CourseCode,Overview,Prerequisites,Objectives,Outline "a+","A+ -

Achieve your A+ certification in just four days – that’s 20% faster than traditional training. On this accelerated A+ course you’ll study official CompTIA curriculum and sit A+ exams 220-1101 (Core 1) and 220-1102 (Core 2) onsite at the The Supplier Centre.

Developed by CompTIA the A+ is a comprehensive vendor-neutral certification and an ideal starting point for your career in IT. If you’re already an IT professional the CompTIA A+ certification will validate your existing skills.

On this accelerated A+ course you’ll learn how to configure and support operating systems. You’ll also study the fundamentals of virtualisation cloud computing software troubleshooting and security.

Train at twice the speed on this official A+ course

The Supplier is an authorised CompTIA Platinum Partner. This means you’ll get access to experienced instructors and up-to-date course material officially approved by CompTIA. During your accelerated course you’ll also sit your CompTIA A+ exams.

","

Before attending this accelerated course you should have:

","","

This training course will help you become an expert in:

" "aaia","ISACA Advanced in AI Audit (AAIA) - ","","","" "aaism","ISACA Advanced in AI Security Management (AAISM) - ","","","" "acscp","Certified Supply Chain Professional (CSCP) -

On this accelerated Certified Supply Chain Professional (CSCP) course you’ll gain the skills required to manage a global supply chain managing suppliers distributors plants and customers located worldwide. You’ll be considered a recognised supply chain expert and set yourself apart from the field.

In just 4 days you’ll become an expert on supply chain:

At the end of this accelerated course you’ll sit the CSCP Exam and achieve your CSCP certification.

The Suppliers Lecture | Lab | Review methodology will allow you to train at twice the speed of traditional training in a distraction-free environment.

Audience

This course is perfect for professionals working within supply chain management who want to elevate themselves in the industry and make their organisation more competitive.

","

There are no prerequisites to attend this course.

","","" "agrccg","AGRC Certificate in Corporate Governance - ","","","" "agrcesgps","AGRC Certificate in ESG Principles and Standards - ","","","" "agrcrm","AGRC Certificate in Risk Management - ","","","" "apmcm","Change Management Foundation and Practitioner -

Get two APMG Change Management certifications in just three days - 40% faster than traditional training. 

You'll sit both the Foundation and Practitioner exams as part of the programme.

On this accelerated course you'll study the recently refreshed Change Management curriculum (V3) aligned to the Change Management Institute’s accreditation.

The APMG Change Management course has been developed in partnership with the Change Management Institute it is designed to help organisations and their people manage the impact of change. They provide techniques to effectively plan and implement successful transformation initiatives. 

 This certification is ideal for project programme change department and operational managers involved in organisational change.

On this course you’ll learn the knowledge proven methods and techniques to: 

The APMG Change Management certification complements process-driven methods like PRINCE2 and MSP.

The Change Management Institute have agreed to offer a complimentary 2-month membership to candidates who have passed one of the Change Management examinations (applicable to exams for both versions of the scheme).

This APMG Change Management course is provided in conjunction with Creative Consulting and Training Ltd an APMG accredited training organisation

APMG International Change Management™

The APMG International Change Management and Swirl Device logo is a trademark of The APM Group Limited used under permission of The APM Group Limited. All rights reserved.

APMG-International Change Management is a trade mark of The APM Group Limited. All rights reserved.

","We recommend that you are familiar with change management concepts and the basic functions of change management within an organisation.","","

Foundation: 

Practitioner: 

" "apmgapmf","Agile Project Management Foundation -

On this accelerated APMG Agile Project Management Foundation course you’ll gain a thorough understanding of the DSDM Agile Project Management framework and how it can support your business' growth and productivity.

In just 2 days you’ll build knowledge on the philosophy principles and lifecycle of an Agile project. You’ll also learn the:

At the end of this course you’ll sit the APMG Agile Project Management Foundation exam to achieve your certifications.

Successful candidates will be entitled to a free Professional Assessment at Business Agility Professional Level 1 - Explorer.

As an official APMG Partner and through The Supplier’s Lecture | Lab | Review methodology you’ll get access to official courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal for:

Please note: The Supplier is an APMG Accredited Organisation.

AgilePM is a registered trademark of Agile Business Consortium Limited. All rights reserved.

","

There are no prerequisites for this accelerated course.

","","" "apmgapmfp","Agile Project Management (AgilePM) Foundation & Practitioner -

On this accelerated APMG Agile Project Management Foundation and Practitioner course you’ll gain a thorough understanding of the DSDM Agile Project Management framework and how as a project manager you’ll apply the framework into your business strategies.

In just 3 days you’ll build knowledge on the philosophy principle and lifecycle of an Agile project. You’ll also learn the:

Successful candidates will be entitled to a free Professional Assessment at Business Agility Professional Level 1 - Explorer.

This is a combined course so you’ll sit both the APMG Agile Project Management Foundation and the APMG Agile Project Management Practitioner exam to achieve your certifications.

As an official APMG Partner and through The Supplier’s Lecture | Lab | Review methodology you’ll get access to official courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal for:

Please note: The Supplier is an APMG Accredited Organisation.

AgilePM is a registered trademark of Agile Business Consortium Limited. All rights reserved.

","

It is recommended (but not essential) for delegates to have experience in team leading project management project assurance/support or user management. Please note you are not able to take Agile Practitioner examination without first passing Agile Foundation.

","","

APMG Agile Project Management Foundation

APMG Agile Project Management Practitioner

" "apmgapmp","Agile Project Management Practitioner -

On this accelerated APMG Agile Project Management Practitioner course you’ll become an agile project leader with in-depth knowledge of agile principles apply the underpinning philosophy of AgilePM in a project situation

In just 2 days you’ll learn to identify and apply popular Agile techniques in a project situation including MoSCoW prioritisation iterative development and timeboxing. You’ll also build knowledge on:

Successful candidates will be entitled to a free Professional Assessment at Business Agility Professional Level 1 - Explorer.

At the end of this accelerated course you’ll sit the APMG Agile Project Management Practitioner exam and achieve your certification. Through The Supplier’s Lecture | Lab | Review methodology you’ll get access to courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal for:

Please note: The Supplier is an APMG Accredited Organisation.

AgilePM is a registered trademark of Agile Business Consortium Limited. All rights reserved.

","

Before attending this accelerated course you should have achieved the following certification:

","","" "apmgncspf","NIST Cyber Security Professional (NCSP) Foundation Certificate -

This accelerated APMG: NIST Cyber Security Professional (NCSP) Foundation Certificate is designed to teach IT Business and Cybersecurity professionals the fundamentals of Digital Transformation Cyber Security Risk Management and the NIST Cyber Security Framework (NIST-CSF). The Foundation training program outlines current cybersecurity challenges and explains how organizations who operationalize a NIST Cyber Security program across an enterprise and its supply chain can mitigate these challenges.

The Foundation course also teaches a new way to communicate with C-Level executives about the business value a NIST-CSF program brings to existing digital business applications and employee productivity programs.

This NIST Cyber Security Foundation Certificate course is designed to teach IT Business and Cybersecurity professionals the fundamentals of Digital Transformation Cybersecurity Risk Management and the NIST Cybersecurity Framework.

At the end of this course youll sit the APMG exam and achieve your NIST Cyber Security Professional (NCSP) Foundation Certificate certification.

Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

Successful candidates will be entitled to a free Professional Assessment at Business Agility Professional Level 1 - Explorer.

Audience

This course is ideal for IT Business and Cyber Security professionals who will play an active or passive role in engineering operationalizing and continually improving an organizations NIST-CSF program and those looking for a baseline knowledge of the NIST-CSF who are considering a career in cybersecurity.

","","","" "app-its","Integrated Technology Solutions -

On this accelerated Integrated Technology Solutions course you will gain a solid foundation in the basic elements and architecture of computer systems laying the groundwork for a deep understanding of IT infrastructure.

You will develop a practical working knowledge of Cloud and Cloud Services unlocking the potential for innovation and efficiency in modern computing.

This course ensures you grasp the principles of secure coding fostering cybersecurity expertise to navigate the ever evolving digital landscape. Additionally you will gain insight into the crucial role IT plays within the broader context of a business strategy aligning technological advancements with organisational goals. 

At the end of this course you’ll achieve your Integrated Technology Solutions certification. Through The Supplier’s Lecture | Lab | Review methodology you’ll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

","

There are no prerequisites for this accelerated course.

","","

Module 1:  Hardware Peripherals and Components

 

Module 2: Software Licencing

 

Module 3: Networking

 

Module 4: Cloud Technologies

 

" "awsa","Certified Solutions Architect - Associate -

On this accelerated AWS Certified Solutions Architect - Associate certification course you'll learn the skills you need to build highly available cost-effective and secure applications on the AWS platform.

In just 4 days you’ll learn details of AWS Services needed to fulfil a solutions architect role and study the following areas:

The Supplier's official AWS Architecting on AWS course is the second rung on the Amazon Webservices certification ladder. This course includes the AWS Solutions Architect - Associate 2020 exam which is the recommended prerequisite qualification for the AWS Advanced Architecting on AWS course and the Solutions Architect - Professional exam.

At the end of the course you’ll also sit the AWS Certified Solutions Architect - Associate exam and get certified.

","

Before attending this course The Supplier recommend you have:

","","" "awsap","Certified Solutions Architect - Associate and Professional -

This AWS Certified Solutions Architect Associate + Professional course combines both Amazon Web Services Solutions Architect certifications into a single 7-day course

On the first part of this comprehensive AWS training you'll prepare for the AWS Solutions Architect Associate exam. You'll learn the skills to build highly available cost effective and secure applications on the AWS platform.

Next you'll follow up with AWS Solutions Architect Professional training and develop the technical knowledge in building distributed applications and systems on the AWS platform.

After seven days of full dedication to Amazon AWS Solutions training you'll have the knowledge to qualification to work with most AWS systems and integrations.

Some of the other skills you'll develop include the following:

This course is aimed at individuals with experience designing distributed applications and systems on the AWS platform.

You will be prepared for and sit the AWS Certified Solutions Architect - Associate and AWS Certified Solutions Professional exams which are included in the cost and covered by our Certification Guarantee.

Residential and Online AWS Certified Solutions Architect Associate + Professional course

The Supplier offers both a classroom-based and AWS Certified Solutions Architect Associate + Professional online course including everything you need to get certified in record time:

","

AWS Certified Solutions Expert Associate + Professional Prerequisites

To take this accelerated course it is recommended that you have:

","","

AWS Certified Solutions Architect - Associate

AWS Certified Solutions Architect - Professional

" "awscda","Certified Developer - Associate -

On this accelerated AWS Certified Developer - Associate certification course you'll learn how to develop and maintain applications on the AWS platform in just 3 days including the key concepts best practices and troubleshooting methodology for development on the platform.

Youll also learn how to:

If you're in a development role and have a couple years' practical experience in developing and maintaining an AWS-based application then this course is ideal for you to continue going up the AWS ladder.

You'll take the DVA-C02 as part of your AWS course and return to the office a certified AWS Developer - Associate.

Residential or Online AWS Certified Developer - Associate certification course

The Supplier offer both classroom-based and AWS Certified Developer - Associate online course including everything you need to get certified in record time:

Audience

This course is ideal if you are in a Developer role

","

This accelerated course is intended for intermediate-level software developers. You should possess:

","","" "awscp","Certified Cloud Practitioner Essentials -

On this accelerated AWS Certified Cloud Practitioner course you'll gain an overall understanding of the Amazon Web Services (AWS) Cloud independent of specific technical roles. You will learn about AWS Cloud concepts AWS services security architecture pricing and support to build your AWS Cloud knowledge. This course also helps you prepare for the AWS Certified Cloud Practitioner exam.

In just 2 days you'll be able to summarise the working definition of AWS and you'll be able to:

At the end of the course you'll sit your official exam CLF-C02 and achieve your AWS Certified Cloud Practitioner certification.

Through The Supplier’s Lecture | Lab | Review methodology you’ll get access to official courseware and learn from certified instructors in a distraction-free environment as The Supplier is an Authorised AWS Training Partner.

Audience

If you are in one of the following job roles or if you're just interested in gaining an overall understanding of the AWS Cloud this course is ideal for you:

","

Before attending this accelerated course you should have:

","","

AWS Cloud Practitioner Essentials

" "awscss","Certified Security - Specialty -

The accelerated AWS Certified Security - Specialty (SCS-C02) course validates your expertise in creating and implementing security solutions in the AWS Cloud. This certification also validates your understanding of specialized data classifications and AWS data protection mechanisms; data-encryption methods and AWS mechanisms to implement them; and secure internet protocols and AWS mechanisms to implement them.

The AWS Certified Security - Specialty (SCS-C02) exam is intended for individuals who perform a security role. The exam validates a candidates ability to effectively demonstrate knowledge about securing the AWS platform.

In just 3 days youll gain an understanding of specialized data classifications and AWS data protection mechanisms. Youll also gain:

At the end of this course youll sit the AWS exam and achieve your AWS Certified Security - Specialty (SCS-C02) certification. Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal for:

","

Before attending this accelerated course you should have:

","","" "awsde","Certified DevOps Engineer - Professional -

On this accelerated AWS Certified DevOps Engineer - Professional course you'll learn how to implement and manage continuous delivery systems and methodologies.

In just 3 days you'll be immersed in the best techniques to design and manage infrastructure on AWS to support multiple DevOps development projects.

At the end of your course youll sit the AWS DOP-C02 exam which will validate your ability to implement and automate security controls and governance process within your business. With this knowledge youll have the skill-set to ensure process management initiatives are not overlooked and comply with high standards.

You'll also learn how to:

This certification is ideal if you're already in a DevOps engineer role and have several years' experience in provisioning operating and managing AWS environments.

In a distraction-free environment get the knowledge and skill-set you need to achieve your AWS DevOps Engineer - Professional certification fast.","

Before attending this accelerated course you should have:

You'll benefit from holding either the AWS Certified Developer - Associate or AWS Certified SysOps Administrator - Associate certifications.

","","" "awsp","Certified Solutions Architect - Professional -

This accelerated AWS Certified Solutions Architect Professional certification will help you develop the knowledge and skills you need to design dynamically scalable highly available fault-tolerant and reliable applications on AWS. At The Supplier this course takes only 3 days.

You will learn to migrate complex multi-tier applications on AWS as well as how to:

At the end of this course you can sit the official AWS Certified Solutions Architect Professional exam and become certified.

How can you take this course?

The Supplier offers both a classroom-based and online AWS Certified Solutions Architect Professional certification course including everything you need to get certified in record time:

","

To take this accelerated course it is recommended you have:

","","This course helps you develop hands-on professional-level experience designing and deploying AWS cloud solutions. You'll become an expert across every domain of the AWS Certified Solutions Architect Professional including:

" "bcscismp","Certificate in Information Security Management Principles | CISMP -

The Certificate in Information Security Management Principles (CISMP) is an entry-level security course. It's similar to MTA Security and CompTIA Security+ certification courses - but vendor neutral and not technical.

Our version of CISMP is largely based on the bespoke Cyber Crime PROTECT course. In addition to using the official BCS book it includes:

CISMP Prerequisites

There are no requirements for this course other than to be computer-literate.

Target Audience

The CISMP credential is widely recognised in the UK and is a good starting point for any professional within the security sector.

","

There are no prerequisites for this accelerated course. However The Supplier recommend you possess:

","","" "bcseai","Essentials Certificate in Artificial Intelligence -

On this accelerated BCS Essentials Certificate in Artificial Intelligence course you’ll learn the basic principles of artificial intelligence (AI) - how it can support your business' growth and the potential risks involved.

In just 1 day you’ll build knowledge on the basic process of machine learning (ML) and it’s relationship with AI. You'll also learn how to:

At the end of the course you'll sit the BCS Essentials Certificate in Artificial Intelligence exam and get certified. You'll get access to official courseware and learn from certified instructors as The Supplier is an Authorised Training Partner (ATP).

Train through The Supplier's Lecture | Lab | Review methodology and you'll train at twice the speed in a distraction-free environment.


Audience


If you're interested in implementing AI into your business or are any of the following this course is ideal for you:


BCS Foundation Certificate in Artificial Intelligence


Once you've achieved your BCS Essentials Certificate in Artificial Intelligence certification you can go on to achieve your BCS Foundation Certificate in Artificial Intelligence.

","

There are no formal prerequisites for this accelerated course.

","","

Section 1: Artificial and Human Intelligence: An Introduction and History

Section 2: Examples of AI: Benefits Challenges and Risks

Section 3: An Introduction to Machine Learning

Section 4: The Future of Artificial Intelligence – Human and Machine Together

" "bcsfai","Foundation Certificate in Artificial Intelligence -

On this accelerated BCS Foundation Certificate in Artificial Intelligence course you will take the next step in developing your knowledge and understanding of artificial intelligence with this new certificate. Learn the general principles of AI its potential implications and capabilities and how to assess AI products and services from multiple angles.

In just 3 days you’ll also gain an understanding of:

At the end of this course you’ll sit the BCS exam and achieve your BCS Foundation Certificate in Artificial Intelligence certification. Through The Supplier’s Lecture | Lab | Review methodology you’ll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

 

Audience

This course is ideal for:

","

There are no prerequisites for this accelerated course.

","","

Module 1: Ethical and Sustainable Human and Artificial Intelligence (20%)

 

Module 2: Artificial Intelligence and Robotics (20%)

 

Module 3: Applying the benefits of AI - challenges and risks (15%)

 

Module 4: Starting AI how to build a Machine Learning Toolbox - Theory and Practice (30%)

 

Module 5: The Management Roles and Responsibilities of humans and machines (15%)

 

" "bcsfdo","Foundation Certificate in DevOps -

On this accelerated BCS Foundation Certificate in DevOps course you’ll develop your knowledge and skills of the DevOps methodology. You'll learn how to build tools and select best practices to help your business deliver applications and services more efficiently.

In just 2 days you'll build knowledge on how applying DevOps will support the culture of your business' departments and the teamwork between your employees.

At the end of your accelerated course you’ll sit the BCS Foundation Certificate in DevOps exam and get certified. You’ll get access to official courseware and learn from certified BCS instructors as The Supplier is an authorised training provider.

Train through The Supplier’s Lecture | Lab | Review methodology and you’ll train at twice the speed in a distraction-free environment.


Audience


This course is ideal if you're involved in implementing the DevOps process in your business; roles including:

","

There are no formal prerequisites for this accelerated course.

","","

Section 1: Introducing DevOps

Section 2: Benefits of DevOps 

Section 3: Culture

Section 4: Automation

Section 5: Lean

Section 6: Measurement

Section 7: Sharing

Section 8: Common DevOps Roles

Section 9: Common DevOps Practices and Techniques 

Section 10: Relevant Methods and Approaches for DevOps Teams

" "capm","Certified Associate in Project Management (CAPM) -

The Supplier is proud to be a Premier Authorised Training Partner with PMI offering CAPM training with our immersive learning style allowing you to build your knowledge and prepare for your the CAPM (Certified Associate in Project management) certification in just 5 days when you choose our accelerated course.

Whether you are a professional who would like to showcase your knowledge or just starting your Project Management career the CAPM certification will better support you on your career journey utilising The Suppliers unique Lecture | Lab | Review methodology.

During this course you'll prepare for and sit the PMI CAPM exam covered by your Certification Guarantee and is included within the course. Furthermore we also offer 12 months PMI membership as part of your course giving you additional access to PMI publications via PMI Standards+ PMI Infinity and various resources to enhance your learning.

On this course you will learn how to:

Professional Development Units (PDUs) are available upon course completion and a digital badge is also available upon completion of the exam to enable you to proudly show your achievements and qualification.

Audience

This course is suitable for:

The PMI Registered Education Provider logo the PMI CAPM are registered marks of the Project Management Institute Inc.

","

To be eligible for the CAPM certification you need:

CAPM PMP and PMI-ACP are registered marks of the Project Management Institute Inc.

","","

Project Management Fundamentals and Core Concepts

Predictive Plan-Based Methodologies

Agile Frameworks/Methodologies

Business Analysis Frameworks

" "cbt19di","COBIT Design and Implementation -

Get certified in designing and implementing IT governance systems for your business on this accelerated 2-day COBIT 2019 course. Train fast with The Supplier an ISACA premier partner and get access to official courseware and the exam.

You'll be immersed in the curriculum through The Supplier's unique Lecture | Lab | Review technique meaning you learn and retain information faster.

Learn about a 4-step implementation program to best set up and tailor your IT governance system with your expert instructor and gain the skills necessary to certify in the COBIT 2019 framework.

This COBIT 2019 Design and Implementation course includes:

Due to ISACA policy exams for COBIT certificates are remote-proctored. This means that delegates are required to take the exam in their own time after delivery; however exam vouchers are included as part of the course. Candidates will also have the opportunity to sit Mocks for the Foundation and the Design and Implementation exams. Feedback from these exams will help you prepare for the final exams.

If you are looking to update and expand on your knowledge and skill on how to develop an IT Governance Solution this COBIT 2019 course is ideal for you.

The Supplier is a premier ISACA partner for EMEA and the US. No other partner in these regions trains more students.

","

Before attending this accelerated course you should have achieved the following certification:

","","

On this accelerated course you'll learn to:

" "cbt19f","COBIT 2019 Foundation -

Get certified in designing and implementing a streamlined enterprise IT governance system for your business on this accelerated 2-day COBIT 2019 Foundation course. Train fast with The Supplier an ISACA premier partner and get access to official courseware and the exam.

You'll be immersed in the curriculum through The Supplier's unique Lecture | Lab | Review technique meaning you learn and retain information faster.

Learn about the Enterprise Governance of IT (EGIT) using the COBIT Core Model with your expert instructor and gain the skills necessary to pass the COBIT 2019 Foundation exam.

This COBIT 2019 Foundation course includes:

Over your accelerated 2 day course you will learn about...

If you are looking to update and expand on your knowledge and skill on how to develop an IT Governance Solution this COBIT 2019 Foundation course is ideal for you.

Due to ISACA policy exams for COBIT certificates are remote-proctored. This means that delegates are required to take the exam in their own time after delivery; however exam vouchers are included as part of the course. Candidates will also have the opportunity to sit Mocks for the Foundation and the Design and Implementation exams. Feedback from these exams will help you prepare for the final exams.

The Supplier is a premier ISACA partner for EMEA and the US. No other partner in these regions trains more students.

","

There are no official prerequisites for this accelerated course.

","","" "cbt19fdi","COBIT 19 Foundation and Design & Implementation -

On this accelerated ISACA Combined COBIT 19 Foundation and Design Implementation course youll gain an understanding of the COBIT framework and how to design and implement a streamlined enterprise IT governance system into your business.

In just 4 days youll build knowledge on the key concepts and terminology surrounding governance solutions. Youll also learn about:

As an ISACA Elite Partner and through The Suppliers Lecture | Lab | Review methodology youll get access to official courseware learn from certified instructors and train in a distraction-free environment.

","

There are no formal prerequisites for this accelerated course.

","","

COBIT 19 Foundation

COBIT 19 Design & Implementation

" "cciso","Certified Chief Information Security Officer (CCISO) -

Gain in-depth knowledge and skills covering the technical side of information security management on this accelerated 3 day Certified Chief Information Security Officer course (CCISO) 25% faster than traditional training.

Your EC-Council CCISO certification course is designed by seasoned CISOs to develop the skills and knowledge required to transition into the highest ranks of information security management. You'll learn to adapt your organisations information security in coordination with ever-changing risks and technologies providing greater protection.

Your expert instructor will immerse you in the course guiding you through the 5 domains contained within EC-Council's CCISO Body of Knowledge:

You'll also be prepared to sit the CCISO exam. However in order to sit the exam you must demonstrate five years experience in three of the five CCISO Domains verified via the EC-Council's exam eligibility application. Providing you meet the criteria you'll sit the exam as part of the course. Covered by our Certification Guarantee.

Without approval from EC-Council you cannot sit the exam. Call us on 080 80 800 888 and speak to one of our enrollment consultants who can guide you through the exam approval process.

Residential or Online CCISO course

The Supplier offers both a classroom-based and Certified Chief Information Security Officer online course including everything you need to get certified in record time:

Both are delivered through our tried and tested Lecture | Lab | Review methodology. In this day and age you get to choose the best one for your needs and get your certification faster than anywhere else


9x Accredited Training Centre of the Year

The Supplier has again won the EC-Council Accredited Training Centre of the Year Award from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

EC-Council's CCISO certification is accredited by the American National Standard Institute (ANSI). Organisations with ANSI accreditation are required to undergo stringent quality reviews and assessments. EC-Council is one of just a handful of certification bodies to achieve ANSI accreditation.

The EC-Council CCISO course is also GCHQ accredited.

","

There are no prerequisites to sit this course. However to sit the exam you must demonstrate five years' experience in three of the five CCISO Domains verified via the EC-Council's exam eligibility application.

If you do not have five years of domain experience you can take the Associate C|CISO Certification programme instead.

You can also take EC-Council Information Security Manager (EISM) exam and then the CCISO exam once you have the proper industry experience. If you do not meet the experience requirements you can also

EC-Council will not accept certifications in lieu of experience to qualify to take the CCISO exam.

However waivers for three years per domain may still be submitted and accepted for B.S. M.S. and Ph. D. degrees in various information security areas for Domains 1-4. MBAs M.S. degrees in finance or CPAs may also be submitted and accepted for Domain 5.

You have to submit their CCISO exam eligibility applications must use the current form. Older forms will no longer be accepted.

Without approval from EC-Council you cannot sit the exam. Call us on 080 80 800 888 and speak to one of our enrolment consultants who can guide you through the C|CISO exam approval process.

","","" "ccisoasso","Associate C|CISO Certification -

The accelerated EC Council Associate C|CISO Certification course is a professional certification that equips cybersecurity professionals with the fundamental knowledge required for information security leadership. It is designed specifically for candidates aspiring to become C-suite leaders by training themselves in the 5 domains of the Certified CISO (C|CISO) course even if they fall short of meeting the minimum 5 years of experience in 3 of the Certified CISO domains.

This certification empowers emerging information security officers to understand the roles and responsibilities necessary for security executives to effectively contribute to the functioning of a CISOs office and guide their career paths toward leadership allowing them to collaborate and support CISOs in strategic decision-making with regard to the information security and risk management of an organisation.

The Associate C|CISO course provides a method to map a career into the C-suite leadership path and is designed to equip cybersecurity officers with the fundamental knowledge required to perform their roles effectively as information security managers ensuring that they gain the knowledge and professional experience needed to progress within their current capabilities.

By holding the Associate C|CISO certification cybersecurity officers demonstrate their commitment to continuous professional development and their readiness to take on leadership roles within a CISOs office. This certification validates their ability to handle complex information security management system challenges manage security programs and contribute to the organisations overall security posture.

This certification also serves as a stepping stone to obtaining the Certified CISO title and joining the global team of certified cybersecurity leaders.

At the end of this course youll sit the EC Council exam and achieve your EC Council Associate CCISO Certification certification. Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal for all Cybersecurity professionals who possess either a minimum of 2 or more years of experience in any of the Certified CISO domains or currently hold certifications such as CISA CISM or CISSP.

","

Before attending this accelerated course you should have at least 2 years of technical or management experience in any of the following domains:

Before attending this accelerated course you should have 2 years of experience in at lead 1 CCISO domain or hold CISSP CISM or CISA certification.","","

" "ccna","CCNA | Implementing and Administering Cisco Solutions -

This accelerated Cisco CCNA course - Implementing and Administering Cisco Solutions - has replaced all CCDA and CCNA certifications including the popular CCNA Routing and Switching.

The CCNA certification is now offered as 5 days in-classroom modules and a required 3 days self-study modules. Train with The Supplier and you'll cover all modules over a total of just 6 days including sitting exam 200-301 CCNA. Get certified at 33% faster than traditional training.

In less than a week you'll be immersed in a broad range of information technology fundamentals; from networking technologies to security essentials automation and programmability.

Through the CCNA certification you'll learn how to navigate network access IP connectivity and IP services enabling your business to be more flexible and scalable. You'll also learn the fundamentals of:

At the end of the course you'll sit exam 200-301 CCNA and achieve the Cisco Certified Network Associate certification. You'll get access to official courseware and learn from certified Cisco instructors as The Supplier is a Cisco Learning Partner.

Audience

This course is ideal for:

This Cisco certification is the starting point for your career in networking giving you the specialist skills you need to operate Cisco equipment. This certification is an ideal follow-up to the CompTIA Network+.

Residential and Online Cisco CCNA course - Implementing and Administering Cisco Solutions

The Supplier offers both a classroom-based and Cisco CCNA online course including everything you need to get certified in record time:

The new CCNA explained

Since the 24th of February 2020 Cisco retired all existing CCDA and CCNA certifications and replaced them with the Implementing and Administering Cisco Solutions (CCNA). The popular CCNA Routing and Switching has also been retired.

Here's the full list of CCNA and CCDA certifications that have retired:

","

Before taking this course you should have:

There are no formal prerequisites for CCNA certification; however make sure you have a good understanding of the exam topics.

","

Your first exposure to Cisco technology should be hands-on. That's why this accelerated 6-day Cisco CCNA course includes real Cisco labs giving you the practical experience you need when applying your skills in the real world.

24-7 lab access will give you the experience you need to prepare for the 200-301 exam which you’ll take during your course. Plus you’ll be sitting your exams at the The Supplier Centre just steps away from your classroom.

Gold certification from the IPv6 Forum Education Certification Program

Cisco CCNA CCNP and CCIE Routing and Switching Certifications have received Gold accreditation from the IPv6 Forum Education Certification Program. Gain your CCNA certification and you’ll be able to display the IPv6 logo proving that you have attained professional IPv6 knowledge and skills.

The IPv6 forum is a worldwide consortium of leading internet vendors industry subject matter experts research and education networks. Their mission is to promote the adoption of IPv6 technology.

","

Curriculum

Lab outline

" "ccsk","The Supplier's training for CSA's Certified Cloud Security Knowledge (CCSK) exam -

On this accelerated The Supplier course for CSA's Certificate of Cloud Security Knowledge (CCSK) course you'll validate your understanding of the best practices surrounding cloud security. This The Supplier course covers the CSA's CCSK Basic and the CCSK Plus aims to ensure that you have a demonstrated awareness of the security threats facing your cloud infrastructure.

In just 2 days you'll build knowledge on the fundamentals and the full capabilities of cloud computing as well as:

The Supplier's unique Lecture | Lab | Review technique combines both theoretical knowledge with practical hands-on skills. This technique will accelerate your learning and ensure you have the ability to apply your new found knowledge as soon as you return to work.

As part of this course you'll be prepared for the CSA Certificate of Cloud Security Knowledge (CCSK) exam. This is covered by your Certification Guarantee.

Audience

This course is ideal if your responsibilities are related to cloud computing and security

","

You should have a basic understanding of security fundamentals such as firewalls secure development encryption and identity management.

","","" "ccsp","CCSP Certified Cloud Security Professional -

Get the knowledge you need to secure your cloud infrastructure in just 6 days. On this accelerated CCSP course youll get the cloud security skills you need to manage cloud environments and purchased cloud services.

Youll even sit your official ISC2 CCSP exam during this course and walk away with your certification in under one week. This exam is covered by your Certification Guarantee: pass first time or train again free.

Outdated approaches to the cloud could be opening your organisation to dangerous cyber criminals. Businesses around the world need experienced professionals with advanced skills in cloud security - prove your knowledge with the industry's top cloud security certification.

As well as learning how to keep your sensitive cloud data secure you'll study the six domains of the CCSP (Certified Cloud Security Professional) and prove knowledge across:

Developed by leading information security organisations the Cloud Security Alliance (CSA) and ISC2 this advanced certification proves your cloud security expertise at a global level.

This certification is ideal for IT and information security leaders that work to apply best practices to cloud security architecture design and operations. This includes roles like enterprise architects systems engineers security managers and security engineers.


Residential or Online CCSP certification

The Supplier offers both a classroom-based and CCSP online course including everything you need to get certified in record time:

Both are delivered through our tried and tested Lecture | Lab | Review methodology. In this day and age you get to choose the best one for your needs and get your certification faster than anywhere else.


ISC2 Highest Performing Affiliate of the Year

The Supplier has been named as a “Highest Performing Affiliate of the Year – EMEA” by ISC2. Upon announcing the award W. Hord Tipton Executive Director of ISC2 stated: “This award represents The Supplier as the top performer for ISC2...for the EMEA region.”

","

Before you attend this course it's highly recommended that you have a minimum of five years of full-time work experience in information technology including three years' work experience in IT security and one year in cloud computing.

