Linkedin Learning – Microsoft 365: Implement Modern Device Services

Linkedin Learning – Microsoft 365: Implement Modern Device Services-ZH
English | Size: 321.14 MB
Category: Tutorial

Mobile devices are a critical productivity tool for most organizations. But balancing mobile access with the need to protect company data and systems can be tricky. Microsoft 365 provides a comprehensive, modern solution for mobile device management, providing maximum flexibility and security. Learn how to manage your organization’s tenant mobile devices and applications in this intermediate course for Microsoft 365 administrators. Instructor and Microsoft MVP Liam Cleary shows how to implement mobile device management using Azure Active Directory and Intune; manage security and compliance profiles for iOS, Windows, and Android devices; deploy mobile applications; and plan Windows 10 deployments to Microsoft 365.

Linkedin Learning – Azure for DevOps Application Infrastructure

Linkedin Learning – Azure for DevOps Application Infrastructure-ZH
English | Size: 196.39 MB
Category: Tutorial

Application infrastructure is a core tenant of DevOps, enabling teams to rapidly evolve scalable systems. App infrastructure is also a core component of the AZ-400 Microsoft Azure DevOps Solutions certification exam-and the focus of this course. Here Gurinder Singh Mann reviews the strategies, tools, and processes necessary to manage application infrastructure using the Azure DevOps tool and service set. Discover strategies for managing drift, leveraging infrastructure automation with Kubernetes, implementing infrastructure as code with Terraform, and deploying resources in a secure and compliant manner. Invest time learning these key Azure skills. The more successful your organization is developing your application infrastructure, the more performant and scalable your applications will be.

Linkedin Learning – SAP ERP Beyond the Basics-XQZT

Linkedin Learning – SAP ERP Beyond the Basics-XQZT
English | Size: 226.73 MB
Category: Tutorial

In this course, author Justin Valley explores ways to customize the SAP ERP layout for end users so that needed features and tools are front and center, and so the system works in a way that resonates with the goals of the business. This course includes an entire chapter on advanced reporting and covers
multiple ways to automate and deliver reports

Linkedin Learning – SurveyMonkey Essential Training-ZH

Linkedin Learning – SurveyMonkey Essential Training-ZH
English | Size: 329.78 MB
Category: Tutorial

Online surveys are the fastest and most cost-effective method to gather feedback. SurveyMonkey is a popular survey platform that you can use for free, with additional paid options, to send surveys and collect and analyze the responses. In this course, you can learn how to use SurveyMonkey to build your own online surveys. Instructor David Rivers walks through the steps, explaining how to choose a template, add questions, and customize your design. He also offers tips to improve response rates. Then David explains how to collect responses via email, social media, and other websites using the collector tools. Finally, learn how to analyze your survey results, filter responses and spot trends, and present your data using the built-in tools in SurveyMonkey.

Linkedin Learning – Security Awareness Social Engineering

Linkedin Learning – Security Awareness Social Engineering-ZH
English | Size: 324.31 MB
Category: Tutorial

Social engineering is one of the most dangerous forms of hacking because it preys on human nature. Learn how to defend your organization from social engineering by recognizing and thwarting the most common types of attacks. This course provides security teams and professionals with information on common social engineering techniques and safeguards. Instructor Stephanie Ihezukwu-a security analyst and engineer-describes how phishing, vishing, baiting, and physical activities like tailgating all provide entry to bad actors, and explains how training can be the most effective tool to combat these attacks. She also explains how to create policies and procedures; set up controls around passwords, email, and software updates; and conduct tests to see how effective your defenses truly are.