: £30,000 - £75,000 annually Penetration Tester: £35,000 - £95,000 annually Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included

Network Engineer Job Guarantee Programme
Delivered Online On Demand3 hours
£1,499

IT Technician Courses Including Job Opportunity

4.7(47)

By Academy for Health and Fitness

Earn up to 75k as a 'IT Technician' or Your 100% Money Back Thinking about a career in IT? The UK tech sector is booming, with over 2 million IT professionals employed and a projected growth of 12% in the next five years! The average IT Technician salary is £35,000, making it a lucrative and rewarding career choice. But where do you start? Our IT Technician Courses Including Job Opportunity Programme is here to guide you all the way until you get the job you want. Our IT Technician Courses Including Job Opportunity Programme is your all-in-one solution to learn from scratch and also secure a job in this exciting industry. With our unique blend of comprehensive courses and career support, your dream job is within reach. We understand the challenges of transitioning into a new field, which is why our program is tailored to guide you every step of the way - from mastering core skills to landing your first job as a IT technician. By choosing our IT Technician Courses Including Job Opportunity Programme, you're not just gaining skills; you're gaining a lifelong career partner. Our mission is simple - to be your trusted partner every step of the way, from training to employment. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring Programmers, so we can help you get your foot in the door. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our IT Technician Courses Including Job Opportunity today and start your journey to becoming a successful IT Technician! Why Choose Us? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our Certified IT Technician Courses: Personalised Guidance: We believe in the power of individual attention. Our experienced mentors will provide one-on-one counselling sessions tailored to your specific needs. Whether you're a beginner or have some IT experience, we will guide you towards honing your skills and developing a strong foundation in IT. One-On-One Consultation: Gain invaluable insights and guidance from seasoned professionals who have thrived in the IT Technician field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking Certified IT Technicians. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Interview Preparation: No more stress over unexpected interview questions. We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Courses we will provide once you enrol in the program: Course 01: IT Technician Course 02: Functional Skills IT Course 03: Data Center Training Essentials: General Introduction Course 04: Understanding Data Protection and Data Security Course 05: CompTIA Network Course 06: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 07: CompTIA A+ (220-1001) Course 08: CompTIA A+ (220-1002) Course 09: CompTIA Network+ Certification (N10-007) Course 10: CompTIA Security+ (SY0-601) Course 11: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 12: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 13: CompTIA PenTest+ (Ethical Hacking) Course 14: Secure Programming of Web Applications Course 15: Document Control Course 16: Information Management Course 17: Cyber Security Law Course 18: Cyber Security Incident Handling and Incident Response How Can We Offer Job Guarantees? HF Online provides consultancy, professional and educational services to many of the companies in the UK. During our intense exclusive training program, you will not just gain and complete the industry valuable certification but will gain industry experience as well, which is imperative to get your 1st job in the sector. The is completed in 9 easy steps: Step 1: Enrol in the Programme Begin your exciting journey with us by enrolling in the IT Technician Courses. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 18 Premium Courses related to T Technician. These courses will teach you the knowledge and skills required to become a successful T Technician. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3 - Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the programming/development industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in IT , it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful career as an IT Technician begins with us. CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This IT Technician Course Including the Job Opportunity Course is suitable for: Beginners with no prior programming experience who are looking to enter the world of coding. Intermediate programmers who wish to expand their skills and explore IT's extensive usage. IT professionals are seeking to diversify their skill sets and stay relevant in today's tech-driven market. Data analysts and scientists who want to leverage IT's powerful libraries for their data processing needs. Students and recent graduates are looking to enhance their employability in the thriving tech industry. Entrepreneurs who wish to understand and utilise IT to automate tasks and analyse data for their businesses. Anyone with a keen interest in IT and a desire to delve into its applications in diverse fields like web development, data science, machine learning, and more. Requirements No experience required. Just enrol & start learning. Career path IT Technician: £20,000 - £50,000 annually Network Administrator: £25,000 - £70,000 annually Cyber Security Analyst: £35,000 - £85,000 annually Data Center Technician: £30,000 - £75,000 annually Cloud Solutions Architect: £40,000 - £100,000 annually Ethical Hacker/Penetration Tester: £35,000 - £90,000 annually Information Security Manager: £45,000 - £110,000 annually Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included

IT Technician Courses Including Job Opportunity
Delivered Online On Demand3 hours
£1,499

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered OnlineFlexible Dates
£2,380

RxJS Operators Training

4.8(9)

By Skill Up

Take a deep dive into RxJS Operators Training and equip yourself with the in-demand skills of RxJS Operators. Begin