You should also be able to demonstrate knowledge in one or more of the six CBK domains:

Please note: You can substitute:

If you don't have any of the experience above you can take and pass the exam to earn an Associate of ISC2 designation which means youll have up to six years to earn your required work experience for the CCSP.","

ISC2 Membership Benefits

ISC2 is an international non-profit membership association built for security professionals. When you certify you’ll become a member of ISC2. As a member you’ll join a global network of 125000+ and get access to an array of exclusive resources tools and peer-to-peer networking opportunities conference and event discounts.

Become a member by earning one of ISC2's gold standard certifications. Contact us to find out more.

","

You'll become an expert across the 6 CCSP domains:

  1. Cloud Concepts Architecture and Design (17%)
  2. Cloud Data Security (20%)
  3. Cloud Platform & Infrastructure Security (17%)
  4. Cloud Application Security (17%)
  5. Cloud Security Operations (16%)
  6. Legal Risk and Compliance (13%)
" "cctim","Certified Threat Intelligence Manager | CCTIM -

On this accelerated CREST Certified Threat Intelligence Manager (CCTIM) course you'll gain expert skills and knowledge to be able to build implement and manage a cyber threat intelligence team or department effectively - aligned to your organisation's cyber security strategy and goals and to provide actionable intelligence to senior stakeholders.

In just 4 days you’ll learn to analyse physical functional or behavioural relationships in order to develop an understanding of attackers and their objectives as well as evaluate gaps and limitations in cyber threat intelligence provision. You'll also build knowledge on:

Through The Supplier’s Lecture | Lab | Review methodology you’ll get access to courseware learn from certified instructors and train in a distraction-free environment.

The exams will not be delivered onsite at the Training centre - you will receive an exam voucher as part of the course. Your exam will have to be booked after course completion off-site.

Audience

This course is ideal for cyber security professionals with 2-3 years’ experience within CTI who wish to manage cyber threat intelligence operations. This includes the following roles:

","

Before attending this course you should have experience in:

You should also have knowledge of business practices within your organisation your organisations risk management processes and any IT user security policies and ideally have one of the following certifications or equivalent:

","","" "cdpo","Certified Data Protection Officer -

Become a Certified Data Protection Officer in just 3 days with accelerated data protection officer training from The Supplier. Get your Data Protection Officer qualification at twice the speed and sit the official PECB Certified Data Protection Officer Exam onsite at the The Supplier Centre.

On this Certified Data Protection Officer course you'll cover the fundamentals of GDPR. You'll then learn how to build maintain and operate a compliance programme to fulfill the requirements of GDPR and other regulatory requirements for your organisation. You'll also examine the tasks performed by a Data Protection Officer and other members of the organisation to ensure compliance in an efficient manner over time.

Learn how to adapt your organisation to become GDPR-compliant and implement privacy policies procedures working instructions consent forms and data protection impact assessments.

Key learning objectives for your accelerated Data Protection Officer training are:

With this accelerated data protection officer training you'll prepare for and sit the official PECB Certified Data Protection Officer Exam. This is covered by your Certification Guarantee.

As of March 2023 PECB have partnered with Credly to offer you the chance of earning a digital badge upon completing your certification.

This accelerated Data Protection Officer course is ideal for:

GDPR applies to organisations within the EU as well as all those that handle personal data of EU citizens. If your organisation's core activities require regular and systematic monitoring of individuals on a large scale - like tracking an individual's behaviour on the internet - you must appoint a Data Protection Officer.

Cut the risk of prosecution in the event of a data breach - breaches of EU regulations by multinationals could result in fines of £20 million or 4% of worldwide gross turnover.

","

Before attending this accelerated Data Protection Officer course you should understand GDPR basics and have knowledge of current legal requirements for data protection.

Certification requirements

Although there are no prerequisites for you to sit the course in order to achieve the Certified DPO credential you'll need to meet a range of requirements. Upon successful completion of the exam you can apply for the credentials outlined in the table below. These are based on professional experience information security and/or data protection experience as well as the signing of the PECB Code of Ethics.

You can gain the PECB Provisional Data Protection Officer credential with no experience. However to gain the PECB Certified Data Protection Officer credential you must have the necessary experience detailed in the table below.

Credential

Exam

Professional Experience

Data Protection project Experience

Other Requirements

PECB Provisional DataProtection Officer

PECB Certified Data Protection Officer exam

None

None

Signing the PECB Code of Ethics

PECB Certified DataProtection Officer

PECB Certified Data Protection Officer exam

Five years of industry experience two of which must have been in Data Protection

Data Protection activities: a total of 300 hours

Signing the PECB Code of Ethics

","","

You'll become an expert across the following modules:

" "ceh","Certified Ethical Hacker | CEH v13 -

Learn to hack and achieve your CEH Certification in just five days with our accelerated EC-Council Certified Ethical Hacker course. This comprehensive course takes you through the real-life tools and techniques that cybercriminals use to hack organisations and shows you how to protect your business from these attack vectors.

You’ll learn the latest real-world commercial-grade hacking tools techniques and methodologies that hackers and information security professionals use to lawfully hack companies. This will help you protect your business from a wide range of threats including:

At the end of this course you will take the official CEH exam and become certified. At The Supplier we are proud to be an EC-Council Accredited Training Partner so you'll get access to official EC-Council courseware and exams. Whats more our Lecture | Lab | Review method will allow you to train at twice the speed of traditional training in a distraction-free environment.

As of March 2023 we provide delegates with the CEH Elite package as part of our standard offering. This includes:

Who should take this course?

This course is ideal for:

Please note that before attending this accelerated course you will be asked to sign an agreement stating that you will not use your ethical hacking knowledge for illegal or malicious attacks.

","

Before attending the EC-Council Ethical Hacking course you should have at least two years of IT work experience and be familiar with Windows and Linux/Unix operating systems.

It would also be useful to be certified in or have equivalent knowledge to CompTIA Network+ and CompTIA Security+.

To get the most out of this course we also recommend you have experience with:

Please note that you must be 18 years or older to attend this course. If you are 16 or 17 years old EC-Council will consider your eligibility for this course once you provide the written consent of a parent or legal guardian.

"," ","

This comprehensive course covers:

" "cencor","Certified Specialist - Enterprise Core -

The Cisco Certified Specialist - Enterprise Core certification is offered as 5 days in-classroom modules and a required 3 days self-study modules. Train with The Supplier and you'll cover all modules over a total of just 6 days including sitting Exam 350-401 ENCOR. Get certified with The Supplier at 33% faster than traditional training.

Get the skills and knowledge you need to implement core enterprise network technologies within your business on this accelerated Cisco Certified Specialist - Enterprise Core course.

In just 6 days you'll learn how to implement virtualisation network assurance and automation into your business. You'll also discover core enterprise network technologies like dual stack (IPv4 and IPv6) architecture.

During your accelerated course you'll study:

You'll get access to official courseware and learn from certified Cisco instructors as The Supplier is a Cisco Learning Partner. At the end of the course you'll sit exam 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies v1.0 and achieve the Cisco Certified Specialist - Enterprise Core certification.

Start your Cisco journey in a distraction-free environment and learn at twice the speed through The Supplier's Lecture | Lab | Review methodology.


Your next steps to CCNP or CCIE certifications


Once you have passed the 350-401 ENCOR exam you'll be ready to sit any of the following Cisco concentration exams:

Pass any of these exams and you'll achieve your CCNP Enterprise certification.

Or if you're aiming for the CCIE Enterprise Infrastructure and CCIE Enterprise Wireless certifications you'll just need to complete the appropriate lab:

","

Before attending this accelerated course you should have knowledge and skills in:

","","

Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0

Lab outline

" "cgeit","Certified in the Governance of Enterprise IT (CGEIT) -

This 3-day accelerated training course will provide you with skills needed to ensure that your IT systems meet the business's needs - through leadership and organisational structures and processes.

You'll learn faster and retain information better through our unique Lecture | Lab | Review technique. Our expert instructors will take you through the roles responsibilities and various focus areas of IT governance.

Do you have management advisory or assurance responsibilities relating to the governance of IT? If so the CGEIT is critical in helping you provide excellent IT governance.

Exclusive: Sit your CGEIT exam on this accelerated course

The Supplier is an ISACA Accredited Training Organisation (ATO). This means you'll have access to official ISACA courseware and will sit your CGEIT exam at the The Supplier Centre during your accelerated course. Don't pass the first time? Don't worry - you'll be covered by our Certification Guarantee.

The Supplier is a premier ISACA partner for EMEA and the US. No other partner in these regions trains more students.

","

Course and Exam Prerequisites

There are no prerequisites for attending the CGEIT course and sitting the exam. In fact this is a practice accepted and encouraged by ISACA. We do however recommend you have some knowledge / experience of IT Governance.

Achieving the CGEIT Certification

In order to become CGEIT certified you must meet the following requirments:

  1. Pass the CGEIT exam
  2. Adhere to the ISACA Code of Professional Ethics
  3. Agree to comply with the CGEIT Continuing Education Policy
  4. Provide evidence of appropriate IT governance work experience as (outlined below) defined by the CGEIT Job Practice

Required IT Governance Experience

You will need to prove a minimum of 5 years experience managing serving in an advisory or oversight role and/or otherwise supporting the governance of the IT-related contribution to an enterprise.

More specifically you will need a minimum of one year of experience relating to the definition establishment and management of a Framework for the Governance of IT. The type and extent of experience accepted is described in CGEIT domain 1 (check the curriculum tab).

You'll also need experience directly related to any two or more of the remaining CGEIT domains

There are no waivers or substitutions for CGEIT experience except if you're a full-time university instructor teaching IT governance related subjects at an accredited university. Where every two years of teaching experience can be substituted for every one year of IT governance experience.

","","" "cipm","CIPM - Certified Information Privacy Manager -

On this 2-day accelerated course you'll develop the skills to become a Certified Information Privacy Manager (CIPM) - the world's first and only privacy programme management certification.

Earning the CIPM demonstrates you have the knowledge to make a privacy programme work for your organisation - you'll be the first point of contact for all things data protection related. This certification also holds accreditation under ISO 17024:2012.

With the General Data Protection Regulation (GDPR) taking effect in 2018 it's imperative you have a knowledgeable Data Protection Officer (DPO) capable of monitoring compliance managing internal data protection activities training data staff and more. Achieving the CIPM validates this knowledge and guarantees a wealth of understanding of the GDPR.

On this course you'll be prepared for and sit the IAPP Certified Information Privacy Manager (CIPM) exam which is covered by your Certification Guarantee.

Audience

This course is ideal if you are in risk management privacy operations accountability audits and privacy analystics including those in the following roles:

Or save hundreds by combining both the CIPM and CIPP/E courses on the accelerated Certified Information Privacy Professional - Europe & Certified Information Privacy Manager course.

Residential or Online CIPM course

The Supplier offers both a classroom-based and Certified Information Privacy Manager online course including everything you need to get certified in record time:

Both are delivered through our tried and tested Lecture | Lab | Review methodology. In this day and age you get to choose the best one for your needs and get your certification faster than anywhere else.


Train fast with official IAPP CIPM training

You'll learn from certified IAPP instructors and study official courseware on your accelerated CIPM course. The Supplier is an official IAPP training partner.

","

There are no prerequisites for this course.

","

IAPP-certified instructors

The Supplier instructors are fully IAPP-certified and bring a wealth of real-world experience to enrich the course content with relevant and useful examples.

IAPP membership

Delegates training with The Supplier for the first time receive a 12-month membership with IAPP as part of their course package. Delegates whose membership has expired have to renew it separately for $275 through the IAPP website. Alternatively delegates can pay a Certification Maintenance fee (24 months) of $250; this preserves the certification but provides no membership privileges.

","

You'll become an expert across the following modules:

" "cippe","CIPP/E - Certified Information Privacy Professional - Europe -

On this accelerated 2-day CIPP/E course you'll be certified in the global gold standard for European Data Protection - known as the Information Privacy Professional/Europe (CIPP/E).

The CIPP/E programme (also known as the CIPP certification) developed by the International Association of Privacy Professionals (IAPP) will grow your understanding of pan-European and national data protection laws. This official CIPP/E training will teach you key data protection terminology and important concepts concerning the protection of personal data and trans-border data flows.

With the General Data Protection Regulation (GDPR) in effect as of May 2018 it's imperative you have a knowledgeable Data Protection Officer (DPO) capable of monitoring compliance managing internal data protection activities training data staff and more. Achieving the CIPP/E validates this knowledge and guarantees a wealth of understanding of GDPR.

This course is aimed at:

On this course you'll be prepared for and sit the IAPP Certified Privacy Professional - Europe (CIPP/E) exam which is covered by your Certification Guarantee.

This course is also ISO/IAS accredited with the certification holding accreditation under ISO 17024:2012.

Alternatively save hundreds by combining both the CIPP/E and CIPM courses on the accelerated Certified Information Privacy Professional - Europe & Certified Information Privacy Manager course.

Residential or Online CIPP course

The Supplier offers both a classroom-based and Certified Information Privacy Professional online course including everything you need to get certified in record time:

Both are delivered through our tried and tested Lecture | Lab | Review methodology. In this day and age you get to choose the best one for your needs and get your certification faster than anywhere else.


Train fast with official IAPP CIPP/E training

You'll learn from certified IAPP instructors and study official courseware on your accelerated CIPP/E course. The Supplier is an official IAPP training partner.

","

There are no prerequisites for this course.

","

IAPP-certified instructors

The Supplier instructors are fully IAPP-certified and bring a wealth of real-world experience to enrich the course content with relevant and useful examples.

IAPP membership

Delegates training with The Supplier for the first time receive a 12-month membership with IAPP as part of their course package. Delegates whose membership has expired have to renew it separately for $275 through the IAPP website. Alternatively delegates can pay a Certification Maintenance fee (24 months) of $250; this preserves the certification but provides no membership privileges.

","

You'll become an expert across the following modules:

" "cippecipm","CIPP/E and CIPM - Certified Information Privacy Professional & Certified Information Privacy Manager -

On this 4-day course you'll be certified in the global gold standard for European Data Protection - known as the Certified Information Privacy Professional/Europe (CIPP/E). Additionally you'll become a Certified Information Privacy Manager (CIPM) - the world's first and only privacy programme management certification.

The CIPP/E programme developed by the International Association of Privacy Professionals (IAPP) will grow your understanding of pan-European and national data protection laws. This official CIPP/E training will teach you key data protection terminology and important concepts concerning the protection of personal data and trans-border data flows.

Earning the CIPM demonstrates you have the knowledge to make a privacy programme work for your organisation - you'll be the first point of contact for all things data protection related. Both the CIPP/E and CIPM certifications are ISO/IAS accredited under 17024:2012.

With the General Data Protection Regulation (GDPR) in effect as of May 2018 it's imperative you have a knowledgeable Data Protection Officer (DPO) capable of monitoring compliance managing internal data protection activities training data staff and more. Achieving the CIPP/E and CIPM validates this knowledge and guarantees a wealth of understanding of GDPR.

Audience

The CIPM course is ideal if you are in risk management privacy operations accountability audits and privacy analystics including those in the following roles:

The CIPP/E course is ideal if you're in legal compliance information management data governance and human resources including those in the following roles:

On this course you'll be prepared for and sit the IAPP Certified Privacy Professional - Europe (CIPP/E) exam and the IAPP Certified Information Privacy Manager (CIPM) exam. These exams are covered by your Certification Guarantee.

Residential or Online CIPP/E and CIPM Combined course

The Supplier offers both a classroom-based and CIPP/E and CIPM Combined online course including everything you need to get certified in record time:

Both are delivered through our tried and tested Lecture | Lab | Review methodology. In this day and age you get to choose the best one for your needs and get your certification faster than anywhere else.


Train fast with official IAPP CIPP/E & CIPM training

You'll learn from certified IAPP instructors and study official courseware on your accelerated CIPP/E & CIPM course. The Supplier is an official IAPP training partner.

Please Note: This IAPP course is now digital. The course material will be made available to your IAPP account when you have confirmed your booking.

","

There are no prerequisites for this course.

","

IAPP-certified instructors

The Supplier instructors are fully IAPP-certified and bring a wealth of real-world experience to enrich the course content with relevant and useful examples.

IAPP membership

Delegates training with The Supplier for the first time receive a 12-month membership with IAPP as part of their course package. Delegates whose membership has expired have to renew it separately for $275 through the IAPP website. Alternatively delegates can pay a Certification Maintenance fee (24 months) of $250; this preserves the certification but provides no membership privileges.

","

You'll become an expert across the following modules:

" "cisa","Certified Information Systems Auditor (CISA) -

Achieve your CISA certification and sit your CISA exam in just 4 days on this accelerated course from The Supplier. Prove your auditing knowledge at an international level with the CISA (Certified Information Systems Auditor) globally recognised as the gold standard certification for IS audit control assurance and security professionals.

On this accelerated 4-day CISA course you’ll get the auditing knowledge and skills you need to identify vulnerabilities report on compliance and introduce controls within an enterprise.

As The Supplier are ISACA Accredited Training Organisation (ATO) you'll get access to official courseware exams and learn from certified instructors. You'll be immersed in this course through The Supplier’s unique Lecture | Lab | Review  methodology and train in a distraction-free environment.You’ll also go beyond the official curriculum as you gain the knowledge needed to pass your CISA exam.

This accelerated CISA training is ideal for you if you work in IT systems auditing consultancy or management - particularly if you're in or aspiring to a senior managerial position.

Residential or Online CISA course

The Supplier offers both a classroom-based and CISA online course including everything you need to get certified in record time:

In this day and age you get to choose the best one for your needs and get your certification faster than anywhere else.

Exclusive: Sit your CISA exam on this accelerated course

The Supplier is an ISACA Accredited Training Organisation (ATO). This means you'll have access to official ISACA courseware and will sit your CISA exam during your accelerated course. If you don’t pass your CISA exam first time don't worry you'll be covered by your Certification Guarantee.

The International Accreditation Service (IAS) has accredited the CISA certification program under ISO/IEC 17024:2012 General Requirements for Bodies Operating Certification Systems of Persons.

Audience

The CISA is essential if you're dealing with controlling monitoring and assessing your business' information technology and business systems. This includes:

The Supplier is a premier ISACA partner for EMEA and the US. No other partner in these regions trains more students .

","

Before attending this accelerated course you should have a minimum 5 years' exposure in the field of Information Systems Auditing. It would also be ideal if you have had experience in the CISA Job Practice Areas.

Submitting an Application for CISA Certification

The CISA certification is designed to recognise information systems (IS) audit control and security professionals. You must be able to submit evidence of a minimum of five years of professional information systems auditing control or security work experience.

Experience substitutions

The following can be substituted for a maximum of three of the five-year work experience requirement:

Experience Exception

If you are a full-time university instructor in a related field (e.g. computer science accounting information systems auditing) you can substitute 2 years of experience in this role for 1 year of the experience requirement.

","","" "cism","CISM (Certified Information Security Manager) -

This accelerated CISM certification course is designed to get you a Certified Information Security Manager qualification much faster than traditional courses. Our CISM training teaches you how to manage design oversee and assess enterprise information security in just 4 days.

The CISM certification proves your knowledge of information security programmes and their role within business goals and objectives. Through The Supplier's unique Lecture | Lab | Review method you'll go through the four ISACA CISM domains:

ISACA Accredited Training Organisation (ATO)

The Supplier is an ISACA Accredited Training Organisation (ATO). This means you'll get access to official ISACA courseware and will sit your CISM exam during your accelerated course.

The Supplier is a premier ISACA partner for EMEA and the US. No other partner in these regions trains more students.

Residential or Online CISM course

The Supplier offers both a classroom-based and CISM online course including everything you need to get certified in record time:

In this day and age you get to choose the best one for your needs and get your certification faster than anywhere else.

Audience

If you're a network achitect information security manager or have information security management responsibilities this accelerated CISM course is ideal for you.

","

CISM requirements

There are no formal prerequisites for attending the CISM course and sitting the exam. In fact this is a practice accepted and encouraged by ISACA.

Achieving the CISM Certification

In order to become CISM certified you must meet the following requirements:

  1. Pass the CISM exam
  2. Adhere to ISACA's Code of Professional Ethics
  3. Agree to comply with the Continuing Education Policy
  4. Accumulate enough work experience in the field of information security.
  5. Submit an Application for CISM Certification within 5 years of passing the exam - see below

Submitting an Application for CISM Certification

The CISM certification is built for information security professionals managers and other assurance providers. In order to be eligible you must be able to submit verified evidence of a minimum of five years of information security work experience with a minimum of three years of information security management work experience in three or more of the job practise analysis areas. The work experience must be gained within the 10-year period preceding the application date for certification or within 5 years from the date of originally passing the exam.

CISM experience requirements substitution

The following security-related certifications and information systems management experience can be used to satisfy the indicated amount of information security work experience.

Two Years:

One Year:

The experience substitutions will not satisfy any portion of the 3-year information security management work experience requirement.

Experience Exceptions

Two years as a full-time university instructor teaching the management of information security can be substituted for every 1 year of information security experience.

","

Professional certification gives you and your organisation a competitive advantage in the marketplace. Although certification may not be mandatory for you at this time a growing number of organisations are requiring or recommending that employees become certified. To help ensure success in the global marketplace it is vital to select a certification program based on universally accepted information security management practices. CISM delivers such a program.

Benefits of CISM Certification

","

You'll become an expert across the four CISM domains:

" "cissp","CISSP Course - Certified Information Systems Security Professional -

Become CISSP-certified in just six days with this accelerated course!

The ISC2 Certified Information Systems Security Professional also known as CISSP is the globally recognised gold-standard IT security certification for information security professionals. With The Supplier you can achieve it at twice the speed.

Accelerated CISSP training

Developed by ISC2 the world’s leading cyber-security membership association this international information systems security certification is key for professionals aiming for senior roles in the field. The Supplier will help you develop the expert knowledge and skills you need to implement and manage an enterprise security programme.

On this accelerated course you’ll study the eight domains of the CISSP Common Body of Knowledge (CBK):

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

Residential or Online CISSP course

The Supplier offers both a classroom-based and CISSP online course including everything you need to get certified in record time:

Both are delivered through our tried and tested Lecture | Lab | Review methodology. In this day and age you get to choose the best one for your needs and get your certification faster than anywhere else.

Audience

This training is ideal for those involved in creating a secure cyber world: security consultants analysts security managers auditors and architects. The CISSP certification is also highly desirable for ambitious professionals aiming to achieve Chief Information Security Officer (CISO) roles.

Official CISSP course

The Supplier is an Authorised Provider of ISC2 training. On this accelerated course you’ll get access to study guides and resources only available to authorised providers:

","

To achieve this certification you must have:

If you don’t meet the work experience requirement you can get a one-year experience waiver if you have:

Alternatively you may choose to take the CISSP course and sit the exam without the required experience. If you pass the exam you will become an ISC2 Associate and have six years to earn the required work experience. Upon gaining the experience you will receive your full CISSP certification.

","

ISC2 Membership Benefits

ISC2 is an international non-profit membership association built for security professionals. When you certify you’ll become a member of ISC2. As a member you’ll join a global network of 125000+ and get access to an array of exclusive resources tools and peer-to-peer networking opportunities conference and event discounts.

Become a member by earning one of ISC2’s gold standard certifications. Contact us to find out more.

The Supplier’s Official CISSP Training Benefits

","

You'll become an expert across the 8 CISSP domains:

" "cloudeplus","Cloud Essentials+ -

On this accelerated CompTIA Cloud Essentials+ course you'll get the knowledge and skills you need to make the right decisions about cloud technology and learn how to increase efficiency cut costs and minimise security risks.

In just 2 days you'll learn how to evaluate cloud business use cases financial impacts technologies and deployment models. You'll also learn how to:

The Supplier is a CompTIA Platinum Partner; you'll get access to official courseware and learn from certified CompTIA instructors. At the end of your course you'll sit the CLO-002 exam and achieve the CompTIA Cloud Essentials+ certification.

This course is ideal if you're working in IT or with a cloud service provider as you're not required to have a technical or IT background.

Through The Supplier’s Lecture | Lab | Review methodology you’ll learn twice as fast as traditional training. Learn in a distraction-free environment and achieve your CompTIA Cloud Essentials+ certification in just 2 days. Why wait?

","

While there are no official prerequisites youll benefit from having 6-12 months work experience as a business analyst in an IT environment with some exposure to cloud technologies.

","","" "cnd","Certified Network Defender (CNDv3) -

On this accelerated EC-Council Certified Network Defender v3 course you will develop your understanding of network security technologies and operations.

In just 5 days you’ll learn about the tools technologies and techniques needed to defend and strengthen your network against a new age of hackers. You’ll also learn valuable skills like how to:

At the end of this accelerated course you’ll sit the EC-Council Certified Network Defender (CND) 312-38 exam and achieve your EC-Council Certified Network Defender v3 certification.

As an Accredited Training Partner (ATP) you’ll get access to official courseware exams and be trained by certified instructors. The Supplier’s Lecture | Lab | Review methodology means you’ll achieve your certification in record time and be back in the office.

Audience


The CND v3 is ideal for all cybersecurity roles and anyone looking to build a career in cybersecurity especially those working in one of the following roles:

","

There are currently no prerequisites for this course but having a basic understanding of Network Security will help.

"," ","" "cpia","Practitioner Intrusion Analyst | CPIA -

On this accelerated CREST Practitioner Intrusion Analyst course you’ll learn the basics of the three primary areas of cyber-attack analysis: network intrusion host intrusion and malware reverse engineering.

In just 4 days you’ll learn the basics of malware analysis by understanding the key tools and techniques malware analysts use to examine malicious programs you’ll also learn:

At the end of this accelerated course you’ll sit the CREST Practitioner Intrusion Analyst exam and achieve your certification. As a CREST Approved Training Partner you’ll get access to official courseware exams and be trained by certified instructors.

The Supplier's Lecture | Lab | Review methodology means you’ll get certified at twice the speed of traditional training in a distraction-free environment.

Audience


This course is ideal for you if you're occupying one of the following roles and want to expand your knowledge on Digital Forensics:

This is also an ideal starting point for those hoping to start a career in Intrusion Analysis or Digital Forensics as this course sets a new security baseline.

Next step: CREST Registered Intrusion Analyst


The CPIA certification is a prerequisite for the CREST Registered Intrusion Analyst course.

The Supplier's corporate training processes policies and procedures have been successfully assessed against the CREST criteria for the Approved Training Provider discipline. The Supplier are currently working to get course content recognised.

","

To attend this course you should have a good understanding of the technical aspects of IT with at least one year's experience in network or server administration.

","","

Module One – Soft Skills and Incident Handling

Module Two – Core Technical Skills

Module Three – Background Information Gathering & Open Source

Module Four – Network Intrusion Analysis

Module Five – Analysing Host Intrusions

Module Six – Malware Analysis/Reverse Engineering

" "cpsa","Practitioner Security Analyst | CPSA -

On this accelerated 4-day CREST Practitioner Security Analyst course you'll gain the core knowledge and skills needed to assess operating systems and common network services - 20% faster than traditional training.

The CPSA is the first certification in CREST's Penetration Testing career pathway and through it you'll be immersed in the fundamentals of penetration testing.

Your expert instructor will teach you to locate security vulnerabilities by performing basic infrastructure and web application testing and interpreting the results.

On this CREST CPSA course you'll cover a range of exciting topics including:

This accelerated CPSA training prepares you for the CREST Practitioner Security Analyst exam. Don't pass the first time? Don't worry - you'll be covered by our Certification Guarantee.

This course is ideal for you if you're a systems administrator incident handler or IT manager wishing to expand your knowledge on Pen testing and Digital Forensics.

The Supplier's corporate training processes policies and procedures have been successfully assessed against the CREST criteria for the Approved Training Provider discipline. The Supplier are currently working to get course content recognised.

","

To attend this course you should have a good understanding of the technical aspects of IT with at least one year's experience in network or server administration.

","","

Module 1 – Soft Skills and Assessment Management

Module 2 - Core Technical Skills

Module 3 - Background Information Gathering and Open Source Intelligence

Module 4 – Networking

Module 5 – Microsoft Windows Security Assessments

Module 6 – Unix Security Assessments

Module 7 – Web Technologies

Module 8 – Web Testing Methodologies

Module 9 – Web Testing techniques

" "cptia","Practitioner Threat Intelligence Analyst | CPTIA -

On this accelerated CREST Practitioner Threat Intelligence Analyst (CPTIA) course you'll learn about the core concepts associated with cyber threat intelligence functions and acquire the necessary skills and knowledge required to operate effectively in support of a cyber threat analyst within a security operations centre (SOC).

In just 4 days you’ll build knowledge on the different classes and stages of cyber-attacks and the different types of cyber attackers their capabilities and objectives. You'll also learn about:

At the end of this course you’ll sit the CREST Practitioner Threat Intelligence Analyst exam and achieve your CREST CPTIA certification. Through The Supplier’s Lecture | Lab | Review methodology you’ll get access to courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal if you are an entry-level cyber security professional interested in utilising threat intelligence to bolster your understanding of the cyber threat landscape including the following job roles:

","

Before attending this accelerated course you would ideally have one or both of the following certifications:

You should also have knowledge in:

","","" "crisc","CRISC (Certified in Risk and Information Systems Control) -

This 3-day accelerated CRISC course will improve your understanding of IT risk management and its impact on your business. Our expert instructors will take you through how to design implement monitor and maintain risk-based efficient and effective information systems controls.

You'll be immersed in the curriculum training up to 10 hours a day through our unique Lecture | Lab | Review technique. By the end of the course you'll gain knowledge of enterprise risk and know various information systems controls to mitigate this risk.

You'll also learn:

The Supplier is an ISACA Accredited Training Organisation (ATO). This means you'll have access to official ISACA courseware and will sit your CRISC exam during your accelerated course. Don't pass the first time? Don't worry - you'll be covered by our Certification Guarantee.

The Supplier is a premier ISACA partner for EMEA and the US. No other partner in these regions trains more students.

Residential or Online CRISC course

The Supplier offers both a classroom-based and CRISC online course including everything you need to get certified in record time:

In this day and age you get to choose the best one for your needs and get your certification faster than anywhere else.

","

This CRISC training course is designed for IT and business professionals who are engaged at an operational or management level to mitigate risk. It is therefore an advantage to have knowledge of business and technology risk management and the implementation of information systems controls. You should also be familiar with general IT and business terminology.

In order to get your CRISC certification you must:

There are no experience waivers or substitutions allowed.

You may take the exam prior to meeting the requirements but your CRISC designation is only awarded when all requirements are met. Experience must have been gained within the 10-year period preceding the application date for certification or within five years from the date of initially passing the examination.

Retaking and passing the examination will be required if the application for certification is not submitted within five years from the passing date of the examination. All experience must be verified independently with employers.

Once a CRISC candidate has passed the CRISC certification exam and has met the work experience requirements the final step is to complete and submit the CRISC Application for Certification.

","","

On this three-day course you'll become an expert across the four domains of CRISC:

" "crt","Registered Penetration Tester | CRT -

On this accelerated 4-day CREST Registered Penetration Tester (CRT) course you'll advance your skills to penetrate computer systems or networks effectively and professionally—using realistic threat techniques—to evaluate their security and detect potential vulnerabilities and protect your business from attacks.

In just 4 days you'll learn to analyse tools and frameworks that are most readily available to hackers seeking to attack an organisation as well as build knowledge on:

Through The Supplier's Lecture | Lab | Review methodology you'll get access to courseware learn from certified instructors and train in a distraction-free environment.

This course and its exam are not available to be taken onsite. CREST (CRT) examinations delivered in the UK are held throughout the year and in various locations. Please check the Exam Track for further information.

Audience

This course is ideal if you are an intermediate-level cyber security professional interested in safely consolidating and practicing your skills using ethical hacking tools and advance the necessary techniques to fulfil security testing responsibilities. These roles include:

","

Before attending this course you should have achieved the CREST Practitioner Security Analyst | CPSA certification. You should also have experience in:

It would also be ideal if you had Ethical Hacking Associate training.

Please note:

","","

Module 1 – Core Technical Skills

Module 2 – Background Information Gathering & Open Source

Module 3 – Networking Equipment

Module 4 – Microsoft Windows Security Assessment

Module 5 – Unix Security Assessment

Module 6 – Web Technologies

Module 7 – Web Testing Techniques

Module 8 – Databases

" "csc","Cyber Secure Coder (CSC) -

On this accelerated 3-day Cyber Secure Coder (CSC) course you'll learn how to identify and remedy software security breaches and vulnerabilities - 40% faster than traditional training. 

Become a Cyber Secure Coder and build secure architecture for your software helping your business grow and keep internal data protected.

