In this workshop, we focus on Endpoint Manager with both a cloud-only and hybrid setup and cover all aspects of the Enterprise Mobility and Security Suite. At the end of the workshop, you will have an up-and-running demo environment with a fully configured Microsoft Endpoint Manager (Intune) environment.
This course is intended for IT Engineers, Administrators, Security Admins and Architects who want to learn more about Azure Sentinel and how to implement it in their organisation. This is a level 400 training so we’ll dive deep into this topic. We will start with a basic overview of what Azure Sentinel is, and then […]
This course is intended for IT Engineers, Administrators and Architects who want to learn more about Azure Identity and how to keep their Identity safe. We will go over some basic Azure fundamentals at the start and that way work our way up on the Azure Identity platform. What can you expect to know after […]
Microsoft Teams is the HUB for Teamwork where users chat, meet, call and collaborate, no matter where you are. For every work experience, there’s a Microsoft Teams device. Learn how to implement Microsoft Teams meeting scenarios and Meeting Rooms devices during this masterclass.
Microsoft Teams is the HUB for Teamwork where users chat, meet, call and collaborate, no matter where you are. Adding Voice capabilities extends the rich feature set of Microsoft Teams as a full Unified Communications solution. While there are many options to implement Voice in Microsoft Teams it is crucial you understand the advantages and […]
This course is intended for IT Engineers, Administrators and Architects who want to learn more about Windows Virtual Desktop. We will cover all topics concerning WVD in this training. From architecture (multiple scenario’s), to User Profiles (multiple scenario’s), to Teams media optimizations. And last but not least, in some hand-on-labs you’ll set up your own […]
The cyber security landscape can be challenging to navigate. New threats emerge daily and malicious actors tweak their approach and tools to bypass protective controls and avoid detection. In this challenging climate, it’s important that you – as a defender – try to stay ahead so you can keep your environment safe. Microsoft has a […]