Office 365 Technical

Learn how to plan, deploy, and operate Office 365. In this course, you will learn to evaluate, plan, deploy, and operate Microsoft Office 365 services,
including its identities, dependencies, requirements, and supporting technologies. You will learn the skills required to set up and sustain an Office 365 tenant and users.

Duration: November 2nd and 3rd, Two days (9:00am – 5:00pm)

Venue: Lotus Beta Analytics, Plot 21 Omorinre Johnson, Lekki-Phase 1 Lagos.


A Course at the expertise level designed to provide intensive knowledge on evaluation, planning , deployment and operation of Microsoft Office 365 services (Breakfast and Lunch Inclusive).

Limited Seats Available.

This includes Two exam vouchers for:
70-346: Managing Office 365 Identities and Requirements
70-347: Enabling Office 365 Services.


Prerequisites Technical knowledge of the following
• Cloud-based service concepts
• Overview of Office 365 and its component services
• Active Directory Service
• TCP/IP network routing
• Domain Name Services (DNS)
• X.509 Certificates
• Firewall ports Professional experience with the following:
         Windows PowerShell
         Administering Office 365 with Office 365 Admin Center
         Virtual Machines and Remote Desktop


COURSE OUTLINE
Planning and Provisioning Microsoft Office 365
Managing Microsoft Office 365 Users and groups
Configuring Client Connectivity to Microsoft Office 365
Planning and Configuring Directory Synchronization
Planning and Deploying Office 2016 ProPlus
Planning and Managing Exchange Online Recipients and Permissions
Planning and Configuring Microsoft Exchange Online Services
Planning and Deploying Skype for Business Online
Planning and Configuring SharePoint Online
Planning and Configuring an Office 365 Collaboration Solution
Planning and Configuring Rights Management and Compliance
Monitoring and Troubleshooting Microsoft Office 365
Planning and Configuring Identity Federatin.

• Plan an Office 365 deployment, configure the Office 365 tenant, and plan a pilot deployment
• Manage Office 365 users, groups, and licenses, and configure delegated administration
• Plan and configure client connectivity to Office 365
• Plan and implement the deployment of Office 365 ProPlus
• Plan and manage Exchange Online recipients and permissions
• Plan and configure Exchange Online services
• Plan and implement the Skype for Business Online deployment
• Plan and configure SharePoint Online
• Plan and configure an Office 365 collaboration solution that includes Yammer Enterprise, OneDrive for Business, and Office 365 groups
• Plan and configure the integration between Office 365 and Azure RMS, and configure compliance features in Office 365
• Monitor and review Office 365 services, and troubleshoot Office 365 issues

• Plan and implement identity federation between on-premises AD DS and Azure AD Who Needs to Attend
• IT professionals who evaluate, plan, deploy, and operate Microsoft Office 365 services including its dependencies, requirements, and supporting technologies
• Network administrators and IT managers responsible for managing and maintaining Office 365, including identities, document protection, integration with
on-premise directory services, and compliance with service level agreements.

 

Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) is the world’s most advanced certified ethical hacking course that covers 18 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organization.

The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals

It is strongly recommended that you attend the CEH class before enrolling into CHFI program!

The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one!

As the security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment,

This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks.  It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process.

Duration: 6th - 10th November 2017 (9:00am - 5:00Pm).

Venue: Lotus Beta Analytics, Plot 21 Omorinre Johnson, Lekki-Phase 1 Lagos.