You'll be immersed in the curriculum through The Supplier's unique Lecture | Lab | Review technique which allows you learn and retain information faster.

Your expert instructor will introduce tools and tactics used to manage cyber security risks teaching you to understand and integrate technologies from a range of different vendors and how to combat the security risks involved. You'll gain a new specialised set of skills working with a variety of software Python HTML and more.

On this all-inclusive accelerated course you'll learn how to:

With these skills you'll be a valuable asset - enabling your business to keep up with demands for connectivity and application development by ensuring software and applications are safe from increasingly severe cyber threats.

During this course you'll not only build on your current skill set but also prepare for and sit the CertNexus Cyber Secure Coder exam (CSC-210) covered by your Certification Guarantee.

This course is designed for software developers testers and architects. However feel free to enrol if you have interest in furthering your learning and developing more skills in these areas.

","

To attend this course The Supplier recommends you have experience developing managing and maintaining software using Python HTML and JavaScript. If you do not have that experience you should contact us to discuss.

","","

Lesson 1: Identifying the Need for Security in Your Software Projects

Lesson 2: Handling Vulnerabilities

Lesson 3: Designing for Security

Lesson 4: Developing Secure Code

Lesson 5: Implementing Common Protections

Lesson 6: Testing Software Security

Lesson 7: Maintaining Security in Deployed Software

" "csise","Implementing and Configuring Cisco Identity Services Engine (SISE) -

In just 4 days This Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco Identity Services Engine (ISE) v3.x an identity and access control policy platform that simplifies the delivery of consistent highly secure access control across wired wireless and VPN connections.

You'll master the skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement profiling services web authentication and guest access services BYOD endpoint compliance services and Terminal Access Controller Access Control Server (TACACS+) device administration.

Through expert instruction and hands-on practice you will learn how to use Cisco ISE to gain visibility into what is happening in your network streamline security policy management and contribute to operational efficiency.

After this course you will be able to use ISE to:

If you're a network security engineer ISE administrator wireless network security engineer or Cisco integrators and partners this course is ideal for you.

Immerse yourself with The Supplier's unique Lecture | Lab | Review technique and gain all the knowledge and skills you need to implement and use Cisco ISE. You'll spend less time out the office and bring the benefits of your new skills to the business faster.

You'll get access to official courseware and learn from certified Cisco instructors as The Supplier is a Cisco Learning Partner.

You can also test your skills whenever you want with 24/7 access to labs.

At the end of the course you'll sit Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam which leads to CCNP Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications.

","

Before attending this accelerated course we recommend you are familiar with:

Certifications that may help you meet these prerequisites include:

This course prepares you for the certification exam Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) which earns you Cisco Certified Specialist - Security Identity Management Implementation certification and will satisfy the concentration exam requirement for the new CCNP Security certification.

","","

Course Outline

Lab Outline

" "csslp","CSSLP - Certified Secure Software Lifecycle Professional -

Some 80% of all security breaches are application-related equating to more than 226 million records being disclosed and fines reaching astronomical amounts.

The Supplier and ISC2 provide a solution that establishes industry standards and instils best practices in developing managing and maintaining software security.

This accelerated CSSLP (Certified Secure Software Lifecycle Professional) course provides IT professionals with a fully-immersed zero-distraction all-inclusive CSSLP training experience. Our CSSLP course encompasses all domains of the ISC2 CSSLP CBK all meals and accommodation.

Who is this course suitable for?

Everybody with at least 4 years of experience in the SLC needs CSSLP certification including:

On this course you'll prepare for and sit the CSSLP exam covered by your Certification Guarantee.

The CSSLP certification is governed by the International Information Systems Security Certifications Consortium ISC2.

The key advantage of authorised ISC2 Institute Training is fundamental: The institute's goal is to provide an extensive overview of the Common Body of Knowledge (CBK) the compendium of practices and standards compiled and continually updated by ISC2 and used as the basis for the CSSLP exam.

Highest Performing Affiliate of the Year

The Supplier has been named as “Highest Performing Affiliate of the Year - EMEA” by ISC2. The major security association helps companies recognise organisations and individuals who are knowledgeable in security through the CISSP CSSLP and SSCP training.

The Supplier is an Authorized Provider of ISC2 training. W. Hord Tipton Executive Director of ISC2 stated: “This award represents The Supplier as the top performer for ISC2...for the EMEA region.”

","

Before attending this accelerated course you should have one of the following:

","

ISC2 Membership Benefits

ISC2 is an international non-profit membership association built for security professionals. When you certify you’ll become a member of ISC2. As a member you’ll join a global network of 125000+ and get access to an array of exclusive resources tools and peer-to-peer networking opportunities conference and event discounts.

Become a member by earning one of ISC2’s gold standard certifications. Contact us to find out more.

As an authorised ISC2 partner The Supplier:

","" "ctdata+","Data+ -

On this accelerated CompTIA Data+ course you’ll build knowledge on collecting analysing and reporting on data to drive your priorities and strategies with informed business decision-making. You’ll also be able to recognise the true value of their data to make better data-driven and informed decisions.

In just 5 days you’ll gain an understanding of the essential concepts of data schemas and dimensions as well as the differences between common data structures and file formats. You’ll also learn:

At the end of this course you’ll sit the CompTIA DA0-001 exam and achieve the CompTIA Data+ certification. As an Authorised Partner and through The Supplier’s Lecture | Lab | Review methodology you’ll get access to official courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal if you are responsible for developing and promoting data-driven business decision-making including the following job roles:

","

There are no formal prerequisites for this accelerated course however CompTIA recommends you have:

","","" "ctech+","CompTIA Tech+ - ","","","" "cysa","Cybersecurity Analyst (CySA+) -

Your 4-day accelerated Cybersecurity Analyst (CySA+) certification course teaches you the knowledge and skills required to perform a host of tasks related to securing and protecting applications and systems within an organisation.

Our experienced instructors will teach you through our unique Lecture | Lab | Review approach to configure threat detection tools perform data analysis and interpret the results to identify vulnerabilities threats and risks to an organisation.

Cyber security analytics vastly improves your threat visibility by focusing on network behaviour including an organisations interior network. These threats are better detected through analytics.

On this accelerated CySA+ course you will focus on the following four cyber security domains:

This course is aimed at cyber security professionals with at least two to three years of on-the-job experience.

The training incorporates hands-on practical work in the form of virtual labs and software tools. This approach will accelerate your learning and will help retain your new found knowledge.

The CompTIA Cybersecurity Analyst (CySA+) exam is on site and includes a performance-based assessment.

","

Prior to attending the CompTIA Cybersecurity Analyst (CySA+) you are expected to have:

","","" "dbf","IT Specialist - Databases -

On this accelerated 3-day Certiport IT Specialist Databases course you’ll learn a broad range of entry-level IT skills in software development database administration networking and security mobility and device management and coding.

At the end of this course you'll sit the Certiport IT Specialist Databases exam and achieve your certification. Through The Supplier’s Lecture | Lab | Review methodology you’ll get access to courseware and achieve your certification at twice the speed of traditional training.

Audience

Candidates for this exam are seeking to prove introductory knowledge of how to design create and query relational databases such as MySQL Microsoft SQL Server or Oracle.

Candidates should have at least 150 hours of instruction or hands-on experience with database design and object management data retrieval and manipulation and related troubleshooting. Candidates should be able to write ANSI SQL statements and troubleshoot syntax errors and runtime errors.

The syntax in the exam is provided in ANSI SQL.

","

To be successful on the test the candidate is also expected to have the following prerequisite knowledge and skills:

","","" "dev","IT Specialist - Software Development -

On this accelerated 5-day Certiport IT Specialist - Software Development course youll learn a broad range of entry-level IT skills in software development.

Audience

The Information Technology Specialist program is a way for individuals to validate foundational IT skills sought after by employers. The IT Specialist program is aimed at candidates who are considering or just beginning a path to a career in information technology.

","

Candidates for this exam are seeking to prove core software development skills including object-oriented programming web applications and databases.

Candidates are expected to have some experience with C# and ANSI SQL.

Candidates should have at least 150 hours of instruction or hands-on experience with concepts related to programming software development object-oriented programming web applications and databases.

To be successful on the test the candidate is also expected to have the following perquisite knowledge and skills:

","","

The course will provide students with an understanding of the following:

Core Programming Concepts

Software Development Principles

Object-Oriented Programming

Databases

" "ecicsscada","ICS/SCADA Cyber Security -

On this accelerated EC-Council ICS/SCADA Cybersecurity course you’ll learn the fundamentals of security and the concepts and best practices behind defending architectures from attacks. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.

In just 4 days you’ll get an insight into the mind of a hacker and learn the techniques to defend your business from the different types of attacks that are common against the oil and gas IT corporate and control network. as well as learn the varying approaches and methods to analyse risks owned by network infrastructure in IT and corporate spaces. You’ll also build knowledge on:

At the end of this course you’ll sit the EC-Council ICS/SCADA Cyber Security exam and achieve your certification. As an Accredited Training Partner for EC-Council and through The Supplier’s Lecture | Lab | Review methodology you’ll get access to official courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal if you are responsible for managing or directing your business' IT infrastructure and for establishing and maintaining information security policies practices and procedures including the following job roles:

","

Before attending this accelerated course you should have knowledge in:

","","

Module 1: Introduction to ICS/SCADA Network Defense

Module 2: TCP/IP 101

Module 3: Introduction to Hacking

Module 4: Vulnerability Management

Module 5: Standards and Regulations for Cybersecurity

Module 6: Securing the ICS network

Module 7: Bridging the Air Gap

Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

" "ecih","Certified Incident Handler (ECIH) v3 -

Get EC-Council Certified Incident Handler (ECIH) v3 certified in just three days and get the skills you need to be an expert in incident management handling and response.

100% compliant with the NICE 2.0 & CREST Frameworks the ECIH certification is internationally recognised - giving you valuable credibility in incident management. You’ll learn how to identify control and recover from cyber security attacks on this hands-on accelerated course.

Get 50% more training time than traditional 9-5pm courses. Using The Supplier's unique Lecture | Lab | Review technique you'll spend more time practicing techniques to detect and respond to current cyber security threats.

On this accelerated ECIH certification course you’ll learn:

You’ll sit your ECIH exam during the course just steps away from the classroom. As an official EC-Council partner you’ll learn from an EC-Council ECIH certified instructor and benefit from official EC-Council courseware and labs.

This accelerated ECIH course is perfect if you’re an incident handler risk assessment administrator pen tester cyber forensic investigator vunerability assessment auditor system administrator system engineer firewall administrator or network manager.

ECIH v3 was created using job task analysis related to incident handling and incident first responder roles and meets industry-wide incident handling standards.

9x Accredited Training Centre of the Year

The Supplier has again won the EC-Council Accredited Training Centre of the Year Award from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

","

You should have the following experience before attending this course:

","","

Module 01: Introduction to Incident Handling and Response

Module 02: Incident Handling and Response Process

Module 03: First Response

Module 04: Handling and Responding to Malware Incidents

Module 05: Handling and Responding to Email Security Incidents

Module 06: Handling and Responding to Network Security Incidents

Module 07: Handling and Responding to Web Application Security Incidents

Module 08: Handling and Responding to Cloud Security Incidents

Module 09: Handling and Responding to Insider Threats

Module 10: Handling and Responding to Endpoint Security Incidents

" "gicsp","The Supplier's training for GIAC's Global Industrial Cyber Security Professional | GICSP -

Secure your IT systems on the GIAC Global Industrial Cyber Security Professional (GICSP) course. This five-day course teaches you how to combine IT cyber security and engineering best practices to secure your Industrial Control Systems (ICS).

You'll learn about:

You'll also take part in a series of practical exercises to consolidate your knowledge of using both wired and wireless networks. By the end of this course you'll know how to harden an ICS using end-point protection securing removable media or updating systems.

The Suppliers course is intended for professionals moving into or gaining responsibilities for the security of Operational Technology (OT) or Industrial Control Systems (ICS) and covers all published syllabus areas required to tackle the GICSP certification. The course offers broader real-world training rather than simply aiming to allow students to tackle the GICSP. However students will with some subsequent guided self-study have all the needed skills to gain the certification.

Please note: The Supplier does not offer the GICSP exam and the exam fee is not included in the course price.

","

In order to be successful on this course you'll need a good understanding of basic computer networking and security principles. You'll also need to be familiar with networking protocols and ideally have a CompTIA Network+ certification.

","

Please Note

","

Each section of the course has been mapped to the relevant industry standards and frameworks: NIST Cyber Security Framework (CSF) ISA/IEC 62443 ISO 2700x COBIT 5 NIST Specialist Publications (SP) CIS (Centre for Internet Security) Critical Security Controls (CSC).

Introduction

Governance & Risk Management

Security Essentials

System Security

ICS Architecture

Hardening ICS

Access Controls

Change Management

Incident management

Business Continuity

System Auditing

" "iappaigp"," Artificial Intelligence Governance Professional Body of Knowledge (AIGP) -

The speed of adoption and innovation in AI products and services demands that this massively powerful technology with huge societal impacts is governed and implemented safely. There is a rapidly growing need for qualified and well-trained professionals to ensure AI systems are developed integrated and deployed in line with emerging AI laws and policies and in a way we can trust.

This accelerated IAPP Artificial Intelligence Governance Professional Body of Knowledge (AIGP) certification provides training for the emerging AI governance profession. An AIGP trained and certified professional will know how to implement and effectively communicate across teams the emerging best practices and rules for responsible management of the AI ecosystem. We are privileged to grow a community of credentialed AI governance professionals through which resources and expanding knowledge can be brought together in one place.

The main purpose of the AIGP body of knowledge is to document the knowledge and skills that will be assessed on the AIGP certification exam. The domains of the BoK capture the activities that an AI governance professional should undertake to guide AI’s implementation in a manner that mitigates risk and ensures safety and trust.

In just 3 days you’ll learn to:

 

At the end of this course you’ll sit the IAPP exam and achieve your IAPP Artificial Intelligence Governance Professional Body of Knowledge (AIGP) certification. Through The Supplier’s Lecture | Lab | Review methodology you’ll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

 

Audience

This course is ideal for:

","

There are no prerequisites for this accelerated course.

","","

Module 1: Understanding the Foundations of Artificial Intelligence

  • Defines AI and machine learning provides an overview of the different types of AI systems and their use cases and positions AI models in the broader socio-cultural context.

 

Module 2: Understanding AI Impacts and Responsible AI Principles

  • Identifies the risks that ungoverned AI systems can have on humans and society and describes the characteristics and principles that are essential to trustworthy and ethical AI.

 

Module 3: Understanding How Current Laws Apply to AI Systems

  • Surveys the current laws that govern the use of artificial intelligence.

 

Module 4: Understanding the Existing and Emerging AI Laws and Standards

  • Outlines the global AI-specific laws (like the EU AI Act and Canada’s Bill C-27) and the major frameworks that show how AI systems can be responsibly governed.

 

Module 5: Understanding the AI Development Life Cycle

  • Broadly outlines the context in which AI risks are managed.

 

Module 6: Implementing Responsible AI Governance and Risk Management

  • Explains how the major AI stakeholders collaborate in a layered approach to manage AI risks while fulfilling the potential benefits AI systems have for society.

 

Module 7: Contemplating Ongoing Issues and Concerns

  • Presents some of the debated issues around AI governance.
" "iappcipt","CIPT - Certified Information Privacy Technologist -

On this accelerated IAPP Certified Information Privacy Technologist (CIPT) accelerated course you'll validate your knowledge of global concepts of privacy and data protection law. You'll also dive into the specific knowledge of building and managing privacy requirements and controls in technology. 

This 2-day IAPP course is the first global privacy certification for IT practitioners. You'll develop your knowledge of privacy-related issues and practices as you cover: 

  • Consumer privacy expectations and best practices while proactively addressing privacy issues with the Internet of Things
  • Communication and collaboration on privacy issues with management development marketing and legal departments
  • Data classification and emerging technology such as cloud computing facial recognition and surveillance
  • Privacy practices for data security and control such as minimization limited access and encryption
  • The implementation of technology to design data privacy into products and
  • The protection of business information by applying critical privacy concepts and practices that impact technology

The CIPT credential demonstrates you have the knowledge to build your organisation's privacy structures from the ground up.

The Supplier are Official IAPP partners so you'll get access to IAPP certified instructors and the latest courseware. At the end of the course you'll sit the IAPP Certified Information Privacy Technologist (CIPT) exam covered by your Certification Guarantee.

Audience

This course is the perfect starting point for IT practitioners looking to develop an understanding of privacy requirements in technology. Those involved in development engineering security deployment or auditing of IT products and services are ideal candidates for this course. Including the following job roles:

  • Head of Product Development
  • Head of Administration
  • DPO
  • CISCO

Train fast with official IAPP CIPT training

You'll learn from certified IAPP instructors and study official courseware on your accelerated CIPT course. The Supplier is an official IAPP training partner.

","

This course is ideal for those with existing experience in IT roles in security software engineering data management and auditing.

","

IAPP-certified instructors

The Supplier instructors are fully IAPP-certified and bring a wealth of real-world experience to enrich the course content with relevant and useful examples.

IAPP membership

Delegates training with The Supplier for the first time receive a 12-month membership with IAPP as part of their course package. Delegates whose membership has expired have to renew it separately for $275 through the IAPP website. Alternatively delegates can pay a Certification Maintenance fee (24 months) of $250; this preserves the certification but provides no membership privileges.

Plus as The Supplier is an IAPP Official Partner youll also get access to up-to-date courseware and reading material.

","
  • Module 1: Foundational principles of privacy in technology
  • Module 2: The role of the technology professional in privacy
  • Module 3: Privacy threats and violations
  • Module 4: Technical measures and privacy-enhancing technologies
  • Module 5: Privacy engineering
  • Module 6: Privacy-by-design methodology
  • Module 7: Technology challenges for privacy
" "isacaccoa","ISACA Certified Cybersecurity Operations Analyst (CCOA) - ","","","" "isc2cgrc","CGRC - Certified in Governance Risk and Compliance -

The Certified in Governance Risk and Compliance (CGRC) is an information security practitioner who champions system security commensurate with an organizations mission and risk tolerance while meeting legal and regulatory requirements.

CGRC is a vendor-neutral cybersecurity credential demonstrates that you have the knowledge skills and experience required for using various frameworks to manage risk and to authorize and maintain information systems.

At the end of this course youll sit the ISC2 exam and achieve your ISC2 Certified in Governance Risk and Compliance (CGRC) certification.

Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal for:

  • IT information security and cybersecurity practitioners who manage risk in information systems.
  • Any practitioner involved in authorizing and maintaining information systems.
  • Any of the following roles:
    • Authorizing Official
    • Cyber GRC Manager
    • Cybersecurity Auditor/Assessor
    • Cybersecurity Compliance Officer
    • Cybersecurity Architect
    • GRC Architect
    • GRC Information Technology Manager
    • GRC Manager
    • Cybersecurity Risk & Compliance Project Manager
    • Cybersecurity Risk & Controls Analyst
    • Cybersecurity Third Party Risk Manager
    • Enterprise Risk Manager
    • GRC Analyst
    • GRC Director
    • GRC Security Analyst
    • System Security Manager
    • System Security Officer
    • Information Assurance Manager
    • Cybersecurity Consultant
","

Before attending this accelerated course you should have:

  • To qualify for the CGRC you must pass the exam and have at least two years of cumulative paid work experience in one or more of the seven domains of the ISC2 CGRC Common Body of Knowledge (CBK)
  • If you dont yet have the required experience you may become an Associate of ISC2 after successfully passing the CGRC exam. The Associate of ISC2 will then have three years to earn the experience needed for the CGRC certification.
","","

Module 1: Information Security Risk Management Program

  • Understand the foundation of an organization information security risk management program
    • Principles of information security
    • Risk management frameworks (e.g. National Institute of Standards and Technology (NIST) cyber security framework Control Objectives for Information and Related Technology (COBIT) International Organization for Standardization (ISO) 27001 International Organization for Standardization (ISO) 31000)
    • System Development Life Cycle (SDLC)
    • Information system boundary requirements
    • Security controls and practices
    • Roles and responsibilities in the authorization/approval process
  • Understand risk management program process
    • Select program management controls
    • Privacy requirements
    • Determine third-party hosted information systems
  • Understand regulatory and legal requirements
    • Familiarize with governmental organizational and international regulatory security and privacy requirements (e.g. International Organization for Standardization (ISO) 27001 Federal Information Security Modernization Act (FISMA) Federal Risk and Authorization Management Program (FedRAMP) General Data Protection Regulation (GDPR) Health Insurance Portability and Accountability Act (HIPAA))
    • Familiarize with other applicable security-related mandates

Module 2: Scope of the Information System

  • Define the information system
    • Determine the scope of the information system
    • Describe the architecture (e.g. data flow internal and external interconnections)
    • Describe information system purpose and functionality
  • Determine categorization of the information system
    • Identify the information types processed stored or transmitted by the information system
    • Determine the impact level on confidentiality integrity and availability for each information type (e.g. Federal Information Processing Standards (FIPS) 199 International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27002 data protection impact assessment)
    • Determine information system categorization and document results

Module 3: Selection and Approval of Security and Privacy Controls

  • Identify and document baseline and inherited controls
  • Select and tailor controls to the system
    • Determine applicability of recommended baseline and inherited controls
    • Determine appropriate use of control enhancements (e.g. security practices overlays countermeasures)
    • Document control applicability
  • Develop continuous control monitoring strategy (e.g. implementation timeline effectiveness)
  • Review and approve security plan/Information Security Management System (ISMS)

Module 4: Implementation of Security and Privacy Controls

  • Implement selected controls
    • Determine mandatory configuration settings and verify implementation in accordance with current industry standards (e.g. Technical Security Standard for Information Technology (TSSIT) Technical Guideline for Minimum Security Measures United States Government Configuration Baseline (USGCB) National Institute of Standards and Technology (NIST) checklists Security Technical Implementation Guides (STIGs) Centre for Internet Security (CIS) benchmarks General Data Protection Regulation (GDPR))
    • Ensure that implementation of controls is consistent with the organizational architecture and associated security and privacy architecture
    • Coordinate implementation of inherited controls with control providers
    • Determine and implement compensating/alternate security controls
    • Document control implementation
      • Document inputs to the planned controls their expected behaviour and expected outputs or deviations
      • Verify the documented details of the controls meet the purpose scope and risk profile of the information system
      • Obtain and document implementation details from appropriate organization entities (e.g. physical security personnel security privacy)

Module 5: Assessment/Audit of Security and Privacy Controls

  • Prepare for assessment/audit
    • Determine assessor/auditor requirements
    • Establish objectives and scope
    • Determine methods and level of effort
    • Determine necessary resources and logistics
    • Collect and review artefacts (e.g. previous assessments/audits system documentation policies)
    • Finalize the assessment/audit plan
  • Conduct assessment/audit
    • Collect and document assessment/audit evidence
    • Assess/audit implementation and validate compliance using approved assessment methods (e.g. interview test and examine)
  • Prepare the initial assessment/audit report
    • Analyse assessment/audit results and identify vulnerabilities
    • Propose remediation actions
  • Review initial assessment/audit report and perform remediation actions
    • Determine risk responses
    • Apply remediations
    • Reassess and validate the remediated controls
  • Develop final assessment/audit report
  • Develop remediation plan
    • Analyse identified residual vulnerabilities or deficiencies
    • Prioritize responses based on risk level
  • Identify resources (e.g. financial personnel and technical) and determine the appropriate timeframe/schedule required to remediate deficiencies

Module 6: Authorization/Approval of Information System

  • Compile security and privacy authorization/approval documents
  • Compile required security and privacy documentation to support authorization/approval decision by the designated official
    • Determine information system risk
    • Evaluate information system risk
    • Determine risk treatment options (i.e. accept avoid transfer mitigate share)
    • Determine residual risk
      • Authorize/approve information system
      • Determine terms of authorization/approval

Module 7: Continuous Monitoring

  • Determine impact of changes to information system and environment
    • Identify potential threat and impact to operation of information system and environment
    • Analyse risk due to proposed changes accounting for organizational risk tolerance
    • Approve and document proposed changes (e.g. Change Control Board (CCB) technical review board)
    • Implement proposed changes
    • Validate changes have been correctly implemented
    • Ensure change management tasks are performed
  • Perform ongoing assessments/audits based on organizational requirements
    • Monitor network physical and personnel activities (e.g. unauthorized assets personnel and related activities)
    • Ensure vulnerability scanning activities are performed
    • Review automated logs and alerts for anomalies (e.g. security orchestration automation and response)
  • Review supply chain risk analysis monitoring activities (e.g. cyber threat reports agency reports news reports)
  • Actively participate in response planning and communication of a cyber event
    • Ensure response activities are coordinated with internal and external stakeholders
    • Update documentation strategies and tactics incorporating lessons learned
  • Revise monitoring strategies based on changes to industry developments introduced through legal regulatory supplier security and privacy updates
  • Keep designated officials updated about the risk posture for continuous authorization/approval
    • Determine ongoing information system risk
    • Update risk register risk treatment and remediation plan
  • Decommission information system
    • Determine information system decommissioning requirements
    • Communicate decommissioning of information system
    • Remove information system from operations
" "isc2elcs","Certified in Cybersecurity -

This accelerated ISC2 Entry-Level Cybersecurity Certification course introduces the ultimate starting point for an exciting and rewarding career in cybersecurity —ISC2 entry-level cybersecurity certification. You dont need work experience just a passion and the drive to enter a challenging and rewarding field one that protects the world from cyber threats and bad actors.

The entry-level cybersecurity certification enables students incoming professionals and career changers to build confidence and enter their first cybersecurity role prepared for whats next.

ISC2 has begun the exciting process of exploring the creation of a new certification. To fill the cybersecurity workforce gap we need to address the workforce shortage facing the industry especially among entry- and junior-level positions. A foundational cybersecurity certification will help ISC2 build a pathway to a rewarding career in cybersecurity for many around the world.

The entry-level cybersecurity certification will prove to employers you have the foundational knowledge skills and abilities necessary for an entry- or junior-level cybersecurity role. It will signal your understanding of fundamental security best practices policies and procedures as well as your willingness and ability to learn more and grow on the job.

The ISC2 entry-level cybersecurity certification is the first step on a career-long journey that will help cybersecurity professionals gain experience and work toward advanced qualifications such as the ISC2 CISSP and ISC2 CCSP.

We believe a need still exists in our industry for a certification that is attainable for newcomers and recognizes the growing trend of people entering the cybersecurity workforce without direct IT experience. Employers need confidence that when hiring new entrants into the field they have a solid grasp of the right technical concepts and a demonstrated aptitude to learn on the job. Moreover as an ISC2 certification the recipient will be an ISC2 member backed by the worlds largest network of certified cybersecurity professionals helping them continue their professional development and earn new achievements and qualifications throughout their career.

At the end of this course youll achieve your ISC2 Entry-Level Cybersecurity Certification.

Through The Suppliers Lecture | Lab | Review methodology youll certify at twice the speed of traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

40% faster

Distraction-free environment

Audience

This course is ideal for Individuals pursuing a career in cybersecurity which can include recent college graduates or those wishing to change careers and entry- and junior-level positions.

","

Unlike other ISC2 certifications there is no work experience requirement to earn this certification.

","","

ISC2 Entry-Level Cybersecurity Certification

Domains - Security Principles Business Continuity (BC) Disaster Recovery (DR) & Incident Response Concepts Access Controls Concepts Network Security Security Operations

Domain 1: Security Principles (26% 20 items)

1.1 Understand the security concepts of information assurance Confidentiality Integrity Availability Authentication (e.g. methods of authentication multi-factor authentication (MFA)) Non-repudiation Privacy 1.2 Understand the risk management process Risk management (e.g. risk priorities risk tolerance) Risk identification assessment and treatment

1.3 Understand security controls Technical controls Administrative controls Physical controls

1.4 Understand ISC2 Code of Ethics Professional code of conduct

1.5 Understand governance processes Policies Procedures Standards Regulations and laws

Domain 2: Business Continuity (BC) Disaster Recovery (DR) & Incident Response Concepts (10% 7 items)

2.1 Understand business continuity (BC) Purpose Importance Components

2.2 Understand disaster recovery (DR) Purpose Importance Components

2.3 Understand incident response Purpose Importance Components

Domain 3: Access Controls Concepts (22% 17 items)

3.1 Understand physical access controls Physical security controls (e.g. badge systems gate entry environmental design) Monitoring (e.g. security guards closed-circuit television (CCTV) alarm systems logs) Authorized versus unauthorized personnel

3.2 Understand logical access controls Principle of least privilege Segregation of duties Discretionary access control (DAC) Mandatory access control (MAC) Role-based access control (RBAC)

Domain 4: Network Security (24% 18 items)

4.1 Understand computer networking Networks (e.g. Open Systems Interconnection (OSI) model Transmission Control Protocol/Internet Protocol (TCP/IP) model Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) WiFi) Ports Applications

4.2 Understand network threats and attacks Types of threats (e.g. distributed denial-of-service (DDoS) virus worm Trojan man-in-the-middle (MITM) side-channel) Identification (e.g. intrusion detection system (IDS) host-based intrusion detection system (HIDS) network intrusion detection system (NIDS)) Prevention (e.g. antivirus scans firewalls intrusion prevention system (IPS))

4.3 Understand network security infrastructure On-premises (e.g. power data center/closets Heating Ventilation and Air Conditioning (HVAC) environmental fire suppression redundancy memorandum of understanding (MOU)/memorandum of agreement (MOA)) Design (e.g. network segmentation (demilitarized zone (DMZ) virtual local area network (VLAN) virtual private network (VPN) micro-segmentation) defense in depth Network Access Control (NAC) (segmentation for embedded systems Internet of Things (IoT)) Cloud (e.g. service-level agreement (SLA) managed service provider (MSP) Software as a Service (SaaS) Infrastructure as a Service (IaaS) Platform as a Service (PaaS) hybrid)

Domain 5: Security Operations (18% 13 items)

5.1 Understand data security Encryption (e.g. symmetric asymmetric hashing) Data handling (e.g. destruction retention classification labeling) Logging and monitoring security events

5.2 Understand system hardening Configuration management (e.g. baselines updates patches)

5.3 Understand best practice security policies Data handling policy Password policy Acceptable Use Policy (AUP) Bring your own device (BYOD) policy Change management policy (e.g. documentation approval rollback) Privacy policy

5.4 Understand security awareness training Purpose/concepts (e.g. social engineering password protection) Importance

" "iso27701la","27701 Lead Auditor - Privacy Information Management System -

On this accelerated ISO 27701 Lead Auditor course you’ll build knowledge on audit principles procedures and techniques and how to apply them to a Privacy Information Management System (PIMS).

In just 3 days you’ll learn how to manage an audit program establish communication with customers and resolve potential conflicts. You’ll also learn how to:

  • Interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit
  • Identify the relationship between ISO/IEC 27701 ISO/IEC 27001 ISO/IEC 27002 and other standards and regulatory frameworks

At the end of your course you’ll sit exam ISO/IEC 27701 Lead Auditor and get your PECB Certified ISO/IEC 27701 Lead Auditor certification. You’ll get access to official courseware and learn from certified instructors as The Supplier are a PECB Titanium Partner.

As of March 2023 PECB have partnered with Credly to offer you the chance of earning a digital badge upon completing your certification.


Audience


This course is ideal for:

  • Auditors interested in leading Privacy Information Management System (PIMS) certification audits
  • Managers or consultants interested in mastering a PIMS audit process
  • Individuals responsible for maintaining conformance with PIMS requirements
  • Technical experts seeking to prepare for a PIMS audit
  • Expert advisors in the protection of Personally Identifiable Information (PII) 
","

Before attending this accelerated course you should have knowledge in:

  • Information security and privacy
  • Audit principles
","","
  • Module 1: Introduction to ISO/IEC 27701 and initiation of a PIMS
  • Module 2: Planning and Implementing a PIMS
  • Module 3: PIMS Monitoring Continual Improvement and Preparation for the Certification Audit and Certification Exam
" "iso27f","27001 Foundation - Information Security Management -

Learn the best practices for implementing and managing an Information Security Management System (ISMS) - as specified in ISO/IEC 27001:2013 - in just 2 days.

You’ll be introduced to the ISO 27000 family of standards and study:

  • Information security fundamentals
  • How to conduct an ISO/IEC 27001 certification audit
  • Design of information security controls based on ISO 27002 best practices

Get immersed in ISO/IEC 27001 in a distraction-free environment and learn faster with The Supplier’s Lecture | Lab | Review methodology.

Plus you’ll sit the PECB Certified ISO/IEC 27001 Foundation exam as part of your accelerated course. This exam is covered by your Certification Guarantee.