RxJS Operators Training
Delivered Online On Demand4 hours 5 minutes
£25

Stained Glass Workshops Taster (3hr) or One day (7.5hr) options

By Blue Skies Glass Studio - Ruth Summers

I am a glass artist who's been designing and creating bespoke contemporary stained glass commissions since 1998. I love to create glass pieces that are pulled in from the things around me that inspire me in life. I would love to help you create your own glass piece of your choice to take home with you at the end of our workshop together. We have flexibility on days/times for workshops, daytime, evenings and weekends, so do get in touch! Many thanks, Ruth x

Stained Glass Workshops 
Taster (3hr) or One day (7.5hr) options
Delivered In-PersonFlexible Dates
£80 to £250

Java Certification Cryptography Architecture - CPD Certified

4.5(3)

By Studyhub UK

24 Hour Flash Deal **25-in-1 Java Certification Cryptography Architecture Mega Bundle** Java Certification Cryptography Architecture Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Java Certification Cryptography Architecture package online with Studyhub through our online learning platform. The Java Certification Cryptography Architecture bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Java Certification Cryptography Architecture course provides complete 360-degree training on Java Certification Cryptography Architecture. You'll get not one, not two, not three, but twenty-five Java Certification Cryptography Architecture courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Java Certification Cryptography Architecture courses are yours for as long as you want them once you enrol in this course This Java Certification Cryptography Architecture Bundle consists the following career oriented courses: Course 01: Java Certification Cryptography Architecture Course 02: jQuery Masterclass Course: JavaScript and AJAX Coding Bible Course 03: SQL Programming Course 04: PHP Web Development with MySQL Course 05: Intermediate Python Coding Course 06: Master JavaScript with Data Visualization Course 07: Learn MySQL from Scratch for Data Science and Analytics Course 08: ASP.Net MVC and Entity Framework Course 09: Building a TodoMVC Application in Vue, React and Angular Course 10: Penetration Testing with OWASP ZAP: Mastery course Course 11: Complete Web Development Course 12: Start Your Career as Web Developer Course 13: Learn Spring & Angular Material with a Full Web Application Course 14: Node JS: API Development with Swagger Interface Description Language Course 15: Mobile and Web Development with Ionic & Angular JS Course 16: Web Applications for Specialisation on Development Course 17: Secure Programming of Web Applications Course 18: Web Application Penetration Testing Course 19: Responsive Web Design Course 20: C Programming Language Course 21: C++ Programming Course 22: Flutter & Dart Development Course Course 23: Build Progressive Web Apps with Angular Course 24: Learn How To Create a Web App for iPad Course 25: Bash Scripting, Linux and Shell Programming The Java Certification Cryptography Architecture course has been prepared by focusing largely on Java Certification Cryptography Architecture career readiness. It has been designed by our Java Certification Cryptography Architecture specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Java Certification Cryptography Architecture Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Java Certification Cryptography Architecture bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Java Certification Cryptography Architecture Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Java Certification Cryptography Architecture Elementary modules, allowing our students to grasp each lesson quickly. The Java Certification Cryptography Architecture course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Java Certification Cryptography Architecture bundle, you really hit the jackpot. Here's what you get: Step by step Java Certification Cryptography Architecture lessons One to one assistance from Java Certification Cryptography Architectureprofessionals if you need it Innovative exams to test your knowledge after the Java Certification Cryptography Architecturecourse 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all twenty-five Java Certification Cryptography Architecture courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Java Certification Cryptography Architecture certificate and transcript on the next working day Easily learn the Java Certification Cryptography Architecture skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Java Certification Cryptography Architecture training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Java Certification Cryptography Architecture Requirements To participate in this Java Certification Cryptography Architecture course, all you need is - A smart device A secure internet connection And a keen interest in Java Certification Cryptography Architecture Career path You will be able to kickstart your Java Certification Cryptography Architecture career because this course includes various courses as a bonus. This Java Certification Cryptography Architecture is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Java Certification Cryptography Architecture career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free

Java Certification Cryptography Architecture - CPD Certified
Delivered Online On Demand6 days
£279

Digital Brows Training | Fundamental Beginners PMU Training -Small Group Learning

By ID Liner | Permanent Makeup Training & Supplies

students learn a variety of different brow tattooing techniques, so we will spend two days learning the shaded brow effects possible with a digital device and three days focused on our most-requested Hairstroke Brows.

Digital Brows Training | Fundamental Beginners PMU Training -Small Group Learning
Delivered Online & In-PersonFlexible Dates
£5,350