As of March 2023 PECB have partnered with Credly to offer you the chance of earning a digital badge upon completing your certification.

If you are involved in the implementation of the ISO/IEC 27001 standard this 2-day course is ideal for you. This course is also beneficial for:

  • Auditors
  • Members of an information security team
  • Technicians involved in operations related to an ISMS
  • Those who want to learn about the processes of an Information Security Management System (ISMS)
  • CxO and Senior Managers responsible for IT governance of an enterprise and the management of risks
","

There are no prerequisites for this accelerated course.

","","
  • Day 1: Introduction to Information Security Management System (ISMS) concepts as required by ISO/IEC 27001
  • Day 2: Information Security Management System requirements and Certification Exam
" "iso27la","27001 Lead Auditor - Infomation Security Management System -

The ISO 27001 Lead Auditor course is a PECB (Professional Evaluation and Certification Board) official course. The three-day intensive course will help you develop the skills needed to audit an Information Security Management System (ISMS). You'll also be able to manage a team of auditors by applying widely-recognised audit principles procedures and techniques.

PECB is officially accredited under ISO 17024 from ANSI. They are the first personnel certification body to be accredited by a National Accreditation Authority.

You will gain the skills and knowledge needed to plan and perform audits compliant with the certification process of the ISO/IEC 27001:2022 standard. Through practical exercises you will learn the following skills:

  • Mastering audit techniques
  • Managing audit teams and audit program
  • Communicating with customers
  • Conflict resolution

As of March 2023 PECB have partnered with Credly to offer you the chance of earning a digital badge upon completing your certification.

In addition you will also get one year free PECB membership (Professional Evaluation and Certification Board) - which usually costs around £250 and be able to apply for the following titles depending on your experience:

  • Certified ISO/IEC 27001 Provisional Auditor
  • Certified ISO/IEC 27001 Auditor
  • Certified ISO/IEC 27001 Lead Auditor
  • Certified ISO/IEC 27001 Senior Lead Auditor
  • PECB Master Certification

More information on these credentials and what is required to achieve them can be found in the prerequisites section below.

If you need more information please call us on 080 80 800 888 and we'll help you through the process.

Residential or Online ISO 27001 Lead Auditor course?

The Supplier offers both a classroom-based and ISO 27001 Lead Auditor online course including everything you need to get certified in record time:

  • Official courseware labs and practice exams
  • ISO 27001 Lead Auditor certification exam
  • Accommodation meals and snacks (for residential courses)

Both are delivered through our tried and tested Lecture | Lab | Review methodology. The Supplier accelerated methodology offers you the opportunity to choose the best delivery option for your needs and get your certification faster than anywhere else.

","

It is recommended that you have already attended Information Security Management System (ISMS) Foundation training or have a basic knowledge of ISO/IEC 27001:2022 and ISO/IEC 27002:2022.

Once this course is complete you will be able to apply for your ISO 27001 Lead Auditor certification. In order to become certified you must pass your exam and adhere to the PECB Code of Ethics. Your credential level will depend on your professional experience. Please see below table which highlights the different credentials available and the pre-requisites required for each stage.

Do you qualify for the ISO 27001 Master certification?

The ISO 27001 Master certification allows you to prove that you have mastered the implementation of an Information Security Management System (ISMS). You can apply for the Master certification through PECB if you have the following:

  • Both ISO 27001 Lead Auditor certification and ISO 27001 Lead Implementer certification
  • 4 additional foundation exams relevent to the certification (ISO 27005 27002 27032 and 27035)
  • 15 years of professional experience with at least 10 years of work experience information security
  • 700 hours of ISMS audit experience and 700 hours of ISMS project experience

Unsure whether you meet the prerequisites? Dont worry. Your training consultant will discuss your background with you to understand if this course is right for you.

","

The ISO 27001 Lead Auditor certification proves that you can conduct process-based audits against ISO 27001 for clients worldwide.

","

During this course you will learn:

Normative regulatory and legal frameworks related to information security

  • Fundamental Principles of Information Security
  • ISO 27001 certification
  • Information Security Management System
  • Detailed presentation of clauses 4-8 of ISO27001

Initiating and Planning an ISO 27001 audit

  • Fundamental auditing concepts and principles
  • Audit approach based on evidence and on risk
  • Preparation of an ISO 27001 certification audit
  • ISMS documentation audit
  • Conducting an opening meeting

Performing an ISO 27001 audit

  • Communication during the audit
  • Audit procedures: observation document review interview sampling technical control confirmation and evaluation
  • Audit test plans
  • Formulation of control findings
  • Documenting deviations

Concluding and ensuring follow-up of an ISO 27001 audit

  • Audit documentation
  • Quality rating
  • Conducting a closing meeting and the conclusion of an ISO 27001 audit
  • Evaluation of corrective action plans
  • ISO 27001 surveillance audit
  • Internal audit management program
" "iso27li","27001 Lead Implementer - Information Security Management -

The ISO 27001 Lead Implementer course is a PECB (Professional Evaluation and Certification Board) official course. The three-day intensive course will help you develop the skills needed to implement an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2022.

PECB is officially accredited under ISO 17024 from ANSI. They are the first personnel certification body to be accredited by a National Accreditation Authority.

This training is consistent with the good practices established by the Project Management Institute (PMI) and ISO 10006:2003 (Quality Management Systems - Guidelines for Quality Management in Projects). The course is fully compatible with:

  • ISO/IEC 27003:2009 (Guidelines for the Implementation of an ISMS)
  • ISO/IEC 27004:2009 (Measurement of Information Security)
  • ISO/IEC 27005:2022 (Risk Management in Information Security)

As of March 2023 PECB have partnered with Credly to offer you the chance of earning a digital badge upon completing your certification.

In addition you will also get one year free PECB membership (Professional Evaluation and Certification Board) - which usually costs around £250 and be able to apply for the following titles depending on your experience:

  • Certified ISO/IEC 27001 Provisional Implementer
  • Certified ISO/IEC 27001 Implementer
  • Certified ISO/IEC 27001 Lead Implementer
  • Certified ISO/IEC 27001 Senior Lead Implementer
  • PECB Master Certification

More information on these credentials and what is required to achieve them can be found in the prerequisites section below.

Residential or Online ISO 27001 Lead Implementer course?

The Supplier offers both a classroom-based and ISO 27001 Lead Implementer online course including everything you need to get certified in record time:

  • Official courseware labs and practice exams
  • ISO 27001 Lead Implementer certification exam
  • Accommodation meals and snacks (for residential courses)

Both are delivered through our tried and tested Lecture | Lab | Review methodology. The Supplier accelerated methodology offers you the opportunity to choose the best delivery option for your needs and get your certification faster than anywhere else.

","

It is recommended that you have already attended Information Security Management System (ISMS) Foundation training or have a basic knowledge of ISO/IEC 27001:2022 and ISO/IEC 27002:2022.

Once this course is complete you will be able to apply for your ISO 27001 Lead Implementer certification. In order to become certified you must pass your exam and adhere to the PECB Code of Ethics. Your credential level will depend on your professional experience. Please see below table which highlights the different credentials available and the pre-requisites required for each stage.

Do you qualify for the ISO 27001 Master certification?

The ISO 27001 Master certification allows you to prove that you have mastered the implementation of an Information Security Management System (ISMS). You can apply for the Master certification through PECB if you have the following:

  • Both ISO 27001 Lead Auditor certification and ISO 27001 Lead Implementer certification
  • 4 additional foundation exams relevent to the certification (ISO 27005 27002 27032 and 27035)
  • 15 years of professional experience with at least 10 years of work experience information security
  • 700 hours of ISMS audit experience and 700 hours of ISMS project experience
","","

During this course you will learn:

  • Information Security Management System (ISMS) concepts as required by ISO 27001; Initiating an ISMS
  • Planning the implementation of an ISMS based on ISO 27001
  • Implementing an ISMS based on ISO 27001
  • Controlling monitoring measuring and improving an ISMS; certification audit of the ISMS
" "iso42001la","ISO 42001 Lead Auditor: Artificial Intelligence Management System (AIMS) -

The 3-day accelerated PECB: ISO 42001 Lead Auditor course has been developed to respond to urgent inquiries concerning AI's unchecked expansion and potential threats. The ISO/IEC 42001 Lead Auditor training course was developed to empower participants with the knowledge and skills essential for planning and conducting ISO/IEC 42001 audits based on best audit practices.

PECB ISO/IEC 42001 Lead Auditor training course enables you to gain the necessary expertise to audit artificial intelligence management systems (AIMS) by applying widely recognized audit principles procedures and techniques.

In just 3 days the PECB ISO/IEC 42001 Lead Auditor certificate will demonstrate that you can:

  • Explain the fundamental concepts and principles of an AI management system based on ISO/IEC 42001
  • Interpret the ISO/IEC 42001 requirements for an AI management system from the perspective of an auditor
  • Evaluate the AI management system conformity to ISO/IEC 42001 requirements in accordance with the fundamental audit concepts and principles
  • Plan conduct and close an ISO/IEC 42001 compliance audit in accordance with ISO/IEC 17021-1 requirements ISO 19011 guidelines and other best practices of auditing
  • Manage an ISO/IEC 42001 audit program

At the end of this course youll sit the PECB exam and achieve your ISO 42001 Lead Auditor certification. Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal for:

  • Individuals with a background in auditing whether internal or external seeking to specialize in auditing AI management system
  • Managers or consultants seeking to master the AI management system audit process
  • Individuals responsible for maintaining conformity with the AI management system requirements in an organization
  • Expert advisors in AI management
  • Professionals involved in analyzing and understanding business requirements for AI implementation
  • Individuals involved in the development and implementation of AI solutions and in designing the architecture of AI systems
","

The main requirement for participating in this training course is having a fundamental understanding of ISO/IEC 42001 and AI principles and concepts.

","","
  • Introduction to ISO/IEC 42001 and management systems
  • Certification process
  • Fundamental concepts and principles of artificial intelligence
  • Overview of ISO/IEC 42001 requirements
  • Fundamental audit concepts and principles
  • The impact of other technologies in auditing
  • Evidence-based auditing
  • Risk-based auditing
  • Initiation of the audit process
  • Stage 1 audit
  • Preparing for stage 2 audit
  • Stage 2 audit
  • Communication during the audit
  • Audit procedures
  • Creating audit test plans
  • Auditing the requirements of ISO/IEC 42001
  • Drafting audit findings and nonconformity reports
  • Audit documentation and quality review
  • Closing the audit
  • Evaluation of action plans by the auditor
  • Beyond the initial audit
  • Managing an internal audit program
  • Closing Training and Exam Prep
" "iso42001li","ISO 42001 Lead Implementer: Artificial Intelligence Management System (AIMS) -

The accelerated PECB: ISO 42001 Lead Implementer course has been developed to respond to urgent inquiries concerning AI's unchecked expansion and potential threats. It specifies the requirements and offers guidance to establish implement maintain and continually improve an AI management system (AIMS) within the context of an organization. It provides a framework for the ethical implementation of AI systems offering a comprehensive approach to ensure that AI technologies align with the principles of fairness transparency accountability and privacy.

PECB ISO/IEC 42001 training courses equip individuals with the competencies needed to plan develop implement maintain and improve AI management systems within organizations. An effective AIMS enables organizations to utilize the full potential of AI in an era where technological adaptation is synonymous with progress and success. Additionally it helps organizations maintain a competitive edge in the constantly changing tech and business environment.

In just 3 days the PECB ISO/IEC 42001 certificate will demonstrate that you can:

  • Comprehend the regulatory and ethical considerations surrounding AI implementation
  • Assist an organization in aligning the AI initiatives with its core business objectives
  • Support an organization in developing and implementing an AI management system
  • Evaluate the quality reliability and performance of AI systems
  • Ensure that AI solutions meet high standards and function as intended
  • Identify potential AI-related risks and implement necessary measures to mitigate those risks

At the end of this course youll sit the PECB exam and achieve your ISO 42001 Lead Implementer certification. Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal for:

  • Managers or consultants involved in and/or concerned with the implementation of an information security management system in an organization
  • Project managers consultants or expert advisers seeking to master the implementation of an information security management system; or individuals responsible to maintain conformity with the ISMS requirements within an organization
  • Members of the ISMS team
","The main requirement for participating in this training course is a general knowledge of the AIMS and ISO/IEC 42001.","","
  • Training course objectives and structure
  • Standards and regulatory frameworks
  • Artificial intelligence management system (AIMS)
  • Fundamental concepts and principles of artificial intelligence
  • AIMS implementation approaches
  • Leadership and project approval
  • Roles and responsibilities
  • The organization and its context
  • AIMS scope
  • Analysis of the existing system
  • AI policy
  • AI risk management
  • Statement of applicability
  • Selection and design of controls
  • Implementation of controls
  • Management of documented information
  • Communication
  • Competence and awareness
  • Management of AI operations
  • Monitoring measurement analysis and evaluation
  • Internal Audit
  • Management review
  • Treatment of nonconformities
  • Continual improvement
  • Preparation for the certification audit
  • Closing training and exam prep
" "istqb","The Supplier's Training for ISTQB's Foundation Software Tester Certification -

The Supplier's two-day accelerated course provides comprehensive training and certification for anyone involved in software testing. It follows the syllabus specified by the International Software Testing Qualification Board (ISTQB).

The Supplier's accelerated course is designed to prepare you for and test you in the following accreditations:

  • ISTQB Foundation Certificate in Software Testing

On completion of The Supplier's course you will be able to:

  • Manage plan and prepare rigorous formal visible and repeatable tests that will fully exercise software in the development of quality systems.
  • Apply different testing approaches (black box white box static and dynamic) to all stages of software development.
  • Prepare test plans strategy specifications procedures and controls to provide a structured approach to testing.
  • Identify what is involved in acceptance testing system testing integration testing and unit testing what should be tested when and by whom.
  • Document testing appropriately.
  • Describe the different types of testing tools available and identify and implement the appropriate types of tools for their needs.

The Supplier's training for ISTQB's Foundation Software Testing certification:

  • Allows you to achieve your certifications in a fraction of the time of 'traditional training' while delivering industry-leading exam passing percentages.
  • Helps students grasp complex technical concepts more easily by identifying and catering to individual student learning styles through a mixed visual auditory and kinaesthetic-tactual delivery system.
  • Enhances retention by employing accelerated learning techniques focused on committing information to long-term memory.
","

Students should already have a basic working knowledge of IT and an understanding of the testing role in software development.

","","

This course will discuss the new CTFL 4.0 syllabus:

Module 1 - Fundamentals of Testing

  • What is Testing?
  • Why is Testing Necessary?
  • Testing Principles
  • Test Activities Testware and Test Roles
  • Essential Skills and Good Practices in Testing

Module 2 - Testing throughout the Software Lifecycle

  • Testing in the Context of an SDLC
  • Test Levels and Test Types
  • Maintenance Testing

Module 3 - Static Testing

  • Static Testing Basics
  • Feedback and Review Process

Module 4 - Test Techniques

  • Test Techniques Overview
  • Black-box Test Techniques
  • White-box Test Techniques
  • Experience-based Test Techniques
  • Collaboration-based Test Approaches

Module 5 - Managing the Test Activities

  • Test Planning
  • Risk Management
  • Test Monitoring Test Control and Test Completion
  • Configuration Management
  • Defect Management

Module 6 - Test tools

  • Tool Support for Testing
  • Benefits and Risks of Test Automation
" "istqbfa","The Supplier's Training for ISTQB's Foundation Agile Tester Extension -

Get certified in Agile testing in just 2 days! Learn how to use Agile as a means of software testing on this accelerated ISTQB Foundation Agile Tester course.

Your accelerated 2-day course provides comprehensive training and certification for software testing and software development life cycles (SLDCs). It follows the syllabus specified by the International Software Testing Qualification Board (ISTQB).

You'll be immersed in the curriculum through The Supplier's unique Lecture | Lab | Review technique meaning you learn and retain information faster. Your expert instructor will introduce various concepts and tools giving you a fresh targeted set of skills around Agile concepts.

At the end of your course you will gain the following certification:

  • ISTQB Agile Tester Foundation Level Extension

On this accelerated course you will learn about:

  • Agile Software Development
  • Fundamental Agile testing principles practices and processes
  • Agile testing methods techniques and tools

If you are experienced with traditional SLDCs and looking to develop and expand on your Agile Testing skills this course is ideal for you.

","

There are no prerequisites needed to take this course. However to sit the ISTQB Agile Tester Foundation Level Extension exam you must already possess the ISTQB Foundation Software Tester certification.

","","

Agile Software Development:

  • Agile Software Development fundamentals
  • Aspects of Agile Approaches

Fundamental Agile concepts:

  • Testing principles practices and process
  • Differences between Traditional testing and Agile testing approaches
  • The roles and responsibilities of an Agile Tester

Agile testing techniques:

  • Agile Testing methods
  • Assessing Quality risks
  • Tools in Agile products
" "itilf","ITIL 4 Foundation certification -

Achieve your ITIL V4 Foundation certification on The Supplier's accelerated 2-day course. Develop the skills to successfully transform your organisation and take advantage of information technology in the modern service economy becoming an ITIL certified strategic leader.

ITIL (IT Infrastructure Library ) is the only consistent and comprehensive documentation of best practice for IT Service Management. It provides a framework to support organisations in improving their tech-enabled products and services. Learn to utilise and adapt to different aspects of digitisation in the business world with AXELOS' ITIL 4 Foundation certification.

In 2 days you'll learn how to:

  • Key concepts in the ITIL 4 framework
  • The ITIL service value system
  • The four dimensions of service management
  • ITSM
  • The seven guiding principles of ITIL 4

This accelerated ITIL Foundation course is delivered by ITIL consultants - experts who work with ITIL on a daily basis. Their expertise will be at your disposal over the duration of your course as they immerse you in the curriculum. With the use of our Lecture | Lab | Review technique The Supplier offer and support your various learning needs guaranteeing you absorb information 40% faster and return certified.

The ITIL 4 Foundation certification is a prerequisite to gaining the ITIL Practitioner certification.

ITIL training courses are accredited and delivered by ATO The Supplier UK.

Residential and Online ITIL foundation training

With The Supplier youll learn from expert instructors to enhance your understanding of the course material. We offer both a classroom-based and ITIL foundation online training course including everything you need to get certified in record time:

  • Official courseware labs and practice exams
  • ITIL 4 Foundation certification exam
  • Accommodation meals and snacks (for residential courses)

Important note: From January 2023 All Global Best Practice certifications provided by Axelos will require recertification after 3 years. This will affect every certification issued from 1st January 2020 onwards and previous certification holders will be given 6 months to renew their certification. If you would like to know more please do not hesitate to contact us to discuss your recertification requirements.

This course is delivered through our UK training centre.

Your ITIL foundation certificate is worth two ITIL credits towards the ITIL Expert qualification.

ITIL is a registered trade mark of AXELOS Limited used under permission of AXELOS Limited. The Swirl logo™ is a trade mark of AXELOS Limited used under permission of AXELOS Limited. All rights reserved.

ITIL and IT Infrastructure Library are registered trade marks of AXELOS Limited used under permission of AXELOS Limited. All rights reserved.

","

To be eligible to attend this accelerated ITIL Foundation course you must meet the following experience and knowledge requirements:

  • End-user level computer and networking skills
  • Work experience in IT service support or IT service delivery
","

The ITIL Foundation Certification will provide you with a systematic approach to IT management covering:

  • IT services through best practice standards and guidance
  • Customer satisfaction through a professional approach to service delivery
  • Productivity
  • Project Management
  • Use of skills and experience
  • Operating efficiencies
  • Business Strategy
  • Delivery of third-party services through the specification of ITIL or ISO/IEC 20000 as the standard for service delivery
","
  • Module 1: Introduction to ITIL 4
  • Module 2: Key Concepts
  • Module 3: The ITIL 4 Service Value System
  • Module 4: ITIL 4 Practices
  • Module 5: 4 Dimensions of Service Management
" "L3ICT","L3 Information Communications Technician - ","","","" "L3ITTS","L3 IT Technical Salesperson - ","","","" "L4BA","L4 Business Analyst - ","","","" "L4CST","L4 Cyber Security Technologist - ","","","" "L4DEVOPS","L4 DevOps - ","","","" "L4DFT","Level 4 Digital Forensic Technician - ","","","" "L4NE-COMP","L4 Network Engineer - CompTIA - ","","","" "L4SD","L4 Software Developer - ","","","" "lpi","LPIC-1: Linux Administrator -

On this accelerated LPIC-1: Linux Administrator course you’ll build knowledge on the skills to provide you with the basic hardware software and networking skills necessary to function in an entry-level Linux role.

In just 6 days you'll immerse yourself in the architecture of a Linux system and learn how to install manage and maintain a Linux workstation including X11 and set it up as a network client. You’ll also learn how to

  • Handle files and access permissions
  • Implement a security system
  • Work at the Linux command line including common GNU and Unix commands

At the end of your course you'll sit exams LPIC-1 Exam 101 and LPIC-1 Exam 102 and get your LPI Level 1 (LPIC-1) certification.

Train through The Supplier's Lecture | Lab | Review methodology and you'll get access to courseware certified Linux instructors and earn your certification at twice the speed.

","

There are no formal prerequisites for this course.

","","

Topic 101: System Architecture

  • 101.1 Determine and configure hardware settings
  • 101.2 Boot the system
  • 101.3 Change run levels/boot targets and shutdown or reboot system

Topic 102: Linux Installation and Package Management

  • 102.1 Design hard disk layout
  • 102.2 Install a boot manager
  • 102.3 Manage shared libraries
  • 102.4 Use Debian package management
  • 102.5 Use RPM and YUM package management
  • 102.6 Linux as a virtualisation guest

Topic 103: GNU and Unix Commands

  • 103.1 Work on the command line
  • 103.2 Process text streams using filters
  • 103.3 Perform basic file management
  • 103.4 Use streams pipes and redirects
  • 103.5 Create monitor and kill processes
  • 103.6 Modify process execution priorities
  • 103.7 Search text files using regular expressions
  • 103.8 Basic file editing

Topic 104: Devices Linux Filesystems Filesystem Hierarchy Standard

  • 104.1 Create partitions and filesystems
  • 104.2 Maintain the integrity of filesystems
  • 104.3 Control mounting and unmounting of filesystems
  • 104.5 Manage file permissions and ownership
  • 104.6 Create and change hard and symbolic links
  • 104.7 Find system files and place files in the correct location
  • LPIC-1 Exam 102

Topic 105: Shells and Shell Scripting

  • 105.1 Customise and use the shell environment
  • 105.2 Customise or write simple scripts

Topic 106: User Interfaces and Desktops

  • 106.1 Install and configure X11
  • 106.2 Graphical Desktops
  • 106.3 Accessibility

Topic 107: Administrative Tasks

  • 107.1 Manage user and group accounts and related system files
  • 107.2 Automate system administration tasks by scheduling jobs
  • 107.3 Localisation and internationalisation

Topic 108: Essential System Services

  • 108.1 Maintain system time
  • 108.2 System logging
  • 108.3 Mail Transfer Agent (MTA) basics
  • 108.4 Manage printers and printing

Topic 109: Networking Fundamentals

  • 109.1 Fundamentals of internet protocols
  • 109.2 Persistent network configuration
  • 109.3 Basic network troubleshooting
  • 109.4 Configure client side DNS

Topic 110: Security

  • 110.1 Perform security administration tasks
  • 110.2 Setup host security
  • 110.3 Securing data with encryption
" "m365f","365 Certified Fundamentals -

On this all-inclusive and accelerated Microsoft 365 Certified Fundamentals course you'll develop an in-depth understanding of Microsoft 365 cloud services in just 1 day. Learn the core skills you need to use Microsoft 365 cloud services and the Software as a Service (SaaS) cloud model.

Achieve the Microsoft 365 Certified Fundamentals certification and you'll gain a grounding in security compliance privacy and trust within Microsoft cloud services. You'll also gain in-depth knowledge of Microsoft 365 subscriptions licenses billing and support.

During your accelerated 1-day course you'll learn to:

  • Plan for migration to Microsoft 365 services
  • Identify key differences between Microsoft on-premises services and Microsoft 365 cloud services
  • Describe identities cloud device management and enterprise mobility in Microsoft 365
  • Describe the use of data protection including Azure Information Protection and Intune

You'll learn fast through The Supplier's unique Lecture | Lab | Review methodology - with 50% faster than traditional training you'll sit your exam as part of the course. Get certified with official Microsoft courseware instructors and exams in a distraction-free environment.

If you're interested in starting a career in cloud services then this Microsoft 365 Certified Fundamentals course is ideal for you.

","

Before attending this course Microsoft recommend you have:

  • General IT knowledge or any general experience working in an IT environment
  • General sales level experience on corresponding Microsoft on-premises products such as Exchange Server SharePoint Office Professional or AD RMS
  • Experience addressing business legal or security requirements for IT
","","

Module 1: Cloud Concepts

  • Principles of cloud computing
  • Microsoft cloud services
  • Migrating to cloud services

Lab: Cloud Fundamentals

  • Exercise 1: Determine the appropriate cloud model (paper-based lab)

Module 2: Core Microsoft 365 Services

  • Microsoft 365 core servies
  • Microsoft on-premise services and cloud services in Microsoft 365
  • Unified endpoint management in Microsoft 365
  • Teamwork in Microsoft 365

Lab: Enabling and Configuring a Microsoft 365 tenant

  • Exercise 1: Activating and configuing a Microsoft 365 tenant
  • Exercise 2: Exploring the Microsoft 365 user and admin portal
  • Exercise 3: Configuring new user and group accounts

Module 3: Security Compliance Privacy and Trust in Microsoft 365

  • Organisational security fundamentals
  • Security features in Microsoft 365
  • Identity and access management
  • Device and data protection in Microsoft 365
  • Compliance in Microsoft 365

Lab: Security in Microsoft 365

  • Exercise 1: Managing users and devices in Azure Active Directory
  • Exercise 2: Evaluate identity protection
  • Exercise 3: Explore tools and compliance

Module 4: Microsoft 365 Pricing and Support

  • Microsoft 365 subscriptions licenses and billing
  • Support in Micrsofot 365

Lab: Managing subscriptions licensing and support in M365

  • Exercise 1: Explore interfaces for billing and subscriptions
  • Exercise 2: Add trial licenses to the tenant
  • Exercise 3: Review support options
" "maa","Certified Azure Administrator Associate -

At The Supplier we specialise in accelerated training that gets people certified at twice the speed. Our accelerated 4-day Microsoft Azure Administrator course helps you develop the skills you need to implement monitor and maintain Azure solutions from storage to security and networking as well as expert knowledge of the service capabilities within Microsoft Azure Cloud.

You'll also learn to:

  • Administer Azure using the Azure portal Cloud Shell Azure PowerShell CLI and ARM templates
  • Plan for create and scale virtual machines
  • Implement Azure storage accounts and shared access keys
  • Configure intersite connectivity solutions
  • Configure data replication backups and virtual networks
  • Manage network traffic subscriptions accounts users groups and billing
  • Implement Azure policies Azure Active Directory Azure Active Directory Connect
  • Secure identities & monitor Azure infrastructure

At The Supplier we are one of the few companies in the world designated as a Microsoft Cloud Partner. Our courses feature the latest Microsoft Official Curriculum (MOC) and are taught by Microsoft Certified Trainers (MCTs). We were also awarded the Microsoft Solutions Partner for Data & AI and Infrastructure badges in recognition of our expertise in delivering quality Azure solutions.

Your expert Microsoft Certified Trainer will immerse you in the curriculum with our unique Lecture | Lab | Review technique helping you to build and retain information faster. You'll also have lab access 24/7 at the training centre so you can test your skills and make the most of your stay!

Where can you take this course?

We offer this course in a classroom-based residential environment as well as a live online instructor-led course. The The Supplier Microsoft Azure Administrator Associate online course includes everything you need to get certified in record time:

  • Official courseware labs and practice exams
  • The official AZ-104 Microsoft Azure Administrator certification exam
  • For residential courses accommodations meals and snacks

At the end of this course you'll be able to take the official Microsoft AZ-104 exam and return to work certified covered by our Certification Guarantee.

Who should take this course?

If you're an Azure Administrator who manages cloud services that span across a variety of cloud capabilities this course is ideal for you.

","

Before attending this course you should have working knowledge of PowerShell and the Command Line Interface.

You should also be familiar with:

  • On-premises virtualisation technologies including: VMs virtual networking and virtual hard disks
  • Network configuration including TCP/IP Domain Name System (DNS) virtual private networks (VPNs) firewalls and encryption technologies
  • Active Directory concepts including domains forests domain controllers replication Kerberos protocol and Lightweight Directory Access Protocol (LDAP)
  • Resilience and disaster recovery including backup and restore operations
  • The Azure Portal
  • ARM templates
  • Operating systems
  • Virtualisation
  • Cloud infrastructure
  • Storage structures
  • Networking
","","

This comprehensive course covers:

  • Module 1: Identity
  • Module 2: Governance and Compliance
  • Module 3: Azure Administration
  • Module 4: Virtual Networking
  • Module 5: Intersite Connectivity
  • Module 6: Network Traffic Management
  • Module 7: Azure Storage
  • Module 8: Azure Virtual Machines
  • Module 9: PaaS Compute Options
  • Module 10: Data Protection
  • Module 11: Monitoring
" "maaea","Certified Azure AI Engineer Associate -

At The Supplier we were awarded the Microsoft Solutions Partner for Data & AI (Azure) badge in recognition of our expertise in delivering quality solutions in this specialised business area.

On your 3-day accelerated Azure AI Engineer Associate course you'll get the skills and knowledge you need to be a successful AI engineer. This course teaches you how to implement solutions that use Cognitive Services and Bots in Microsoft Azure and also covers monitoring troubleshooting and optimising.

Your expert Microsoft Certified Trainer (MCT) will immerse you in the curriculum with our unique Lecture | Lab | Review technique helping you to build and retain information faster. You'll also have lab access 24/7 at the training centre so you can test your skills and make the most of your stay.

At the end of the course youll acquire the following skills:

  • Select the appropriate Azure AI service
  • Plan and configure security for Azure AI services
  • Create and manage an Azure AI service
  • Deploy Azure AI services
  • Create solutions to detect anomalies and improve content
  • Analyze images
  • Extract text from images
  • Implement image classification and object detection by using the Custom Vision service part of Azure Cognitive Services
  • Process videos
  • Analyze text
  • Process speech
  • Translate language
  • Build and manage a language understanding model
  • Create a question answering solution
  • Implement a Cognitive Search solution
  • Apply AI enrichment skills to an indexer pipeline
  • Design and implement conversation flow
  • Build a conversational bot
  • Test publish and maintain a conversational bot

You'll benefit from the latest up-to-date Microsoft courseware and practice papers as The Supplier is a Microsoft Learning Partner.

You'll also be prepared for exam Exam AI-102: Designing and Implementing a Microsoft Azure AI Solution. You'll sit this exam at the The Supplier Centre during the course covered by your Certification Guarantee.

Audience

If you're a developer who builds applications integrated with Cognitive Services and/or Azure Bots this course is ideal for you. This course requires no previous knowledge of Machine Learning.

","

Before attending this course students must have:

  • Knowledge of Microsoft Azure and ability to navigate the Azure portal
  • Knowledge of either C# or Python
  • Familiarity with JSON and REST programming semantics
","","
  • Module 1 - Prepare to develop AI solutions on Azure
  • Module 2 - Create and consule Cognitive Services
  • Module 3 - Secure Cognitive Services
  • Module 4 - Monitor Cognitive Services
  • Module 5 - Deploy Cognitive Services in Containers
  • Module 6 - Extract insights from text with the Language Service
  • Module 7 - Translate text with the Translator service
  • Module 8 - Build a Language Understanding Model
  • Module 9 - Publish and use a Language Understanding app
  • Module 10 - Build a bot with the Bot Framework SDK
  • Module 11 - Analyze Images
  • Module 12 - Analyze Video
  • Module 13 - Classify images
  • Module 14 - Detect objects in images
  • Module 15 - Detect analyze and recognise faces
  • Module 16 - Read Text in Images and Documents with the Computer Vision Service
  • Module 17 - Extract data from forms with Form Recognizer
  • Module 18 - Create an Azure Cognitive Search Solution
  • Module 19 - Create a customer skill for Azure Cognitive Search
  • Module 20 - Create a knowledge store with Azure Cognitive Search
" "mcaf","Certified Azure Fundamentals Course | Exam AZ-900 -

On this accelerated Microsoft Azure Fundamentals course you'll get foundational knowledge on how cloud services work and how Microsoft Azure services provide key capabilities to organisations that allow them to improve their workloads by moving to the cloud.

In just 1-day you’ll learn the main Azure services and general concepts like Public Private and Hybrid cloud and Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). You'll also learn how to understand:

  • Cloud concepts
  • Core Azure services
  • Security privacy compliance and trust
  • Azure pricing and support

At the end of this accelerated course you’ll sit exam AZ-900: Microsoft Azure Fundamentals and get your Microsoft Azure Fundamentals certification.

The Supplier’s status as a Microsoft Gold Partner for Learning means you’ll get access to the most up-to-date Microsoft courseware and practice papers. Your expert Microsoft Certified Trainer (MCT) will immerse you in the curriculum with our unique Lecture | Lab | Review methodology helping you to build and retain information faster. 

Audience

This course is ideal if you're an IT Professional that wants to start to work with Microsoft Azure or you have a non-IT role but need to interact with cloud solutions and/or IT Professionals that work with Microsoft Azure

","

Candidates for this exam should have foundational knowledge of cloud services and how those services are provided with Microsoft Azure. The exam is intended for candidates who are just beginning to work with cloud-based solutions and services or are new to Azure.

","

The Supplier deliver accelerated courses as a Microsoft Learning Partner. You'll get exclusive benefits including:

  • Expert instruction from a Microsoft Certified Trainer (MCT)
  • Microsoft Official Curriculum (MOC)
  • Official Microsoft Practice Tests
  • On-site testing - walk away certified
","

Course AZ-900T01-A: Microsoft Azure Fundamentals

  • Module 1: Cloud concepts
  • Module 2: Azure architecture and services
  • Module 3: Azure management and governance
" "mcasea","Certified Azure Security Engineer Associate -

Gain the skills you need to become a Microsoft Certified Azure Security Engineer Associate in just 3 days. You'll learn how best to implement data platforms and protect your business with Azure technology.

Boost your knowledge on implementing security controls maintaining your business' security posture and identifying and remediating security vulnerabilities. This course includes security for identity and access platform protection data and applications and security operations.

You'll learn the official curriculum fast as you're taught by Microsoft Certified Trainers. The Supplier's unique Lecture | Lab | Review methodology means you'll practice everything you learn in a distraction-free environment and return to the office certified.

You'll also learn how to:

  • Implement enterprise governance strategies including role-based access control Azure policies and resource locks
  • Implement an Azure AD infrastructure including users groups and multi-factor authentication
  • Implement perimeter security strategies including Azure Firewall
  • Implement storage security strategies including shared access signatures blob retention policies and Azure Files authentication

You will be prepared for and sit exam AZ-500 at the The Supplier Centre during the course. This is covered by your Certification Guarantee - pass first time or train again for free.

If you're interested in developing your skills as an Azure Security Engineer Associate then this course is ideal for you.

","

Before attending this accelerated course you should have experience in:

  • Deploying Azure workloads
  • Windows and Linux operating systems and scripting languages

And an understanding of:

  • Security best practices and industry security requirements such as defense in depth least privileged access role-based access control multi-factor authentication
  • Security protocols such as Virtual Private Networks (VPN) Internet Security Protocol (IPSec) Secure Socket Layer (SSL) disk and data encryption methods

Microsoft also recommend you take the Exam AZ-104: Microsoft Azure Administrator Associate.

","","
  • Module 1: Manage Identity and Access
    • Lab: Role-Based Access Control
    • Lab: Azure Policy
    • Lab: Resource Manager Locks
    • Lab: MFA Conditional Access and AAD Identity Protection
    • Lab: Azure AD Privileged Identity Management
    • Lab: Implement Directory Synchronisation
  • Module 2: Implement Platform Protection
    • Lab: Configuring and Securing ACR and AKS
    • Lab: Azure Firewall
    • Lab: Network Security Groups and Application Security Groups
  • Module 3: Secure Data and Applications
    • Lab: Key Vault (Implementing Secure Data by setting up Always Encrypted)
    • Lab: Securing Azure SQL Database
    • Lab: Service Endpoints and Securing Storage
  • Module 4: Manage Security Operations
    • Lab: Azure Sentinel
    • Lab:  Azure Security Center
    • Lab: Azure Monitor
" "mcppsae","Certified Power Platform Solution Architect | Exam PL-600 -

On this accelerated Microsoft Certified: Power Platform Solution Architect course you will develop your knowledge in designing implementing and developing an overall solution to your business' strategies.

In just 2 days you’ll build knowledge in increasing the value of the customer’s investment and promote organisational health. You’ll also be responsible for:

  • Performing solution envisioning and requirement analyses
  • Facilitating design decisions across development configuration integration infrastructure security availability storage and change management
  • Balancing a project's business needs while meeting functional and non-functional require

At the end of this course you’ll sit Exam PL-600: Microsoft Power Platform Solution Architect and achieve your certification.

As a Microsoft Gold Partner for Learning and through The Supplier’s Lecture | Lab | Review methodology you’ll get access to Microsoft Official Curriculums (MOCs) learn from Microsoft Certified Trainers (MCTs) get official courseware and train in a distraction-free environment.

Audience

This course is ideal for Solution Architects who are responsible for the design implementation deployment and adoption of an overall solution.

Next step: Microsoft Certified: Power Platform Solution Architect Expert

Once you have passed Exam PL-600: Microsoft Power Platform Solution Architect you’ll be halfway to achieving the Microsoft Certified: Power Platform Solution Architect Expert certification.

Achieve either Exam: PL-600 and the Microsoft Certified Power Platform Functional Consultant Associate certification or Exam: PL-600 and Microsoft Certified Power Platform Developer Associate certification in order to become a Microsoft Power Platform Solution Architect Expert.

Once you have passed both Exam PL-600 and one of the prerequisites you’ll automatically receive your Microsoft Certified: Power Platform Solution Architect Expert certification.

","

Before attending this accelerated course you should have achieved one of the following certifications:

  • Microsoft Certified: Power Platform Functional Consultant Associate
  • Microsoft Certified Power Platform Developer Associate 
","","

Section 1: Perform solution envisioning and requirement analyses

  • Module 1: Initiate solution planning
  • Module 2: Identify organisation information and metrics
  • Module 3: Identify existing solutions and systems
  • Module 4: Capture requirements
  • Module 5: Perform fit/gap analyses

Section 2: Architect a solution

  • Module 1: Lead the design process
  • Module 2: Design the data model
  • Module 3: Design integrations
  • Module 4: Design the security model

Section 3: Implement the solution

  • Module 1: Validate the solution design
  • Module 1: Support go-live
" "md365fof","Dynamics 365 Finance -

Please note: This course's title has changed from 'Certified Dynamics 365 for Finance and Operations Financials Functional Consultant Associate' to 'Dynamics 365 Finance'.

Get the skills and knowledge you need to become a Microsoft Dynamics 365 Finance Functional Consultant on this 4-day course.

On this course you'll learn how to analyse business requirements and translate theminto fully realised business processes and solutions that implement industry-recommended practices.

The Supplier's unique Lecture | Lab | Review technique means you'll learn the official curriculum 40% faster than traditional training. Become a Microsoft Certified Dynamics 365 for Financials Functional Consultant Associate by covering the following:

  • Set up and configure financial management
  • Implement accounts receivable credit collections and revenue recognition
  • Implement and manage accounts payable and expenses
  • Manage budgeting
  • Manage fixed assets

You will be prepared by Microsoft Certified Trainers to sit exam MB-310 at the The Supplier Centre during the course. This is covered by your Certification Guarantee.

Please note in order to achieve the Microsoft Dynamics 365 Finance certification you must also take the:

  • MB-300: Microsoft Dynamics 365 Core Finance and Operations exam
","

Whilst there is no official pre-requisite you have a fundamental understanding of
accounting principles and a deeper understanding of financial operations as they relate
to:

  • Core finance
  • Manufacturing
  • Retail
  • Supply chain management operations

As a candidate for this exam you specialize in one or more feature sets of Dynamics
365 Finance including core finance general ledger tax cost accounting cost
management fixed assets asset leasing budgeting revenue recognition consolidation
and elimination credit and collections cash and bank management and expense
management. You understand the relationships between:

  • Finance and manufacturing
  • Retail
  • Supply chain management

","","
  • Module 1 - Configure and use the general ledger in Dynamics 365 Finance.
  • Module 2 - Configure and use cash and bank management and sales tax in Dynamics 365
    Finance.
  • Module 3 - Work with accounts payable in Dynamics 365 Finance.
  • Module 4 - Work with accounts recievable in Dynamics 365 Finance.
  • Module 5 - Configure and use budgeting in Dynamics 365 Finance.
  • Module 6 - Get started with cost accounting for supply chains in Dynamics 365 Finance.
  • Module 7 - Work with Expense management in Dynamics 365 Project Operations
" "mdmais","Designing Microsoft Azure Infrastructure Solutions | Exam AZ-305 -

On this accelerated Designing Microsoft Azure Infrastructure Solutions course you’ll learn the principles and skills required to design infrastructure solutions manage decisions to affect an overall solution and how best to implement your new skills into your business.

In just 3 days you’ll build knowledge on governance application architecture data integration and authentication to name a few topics. You’ll also learn about:

  • Non-relational storage relational storage and data integration solutions
  • Logging and monitoring solutions
  • Networking business continuity and migration solutions

At the end of this course you’ll sit Exam AZ-305: Designing Microsoft Azure Infrastructure Solutions and achieve your certification. As a Microsoft Gold Partner for Learning and through The Supplier’s Lecture | Lab | Review methodology you’ll get access to Microsoft Official Curriculum (MOCs) learn from Microsoft Certified Trainers (MCTs) and train in a distraction-free environment.

Next steps: Microsoft Certified: Azure Solutions Architect Expert certification

Once you achieve the Designing Microsoft Azure Infrastructure Solutions certification you'll be halfway towards becoming a Microsoft Azure Solutions Architect Expert.

Both exam AZ-305 and exam AZ-104: Microsoft Azure Administrator Associate are prerequisites for the Microsoft Certified: Azure Solutions Architect Expert certification.

After you pass both exams you'll automatically receive the Microsoft Azure Solutions Architect Expert certification.

Alternatively you can take the combined course and pass both exams in just 7 days.

","

Before attending this accelerated course you should have experience in deploying or administering Azure resources as well as knowledge in:

  • Azure Active Directory
  • Azure compute technologies like VMs containers and serverless solutions
  • Azure virtual networking to include load balancers
  • Azure Storage technologies (unstructured and databases)
  • General application design concepts like messaging and high availability
","","

Course AZ-305T00: Designing Microsoft Azure Infrastructure Solutions

Module 1: Design governance and compute solutions

  • Lab: Case studies

Module 2: Design storage and data integration solutions

  • Lab: Case studies

Module 3: Design app architecture access and monitoring solutions

  • Lab: Case studies

Module 4: Design network continuity and migration solutions

  • Lab: Case studies
" "miaaa","Certified: Identity and Access Administrator Associate | Exam SC-300 -

On this accelerated Microsoft Certified: Identity and Access Administrator Associate course you’ll learn to design implement and operate your business' identity and access management system by using Azure AD.

In just 3 days you’ll build knowledge on managing tasks like providing secure authentication and authorisation access to enterprise applications. You’ll also learn how to:

  • Troubleshoot monitor and report the identity and access environment
  • Provide seamless experiences and self-service management capabilities for all users
  • Adapt access and governance

At the end of this course you’ll sit exam Exam SC-300: Microsoft Identity and Access Administrator  and achieve your certification. As The Supplier are a Microsoft Gold Partner for Learning you’ll get access to the official exam Microsoft Official Curriculum (MOCs) and learn from Microsoft Certified Trainers (MCTs).

Through The Supplier’s Lecture | Lab | Review methodology you’ll achieve your certification twice as fast as traditional training.

","

Before attending this accelerated course you should have prior knowledge in the following areas:

  • Security best practices and industry security requirements such as defence in depth least privileged access shared responsibility and zero trust model
  • Identity concepts such as authentication authorization and active directory
  • Deploying Azure workloads. This course does not cover the basics of Azure administration instead the course content builds on that knowledge by adding security-specific information
  • Windows and Linux operating systems and scripting languages is helpful but not required. Course labs may use PowerShell and the CLI
","","

Course SC-300T00-A: Microsoft Identity and Access Administrator

Module 1: Implement an identity management solution 

  • Implement initial configuration of Azure Active Directory
  • Create configure and manage identities
  • Implement and manage external identities
  • Implement and manage hybrid identity

Module 2: Implement an authentication and access management solution

  • Secure Azure AD user with MFA
  • Manage user authentication
  • Plan implement and administer conditional access
  • Manage Azure AD Identity Protection

Module 3: Implement Access Management for Apps

  • Plan and design the integration of enterprise for SSO
  • Implement and monitor the integration of enterprise apps for SSO
  • Implement app registrations

Module 4: Plan and implement an Identity Governance Strategy

  • Plan and implement entitlement management
  • Plan implement and manage access reviews
  • Plan and implement privileged access
  • Monitor and maintain Azure Active Directory
" "ms365a102","Microsoft 365 Administrator | Exam MS-102 -

This accelerated Microsoft 365 Administrator course which replaces the MS-100 and MS-101 in May 2023 is for Microsoft 365 administrators who deploy and manage Microsoft 365.

You will learn to perform Microsoft 365 tenant-level implementation and administration of cloud and hybrid environments.

Microsoft 365 administrators function as the integrating hub for all Microsoft 365 workloads and coordinate across multiple Microsoft 365 workloads.

In just 4 days youll learn work to with architects and other administrators responsible for workloads infrastructure identity security compliance endpoints and applications.

At the end of this course youll sit the Microsoft exam and achieve your Microsoft 365 Administrator certification.

Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal for:

  • Microsoft 365 administrators who deploy and manage Microsoft 365.
  • People who have functional experience with all Microsoft 365 workloads and Azure Active Directory (Azure AD) part of Microsoft Entra and have administered at least one of these.
  • People who have a working knowledge of networking server administration DNS and PowerShell.
","

Before attending this accelerated course you should have one of these four potential pre-requisite options:

  • Microsoft 365 Endpoint Administrator (MD-102T00)
  • Microsoft 365 Certified: Messaging Administrator Associate
  • Microsoft 365 Certified: Teams Administrator Associate
  • Microsoft Certified: Identity and Access Administrator Associate
","","Curriculum

Module 1: Deploy and manage a Microsoft 365 tenant (25-30%) Implement and manage a Microsoft 365 tenant

  • Create a tenant
  • Implement and manage domains
  • Configure organizational settings including security privacy and profile
  • Identify and respond to service health issues
  • Configure notifications in service health
  • Monitor adoption and usage

Manage users and groups

  • Create and manage users
  • Create and manage guest users
  • Create and manage contacts
  • Create and manage groups including Microsoft 365 groups
  • Manage and monitor Microsoft 365 license allocations
  • Perform bulk user management including PowerShell

Manage roles in Microsoft 365

  • Manage roles in Microsoft 365 and Azure AD
  • Manage role groups for Microsoft Defender Microsoft Purview and Microsoft 365 workloads
  • Manage delegation by using administrative units
  • Implement privileged identity management for Azure AD roles

Module 2: Implement and manage identity and access in Azure AD (25-30%)

Implement and manage identity synchronization with Azure AD

  • Prepare for identity synchronization by using IdFix
  • Implement and manage directory synchronization by using Azure AD Connect cloud sync
  • Implement and manage directory synchronization by using Azure AD Connect
  • Monitor synchronization by using Azure AD Connect Health
  • Troubleshoot synchronization including Azure AD Connect and Azure AD Connect cloud sync

Implement and manage authentication

  • Implement and manage authentication methods including Windows Hello for Business passwordless tokens and the Microsoft Authenticator app
  • Implement and manage self-service password reset (SSPR)
  • Implement and manage Azure AD Password Protection
  • Implement and manage multi-factor authentication (MFA)
  • Investigate and resolve authentication issues

Implement and manage secure access

  • Plan for identity protection
  • Implement and manage Azure AD Identity Protection
  • Plan Conditional Access policies
  • Implement and manage Conditional Access policies

Module 3: Manage security and threats by using Microsoft 365 Defender (25- 30%)

Manage security reports and alerts by using the Microsoft 365 Defender portal

  • Review and take actions to improve the Microsoft Secure Score in the Microsoft 365 Defender portal
  • Review and respond to security incidents and alerts in Microsoft 365 Defender
  • Review and respond to issues identified in security and compliance reports in Microsoft 365 Defender
  • Review and respond to threats identified in threat analytics

Implement and manage email and collaboration protection by using Microsoft Defender for Office 365

  • Implement policies and rules in Defender for Office 365
  • Review and respond to threats identified in Defender for Office 365 including threats and investigations
  • Create and run campaigns such as attack simulation
  • Unblock users Implement and manage endpoint protection by using Microsoft Defender for Endpoint
  • Onboard devices to Defender for Endpoint
  • Configure Defender for Endpoint settings
  • Review and respond to endpoint vulnerabilities
  • Review and respond to risks identified in the Microsoft Defender Vulnerability Management dashboard

Module 4: Manage compliance by using Microsoft Purview (15-20%)

Implement Microsoft Purview information protection and data lifecycle management

  • Implement and manage sensitive info types by using keywords keyword lists or regular expressions
  • Implement retention labels retention label policies and retention policies
  • Implement sensitivity labels and sensitivity label policies Implement Microsoft Purview data loss prevention (DLP)
  • Implement DLP for workloads
  • Implement Endpoint DLP
  • Review and respond to DLP alerts events and reports
" "ms365ea","MD-102T00 : Microsoft 365 Endpoint Administrator -

On this accelerated MD-102T00 : Microsoft 365 Endpoint Administrator course you will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies.

This course introduces essential elements of modern management co-management approaches and Microsoft Intune integration. It covers app deployment management of browser-based applications and key security concepts such as authentication identities access and compliance policies. Technologies like Azure Active Directory Azure Information Protection and Microsoft Defender for Endpoint are explored to protect devices and data.

At the end of this course youll sit the Microsoft exam and achieve your MD-102T00 : Microsoft 365 Endpoint Administrator certification.

Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

Audience

This course is ideal for Microsoft 365 administrators security administrators and other workload administrators.

","

Before attending this accelerated course you should have:

  • Experience with Azure AD and Microsoft 365 technologies including Intune.
  • Strong skills and experience in deploying configuring and maintaining Windows client and non-Windows devices.
","","

Module 1: Deploy Windows client (25-30%)

  • Prepare for a Windows client deployment
  • Select a deployment tool based on requirements
  • Choose between migrate and rebuild
  • Choose an imaging and/or provisioning strategy
  • Select a Windows edition based on requirements
  • Implement subscription-based activation
  • Plan and implement a Windows client deployment by using Windows Autopilot
  • Configure device registration for Autopilot
  • Create validate and assign deployment profiles
  • Set up the Enrolment Status Page (ESP)
  • Deploy Windows devices by using Autopilot
  • Troubleshoot an Autopilot deployment
  • Plan and implement a Windows client deployment by using the Microsoft Deployment Toolkit (MDT)
  • Plan and implement an MDT deployment infrastructure
  • Create manage and deploy images
  • Monitor and troubleshoot a deployment
  • Plan and configure user state migration
  • Configure remote management
  • Configure Remote Help in Intune
  • Configure Remote Desktop on a Windows client
  • Configure the Windows Admin Centre
  • Configure PowerShell remoting and Windows Remote Management (WinRM)

Module 2: Manage identity and compliance (15-20%)

  • Manage identity
  • Implement user authentication on Windows devices including Windows Hello for Business passwordless and tokens
  • Manage role-based access control (RBAC) for Intune
  • Register devices in and join devices to Azure AD
  • Implement the Intune Connector for Active Directory
  • Manage the membership of local groups on Windows devices
  • Implement and manage Local Administrative Passwords Solution (LAPS) for Azure AD
  • Implement compliance policies for all supported device platforms by using Intune
  • Specify compliance policies to meet requirements Implement compliance policies
  • Implement Conditional Access policies that require a compliance status
  • Manage notifications for compliance policies
  • Monitor device compliance
  • Troubleshoot compliance policies

Module 3: Manage maintain and protect devices (40-45%)

  • Manage the device lifecycle in Intune
  • Configure enrolment settings
  • Configure automatic and bulk enrolment including Windows Apple and Android
  • Configure policy sets Restart retire or wipe devices
  • Manage device configuration for all supported device platforms by using Intune
  • Specify configuration profiles to meet requirements
  • Implement configuration profiles
  • Monitor and troubleshoot configuration profiles
  • Configure and implement Windows kiosk mode
  • Configure and implement profiles on Android devices including fully managed dedicated corporate owned and work profile
  • Plan and implement Microsoft Tunnel for Intune
  • Monitor devices Monitor devices by using Intune
  • Monitor devices by using Azure Monitor
  • Analyse and respond to issues identified in Endpoint analytics and Adoption Score
  • Manage device updates for all supported device platforms by using Intune
  • Plan for device updates
  • Create and manage update policies by using Intune
  • Manage Android updates by using configuration profiles
  • Monitor updates Troubleshoot updates in Intune
  • Configure Windows client delivery optimization by using Intune
  • Create and manage update rings by using Intune
  • Implement endpoint protection for all supported device platforms
  • Implement and manage security baselines in Intune
  • Create and manage configuration policies for Endpoint security including antivirus encryption firewall endpoint detection and response (EDR) and attack surface reduction (ASR)
  • Onboard devices to Defender for Endpoint
  • Implement automated response capabilities in Defender for Endpoint
  • Review and respond to device issues identified in the Microsoft Defender Vulnerability Management dashboard

Module 4: Manage applications (10-15%)

  • Deploy and update apps for all supported device platforms
  • Deploy apps by using Intune
  • Configure Microsoft 365 Apps deployment by using the Microsoft Office Deployment Tool or Office Customization Tool (OCT)
  • Manage Microsoft 365 Apps by using the Microsoft 365 Apps admin centre
  • Deploy Microsoft 365 Apps by using Intune
  • Configure policies for Office apps by using Group Policy or Intune
  • Deploy apps to platform-specific app stores by using Intune
  • Plan and implement app protection and app configuration policies
  • Plan and implement app protection policies for iOS and Android
  • Manage app protection policies
  • Implement Conditional Access policies for app protection policies
  • Plan and implement app configuration policies for managed apps and managed devices
  • Manage app configuration policies
" "msadpbi","Certified: Power BI Data Analyst Associate -

Please note: This course's title has changed from 'Microsoft Certified Data Analyst Associate' to 'Microsoft Certified: Power BI Data Analyst Associate'. The exam has also changed from 'Exam DA-100: Analysing Data with Microsoft Power BI' to 'Exam PL-300: Microsoft Power BI Data Analyst'.

At The Supplier we were awarded the Microsoft Solutions Partner for Business Applications and Data & AI (Azure) badges in recognition of our expertise in delivering quality solutions in this specialised business area.

On this accelerated Microsoft Certified: Power BI Data Analyst Associate course you'll learn how to boost the value of your business’ data assets by using Microsoft Power BI.

In just 3 days you'll gain knowledge on designing and building scalable data models cleaning and transforming data enabling advanced analytic capabilities and deploying and maintaining deliverables. You’ll also learn how to:

  • Collaborate with key stakeholders to deliver relevant insights
  • Resolve inconsistencies unexpected or null values and data quality issues
  • Use DAX to build complex measures and implement Time Intelligence

At the end of your course you’ll sit Exam PL-300: Microsoft Power BI Data Analyst and get certified as a Microsoft Power BI Data Analyst Associate.

You'll get access to Microsoft Official Curriculum (MOC) and learn from certified instructors as The Supplier is a Microsoft Gold Partner for Learning. Train through The Supplier's Lecture | Lab | Review methodology and you'll achieve your Microsoft certification at twice the speed in a distraction-free environment.

","

Before attending this accelerated course you should have fundamental knowledge of:

  • Core data concepts
  • Working with relational data in the cloud
  • Working with non-relational data in the cloud
  • Data analysis and visualisation concepts
","","
  • Module 1: Get Started with Microsoft Data Analytics
  • Module 2: Getting Data in Power BI
  • Module 3: Cleaning Transforming and Loading Data in Power BI
  • Module 4: Design a Data Model in Power BI
  • Module 5: Create Model Calculations using DAX in Power BI
  • Module 6: Optimize Model Performance in Power BI
  • Module 7: Create Reports in Power BI
  • Module 8: Create Dashboards in Power BI
  • Module 9: Identify Patterns and Trends in Power BI
  • Module 10: Create and Manage Workspaces in Power BI
  • Module 11: Manage Files and Datasets in Power BI
  • Module 12: Row-level Security in Power BI
" "msanea","Certified: Azure Network Engineer Associate -

At The Supplier we were awarded the Microsoft Solutions Partner for Infrastructure (Azure) badge in recognition of our expertise in delivering quality solutions in this specialised business area.

On this accelerated Microsoft Certified: Azure Network Engineer Associate course you’ll gain knowledge in planning implementing and maintaining Azure networking solutions into your business including hybrid networking connectivity routing security and private access to Azure services.

In just 3 days you’ll build knowledge on load balance traffic network routing private access to Azure services network security and monitoring. You’ll also learn about:

  • The Azure Portal and other methods including PowerShell Azure Command-Line Interface (CLI) and Azure Resource Manager templates (ARM templates)
  • Designing and implementing Azure ExpressRoute ExpressRoute Global Reach ExpressRoute FastPath and ExpressRoute Peering options
  • The differences between Private Link Service and private endpoints

At the end of this course you’ll sit Exam AZ-700: Designing and Implementing Microsoft Azure Networking Solutions and achieve your Microsoft Certified: Azure Network Engineer Associate certification.

As a Microsoft Gold Partner for Learning and through The Supplier’s Lecture | Lab | Review methodology you’ll get access to Microsoft Official Curriculums (MOCs) official courseware learn from Microsoft Certified Trainers (MCTs) and train in a distraction-free environment.

Audience

This course is ideal if you are a Network Engineer interested in specialising in Azure networking solutions.

","

Before attending this accelerated course Microsoft recommend you have experience in Azure administration enterprise networking on-premises or cloud infrastructure and network security. You should also have an understanding of:

  • On-premises virtualisation technologies including VMs virtual networking and virtual hard disks
  • Network configurations including TCP/IP Domain Name System (DNS) virtual private networks (VPNs) firewalls and encryption technologies
  • Software-defined networking
  • Hybrid network connectivity methods such as VPN
  • Resilience and disaster recovery including high availability and restore operations

The following Microsoft certifications encompass all the foundational knowledge recommended to have before attending this course:

  • Microsoft Certified Azure Fundamentals | Exam AZ-900
  • Microsoft Certified Azure Administrator Associate | AZ-104
","","

Course AZ-700T00: Designing and Implementing Microsoft Azure Networking Solutions

  • Module 1: Azure Virtual Networks
    • Lab: Design and implement a Virtual Network in Azure
    • Lab: Configure DNS settings in Azure
    • Lab: Connect Virtual Networks with Peering
  • Module 2: Design and Implement Hybrid Networking
    • Lab: Create and configure a local gateway
  • Module 3: Design and implement Azure ExpressRoute
    • Lab: Create and configure ExpressRouteModule 4: load balancing non-HTTP(S) traffic in Azure
    • Lab: Create and configure a public load balancer to load balance VMs using the Azure portal
    • Lab: Create a Traffic Manager Profile using the Azure portal
    • Lab: Create view and manage metric alerts in Azure Monitor
  • Module 5: Load balancing HTTP(S) traffic in Azure
    • Lab: Create a Front Door for a highly available web application using the Azure portal
    • Lab: Create and Configure an Application Gateway
  • Module 6: Design and implement network security
    • Lab: Create a Virtual Network with DDoS protection plan
    • Lab: Deploy and Configure Azure Firewall
    • Lab: Create a Web Application Firewall policy on Azure Front Door
  • Module 7: Design and implement private access to Azure Services
    • Lab: Restrict network access to PaaS resources with virtual network service endpoints
    • Lab: Create an Azure private endpoint
" "msarda","Certified Azure Database Administrator Associate -

At The Supplier we were awarded the Microsoft Solutions Partner for Data & AI (Azure) badge in recognition of our expertise in delivering quality solutions in this specialised business area.

On this accelerated Microsoft Certified: Azure Database Administrator Associate course you’ll learn how to apply utilise and manage the operational elements of cloud-native and hybrid data platform solutions built on Microsoft Azure data services and Microsoft SQL Server.

In just 3 days you'll build knowledge on a broad range of methods and tools like:

  • Applying T-SQL for administrative management purposes
  • Managing security and performance and optimising modern relational database solutions
  • Learning to work with the Azure Data Engineer to manage operational aspects of data platform solutions

Through The Supplier's Lecture | Lab | Review methodology you'll learn 50% faster than traditional training. You’ll get access to Microsoft Official Curriculum (MOCs) certified instructors and sit Exam DP-300: Administering Relational Databases on Microsoft Azure (currently in beta) in a distraction-free environment.

Achieve your certification in a matter of days and return to the office a Microsoft Certified: Azure Database Administrator Associate.

Audience

If you're a database administrator or a data management specialist that manages on-premises and cloud relational databases built on top of Microsoft SQL Server and Microsoft Azure data services this course is ideal for you.

","

Before attending this accelerated course you should have technical knowledge equivalent to either of the following courses:

  • Microsoft Certified: Azure Fundamentals
  • Microsoft Certified: Azure Data Fundamentals
","","

Course DP-300T00-A: Administering Relational Databases on Microsoft Azure

  • Module 1: The Role of the Azure Database Administrator
    • Lab: Using the Azure Portal and SQL Server Management Studio
  • Module 2: Plan and Implement Data Platform Resources
    • Lab: Deploying Azure SQL Database
  • Module 3: Implement a Secure Environment
    • Lab: Implement a Secure Environment
  • Module 4: Monitor and Optimise Operational Resources
    • Lab: Monitor and Optimise Resources
  • Module 5: Optimise Query Performance
    • Lab: Query Performance Troubleshooting
  • Module 6: Automation of Tasks
    • Lab: Automating Tasks
  • Module 7: Plan and Implement a High Availability and Disaster Recovery Environment
    • Lab: Plan and Implement a High Availability and Disaster Recovery Environment
" "msasae","Certified Azure Solutions Architect Expert -

At The Supplier we were awarded the Microsoft Solutions Partner for Data & AI (Azure) and Infrastructure (Azure) badges in recognition of our expertise in delivering quality solutions in this specialised business area.

On this accelerated Microsoft Certified: Azure Solutions Architect Expert course you'll get the skills you need as an Azure Solutions Architect to implement monitor and maintain Azure solutions - from implementation of virtual machines to designing API integration strategies. You'll also gain expert understanding of service capabilities within the Microsoft Azure cloud.

In just 7 days you'll also learn how to:

  • Deploy and configure infrastructure
  • Implement workloads and security
  • Create and deploy apps
  • Implement authentication and secure data
  • Develop for the cloud and for Azure storage
  • Determine workload requirements
  • Design for identity and security
  • Design a data platform solution
  • Design a business continuity strategy
  • Design for deployment migration and integration
  • Design an infrastructure strategy

You'll be immersed in the curriculum and have 24/7 lab access with The Supplier's unique Lecture | Lab | Review methodology helping you to build and retain information faster.

You'll get access to Microsoft Official Courseware (MOCs) and learn from certified Microsoft trainers MCTs) as The Supplier are a Microsoft Gold Partner for Learning. 

You'll also be prepared for Exam AZ-104: Microsoft Azure Administratorand Exam AZ-305: Designing Microsoft Azure Infrastructure Solutions. You'll sit these exams during the course covered by your Certification Guarantee.

Audience

If you're an Azure Administrator who manages cloud services that span across a variety of cloud capabilities this course is ideal for you.

Certification path

You also have the option of taking the exams separately. Once you've completed both you'll automatically achieve the Microsoft Certified: Solutions Architect Expert certification:

  • Microsoft Azure Administrator Associate | Exam AZ-104
  • Microsoft Designing Microsoft Azure Infrastructure Solutions | Exam AZ-305

Residential and online Microsoft’s Azure Solutions Architect Expert training

The Supplier offers both a classroom-based and Microsoft Azure solutions architect expert online course including everything you need to get certified in record time:

  • Official courseware labs and practice exams
  • AZ-104: Microsoft Azure Administratorand AZ-305: Designing Microsoft Azure Infrastructure Solutions certification exams
  • Accommodation meals and snacks (for residential courses)
","

In order to achieve the Microsoft Certified Azure Solutions Architect Expert certification you must have achieved the following certifications:

  • Microsoft Designing Microsoft Azure Infrastructure Solutions | Exam AZ-305
  • Microsoft Azure Administrator Associate | Exam AZ-104
","","

Course AZ-104T00: Microsoft Azure Administrator

  • Module 1: Identity
  • Module 2: Governance and Compliance
  • Module 3: Azure Administration
  • Module 4: Virtual Networking
  • Module 5: Intersite Connectivity
  • Module 6: Network Traffic Management
  • Module 7: Azure Storage
  • Module 8: Azure Virtual Machines
  • Module 9: PaaS Compute Options
  • Module 10: Data Protection
  • Module 11: Monitoring

Course AZ-305T00: Designing Microsoft Azure Infrastructure Solutions

  • Module 1: Design governance and compute solutions
  • Module 2: Design storage and data integration solutions
  • Module 3: Design app architecture access and monitoring solutions
  • Module 4: Design network continuity and migration solutions
" "msca100","Cybersecurity Architect | Exam SC-100 -

On this accelerated 3 Day Microsoft Cybersecurity Architect course you’ll learn to
design solutions that align with security best practices and priorities design
security operations identity and compliance capabilities design security solutions
for infrastructure and design security solutions for applications and data.

You’ll also learn to support your business by designing security for infrastructure
and designing a strategy for data and applications.

As a Microsoft Gold Partner for Learning and through The Supplier’s Lecture | Lab |
Review methodology you’ll get access to Microsoft Official Curriculum (MOCs) learn
from Microsoft Certified Trainers (MCTs) in a distraction-free environment.

At the end of this course you’ll sit Exam SC-100: Microsoft Cybersecurity Architect.

In order to achieve the Microsoft Certified: Cybersecurity Architect Expert
certification you need to pass Exam SC-100 as well as one of the following:

  • Microsoft Certified: Security Operations Analyst Associate | Exam SC-200
  • Microsoft Certified: Identity and Access Administrator Associate | Exam SC-300
  • Microsoft Certified Azure Security Engineer Associate | Exam AZ-500
  • Both exam SC-100 and exam SC-200 SC-300 or AZ-500 are prerequisites to become a
  • Microsoft Certified: Cybersecurity Architect Expert.

After you pass both exams you'll automatically receive the Microsoft Certified:
Cybersecurity Architect Expert certification

","

Before attending this course you must have earned one of the following Associate level certifications:

  • Microsoft Certified: Identity and Access Administrator Associate
  • Microsoft 365 Certified: Security Administrator Associate
  • Microsoft Certified: Security Operations Analyst Associate
  • Microsoft Certified Azure Security Engineer Associate
  • Unsure whether you meet the prerequisites? Don’t worry. Your training consultant will
    discuss your background with you to understand if this course is right for you

    ","","
    • Module 1 - Introduction to Zero Trust and best practice frameworks.
    • Module 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-
      Architected Framework (WAF).
    • Module 3 - Design solutions that align with the Microsoft Cybersecurity Reference
      Architecture (MCRA) and Microsoft cloud security benchmark (MCSB).
    • Module 4 - Design a resiliency strategy for common cyberthreats like ransomware.
    • Module 5 - Case study: Design solutions that align with security best practices and
      priorities.
    • Module 6 - Design solutions for regulatory compliance.
    • Module 7 - Design solutions for identity and access management.
    • Module 8 - Design solutions for securing privileged access.
    • Module 9 - Design solutions for security operations.
    • Module 10 - Case study: Design security operations identity and compliance
      capabilities.
    • Module 11 - Design solutions for securing Microsoft 365.
    • Module 12 - Design solutions for securing applications.
    • Module 13 - Design solutions for securing an organization's data.
    • Module 14 - Case study: Design security solutions for applications and data.
    • Module 15 - Specify requirements for securing SaaS PaaS and IaaS services.
    • Module 16 - Design solutions for security posture management in hybrid and multicloud
      environments.
    • Module 17 - Design solutions for securing server and client endpoints.
    • Module 18 - Design solutions for network security.
    • Module 19 - Case study: Design security solutions for infrastructure.
    " "mscae","Certified: Cybersecurity Architect Expert -

    In this intensive course you will acquire the knowledge and skills to become an expert in designing managing and implementing cybersecurity strategies to protect your company its processes and enterprise architecture from cyber attacks.

    In less than a week you will be responsible for developing a Zero Trust strategy and architecture as well as:

    • Evaluating technical Governance-Risk-Compliance (GRC) strategies and security operations strategies
    • Designing a security strategy for infrastructure
    • Developing a strategy for data and applications

    As a Microsoft Gold Partner for Learning and through the The Supplier methodology Lecture | Lab | Review you will gain access to the Microsoft Official Curriculum (MOCs) and learn from Microsoft Certified Trainers (MCTs) in a distraction-free environment.

    Certification Path

    You have the option to take the combined exams for Microsoft Certified: Security Operations Analyst Associate | Exam SC-200 and Microsoft Cybersecurity Architect | Exam SC-100 or take the exams individually.

    To achieve the Microsoft Certified: Cybersecurity Architect Expert Certification you must pass both the SC-100 Exam and one of the following exams:

    • Microsoft Certified: Security Operations Analyst Associate | Exam SC-200
    • Microsoft Certified: Identity and Access Administrator Associate | Exam SC-300
    • Microsoft Certified Azure Security Engineer Associate | Exam AZ-500
    • Microsoft 365 Certified Security Administrator Associate | Exam MS-500

    Both the SC-100 Exam and the SC-200 SC-300 AZ-500 or MS-500 Exams are prerequisites for earning the title of Microsoft Certified: Cybersecurity Architect Expert.

    Upon passing both exams you will automatically receive the Microsoft Certified: Cybersecurity Architect Expert Certification.

    ","

    In order to achieve the Microsoft Certified: Cybersecurity Architect Expert certification you need to pass Exam SC-100 as well as one of the following:

    • Microsoft Certified: Security Operations Analyst Associate | Exam SC-200
    • Microsoft Certified: Identity and Access Administrator Associate | Exam SC-300
    • Microsoft Certified Azure Security Engineer Associate | Exam AZ-500
    • Microsoft 365 Certified Security Administrator Associate | Exam MS-500

    Both exam SC-100 and exam SC-200 SC-300 AZ-500 or MS-500 are prerequisites to become a Microsoft Certified: Cybersecurity Architect Expert.

    After you pass both exams you'll automatically receive the Microsoft Certified: Cybersecurity Architect Expert certification.

    If you are choosing to take the combined course (Exam SC-100 and Exam SC-200) then you will need the following prerequisites:

    Experience in:

    • Hybrid and cloud implementations
    • Security engineering areas including:
      • Identity and access
      • Platform protection
      • Security operations
      • Securing data
      • Securing applications

    And understanding of:

    • Microsoft 365
    • Microsoft security compliance and identity products
    • Azure services specifically Azure SQL Database and Azure Storage
    • Azure virtual machines and virtual networking
    • Scripting concepts
    • Windows 10
    ","","
    • Module 1: Mitigate threats using Microsoft 365 Defender
    • Module 2: Mitigate threats using Microsoft Defender for Endpoint
    • Module 3: Mitigate threats using Microsoft Defender for Cloud
    • Module 4: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
    • Module 5: Configure your Microsoft Sentinel environment
    • Module 6: Connect logs to Microsoft Sentinel
    • Module 7: Create detections and perform investigations using Microsoft Sentinel
    • Module 8: Perform threat hunting in Microsoft Sentinel

    SC-100: Microsoft Cybersecurity Architect

    • Section 1: Design a Zero Trust strategy and architecture
      • Module 1: Build an overall security strategy and architecture
      • Module 2: Design a security operations strategy
      • Module 3: Design an identity security strategy
    • Section 2: Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
      • Module 1: Design a regulatory compliance strategy
      • Module 2: Evaluate security posture and recommend technical strategies to manage risk
    • Section 3: Design security for infrastructure
      • Module 1: Design a strategy for securing server and client endpoints
      • Module 2: Design a strategy for securing SaaS PaaS and IaaS services
    • Section 4: Design a strategy for data and applications
      • Module 1: Specify security requirements for applications
      • Module 2: Design a strategy for securing data
    • Section 5: Recommend security best practices and priorities
      • Module 1: Recommend security best practices by using the Microsoft Cybersecurity Reference Architecture (MCRA) and Azure Security Benchmarks
      • Module 2: Recommend a secure methodology by using the Cloud Adoption Framework (CAF)
      • Module 3: Recommend a ransomware strategy by using Microsoft Security Best Practices
      " "msfde","Microsoft Certified: Fabric Data Engineer Associate (DP-700) - ","","","" "msoaa","Certified: Security Operations Analyst Associate | Exam SC-200 -

      On this accelerated Microsoft Certified: Security Operations Analyst Associate course you’ll learn to investigate and respond to threats to your business using Microsoft Azure Sentinel Azure Defender Microsoft 365 Defender and third-party security products.

      In just 3 days you’ll build knowledge on collaborating with stakeholders to secure information technology systems for your organisation. You’ll also learn how to:

      • Reduce business risk by rapidly remediating active attacks in the environment
      • Advising on improvements to threat protection practices
      • Refer violations of business policies to appropriate stakeholders

      At the end of this course you’ll sit exam Exam SC-200: Microsoft Security Operations Analyst and achieve your certification. As The Supplier are a Microsoft Gold Partner for Learning you’ll get access to the official exam Microsoft Official Curriculum (MOCs) and learn from Microsoft Certified Trainers (MCTs).

      Through The Supplier’s Lecture | Lab | Review methodology you’ll achieve your certification twice as fast as traditional training.

      ","

      Before taking this accelerated course you should have a basic understanding of the following topics:

      • Microsoft 365
      • Microsoft security compliance and identity products
      • Azure services specifically Azure SQL Database and Azure Storage
      • Azure virtual machines and virtual networking
      • Scripting concepts

      And an intermediate understanding of the following:

      • Windows 10
      ","","

      SC-200: Microsoft Security Operations Analyst

      • Module 1: Mitigate threats using Microsoft 365 Defender
      • Module 2: Mitigate threats using Microsoft Defender for Endpoint
      • Module 3: Mitigate threats using Microsoft Defender for Cloud
      • Module 4: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
      • Module 5: Configure your Microsoft Sentinel environment
      • Module 6: Connect logs to Microsoft Sentinel
      • Module 7: Create detections and perform investigations using Microsoft Sentinel
      • Module 8: Perform threat hunting in Microsoft Sentinel
      " "msp","MSP Foundation 5th edition and MSP Practitioner 5th edition -

      Achieve two MSP certifications in just 3 days on this official AXELOS course. MSP is the most widely used qualification for programme management and you’ll accelerate through both the Foundation and Practitioner levels on this course.

      In just 3 days you’ll become an expert in frameworks for implementing business strategies and initiatives. Across 3 days you’ll also study:

      • Organisational leadership
      • Stakeholder management
      • Quality management

      At the end of this accelerated MSP course youll prepare and sit the following exams covered by your certification guarantee:

      • MSP Foundation 5th Edition
      • MSP Practitioner 5th Edition

      Start your programme management journey in a distraction-free environment and learn at twice the speed through The Supplier's Lecture | Lab | Review methodology.

      MSP is a registered trade mark of AXELOS Limited used under permission of AXELOS Limited. The Swirl logo™ is a trade mark of AXELOS Limited used under permission of AXELOS Limited. All rights reserved.

      MSP is a registered trade mark of AXELOS Limited used under permission of AXELOS Limited. All rights reserved.

      Important note: From January 2023 All Global Best Practice certifications provided by Axelos will require recertification after 3 years. This will affect every certification issued from 1st January 2020 onwards and previous certification holders will be given 6 months to renew their certification. If you would like to know more please do not hesitate to contact us to discuss your recertification requirements.

      This course is delivered via our The Supplier UK and Benelux locations.

      ","

      Before attending this course you should have six months experience in project management.

      Please note: You'll be provided with the pre-course reading by email prior to attending. The Supplier recommends you spend around 8 hours working through this pre-reading.

      ","","
      • Module 1: An overview of MSP
        • Principles
        • Themes
        • Processes
      • Module 2: Programme documentation
      • Module 3: The 7 MSP themes
        • Organisation
        • Design
        • Justification
        • Structure
        • Knowledge
        • Assurance
        • Decisions
      " "msppda","Certified: Power Platform Developer Associate -

      On this accelerated Microsoft Certified: Power Platform Developer Associate course you’ll learn to design develop secure and troubleshoot Power Platform solutions.

      At The Supplier we were awarded the Microsoft Solutions Partner for Business Applications badge in recognition of our expertise in delivering quality solutions in this specialised business area.

      In just 4 days you’ll also learn to describe Power Platform extensibility points and how to:

      • Manage and troubleshoot apps
      • Apply business logic using client scripting
      • Use platform APIs

      At the end of this course you will take exam PL-400 - Microsoft Power Platform Developer (beta) and acieve your Microsoft Power Platform Developer Associate certification.

      As a Microsoft Gold Training Partner you'll get access to the Microsoft Official Curriculum (MOCs) official courseware and learn from Microsoft certified instructors.

      The Supplier’s Lecture | Lab | Review methodology will allow you to train at twice the speed of traditional training in a distraction-free environment.

      Audience

      This course is perfect for developers who work with Microsoft power apps model-driven apps in Dynamics 365.

      ","

      Before attending this accelerated course you should have:

      • Strong applied knowledge of Power Platform services
      • An in-depth understanding of their capabilities boundaries and constraints
      • A basic understanding of DevOps practices for Power Platform
      ","","

      Microsoft Certified Power Platform Developer Associate

      • Module 1: Create a technical design
      • Module 2: Configure Common Data Service
      • Module 3: Create and configure Power Apps
      • Module 4: Configure business process automation
      • Module 5: Extend the user experience
      • Module 6: Extend the platform
      • Module 7: Develop Integrations
      " "msppfca","Certified Power Platform Functional Consultant | Exam PL-200 -

      On this accelerated Microsoft Certified: Power Platform Functional Consultant Associate course you’ll learn key skills to help automate business processes develop app experiences and connect with your clients more efficiently.

      At The Supplier we were awarded the Microsoft Solutions Partner for Business Applications badge in recognition of our expertise in delivering quality solutions in this specialised business area.

      In just 4 days you’ll learn how to perform discovery capture requirements engage subject matter experts and stakeholders translate requirements and configure Power Platform solutions and apps. You’ll also build knowledge on:

      • Implementing components of a solution that include application enhancements
      • System integrations and data conversions
      • Custom process automation and custom visualisations

      At the end of your course you’ll sit Exam PL-200: Microsoft Power Platform Functional Consultant and achieve your Microsoft Certified: Power Platform Functional Consultant Associate certification.

      You’ll get access to Microsoft Official Curriculum (MOCs) and official courseware and learn from certified instructorsas The Supplier is a Microsoft Gold Partner for Learning. Train through The Supplier’s Lecture | Lab | Review methodology and you’ll achieve your certification at twice the speed in a distraction-free environment.

      Audience

      This course is ideal if you are an IT professional with experience in configuring Microsoft Power Platform. Also if you are in any of the following job roles:

      • Functional consultant
      • Data analyst
      • Developer

      Next step: Become a Microsoft Certified: Dynamics 365 Functional Consultant Associate 

      Once you achieve the Microsoft Certified: Power Platform Functional Consultant Associate certification you'll be on your way to becoming a Microsoft Functional Consultant Associate in your chosen field:

      Exam: PL-200 and Exam: MB-220: Microsoft Dynamics 365 Marketing are prerequisites for the Microsoft Certified: Dynamics 365 Marketing Functional Consultant Associate certification.

      Exam: PL-200 and MB-230: Microsoft Dynamics 365 Customer Service Functional Consultant are prerequisites for the Microsoft Certified: Dynamics 365 Customer Service Functional Consultant Associate certification.

      Exam: PL-200 and Exam MB-240: Microsoft Dynamics 365 Field Service Functional Consultant are prerequisites for the Microsoft Certified: Dynamics 365 Field Service Functional Consultant Associate.

      After you pass both exams of whichever avenue you choose to take you'll become a Microsoft Functional Consultant Associate.

      ","

      Before attending this accelerated course you should have:

      • Experience as an IT professional or student
      • Working knowledge of the Power Platform and its key components
      • Knowledge of Microsoft Dataverse (or general data modeling) and security concepts
      ","","
      • Module 1: Introduction to Microsoft Power Platform
      • Module 2: Work with Dataverse
      • Module 3: Make model-driven apps with Power Apps
      • Module 4: Make canvas apps with Power Apps
      • Module 5: Make portals with Power Apps
      • Module 6: Introduction to automation
      • Module 7: Build Power Automate cloud flows
      • Module 8: Build Power Automate desktop flows
      • Module 9: Build business process flows
      • Module 10: Build chatbots with Power Virtual Agents
      • Module 11: Analyse data with Power BI
      • Module 12: Putting it all together
      " "mswshaa","Certified: Windows Server Hybrid Administrator Associate | Exams AZ-800 & AZ-801 -

      At The Supplier we were awarded the Microsoft Solutions Partner for Infrastructure (Azure) badge in recognition of our expertise in delivering quality solutions in this specialised business area.

      On this accelerated Microsoft Certified: Windows Server Hybrid Administrator Associate you’ll be able to administer core and advanced Windows Server workloads and services using on-premises hybrid and cloud technologies. You’ll learn how to implement and manage on-premises and hybrid solutions like identity management compute networking and storage.

      In just 7 days you’ll build knowledge on tasks related to security migration monitoring high availability troubleshooting and disaster recovery. You’ll also learn to:

      • Use administrative tools and technologies including Windows Admin Center PowerShell Azure Arc and IaaS virtual machine administration
      • Work with Azure Automation Update Management Microsoft Defender for Identity Azure Security Center Azure Migrate and Azure Monitor

      As a Microsoft Gold Partner for Learning and through The Supplier’s Lecture | Lab | Review methodology you’ll get access to Microsoft Official Curriculum (MOCs) learn from Microsoft Certified Trainers (MCTs) and train in a distraction-free environment.

      ","

      Before attending this accelerated course you should have experience working with Windows Server operating systems.

      ","","

      AZ-800: Administering Windows Server Hybrid Core Infrastructure

      • Module 1: Deploy and manage Active Directory Domain Services (AD DS) in on-premises and cloud environments
      • Module 2: Manage Windows Servers and workloads in a hybrid environment
      • Module 3: Manage virtual machines and containers
      • Module 4: Implement and manage an on-premises and hybrid networking infrastructure
      • Module 5: Manage storage and file services

      AZ-801: Configuring Windows Server Hybrid Advanced Services

      • Module 1: Secure Windows Server on-premises and hybrid infrastructures
      • Module 2: Implement and manage Windows Server high availability
      • Module 3: Implement disaster recovery
      • Module 4: Migrate servers and workloads
      • Module 5: Monitor and troubleshoot Windows Server environments
      " "mswvds","Certified Azure Virtual Desktop Specialty | AZ-140 -

      At The Supplier we were awarded the Microsoft Solutions Partner for Infrastructure (Azure) badge in recognition of our expertise in delivering quality solutions in this specialised business area.

      On this accelerated Microsoft Certified: Azure Virtual Desktop Specialty course you’ll learn how to plan implement and manage an Azure Virtual Desktop architecture into your business.

      In just 3 days you’ll learn to manage access and security manage user environments and apps and monitor and maintain an Azure Virtual Desktop infrastructure. You’ll also build knowledge on:

      • Implementing and managing storage for Azure Virtual Desktop
      • Creating and configuring host pools and automate Azure Virtual Desktop management tasks
      • Configuring storage for FSLogix components 

      At the end of this course you’ll sit Exam AZ-140: Configuring and Operating Microsoft Azure Virtual Desktop and achieve your Microsoft Certified: Azure Virtual Desktop Specialty certification.

      As a Microsoft Gold Partner for Learning and through The Supplier’s Lecture | Lab | Review methodology you’ll get access to the Microsoft Official Curriculum (MOCs) learn from Microsoft Certified Trainers (MCTs) and train in a distraction-free environment.

      Audience

      This course is ideal for Microsoft Azure administrators with subject matter expertise in planning delivering and managing virtual desktop experiences and remote apps for any device on Azure.

      Please note: This course was previously known as Microsoft Certified: Windows Virtual Desktop Specialty | Exam AZ140 (Course AZ-140T00).

      ","

      Before attending this accelerated course you should have

      • Experience in Azure technologies including virtualisation networking identity storage backups resilience and disaster recovery
      • An understanding of on-premises virtual desktop infrastructure technologies as they relate to migrating to Windows Virtual Desktop
      • Experience using the Azure portal and Azure Resource Manager (ARM) templates to accomplish many of their tasks
      • Expert Azure administration skills
      ","","

      Course AZ-140T00: Configuring and Operating Microsoft Azure Virtual Desktop

      • Section 1: Plan an Azure Virtual Desktop architecture
        • Module 1: Design the Azure Virtual Desktop architecture
        • Module 2: Design for user identities and profiles
      • Section 2: Implement a Azure Virtual Desktop infrastructure
        • Module 1: Implement and manage networking for Azure Virtual Desktop
        • Module 2: Implement and manage storage for Azure Virtual Desktop
        • Module 3: Create and configure host pools and session hosts
        • Module 4: Create and manage session host images
      • Section 3: Manage access and security
        • Module 1: Manage access
        • Module 2: Manage security
      • Section 4: Manage user environments and apps
        • Module 1: Implement and manage FSLogix
        • Module 2: Configure user experience settings
        • Module 3: Install and configure apps on a session host
      • Section 5: Monitor and maintain an Azure Virtual Desktop infrastructure
        • Module 1: Plan and implement business continuity and disaster recovery
        • Module 2: Automate Azure Virtual Desktop management tasks
        • Module 3: Monitor and manage performance and health
      " "mteams","365 Certified Teams Administrator Associate -

      On this accelerated Microsoft 365 Certified Teams Administrator Associate course you'll learn about various Teams management tools security and compliance feature for Teams network requirement for Teams deployment as well as different Teams settings and policies for managing collaboration and communication experience.

      In just 3 days you'll gain comprehensive knowledge of Teams architecture and build knowledge in the following areas:

      • Integration between Microsoft Teams and various workloads and services in Microsoft 365
      • Security and compliance features for Teams including conditional access MFA Threat alerts DLP policies eDiscovery and information barrier policies
      • Preparing the environment for a Microsoft Teams deployment including upgrading from Skype for Business to Microsoft Teams network settings and managing Microsoft Teams endpoints
      • How to create and manage teams manage membership including internal and external users
      • Different settings and policies to manage collaboration and communication experiences in Microsoft Teams

      At the end of your course you’ll sit exam MS-700 and achieve your Microsoft 365 Certified: Teams Administrator Associate certification. This accelerated training is equivalent to Microsoft’s MS-700T00-A: Managing Microsoft Teams course.

      You’ll get access to Microsoft Official Curriculum (MOC) and learn from certified instructors as The Supplier are a Microsoft Gold Partner for Learning.

      Audience

      If you're interested in Microsoft Teams and would like to implement it into your organisation this course is ideal for you.

      ","

      Before attending this accelerated course you should understand:

      • Basic functional experience with Microsoft 365 services
      • General IT practices including PowerShell
      ","","
      • Module 1: Get started with managing Microsoft Teams
      • Module 2: Implement security and compliance for Microsoft Teams
      • Module 3: Prepare the environment for a Microsoft Teams deployment
      • Module 4: Manage chat teams channels and apps in Microsoft Teams
      • Module 5: Manage meetings and virtual events in Microsoft Teams
      • Module 6: Manage calling in Microsoft Teams
      " "n+","Network+ -

      Achieve your Network+ certification in just 4 days – that’s 40% faster than traditional training. On this accelerated Network+ course you’ll study the official CompTIA curriculum and take your Network+ exam onsite at the The Supplier Centre or from the comfort of your own home.

      Developed by CompTIA Network+ is a vendor-neutral and globally recognised certification. This certification proves you have the knowledge needed to start a career in networking.

      The content in the CompTIA Network+ (N10-008) exam focuses on foundational networking tools and technologies used to create secure networks and guarantee the availability of critical business information as reflected in the exam objectives below:

      • Networking Fundamentals
      • Network Implementations
      • Network Operations
      • Network Security
      • Network Troubleshooting

      Train at twice the speed on this official CompTIA course

      The Supplier is an Authorised CompTIA Platinum Partner. This means you’ll get access to experienced instructors and up-to-date course material officially approved by CompTIA. During your CompTIA Network+ training you’ll also sit your official Network+ exam.

      ","

      CompTIA A+ certified and/or 9 months networking experience.

      ","","
      • Module 1: Networking Fundamentals
      • Module 2: Network Implementations
      • Module 3: Network Operations
      • Module 4: Network Security
      • Module 5: Network Troubleshooting
      " "ncsp","NIST Cybersecurity Professional Practitioner | NCSP -

      This accelerated APMG International NIST Cyber Security Professional (NCSP) Practitioner Certification course is designed to teach IT Engineering Operations and Business Risk professionals a Fast-Track approach to operationalizing the NIST Cybersecurity Framework and its 800-53 informative reference controls across an enterprise and its supply chain.

      The NCSP accredited certification training programs leverage guidance from NIST ISO and industry thought leaders to teach organizations of any size how to build a culture-driven adaptive cyber-resilient digital business capable of Creating Protecting and Delivering (CPD) digital business value.

      Also included in the program is guidance on how to leverage existing business systems (enterprise risk digital value management etc.) and a digital value management model to enable a culture-driven adaptive cyber-resilient organization capable of Creating Protecting and Delivering digital business value.

      This course guides you on a best practice approach to engineering a comprehensive NIST-CSF 800-53 risk management program that is implemented for use and auditable for purpose.

      At the end of this course youll sit the APMG exam and achieve your NIST Cyber Security Professional (NCSP) Practitioner certification. Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

      The APMG International NIST Cyber Security Professional (NCSP) Practitioner and Swirl Device logo is a trademark of The APM Group Limited used under permission of The APM Group Limited. All rights reserved.

      Audience

      This course is ideal for IT Engineering Operations and Business Risk professionals.

      Successful candidates will be entitled to a free Professional Assessment at Business Agility Professional Level 1 - Explorer.

      ","There are no prerequisites for this accelerated course.","","
      • Module 1: Digital transformation and cybersecurity
      • Module 2: The threat landscape
      • Module 3: The 800-53 controls
      • Module 4: How to adopt and adapt
      • Module 5: Adaptive ways of working
      • Module 6: Rapid adoption and rapid adaptation - FastTrack
      • Module 7: CIIS practice
      " "pcdsfcjs","PeopleCert DEV Skills Foundation Certificate (JavaScript) - ","","","" "pecbdora","PECB Digital Operational Resilience Act (DORA) Lead Manager -

      Join our accelerated 3-day PECB DORA Lead Manager course and elevate your expertise in establishing implementing and managing an ICT risk management framework based on DORA requirements. Dive into the Digital Operational Resilience Act (DORA) the cornerstone of the financial sector's response to ICT-related challenges. Enacted by the European Parliament and the Council of the European Union DORA aims to standardize and streamline regulations governing ICT risk management across the EU. Our certification course is your guide through DORA's requirements emphasizing the principle of proportionality tailored to your organization's needs. Master essential skills to ensure your entity can withstand respond to and recover from all ICT challenges effectively.

      Discover the importance of DORA:

      Starting January 17 2025 financial entities must meet DORA requirements. Failure to comply can lead to hefty penalties highlighting the EU's emphasis on digital operational resilience. Penalties vary but aim to deter future breaches effectively.

      Organizations need to continuously refine their digital resilience strategies to stay ahead in today's fast-paced landscape. This means teamwork across all organizational levels including executives staff and external partners. Stay updated and collaborate with regulators to adapt to evolving technologies and threats.

      The course covers the five key mandates of DORA for financial entities' ICT risk management:

      • Establishing and maintaining an effective ICT risk management framework.
      • Implementing incident management and reporting frameworks.
      • Conducting regular digital resilience testing including vulnerability assessments and penetration testing.
      • Managing third-party ICT risks with oversight of critical providers.
      • Encouraging information sharing for collective defence against ICT threats.

      Throughout this intensive 3-day program you will:

      • Understand DORA's regulatory requirements focusing on ICT risk management incident reporting resilience testing and third-party risk.
      • Implement strategies to enhance digital resilience and mitigate ICT risks in financial institutions aligning with DORA and industry standards.
      • Identify analyze and address relevant ICT risks.
      • Develop and maintain robust ICT risk management frameworks and response plans.
      • Foster stakeholder collaboration for ongoing DORA compliance.
      • Utilize industry-standard tools to monitor and manage ICT risks improving overall security.

      Upon completion you'll sit the PECB exam and earn your PECB DORA Lead Manager certification. Our Lecture | Lab | Review methodology ensures you get certified at twice the speed of traditional training with access to courseware certified instructors and a distraction-free environment. Accelerate your career with our comprehensive DORA certification course.

      Audience

      This training course is intended for:

      • Financial institutions executives and decision-makers
      • Compliance officers and risk managers
      • IT professionals
      • Legal and regulatory affairs personnel
      • Consultants and advisors specializing in financial regulation and cybersecurity
      ","

      Having a fundamental understanding of information security and cybersecurity concepts and familiarity with ICT risk management principles. 

      ","","
      • Module 1: Training course Objectives and Structure
      • Module 2: Overview of the Digital Operational Resilience Act (DORA)
      • Module 3: Fundamental concepts of ICT risk management and digital operational resilience
      • Module 4: Preparing and planning for DORA project implementation
      • Module 5: Governance and organization
      • Module 6: ICT risk management
      • Module 7: ICT - related incident management and reporting
      • Module 8: Digital operational resilience testing
      • Module 9: Managing ICT Third-party risks
      • Module 10: The Oversight Framework and the Lead Overseer
      • Module 11: Information and intelligence sharing
      • Module 12: Training and awareness
      • Module 13: Competent authorities
      • Module 14: Monitoring measurement analysis and evaluation
      • Module 15: Internal audit and management review
      • Module 16: Continual Improvement
      • Module 17: Closing training and Exam Preparation
      " "pecbnis2"," Certified NIS2 Directive 2.0 Lead Implementer -

      This accelerated NIS 2 Directive Lead Implementer course is designed for professionals working in critical infrastructure sectors this program provides comprehensive insights into the regulatory requirements and best practices for achieving cyber resilience.

      In just 3 days youll learn gain a deep understanding of the NIS2 Directive and its impact on critical infrastructure operators. Youll also learn how to:

      • Implement robust cybersecurity measures to protect critical assets and ensure operational continuity.
      • Develop incident response capabilities and establish effective risk management frameworks.
      • Identify vulnerabilities and conduct risk assessments to mitigate potential threats.
      • Stay up to date with the evolving regulatory landscape and compliance requirements.
      • Collaborate with relevant stakeholders to enhance cyber resilience within your organization.

      At the end of this course youll sit the PECB exam and achieve your NIS 2 Directive Lead Implementer certification. Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

      Audience

      This course is ideal for:

      • Professionals working in critical infrastructure sectors
      ","

      Prior to taking this course delegates should have a fundamental understanding of Cyber Security.

      ","","
      • Module 1: Policies on risk analysis and information system security
      • Module 2: Incident handling
      • Module 3: Business continuity such as backup management and disaster recovery and crisis management
      • Module 4: Supply chain security including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers
      • Module 5: Security in network and information systems acquisition development and maintenance including vulnerability handling and disclosure
      • Module 6: Policies and procedures to assess the effectiveness of cybersecurity risk-management measures;
      • Module 7: Basic cyber hygiene practices and cybersecurity training;
      • Module 8: Policies and procedures regarding the use of cryptography and where appropriate encryption;
      • Module 9: Human resources security access control policies and asset management;
      • Module 10: The use of multi-factor authentication or continuous authentication solutions secured voice video and text communications and secured emergency communication systems within the entity where appropriate.
      " "pecbnistcc","PECB Certified NIST Cybersecurity Professional - ","","","" "pentest+","PenTest+ -

      On this accelerated 3 day CompTIA PenTest+ you'll get the skills you need to identify exploit report and manage vulnerabilities on a network - 30% faster than traditional training.

      This course builds upon skills learnt from CompTIA Security+ certification and provides you with the intermediate skills and best practice for penetration testing.

      Your expert instructor will teach you up-to-date penetration testing skills helping you develop vulnerability assessment techniques and the management skills necessary to determine how resilient a network is to attacks.

      You'll learn to:

      • customise assessment frameworks
      • report penetration test findings
      • communicate recommended strategies

      You'll be immersed in the curriculum with our unique Lecture | Lab | Review technique which combines theory and practical skills to help you retain information faster. With 24/7 lab access you'll have the opportunity to test your penetration and vulnerability assessment skills whenever you like.

      On this course you'll prepare for and take the CompTIA PenTest+ exam which is covered by your Certification Guarantee. The performance-based PenTest+ exam involves hands-on simulations proving you've moved beyond theory and have the practical skills to carry out penetration testing techniques.

      Achieving this certification qualifies you for a role as a:

      • Penetration Tester
      • Vulnerability Tester
      • Security Analyst (II)
      • Vulnerability Assessment Analyst
      • Network Security Operations
      • Application Security Vulnerability

      If you're an intermediate level cyber security professional tasked with penetration testing this course is ideal for you.

      ","

      Before attending this course you should have:

      • Network+ Security+ or equivalent knowledge
      • A minimum of 2-3 years of hands-on information security or related experience
      ","","

      Planning and Scoping

      • Explain the importance of planning for an engagement
      • Explain key legal concepts.
      • Explain the importance of scoping an engagement properly.
      • Explain the key aspects of compliance-based assessments.

      Information Gathering and Vulnerability Identification

      • Given a scenario conduct information gathering using appropriate techniques
      • Given a scenario perform a vulnerability scan.
      • Given a scenario analyse vulnerability scan results
      • Explain the process of leveraging information to prepare for exploitation.
      • Explain weaknesses related to specialised systems

      Attacks and Exploits

      • Compare and contrast social engineering attacks
      • Given a scenario exploit network-based vulnerabilities
      • Given a scenario exploit wireless and RF-based vulnerabilities
      • Given a scenario exploit application-based vulnerabilities
      • Given a scenario exploit local host vulnerabilities
      • Summarise physical security attacks related to facilities
      • Given a scenario perform post-exploitation techniques

      Penetration Testing Tools

      • Given a scenario use Nmap to conduct information gathering exercises
      • Compare and contrast various use cases of tools
      • Given a scenario analyse tool output or data related to a penetration test
      • Given a scenario analyse a basic script (limited to Bash Python Ruby and PowerShell)

      Reporting and Communication

      • Given a scenario use report writing and handling best practices
      • Explain post-report delivery activities
      • Given a scenario recommend mitigation strategies for discovered vulnerabilities
      • Explain the importance of communication during the penetration testing process
      " "pmp","Project Management Professional (PMP) certification -

      The Supplier is proud to be a Premier Authorised Training Partner with PMI offering PMP Official content coupled with our immersive learning style allowing you to build your knowledge and prepare for your the PMP (Project Management Professional) certification in just 5 days when you choose our accelerated course.

      By taking our course you will receive a PMI Membership bundle which includes a 12-month PMI membership exam fees and access to PMI Standards Plus and other amazing resources.

      Become a professional in project management and learn how to speak and understand a global project management language connecting you to a massive community of professionals across the world utilising The Suppliers unique Lecture | Lab | Review methodology.

      During this course you'll prepare for and sit the PMI PMP exam covered by your Certification Guarantee and is included within the course. Furthermore we also offer 12 months PMI membership as part of your course giving you additional access to PMI publications via PMI Standards+ and various resources to enhance your learning.

      On this course you will learn how to:

      • Build and lead a team
      • Empower collaborate and mentor stakeholders
      • Assess and manage risks
      • Plan and manage project scope and schedule

      Professional Development Units (PDUs) are available upon course completion and a digital badge is also available upon completion of the exam to enable you to proudly show your achievements and qualification.

      Audience

      This accelerated course is ideal for experienced project managers who want to validate their expertise and gain new insights into project management.

      New to project management? Then you may prefer to attend the PMI CAPM course which may prove more suitable.

      The PMI Registered Education Provider logo the Project Management Professional (PMP) the PMP and the PMI CAPM are a registered mark of the Project Management Institute Inc.

      ","

      Before attending this accelerated course you should have:

      • Four-Year College / University Degree
      • 36 months of experience leading projects within the past eight years
      • 35 hours of project management education/training or CAPM certification

      — or —

      • A secondary degree (high school diploma associates degree or global equivalent)
      • 60 months of experience leading projects within the past eight years
      • 35 hours of project management education/training or CAPM certification

      Your accelerated PMP course meets the required 35 hours of project management education (we actually deliver 46 hours) for you to qualify to take the PMP exam

      You can also qualify for the PMP exam education requirements by attending a combination of these accelerated courses:

      • PRINCE2 - 33.5 PDU hours
      • PMI-ACP - 30 PDU hours
      • Scrum Master - 22 PDU hours

      The Project Management Professional (PMP) PMP and PMI-ACP are a registered markof the Project Management Institute Inc.

      ","
      • Membership Bundle which includes 12 months PMI membership giving you access to PMI standards+ resources
      • Exam voucher
      • Upon course completion 38 Personal Development Units (PDUs) are available
      • PMI Digital Acclaim Badge available upon exam completion with PMI via Credly.
      ","

      Module 1: Creating a High-Performing Team

      • Build a team
      • Define team ground rules
      • Negotiate project agreements
      • Empower team members and stakeholders
      • Train team members and stakeholders
      • Engage and support virtual teams
      • Build shared understanding about a project

      Module 2: Starting the Project

      • Determine appropriate project methodology/methods and practices
      • Plan and manage scope
      • Plan and manage budget and resources
      • Plan and manage schedule
      • Plan and manage quality of products and deliverables
      • Integrate project planning activities
      • Plan and manage procurement
      • Establish project governance structure
      • Plan and manager project/phase closure

      Module 3: Doing the Work

      • Assess and manage risks
      • Execute project to deliver business value
      • Manage communications
      • Engage stakeholders
      • Create project artefacts
      • Manage project changes
      • Manage project issues
      • Ensure knowledge transfer for project continuity

      Module 4: Keeping the Team on Track

      • Lead a team
      • Support team performance
      • Address and remove impediments obstacles and blockers
      • Manage conflict
      • Collaborate with stakeholders
      • Apply emotional intelligence to promote team performance

      Module 5: Keeping the Business in Mind

      • Manage compliance requirements
      • Evaluate and deliver project benefits and value
      • Evaluate and address internal and external business environment changes
      • Support organizational change
      • Employ continuous process improvement
      " "prince2_3","PRINCE27 Foundation & Practitioner 7th Edition -

      On this accelerated PRINCE2 Foundation and Practitioner course you will learn about the core applications of the PRINCE2 methodology and how PRINCE2 can be adapted to offer a structured scalable and tailored approach to project management within your organization.

      In just 3 days youll take both the Foundation and Practitioner The Supplier courses following the newly refreshed PRINCE2 7th Edition content to achieve your certification faster than anywhere else. If you would like to take this course during normal business hours 9 to 5 in London or Manchester city centre you can register here.

      PRINCE27 addresses changes in the project management sector and adapts to evolving working practices and technologies. A further focus on sustainability and people throughout the methodology has also been added to offer better direction as the industry changes. During this combined course youll also build knowledge on:

      • How to tailor the methods to the needs of your organisation and project environment
      • Further enhancements technologies and updates introduced in PRINCE2 7th Edition and how these can be adapted to offer a more sustainable approach to project management

      At the end of this course youll prepare for and sit the PRINCE2 Foundation exam and the PRINCE2 Practitioner exam and achieve your certifications. Through The Suppliers Lecture | Lab | Review methodology youll get access to courseware learn from certified instructors and train at twice the speed in a distraction-free environment.

      All Global Best Practice certifications provided by Axelos require recertification after 3 years. If you would like to know more please do not hesitate to contact us to discuss your recertification requirements.

      Target audience:

      • All Project Managers (certified and uncertified)
      • Aspiring Project Managers
      • For anyone aiming to enhance their project management skills
      • Anyone involved in project delivery

      PRINCE2 is a registered trademark of AXELOS Limited used under permission of AXELOS Limited. The Swirl logo is a trademark of AXELOS Limited used under the permission of AXELOS Limited. All rights reserved.

      ","

      There are no formal prerequisites for this accelerated combination course as foundation will be sat during the course which is a pre-requisite for the practitioner examination. Please note however it is highly recommended that you complete the pre-reading material before attending.

      ","","

      Foundation Learning Outcome:

      • Understand key concepts relating to Projects and PRINCE2
      • Understand how the PRINCE2 principles underpin the PRINCE2 method
      • Understand the importance of people in successful projects
      • Understand the PRINCE2 practices and how they are applied throughout the project
      • Understand the PRINCE2 processes and how they are carried out throughout the project

      Practitioner Learning Outcome:

      • Understand how to apply the PRINCE2 principles in context
      • Understand how to apply effective people management in successful projects
      • Understand how to apply and tailor relevant aspects of PRINCE2 practices in context
      • Understand how to apply (and tailor) relevent aspects of PRINCE2 processes in context
      " "prince2af","PRINCE2 Agile Foundation -

      On this accelerated AXELOS: PRINCE2 Agile Foundation course you will gain and understanding of PRINCE2 management controls with a broad toolset of agile delivery techniques. This course is a pre-requisite for the Practitioner certification and key to understanding project management.

      In just 2 days you will learn the PRINCE2 governance requirements clearly and comprehensively. You will also learn:

      • How to manage project within the principles of “The Lean Start-up”
      • Agile concepts and techniques including: Scrum Kanban and Cynefin
      • The interface between PRINCE2 and agile ways of working

      At the end of this course you will sit the AXELOS exam and will achieve your AXELOS: PRINCE2 Agile Foundation certification. Through The Supplier’s Lecture | Lab | Review methodology you’ll certify at twice the speed of traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

      For all AXELOS courses the exam voucher is included in the price of training.

      Audience

      This course is ideal for:

      • Project Managers
      • Project Planners
      • Project executioners

      Important note: From January 2023 All Global Best Practice certifications provided by Axelos will require recertification after 3 years. This will affect every certification issued from 1st January 2020 onwards and previous certification holders will be given 6 months to renew their certification. If you would like to know more please do not hesitate to contact us to discuss your recertification requirements.

      AXELOS PRINCE2 Agile Foundation is a registered trademark of AXELOS Limited used under permission of AXELOS Limited. The Swirl logo is a trade mark of AXELOS Limited used under permission of AXELOS Limited. All rights reserved.

      ","

      There are no prerequisites for this course

      ","","

      AXELOS: PRINCE2 Agile Foundation

      Module 1: Projects and BAU

      Module 2: An overview of agile

      Module 3: Blending PRINCE2 and agile together

      Module 4: Assumptions

      Module 5: The Hexagon (incl. MoSCoW prioritisation)

      Module 6: Starting Up a Project Initiating a Project (including the Business Case value assessment and Cynefin approach)

      Module 7: Organisation and Servant leadership

      Module 8: The Agilometer and the Risk Theme

      Module 9: Managing Product Delivery (incl. Scrum Plans and Progress estimation burn charts IRs and Work Packages)

      Module 10: Quality (Incl. DoD)

      Module 11: Controlling a Stage and Managing a Stage Boundary (Incl. Frequent Releases and Retrospectives)

      Module 12: Directing a Project

      Module 13: Agile Contracts and Closing a Project

      Module 14: Closing a Project

      Module 15: Management Products

      Module 16: Communication (Incl. workshops)

      Module 17: Kanban and Lean Start Up

      Module 18: General guidance (Incl. Health Check Transitioning PM tips)

      Module 19: Focus Areas

      " "prince2afp","PRINCE2 Agile Foundation and Practitioner | The Supplier -

      On this accelerated AXELOS PRINCE2 Agile Foundation and Practitioner course you’ll combine the flexibility and responsiveness of agile thinking with the effective PRINCE2 framework and learn how to implement the methodology into your business.

      In just 3 days you'll build knowledge on how best to boost the effectiveness of your projects through applying basic agile concepts. You'll also learn to implement:

      • The Agilometer and the Risk Theme
      • The Hexagon (incl. MoSCoW prioritisation)
      • Kanban and Lean Start Up

      At the end of this course youll prepare for and sit the AXELOS PRINCE2 Agile Foundation exam and the PRINCE2 Agile Practitioner exam and achieve your certifications. Through The Suppliers Lecture | Lab | Review methodology youll get access to courseware learn from certified instructors and train in a distraction-free environment.

      Audience

      This course is ideal if your job consists of delivering managing or working within agile projects and project teams including:

      • Project Managers/Programme Manager
      • Project Support
      • Delivery Team Support
      • PMO roles
      • Project Administrator
      • Project Co-ordinators
      • Team leaders/managers.

      Important note: From January 2023 All Global Best Practice certifications provided by Axelos will require recertification after 3 years. This will affect every certification issued from 1st January 2020 onwards and previous certification holders will be given 6 months to renew their certification. If you would like to know more please do not hesitate to contact us to discuss your recertification requirements.

      AXELOS PRINCE2 Agile Foundation and Practitioner is a registered trademark of AXELOS Limited used under permission of AXELOS Limited. The Swirl logo is a trade mark of AXELOS Limited used under permission of AXELOS Limited. All rights reserved.

      ","

      There are no formal prerequisites for the Foundation qualification but you will need to have either PRINCE2 Foundation or PRINCE2 Agile Foundation to take the PRINCE2 Agile Practitioner qualification.

      ","","
      • Module 1: Projects and BAU
      • Module 2: An overview of agile
      • Module 3: Blending PRINCE2 and agile together
      • Module 4: Assumptions
      • Module 5: The Hexagon (incl. MoSCoW prioritisation)
      • Module 6: Starting Up a Project Initiating a Project (including the Business Case value assessment and Cynefin approach)
      • Module 7: Organisation and Servant leadership
      • Module 8: The Agilometer and the Risk Theme
      • Module 9: Managing Product Delivery (incl. Scrum Plans and Progress estimation burn charts IRs and Work Packages)
      • Module 10: Quality (Incl. DoD)
      • Module 11: Controlling a Stage and Managing a Stage Boundary (Incl. Frequent Releases and Retrospectives)
      • Module 12: Directing a Project
      • Module 13: Agile Contracts and Closing a Project
      • Module 14: Closing a Project
      • Module 15: Management Products
      • Module 16: Communication (Incl. workshops)
      • Module 17: Kanban and Lean Start Up
      • Module 18: General guidance (Incl. Health Check Transitioning PM tips)
      • Module 19: Focus Areas
      • Module 20: Practitioner Workshop
      " "prince2ag","PRINCE2 Agile Practitioner -

      Learn how to apply the worlds most complete project management solution PRINCE2 Agile twice as fast as traditional training. On this accelerated 2-day PRINCE2 Agile Practitioner course youll combine the flexibility and responsiveness of agile thinking with the effective PRINCE2 framework.

      PRINCE2 Agile Practitioner training is always and only offered together with the respective exam included in the price of the training.

      For the forward thinkers and their organisations

      Learn how to apply an established agile methodology to your existing knowledge and boost the effectiveness of your projects. Just like PRINCE2 agile can be applied to any type of project within any industry.

      Youll learn how to:

      • Apply basic agile concepts
      • Combine PRINCE2 and the agile methodology
      • Apply project management principles and processes in an agile environment
      • Prepare and pass the Agile Practitioner exam

      Important note: From January 2023 All Global Best Practice certifications provided by Axelos will require recertification after 3 years. This will affect every certification issued from 1st January 2020 onwards and previous certification holders will be given 6 months to renew their certification. If you would like to know more please do not hesitate to contact us to discuss your recertification requirements.

      AXELOS - PRINCE2 Agile Practitioner Certification is a registered trademark of AXELOS Limited used under permission of AXELOS Limited. The Swirl logo is a trade mark of AXELOS Limited used under permission of AXELOS Limited. All rights reserved.

      ","

      Before taking this accelerated course you'll need to have one of the following certifications:

      • PRINCE2 5th Edition (Foundation or Practitioner)
      • PRINCE2 6th Edition (Foundation or Practitioner)
      • PRINCE2 Agile Foundation
      • Project Management Qualification (PMQ)
      • Certified Associate in Project Management (CAPM)
      • Project Management Professional (PMP)
      • IPMA Levels ABC and D (Certified Projects Director)
      ","","
      • Basic concepts of common agile ways of working
      • Purpose and context for combining PRINCE2 and the agile way of working
      • Apply and evaluate the focus areas to a project in an agile context
      • Fix and flex the six aspects of a project in an agile context
      • Apply and tailor the PRINCE2 principles themes processes and management products to a project within an agile context
      • Learn through the use of theory and practical exercises
      • Prepare for the PRINCE2 Agile Practitioner exam
      " "prince2f","PRINCE27 - Foundation Certification (7th Edition) -

      On this accelerated PRINCE2 Foundation course you will learn about the core applications of the PRINCE2 methodology and how PRINCE2 can be adopted to offer a structured scalable and tailored approach to project management within your organization.

      In just 2 days youll take undertake the Foundation course and exam following the newly refreshed PRINCE2 7th Edition content to achieve your certification faster than anywhere else.

      PRINCE27 addresses changes in the project management sector and adapts to evolving working practices and technologies. A further focus on sustainability and people throughout the methodology has also been added to offer better direction as the industry changes. During this course youll also build knowledge on:

      • How to tailor the methods to the needs of your organisation and project environment
      • Further enhancements technologies and updates introduced in PRINCE2 7th Edition and how these can be adapted to offer a more sustainable approach to project management

      At the end of this course youll prepare for and sit the PRINCE2 Foundation exam and achieve your certifications. Through The Suppliers Lecture | Lab | Review methodology youll get access to courseware learn from certified instructors and train at twice the speed in a distraction-free environment.

      All Global Best Practice certifications provided by Axelos require recertification after 3 years. If you would like to know more please do not hesitate to contact us to discuss your recertification requirements.

      If you would like to sit your PRINCE2 course at a city location you can also book your The Supplier course with our parent company BPP.

      Audience:

      • All Project Managers (certified and uncertified)
      • Aspiring Project Managers
      • For anyone aiming to enhance their project management skills
      • Anyone involved in project delivery

      PRINCE2 is a registered trade-mark of AXELOS Limited used under permission of AXELOS Limited. The Swirl logo is a trademark of AXELOS Limited used under permission of AXELOS Limited. All rights reserved.

      ","

      There are no formal prerequisites for this accelerated foundation course. Please note however: it is highly recommended that you complete the pre-reading material before attending.

      ","","

      Foundation Learning Outcome:

      • Understand key concepts relating to Projects and PRINCE2
      • Understand how the PRINCE2 principles underpin the PRINCE2 method
      • Understand the importance of people in successful projects
      • Understand the PRINCE2 practices and how they are applied throughout the project
      • Understand the PRINCE2 processes and how they are carried out throughout the project
      " "psm","The Supplier course for Scrum.org Scrum Master I (PSM I) -

      The Supplier's accelerated course is designed to prepare you for Scrum.org Scrum Master I (PSM I) exam.

      At the end of The Supplier's 2-day course you will sit Scrum.org's Scrum Master I exam. By attaining the Scrum Master certification you'll demonstrate your ability to lead or support the software development process in your organisation. PSM I is recognized by the industry as a certification that demonstrates a fundamental level of Scrum mastery. As a PSM I certification holder you have proven that you understand Scrum as described in the Scrum Guide and how to apply Scrum in Scrum Teams. PSM I holders have a consistent terminology and approach to Scrum.

      In just 2 days you will learn the Scrum basics and how to use Scrum to optimise productivity and efficiency. The Suppliers course is very hands-on and you will experience all aspects of the scrum framework.

      During the course you will also learn how to:

      • Help Scrum Teams deliver value to their organization
      • Understand the theory and principles behind Scrum and empiricism
      • Understand how each part of the Scrum framework ties back to the principles and theory
      • Understand uncertainty and complexity in product delivery
      • Understand the meaning and importance of the Scrum values
      • Learn what Done means and why it is crucial to transparency
      • Know how to use the Product Backlog to plan with agility
      • Understand the importance of self-managing teams interpersonal skills needed and the Scrum Master role
      • Clarify the leadership role a Scrum Master plays on the team
      • Learn the skills and traits and behavior shifts required to be a Scrum Master

      Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

      Audience:

      This course is appropriate for students in any industry where teams are working to solve complex problems. The Scrum Master course is for:

      • Practitioners that are interested in starting a career as a Scrum Master
      • Scrum Masters Agile/Scrum Coaches and consultant looking to improve their use of Scrum
      • Anyone involved in product delivery using Scrum

      The Supplier will help you prepare for official Scrum.org exams. Our courses are not endorsed by or affiliated with Scrum.org.

      Scrum.org Professional Scrum Master are trademarks of Scrum.org and may be registered in the United States Patent and Trademark Office and in other countries.

      The statements made and opinions expressed herein belong exclusively to The Supplier and are not shared by or represent the viewpoint of Scrum.org. This training does not constitute an endorsement of any product service or point of view. Scrum.org makes no representations warranties or assurances of any kind express or implied as to the completeness accuracy reliability suitability availability or currency of the content contained in this presentation or any material related to this presentation. In no event shall Scrum.org its agents officers employees licensees or affiliates be liable for any damages whatsoever (including without limitation damages for loss of profits business information loss of information) arising out of the information or statements contained in the training. Any reliance you place on such content is strictly at your own risk.

      ","

      You're ready for this The Supplier course if you:

      • Are familiar with the basics of project management
      • Understand 'requirements' and 'requirements decomposition'
      • Have been involved with a project that creates or improves a product
      • Understand the basics of Scrum and have read the Scrum Guide

      Unsure whether you meet the prerequisites? Dont worry. Your training consultant will discuss your background with you to understand if this course is right for you.

      ","
      • Free Credly Digital Credential
      • Students of Scrum.org courses are able to claim Project Management Institute (PMI) PDU credit: 14 PDUs after attending a two-day Scrum Master (PSM) course. Please note that PMI PDUs are earned for course attendance and not for passing a Scrum.org assessment
      ","
      • Module 1: Linear & Iterative approaches
      • Module 2: Agile Manifesto & The Agile Principles
      • Module 3: What is Scrum
      • Module 4: Scrum Theory
      • Module 5: Scrum Values
      • Module 6: Scrum Teams
      • Module 7: Scrum Events
      • Module 8: Scrum Artifacts
      • Module 9: Scrum Fact or Fiction
      • Module 10: Agile/Scrum Tools & Techniques
      • Module 11: Scrum Project
      " "pythonf","IT Specialist - Python Fundamentals -

      On this accelerated 4-day Certiport IT Specialist Python Fundamentals course you’ll learn to construct and analyse code segments that use branching statements and that perform iteration. You'll also learn to construct and analyse code segments that perform file input and output operations as well as console input and output operations.

      At the end of this course you'll sit the Certiport IT Specialist Python Fundamentals exam and achieve your certification. Through The Supplier’s Lecture | Lab | Review methodology you’ll get access to courseware and achieve your certification at twice the speed of traditional training.

      Audience

      This course is ideal if you’re interested in validating your entry-level IT skills and starting a career in information technology.

      Candidates for this exam should be able to recognise and write syntactically correct well-documented Python 3 code that will logically solve a given problem correctly use data types supported by Python and use common libraries to write a program that solves a complex problem.

      Candidates are expected to have had at least 150 hours of instruction and/or hands-on experience with the Python programming language be familiar with its features and capabilities and understand how to write debug and maintain well-formed well-documented Python code.

      ","

      Candidates for this exam should be able to recognise and write syntactically correct well-documented Python 3 code that will logically solve a given problem correctly use data types supported by Python and use common libraries to write a program that solves a complex problem.

      Candidates are expected to have had at least 150 hours of instruction and/or hands-on experience with the Python programming language be familiar with its features and capabilities and understand how to write debug and maintain well-formed well-documented Python code.

      To be successful on the test the candidate is also expected to have the following prerequisite knowledge and skills:

      • 8th-grade reading skills
      • Basic computer skills
      • Algebra I
      ","","
      • Section 1: Operations using Data Types and Operators
        • Module 1: Evaluate expressions to identify the data types Python assigns to variables • str int float and bool
        • Module 2: Perform data and data type operations
        • Module 3: Determine the sequence of execution based on operator precedence
        • Module 4: Select operators to achieve the intended results • Assignment comparison logical arithmetic identity (is) containment (in)
      • Section 2: Flow Control with Decisions and Loops
        • Module 1: Construct and analyse code segments that use branching statements
        • Module 2: Construct and analyse code segments that perform iteration
      • Section 3: Input and Output Operations
        • Module 1: Construct and analyse code segments that perform file input and output operations
        • Module 2: Construct and analyse code segments that perform console input and output operations
      • Section 4: Code Documentation and Structure
        • Module 1: Document code segments
        • Module 2: Construct and analyse code segments that include function definitions
      • Section 5: Troubleshooting and Error Handling
        • Module 1: Analyse detect and fix code segments that have errors
        • Module 2: Analyse and construct code segments that handle exceptions
      • Section 6: Operations using Modules and Tools
        • Module 1: Perform basic operations by using built-in modules
        • Module 2: Solve complex computing problems by using built-in modules
      " "sdf","Software Development Fundamentals -

      This accelerated Software Development Fundamentals course will provide you with a basic understanding of the software development lifecycle. As well as the decsisions that have to be made when selecting a software development methodology. You'll also develop an appreciation of how software developers need to work effectively in teams to produce software.

      Your role as a software developer is to build and test high-quality code across front end logic and database layers. Typically you will work as part of a larger team responsible for some of the straightforward tasks and deliverables of the overall project. You will interpret design documentation and specifications. Customer requirements will typically be defined and agreed by more experienced or specialist members of the team such as a business analyst or technical architect.

      Upon completion of this course you will have gained the knowledge and skills to fulfil the role of a Software Developer. These include carrying out the following:

      • Review requirements and specifications and define test conditions. Design test cases and test scripts under your own direction mapping back to pre-determined criteria recording and reporting outcomes. Analyse and report test activities and results. Identify and report issues and risks associated with your work.
      • Design code test correct and document moderately complex programs and program modifications from supplied specifications using agreed standards and tools. Conduct reviews of supplied specifications with others when necessary.
      • Apply ergonomics tools and methods to develop users' tasks interactions and interfaces to meet users' requirements.
      • Apply data analysis and data modelling techniques to establish modify or maintain a data structure and its associated components.
      • Develop specialist knowledge of database concepts object and data modelling techniques and design principles. Translate object and data models into appropriate database schemas within design constraints. Interpret installation standards to meet project needs and produce database components as required. Evaluate potential solutions demonstrating installing and commissioning selected products.
      • Produce software builds from software source code. Conduct tests as defined in an integration test specification record the details of any failures and carry out fault diagnosis relating to simple failures reporting the results of the diagnosis in a clear and concise manner.

      This is a vendor-neutral IT developer course aimed at anyone who is involved in any aspect of systems development. Ideal for someone looking to develop foundation knowledge in Software Development.

      ","

      There are no prerequisites for this course. It is suitable for beginners.

      ","","

      Module 1 - Understand the Software Development Lifecycle

      You will:

      • Understand the role of software development and its relationship to other associated disciplines
      • The important of following procedural/staged lifecycle

      Module 2 - Understand Software Development Methodologies

      You will:

      • Understand software development methodologies applications as well as advantages/disadvantages
      • Be able to compare and contrast software development methodologies

      Module 3 - Business Environment

      You will:

      • Be able to describe the business environment related to software development
      • Know how to respond to business environment and issues

      Module 4 - Effective Teams

      You will:

      • Describe the roles and responsibilities with the software development and implementation lifecycle
      • Appreciate the importance of working as a member of an effective development team

      Module 5 - Case Study

      You will:

      • Apply learning to a practical example
      " "sec+","Security+ Certification -

      On this 4-day CompTIA Security+ course you'll learn how to troubleshoot security events and incidents and operate within applicable policies laws and regulations.

      Provide infrastructure application information and operational security by identifying and mitigating risks. CompTIA's Security+ is a vendor neutral certification developed with input from industry government academia and front-line practitioners.

      You'll learn about the following CompTIA Security+ topics:

      • General Security Concepts
      • Threats Vulnerabilities and Mitigations
      • Security Architecture
      • Security Operations
      • Security Program Management and Oversight

      The Supplier is an Authorized Partner of CompTIA. This means that you are guaranteed the highest level of instructor and course material all of which is officially approved by CompTIA.

      Residential or online CompTIA Security+ training course

      The Supplier offers both a classroom-based and CompTIA Security+ online course including everything you need to get certified in record time:

      • Official courseware labs and practice exams
      • CompTIA Security+ certification exam
      • Accommodation meals and snacks (for residential courses)

      Both are delivered through our tried and tested Lecture | Lab | Review methodology. In this day and age you get to choose the best one for your needs and get your certification faster than anywhere else.

      ","

      Before attending this accelerated course you should have:

      • 2 year's experience in IT administration with a security focus
      • An understanding of operating systems and knowledge of Windows-based systems
      • The ability to identify basic network components and their roles including routers switches firewalls and server roles.
      • Some knowledge of firewall configurations
      • An understanding of Wireless networks
      • An understanding of the OSI Model and TCP/IP including IPv4 subnetting

      The Supplier also recommends you have attended the CompTIA A+ and/or CompTIA Network+ course.

      ","","

      You'll study the following Security+ domains:

      1. General Security Concepts
      2. Threats Vulnerabilities and Mitigations
      3. Security Architecture
      4. Security Operations
      5. Security Program Management and Oversight
      " "securityx","CompTIA SecurityX - ","","","" "serv+","Server+ -

      Achieve your Server+ certification in just 4 days - thats 40% faster than traditional training. On this accelerated Server+ course youll study official CompTIA curriculum and take your Server+ exam onsite at the The Supplier Centre or from the comfort of your own home.

      Developed by CompTIA the Server+ is a vendor-neutral and globally recognised certification. This certification proves you have the knowledge needed to start a career in networking.

      The content in the CompTIA Server+ (SK0-005) exam validates the hands-on skills of IT professionals who install manage and troubleshoot servers in data centres as well as on-premise and hybrid environments. as reflected in the exam objectives below:

      • Server Hardware Installation & Management
      • Server Administration
      • Security & Disaster Recovery
      • Troubleshooting

      Train at twice the speed on this official CompTIA course.

      The Supplier is an Authorised CompTIA Platinum Partner. This means youll get access to experienced instructors and up-to-date course material officially approved by CompTIA. During your CompTIA Server+ training youll also sit your official Server+ exam.

      ","

      CompTIA A+ certified or equivalent knowledge.

      Two years of hands-on experience working in a server environment.

      ","","
      • Module 1: Server Hardware Installation & Management (18%)
      • Module 2: Server Administration (30%)
      • Module 3: Security & Disaster Recovery (24%)
      • Module 4: Troubleshooting (28%)
      " "sixblack","IASSC Certified Lean Six Sigma Black Belt ICBB -

      As of January 2023 The Supplier now offer IASSC accredited courses as an ATO of PeopleCert.

      Six Sigma is a business management strategy originally developed by Motorola USA in 1986. Six Sigma seeks to improve the quality of process outputs by identifying and removing the causes of defects (errors) and minimizing variability in manufacturing and business processes.

      It uses a set of quality management methods including statistical methods and creates a special infrastructure of people within the organization (e.g. Black Belts and Green Belts) who are experts in these methods. Each Lean Six Sigma project carried out within an organisation follows a defined sequence of steps and has quantified financial targets (cost reduction or profit increase).

      Train through The Supplier's accelerated methodology and you'll learn at twice the speed in a distraction-free environment.

      During this 5-day IASSC accredited course you will gain a thorough understanding of all aspects of the Lean Six Sigma Method at an advanced level of proficiency and also achieve a high level of understanding of all aspects of the Lean Six Sigma method and learn the approach concepts and tools required for business improvement. The Lean Six Sigma Black Belt certification is a Lean Six Sigma tool-kit which can be applied to real-life problems within the industry by professionals with a high-level understanding of the Lean Six Sigma method and provides delegates with the ability to successfully lead complex improvement projects to varify their abilities.

      This course has been developed for managers and professionals responsible for implementing Lean Six Sigma and wishing to understand the principles in order to work more effectively. It may also be used to raise awareness of Six Sigma within an organisation or as a member of a process improvement team.

      Holders of all Lean Six Sigma - IASSC Certified Belts are required to be re-certified within 3 years from their original certification.

      Audience:

      Lean Six Sigma is suitable for:

      • Improvement Managers
      • Operational Line Managers
      • Team Managers
      • Project Managers
      • Programme Managers
      • Change Managers
      • Finance Managers
      • IT Managers
      • HR Managers
      ","

      Important note: Please download the Minitab software prior to the start of your course. Its not necessary to purchase the software; the free 14-day trial is enough for the purposes of this course.

      There are no formal prerequisites for this accelerated course however it is recommended that you complete (with The Supplier or through previous training) Lean Six Sigma Green Belt before moving on to the Lean Six Sigma Black Belt qualification as this course is the advanced level of the Lean Six Sigma qualifications. It is also advantageous to complete the pre-reading material before attending the course and also have previous project management experience either directly as a Project Manager or as part of a team.

      It is also recommended that delegates have a basic understanding of Microsoft Office; such as Word Excel and PowerPoint. Previous exposure to process improvement or Lean Six Sigma philosophies is helpful but not essential.

      ","","

      Lean Six Sigma Black Belt key learning outcomes

      1.0 Define Phase

      • 1.1 The Basics of Six Sigma
      • 1.2 The Fundamentals of Six Sigma
      • 1.3 Selecting Lean Six Sigma Projects
      • 1.4 The Lean Enterprise

      2.0 Measure Phase

      • 2.1 Process Definition
      • 2.2 Six Sigma Statistics
      • 2.3 Measurement System Analysis
      • 2.4 Process Capability

      3.0 Analyze Phase

      • 3.1 Patterns of Variation
      • 3.2 Inferential Statistics
      • 3.3 Hypothesis Testing
      • 3.4 Hypothesis Testing with Normal Data
      • 3.5 Hypothesis Testing with Non-Normal Data

      4.0 Improve Phase

      • 4.1 Simple Linear Regression
      • 4.2 Multiple Regression Analysis

      5.0 Control Phase

      • 5.1 Lean Controls
      • 5.2 Statistical Process Control (SPC)
      • 5.3 Six Sigma Control Plans
      " "sixgreen","IASSC Certified Lean Six Sigma Green Belt ICGB -

      As of January 2023 The Supplier now offer IASSC accredited courses as an ATO of PeopleCert.

      Six Sigma is a business management strategy originally developed by Motorola USA in 1986. Six Sigma seeks to improve the quality of process outputs by identifying and removing the causes of defects (errors) and minimizing variability in manufacturing and business processes.

      It uses a set of quality management methods including statistical methods and creates a special infrastructure of people within the organization (e.g. Black Belts and Green Belts) who are experts in these methods. Each Lean Six Sigma project carried out within an organisation follows a defined sequence of steps and has quantified financial targets (cost reduction or profit increase).

      Train through The Supplier's accelerated methodology and you'll learn at twice the speed in a distraction-free environment.

      During this 5-day IASSC accredited course - you will gain a thorough understanding of all aspects of the Lean Six Sigma method and learn the approach concepts and tools required for business improvement. The Lean Six Sigma Green Belt certification is a Lean Six Sigma tool-kit which can be applied to real-life problems within the industry by professionals with a high-level understanding of the Lean Six Sigma method and some experience working in more complex improvement projects.

      This course has been developed for managers and professionals responsible for implementing Lean Six Sigma and wishing to understand the principles in order to work more effectively. It may also be used to raise awareness of Six Sigma within an organisation or as a member of a process improvement team.

      Holders of all Lean Six Sigma - IASSC Certified Belts are required to be re-certified within 3 years from their original certification.

      Audience:

      Lean Six Sigma is suitable for:

      • Improvement Managers
      • Operational Line Managers
      • Team Managers
      • Project Managers
      • Programme Managers
      • Change Managers
      • Finance Managers
      • IT Managers
      • HR Managers
      ","

      Important note: Please download the Minitab software prior to the start of your course. Its not necessary to purchase the software; the free 14-day trial is enough for the purposes of this course.

      Although not an official pre-requisite for the course due to the high-quality content that is provided with this certification it is highly recommended that for those without any experience or prior knowledge of Lean Six Sigma that you consider completing Lean Six Sigma IASSC Yellow Belt prior to moving onto the Green belt.

      You will have an interest in business process improvement as part of your job role. No relevant experience in this field - or project management - is necessary but can benefit. It is also advantageous to complete the pre-reading material.

      Holders of Lean Six Sigma - IASSC Certified Green Belt are required to be re-certified within 3 years from their original certification.

      ","","

      Lean Six Sigma Green Belt key learning outcomes

      1.0 Define Phase

      • 1.1 The Basics of Six Sigma
      • 1.2 The Fundamentals of Six Sigma
      • 1.3 Selecting Lean Six Sigma Projects
      • 1.4 The Lean Enterprise

      2.0 Measure Phase

      • 2.1 Process Definition
      • 2.2 Six Sigma Statistics
      • 2.3 Measurement System Analysis
      • 2.4 Process Capability

      3.0 Analyze Phase

      • 3.1 Patterns of Variation
      • 3.2 Inferential Statistics
      • 3.3 Hypothesis Testing
      • 3.4 Hypothesis Testing with Normal Data
      • 3.5 Hypothesis Testing with Non-Normal Data

      4.0 Improve Phase

      • 4.1 Simple Linear Regression
      • 4.2 Multiple Regression Analysis

      5.0 Control Phase

      • 5.1 Lean Controls
      • 5.2 Statistical Process Control (SPC)
      • 5.3 Six Sigma Control Plans
      " "sscp","SSCP - Systems Security Certified Practitioner -

      The goal of this five-day accelerated SSCP certification course is to provide IT and information security professionals with a fully-immersed zero-distraction all-inclusive SSCP training experience. You'll develop the expertise to tackle the operational demands and responsibilities of a security practitioner including authentication security testing intrusion detection/prevention incident response and recovery attacks and countermeasures cryptography malicious code countermeasures and more.

      SSCP Certification was designed to recognise an international standard for practitioners of information security [IS] and understanding of a Common Body of Knowledge (CBK). It focuses on practices roles and responsibilities as defined by experts from major IS industries. Certification can enhance an IS career and provide added credibility.

      Your SSCP course encompasses the ISC2 SSCP CBK Review Seminar intense hands-on instruction meals and accommodation.

      SSCP accreditation provides information security personnel and their employers with international credibility. It also gives their employers a reliable measure of professional competence.

      The key advantage of authorised ISC2 Institute Training is fundamental: The institute's goal is to provide an extensive overview of the Common Body of Knowledge (CBK) the compendium of information security practices and standards compiled and continually updated by ISC2 and used as the basis for the SSCP exam.

      You will access exclusive benefits as The Supplier are an authorised ISC2 host partner. Only authorised ISC2 host partners:

      • Are guaranteed to adhere to stringent technical pre-screening practices - Candidates that do not have the necessary work and education experience my be subject to decertification
      • Guarantee the highest quality of education and customer satisfaction - Candidates are able to contact ISC2 directly for program quality assurance
      • Utilise ISC2 Institute's instructors trained directly by the consortium - Many SSCP instructors participated in the actual development of the SSCP CBK
      • Employ the only official ISC2 courseware and materials The product of extensive work from SSCPs CISSPs ISC2; Instructors and Subject Matter Experts

      On this course you'll prepare for and sit the SSCP exam covered by your Certification Guarantee.

      This accelerated training course is designed for those with proven technical skills and practical hands-on security knowledge in operational IT roles. The SSCP is ideal for those working in or towards positions such as but not limited to:

      • Network Security Engineer
      • Systems/Network Administrator
      • Security Analyst
      • Systems Engineer
      • Security Consultant/Specialist
      • Security Administrator
      • Systems/Network Analyst
      • Database Administrator

      Highest Performing Affiliate of the Year

      The Supplier has been named as “Highest Performing Affiliate of the Year - EMEA” by ISC2. The major security association helps companies recognise organisations and individuals who are knowledgeable in security through the CISSP CSSLP and SSCP training.

      The Supplier is an Authorised Provider of ISC2 training. W. Hord Tipton Executive Director of ISC2 stated: “This award represents The Supplier as the top performer for ISC2...for the EMEA region.”

      ","

      There are currently no formal prerequisites to attend the SSCP course. Though it is recommended that students have some knowledge of other IT domains including a basic working knowledge of network technologies. The CompTIA Security+ certification while not required would also be beneficial.

      In order to attain the SSCP certification delegates require a minimum of one years cumulative paid full-time work experience in one or more of the seven domains covered in the SSCP CBK. Valid experience includes information systems security-related work performed or work that requires information security knowledge and involves direct application of that knowledge.

      If you do not have the required experience you may still sit for the exam and become an Associate of ISC2 until you have gained the required experience.

      ","

      ISC2 Membership Benefits

      ISC2 is an international non-profit membership association built for security professionals. When you certify you’ll become a member of ISC2. As a member you’ll join a global network of 125000+ and get access to an array of exclusive resources tools and peer-to-peer networking opportunities conference and event discounts.

      Become a member by earning one of ISC2’s gold standard certifications. Contact us to find out more.

      SSCP certification benefits

      Information security professionals invest substantially in information assets including technology architecture and process. But how can protection of these assets be ensured? Only through the strengths of the professionals in charge.

      Industry standards ethics and certification of IS professionals and practitioners becomes critical to ensuring a higher standard for security is achieved. ISC2 as the only not-for-profit consortium charged with maintaining administering and certifying IS professionals in the Common Body of Knowledge [CBK] is the premier resource for IS professionals worldwide.

      Why Choose The Supplier for SSCP training?

      • ISC2 instructors present the SSCP Common Body of Knowledge (CBK) Seminar
      • We utilise only ISC2 copyrighted training material which is unavailable to other non-partner organizations
      • Our zero-distraction accelerated delivery model provides today's network and information security professionals with a value-added option for official accelerated training on the seven domains of the SSCP Common Body of Knowledge (CBK).
      • You'll sit your SSCP exam during your course at the The Supplier Centre

      You will benefit from participating in the program should you be a

      • Security administrator looking to improve your skills and employment opportunities
      • Company desiring to improve your security profile and competitive edge
      • Vendor wanting to enhance the marketability of your product with qualified security administrators

      When you have certified personnel on staff your company is operating at a known level of professional competency. Your risks are lowered and your liabilities decreased. Customers and investors are assured that your company can protect their investment. SSCPs have demonstrated their extensive knowledge of security administration. They have the ability to implement and maintain highly secure systems and to respond quickly to problems and violations. They reduce your risks and limit potential reputation financial and business losses.

      SSCP certification reduces training costs as well by identifying highly qualified individuals for your security positions; people that can train and mentor your staff and improve their security awareness. A company-mandated certification program improves employee morale by creating a consistent career path that guarantees an employee's skills will remain current. It also improves your ability to attract and retain a highly competent staff.

      ","

      This course covers the seven domains contained in the SSCP Common Body of Knowledge.

      Domain 1: Access Controls

      1.1 Implement and maintain authentication methods

      • Single/multifactor authentication
      • Single sign-on
      • Device authentication
      • Federated access

      1.2 Support internetwork trust architectures

      • Trust relationships (e.g. 1-way 2-way transitive)
      • Extranet
      • Third party connections

      1.3 Participate in the identity management lifecycle

      • Authorisation
      • Proofing
      • Provisioning/de-provisioning
      • Maintenance
      • Entitlement
      • Identity and Access Management (IAM) systems

      1.4 Implement access controls

      • Mandatory
      • Non-discretionary
      • Discretionary
      • Role-based
      • Attribute-based
      • Subject-based
      • Object-based

      Domain 2: Security Operations and Administration

      2.1 Comply with codes of ethics

      • ISC2 Code of Ethics
      • Organisational code of ethics

      2.2 Understand security concepts

      2.3 Document implement and maintain functional security controls

      • Deterrent controls
      • Preventative controls
      • Detective controls
      • Corrective controls
      • Compensating controls

      2.4 Participate in asset management

      • Lifecycle (hardware software and data)
      • Hardware inventory
      • Software inventory and licensing
      • Data storage

      2.5 Implement security controls and assess compliance

      • Technical controls (e.g. session timeout password aging)
      • Physical controls (e.g. mantrap cameras locks)
      • Administrative controls (e.g. security policies and standards procedures baselines)
      • Periodic audit and review
      • Confidentiality
      • Integrity
      • Availability
      • Accountability
      • Privacy
      • Non-repudiation
      • Least privilege
      • Separation of duties

      2.6 Participate in change management

      • Execute change management process
      • Identify security impact
      • Testing /implementing patches fixes and updates (e.g. operating system applications SDLC)

      2.7 Participate in security awareness and training

      2.8 Participate in physical security operations (e.g. data centre assessment badging)

      Domain 3: Risk Identification Monitoring and Analysis

      3.1 Understand the risk management process

      • Risk visibility and reporting (e.g. risk register sharing threat intelligence Common Vulnerability Scoring System (CVSS))
      • Risk management concepts (e.g. impact assessments threat modelling Business Impact Analysis (BIA))
      • Risk management frameworks (e.g. ISO NIST)
      • Risk treatment (e.g. accept transfer mitigate avoid recast)

      3.2 Perform security assessment activities

      • Participate in security testing
      • Interpretation and reporting of scanning and testing results
      • Remediation validation
      • Audit finding remediation

      3.3 Operate and maintain monitoring systems (e.g. continuous monitoring)

      • Events of interest (e.g. anomalies intrusions unauthorised changes compliance monitoring)
      • Logging
      • Source systems
      • Legal and regulatory concerns (e.g. jurisdiction limitations privacy)

      3.4 Analyse monitoring results

      • Security baselines and anomalies
      • Visualisations metrics and trends (e.g. dashboards timelines)
      • Event data analysis
      • Document and communicate findings (e.g. escalation)

      Domain 4: Incident Response and Recovery

      4.1 Support incident lifecycle

      • Preparation
      • Detection analysis and escalation
      • Containment
      • Eradication
      • Recovery
      • Lessons learned/implementation of new countermeasure

      4.2 Understand and support forensic investigations

      • Legal and ethical principles
      • Evidence handling (e.g. first responder triage chain of custody preservation of scene)

      4.3 Understand and support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) activities

      • Emergency response plans and procedures (e.g. information system contingency plan)
      • Interim or alternate processing strategies
      • Restoration planning
      • Backup and redundancy implementation
      • Testing and drills

      Domain 5: Cryptography

      5.1 Understand fundamental concepts of cryptography

      5.2 Understand reasons and requirements for cryptography

      5.3 Understand and support secure protocols

      5.4 Understand Public Key Infrastructure (PKI) systems

      • Fundamental key management concepts (e.g. key rotation key composition key creation exchange revocation escrow)
      • Web of Trust (WOT) (e.g. PGP GPG)
      • Hashing
      • Salting
      • Symmetric/asymmetric encryption/Elliptic Curve Cryptography (ECC)
      • Non-repudiation (e.g. digital signatures/ certificates HMAC audit trail)
      • Encryption algorithms (e.g. AES RSA)
      • Key strength (e.g. 256 512 1024 2048 bit keys)
      • Cryptographic attacks cryptanalysis and counter measures
      • Confidentiality
      • Integrity and authenticity
      • Data sensitivity (e.g. PII intellectual property PHI)
      • Regulatory
      • Services and protocols (e.g. IPSec TLS S/MIME DKIM)
      • Common use cases
      • Limitations and vulnerabilities

      6.1 Understand and apply fundamental concepts of networking

      6.2 Understand network attacks and countermeasures (e.g. DDoS man-in-the-middle DNS poisoning)

      6.3 Manage network access controls

      • Network access control and monitoring (e.g. remediation quarantine admission)
      • Network access control standards and protocols (e.g. IEEE 802.1X Radius TACACS)
      • Remote access operation and configuration (e.g. thin client SSL VPN IPSec VPN telework)

      6.4 Manage network security

      • Logical and physical placement of network devices (e.g. inline passive)
      • Segmentation (e.g. physical/logical data/control plane VLAN ACLs)
      • Secure device management 6.5 Operate and configure network-based security devices
      • Firewalls and proxies (e.g. filtering methods)
      • Network intrusion detection/prevention systems
      • Routers and switches
      • Traffic-shaping devices (e.g. WAN optimisation load balancing)

      6.6 Operate and configure wireless technologies (e.g. bluetooth NFC WiFi)

      • Transmission security
      • Wireless security devices (e.g.WIPS WIDS)
      • Domain 6: Network and Communications Security
      • OSI and TCP/IP models
      • Network topographies (e.g. ring star bus mesh tree)
      • Network relationships (e.g. peer to peer client server)
      • Transmission media types (e.g. fiber wired wireless)
      • Commonly used ports and protocols

      Domain 7: Systems and Application Security

      7.1 Identify and analyse malicious code and activity Malware (e.g. rootkits spyware scareware ransomware trojans virus worms trapdoors backdoors and remote access trojans)

      • Malicious code countermeasures (e.g. scanners anti-malware code signing sandboxing)
      • Malicious activity (e.g. insider threat data theft DDoS botnet)
      • Malicious activity countermeasures (e.g. user awareness system hardening patching sandboxing isolation)

      7.2 Implement and operate endpoint device security

      7.3 Operate and configure cloud security

      7.4 Operate and secure virtual environments

      • HIDS
      • Host-based firewalls
      • Application white listing
      • Endpoint encryption
      • Trusted Platform Module (TPM)
      • Mobile Device Management (MDM) (e.g. COPE BYOD)
      • Secure browsing (e.g. sandbox)
      • Deployment models (e.g. public private hybrid community)
      • Service models (e.g. IaaS PaaS and SaaS)
      • Virtualisation (e.g. hypervisor)
      • Legal and regulatory concerns (e.g. privacy surveillance data ownership jurisdiction eDiscovery)
      • Data storage and transmission (e.g. archiving recovery resilience)
      • Third party/outsourcing requirements (e.g. SLA data portability data destruction auditing)
      • Shared responsibility model
      • Software-defined networking
      • Hypervisor
      • Virtual appliances
      • Continuity and resilience
      • Attacks and countermeasures
      • Shared storage
      " "togaf","TOGAFEA Training - TOGAF Enterprise Architecture Combined 10th Edition -

      This TOGAFEA training is provided by The Supplier in collaboration with Mundo Cognito and is accredited by The Open Group.

      Our accelerated TOGAF Enterprise Architecture course attests that you have the basic knowledge and understanding of the Enterprise Architecture using the TOGAF approach and can contribute to an architecture project or work with the results. The learning objectives at this level focus on knowledge and comprehension.

      At The Supplier we specialise in accelerated courses that get you certified at twice the speed. In just 3 days you will learn the concepts of Enterprise Architecture and the TOGAF Standard 10th Edition.

      You will learn about key areas such as:

      • The key terminology of the The Open Group Architecture Framework (TOGAF) Standard
      • The Architecture Development Method (ADM) cycle the objectives of each phase and how to adapt and scope the ADM for use
      • The techniques available to support application of the ADM
      • Applying the ADM including use of iteration partitioning and application in a Digital enterprise
      • How Architecture Governance contributes to architecture development
      • Architecture content — the outputs produced while executing the ADM
      • The context within which an Enterprise Architecture practitioner must operate
      • How to apply the stakeholder management technique
      • How to implement the Architecture Vision phase including its applicable techniques
      • How to implement the Architecture Development Method (ADM) Phases B C and D to develop an architecture together with the applicable techniques
      • How to implement the ADM Phases E F and G to implement an architecture together with the applicable techniques
      • How to implement Architecture Change Management
      • How to manage architecture requirements
      • How to use The Open Group Library
      • How to support the ADM work with applicable techniques
      • Using architecture levels to organize the Architecture Landscape
      • The Architecture Content Framework

      At the end of this course youll sit two TOGAF Enterprise Architecture exams Level 1 Foundation and Level 2 Certified and achieve your official TOGAF Enterprise Architecture certification.

      Who should take this course?

      This course is ideal for:

      • Individuals who need a basic understanding of a proven Enterprise Architecture methodology
      • Professionals who work for or join an organization applying the TOGAF Standard
      • Individuals who need to start to learn the TOGAF method
      • Individuals expected to apply the TOGAF approach to develop sustain and transform domain architectures
      • Individuals actively contributing to organisational transformation
      • Individuals working in Agile environments who need to understand and apply Enterprise Architecture using the TOGAF Standard
      • Individuals who wish to become qualified as part of their professional development
      ","

      If you plan to take the two examinations or the Combined Part 1 and Part 2 examination during the course there are no prerequisites.

      If you've achieved the TOGAF Enterprise Architecture Foundation certification exam or passed the Part 1 section of the Combined Part 1 and Part 2 examination you only need to take the TOGAF Enterprise Architecture Part 2 exam.

      Candidates who have achieved the TOGAF 9 certification can become certified through the bridge learning path.

      ","

      Benefits of TOGAF

      Candidates who become certified will earn The Open Group Applied TOGAF Enterprise Architecture Practitioner Open Digital Achievement Badge to reflect their ability to analyse and apply Enterprise Architecture. You can apply for this directly via The Open Group.

      ","

      This comprehensive course covers:

      • Module 1: Course Introduction
      • Module 2: Implemenetation Support Techniques
      • Module 3: An Introduction to the ADM
      • Module 4: Introduction to the ADM Techniques
      • Module 5: Apply ADM
      • Module 6: Architecture Governance
      • Module 7: Architecture Content
      • Module 8: The Context for Enterprise Architecture
      • Module 9: Stakeholder Management
      • Module 10: Phase A
      • Module 11: Architecture Development
      • Module 12: Implementing the Architecture
      • Module 13: Architecture Change Management
      • Module 14: Requirements Management
      • Module 15: Supporting the ADM work
      " "togafeaf","TOGAFEA Training - TOGAF Enterprise Architecture Foundation 10th Edition -

      This TOGAFEA training is provided by The Supplier in collaboration with Mundo Cognito and is accredited by The Open Group.

      This accelerated TOGAF Enterprise Architecture course provides validation that an individual has the basic knowledge and understanding of the Enterprise Architecture using the TOGAF approach sufficient to be able to contribute to an architecture project or work with the results. The learning objectives at this level focus on knowledge and comprehension.

      In just 2 days youll learn a common language with TOGAF practitioners. Youll also learn:

      • A basic understanding of the TOGAF approach for Enterprise Architecture including Agile delivery and application in a Digital Enterprise
      • The prerequisite qualification for becoming a TOGAF Enterprise Architecture Practitioner

      At the end of this course youll sit the TOGAFEA Level 1 Foundation exam and achieve your TOGAF Enterprise Architecture Foundation certification.

      Candidates who become certified who also satisfactorily complete the learning studies within this accredited training course will in addition earn The Open Group Certified: Applied TOGAF Enterprise Architecture Practitioner Open Badge to reflect their ability to analyze and apply Enterprise Architecture.

      Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

      Audience:

      This course is ideal for:

      • Individuals who need a basic understanding of a proven Enterprise Architecture methodology
      • Professionals who work for or join an organization applying the TOGAF standard.
      • Individuals who need to start to learn the TOGAF method.
      • Individuals who want to achieve the TOGAF Enterprise Architecture Foundation qualification
      ","

      There are no prerequisites for this foundation certification.

      Candidates who have achieved the TOGAF 9 Certified qualification can achieve certification via the bridge learning path. Please see our TOGAF©EA Bridge course for more information.

      ","

      Candidates who become certified who also satisfactorily complete the learning studies within this accredited training course will in addition earn The Open Group Certified: Applied TOGAF Enterprise Architecture Practitioner Open Digital Achievement Badge to reflect their ability to analyse and apply Enterprise Architecture. This can be applied for directly with The Open Group.

      ","
      • Module 1: The concepts of Enterprise Architecture and the TOGAF Standard
      • Module 2: The key terminology of the TOGAF Standard
      • Module 3: The Architecture Development Method (ADM) cycle and the objectives of each phase and how to adapt and scope the ADM for use
      • Module 4: The techniques available to support application of the ADM
      • Module 5: Applying the ADM including use of iteration partitioning and application in a Digital enterprise
      • Module 6: How Architecture Governance contributes to architecture development
      • Module 7: Architecture content — the outputs produced while executing the ADM
      " "togafeap","TOGAFEA Training - TOGAF Enterprise Architecture Practitioner 10th Edition -

      This TOGAFEA training is provided by The Supplier in collaboration with Mundo Cognito and is accredited by The Open Group.

      This accelerated TOGAF Enterprise Architecture course provides validation that an individual has the knowledge comprehension and understanding of the Enterprise Architecture using the TOGAF approach sufficient to be able to contribute to an architecture project or work with the results.

      In just 2 days you will learn the concepts of Enterprise Architecture and the TOGAF Standard - 10th Edition. Youll also learn:

      • How to apply the TOGAF approach to transform and manage change
      • Know how to apply the TOGAF method
      • Know how to apply the TOGAF techniques

      At the end of this course youll sit the TOGAF Enterprise Architecture Practitioner exam; Level 2 Certified and achieve your TOGAF Enterprise Architecture certification.

      Candidates who become certified who also satisfactorily complete the learning studies within this accredited training course will in addition earn The Open Group Certified: Applied TOGAF Enterprise Architecture Practitioner Open Badge to reflect their ability to analyze and apply Enterprise Architecture.

      Through The Suppliers Lecture | Lab | Review methodology youll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

      Audience:

      This course is ideal for:

      • Individuals expected to apply the TOGAF approach to develop sustain and transform domain architectures
      • Individuals actively contributing to organizational transformation
      • Individuals working in Agile environments who need to understand and apply Enterprise Architecture using the TOGAF Standard
      • Individuals who wish to become qualified as part of their professional development
      ","

      If a candidate has achieved certification for TOGAF Enterprise Architecture Foundation or passed the Part 1 section of the Combined Part 1 and Part 2 examination then they need only take the TOGAF Enterprise Architecture Part 2 examination.

      Candidates who have achieved the TOGAF 9 Certified qualification can achieve certification via the bridge learning path.

      Unsure whether you meet the prerequisites? Dont worry. Your training consultant will discuss your background with you to understand if this course is right for you.

      ","

      Candidates who become certified who also satisfactorily complete the learning studies within this accredited training course will in addition earn The Open Group Certified: Applied TOGAF Enterprise Architecture Practitioner Open Digital Achieivement Badge to reflect their ability to analyze and apply Enterprise Architecture. This can be applied for directly with The Open Group.

      ","
    • Module 2: How to apply the stakeholder management technique
    • Module 3: How to implement the Architecture Vision phase including its applicable techniques
    • Module 4: How to implement the Architecture Development Method (ADM) Phases B C and D to develop an architecture together with the applicable techniques
    • Module 5: How to implement the ADM Phases E F and G to implement an architecture together with the applicable techniques
    • Module 5: How to implement Architecture Change Management
    • Module 6: How to manage architecture requirements
    • Module 7: How to use The Open Group Library
    • Module 8: How to support the ADM work with applicable techniques
    • Module 9: Using architecture levels to organize the Architecture Landscape
    • Module 10: The Architecture Content Framework
    " "vmcpdcvf8","vSphere: Fast Track [V8] -

    This accelerated VMware vSphere: Fast Track [V8] five-day extended hour course takes you from introductory to advanced VMware vSphere 8 management skills. Building on the installation and configuration content from our best-selling course you will also develop advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure.

    Through a mix of lecture and hands-on labs you will install configure and manage vSphere 8. You will explore the features that build a foundation for a truly scalable infrastructure and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere 8 which includes VMware ESXi™ 8 and VMware vCenter Server 8.

    In just 5 days you’ll you will be able to meet the following objectives:

    • Install and configure ESXi hosts
    • Deploy and configure vCenter
    • Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users
    • Configure vCenter High Availability
    • Create and configure virtual networks using vSphere standard switches and distributed switches
    • Create and configure datastores using storage technologies supported by vSphere
    • Use the vSphere Client to create virtual machines templates clones and snapshots
    • Configure and manage a VMware Tools Repository
    • Create content libraries for managing templates and deploying virtual machines
    • Manage virtual machine resource use
    • Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion
    • Create and configure a vSphere cluster that is enabled with vSphere High Availability and vSphere Distributed Resource Scheduler
    • Manage the life cycle of vSphere to keep vCenter ESXi hosts and virtual machines up to date
    • Configure and manage vSphere networking and storage for a large and sophisticated enterprise
    • Use host profiles to manage VMware ESXi host compliance
    • Monitor the vCenter ESXi and VMs performance in the vSphere client

    At the end of this course you’ll sit the VM Ware exam and achieve your VMware vSphere: Fast Track [V8] certification.

    Through The Supplier’s Lecture | Lab | Review methodology you’ll get certified at twice the speed of the traditional training and get access to courseware learn from certified instructors and train in a distraction-free environment.

    Audience

    This course is ideal for:

    • System administrators
    • System engineers
    ","

    Before attending this accelerated course you should have:

    • System administration experience on Microsoft Windows or Linux operating systems.
    ","","

    Module 1: Course Introduction

    • Introductions and course logistics
    • Course objectives

    Module 2: vSphere and Virtualization Overview

    • Explain basic virtualization concepts
    • Describe how vSphere fits in the software-defined data center and the cloud infrastructure
    • Recognize the user interfaces for accessing vSphere
    • Explain how vSphere interacts with CPUs memory networks storage and GPUs
    • Install an ESXi host

    Module 3: vCenter Management

    • Recognize ESXi hosts communication with vCenter
    • Deploy vCenter Server Appliance
    • Configure vCenter settings
    • Use the vSphere Client to add and manage license keys
    • Create and organize vCenter inventory objects
    • Recognize the rules for applying vCenter permissions
    • View vSphere tasks and events
    • Create a vCenter backup schedule
    • Recognize the importance of vCenter High Availability
    • Explain how vCenter High Availability works

    Module 4: Deploying Virtual Machines

    • Create and provision VMs
    • Explain the importance of VMware Tools
    • Identify the files that make up a VM
    • Recognize the components of a VM
    • Navigate the vSphere Client and examine VM settings and options
    • Modify VMs by dynamically increasing resources
    • Create VM templates and deploy VMs from them
    • Clone VMs • Create customization specifications for guest operating systems
    • Create local published and subscribed content libraries
    • Deploy VMs from content libraries
    • Manage multiple versions of VM templates in content libraries

    Module 5: Configure and Manage vSphere Networking

    • Configure and view standard switch configurations
    • Configure and view distributed switch configurations
    • Recognize the difference between standard switches and distributed switches
    • Explain how to set networking policies on standard and distributed switches

    Module 6: Configure and Manage vSphere Storage

    • Recognize vSphere storage technologies
    • Identify types of vSphere datastores
    • Describe Fibre Channel components and addressing
    • Describe iSCSI components and addressing
    • Configure iSCSI storage on ESXi
    • Create and manage VMFS datastores
    • Configure and manage NFS datastores
    • Discuss vSphere support for NVMe and iSER technologies

    Module 7: Managing Virtual Machines

    • Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances
    • Migrate VMs using vSphere vMotion
    • Describe the role of Enhanced vMotion Compatibility in migrations
    • Migrate VMs using vSphere Storage vMotion
    • Take a snapshot of a VM
    • Manage consolidate and delete snapshots
    • Describe CPU and memory concepts in relation to a virtualized environment
    • Describe how VMs compete for resources
    • Define CPU and memory shares reservations and limits
    • Recognize the role of a VMware Tools Repository
    • Configure a VMware Tools Repository
    • Recognize the backup and restore solution for VMs

    Module 8: vSphere Monitoring

    • Monitor the key factors that can affect a virtual machine's performance
    • Describe the factors that influence vCenter performance
    • Use vCenter tools to monitor resource use
    • Create custom alarms in vCenter
    • Describe the benefits and capabilities of VMware Skyline
    • Recognize uses for Skyline Advisor Pro

    Module 9: Deploying and Configuring vSphere Cluster

    • Use Cluster Quickstart to enable vSphere cluster services and configure the cluster
    • View information about a vSphere cluster
    • Explain how vSphere DRS determines VM placement on hosts in the cluster
    • Recognize use cases for vSphere DRS settings
    • Monitor a vSphere DRS cluster
    • Describe how vSphere HA responds to different types of failures
    • Identify options for configuring network redundancy in a vSphere HA cluster
    • Recognize the use cases for various vSphere HA settings
    • Configure a cluster enabled for vSphere DRS and vSphere HA
    • Recognize when to use vSphere Fault Tolerance
    • Describe the function of the vCLS
    • Recognize operations that might disrupt the healthy functioning of vCLS VMs

    Module 10: ESXi Operations

    • Use host profiles to manage ESXi configuration compliance
    • Recognize the benefits of using configuration profiles

    Module 11: Managing the vSphere Lifecycle

    • Generate vCenter interoperability reports
    • Recognize features of vSphere Lifecycle Manager
    • Describe ESXi images and image depots
    • Enable vSphere Lifecycle Manager in a vSphere cluster
    • Validate ESXi host compliance against a cluster image and remediate ESXi hosts using vSphere Lifecycle Manager
    • Describe vSphere Lifecycle Manager automatic recommendations
    • Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware

    Module 12: Network Operations

    • Configure and manage vSphere distributed switches
    • Describe how VMware vSphere Network I/O Control enhances performance
    • Define vSphere Distributed Services Engine
    • Describe the use cases and benefits of vSphere Distributed Services Engine

    Module 13: Storage Operations

    • Describe the architecture and requirements of vSAN configuration
    • Describe storage policy-based management
    • Recognize components in the vSphere Virtual Volumes architecture
    • Configure Storage I/O Control
    "