5-day intensive data protection course, delivered by a specialist.
Duration 1 Days 6 CPD hours This course is intended for To ensure success, students should have completed Excel Essentials and Excel Functions Including Pivot Tables and Lookups or have the equivalent knowledge and experience. Overview Upon successful completion of this course, students will be able to enhance productivity and efficiency by streamlining workflow, collaborate with others, and audit and analyse data. This course is designed for students desiring to gain skills necessary to create macros, collaborate with others, audit and analyse data, incorporate multiple data sources, and import data. Working with Multiple Worksheets and Workbooks Working with Named Ranges Link Cells Across Worksheets and Workbooks Use 3D References to Calculate Across Worksheets Consolidate Data Use Formula Auditing and Error Checking Reveal Formulas Trace Cell Precedents and Dependents Locate Errors in Formulas Watch and Evaluate Formulas Reviewing and Protecting Workbooks Control Data Entry via Data Validation Protect Workbook Access Protect Worksheets and Cell Content Add and Edit Comments Prepare a Workbook for Distribution Modify Excel's Default Settings Using Macros to Automate Workbook Functionality Create Macros via Recording Run Macros via Buttons and Shortcuts Assign Macros to the Quick Access Toolbar and Ribbon Assign Macros to Objects View Macro Code Forecasting and Analysis Data Use Conditional Formatting to Highlight, Sort and Filter Key Data Advanced Conditional Formatting using Formulas Create Sparklines to Visualise Data Add Trendlines to Charts to Visualise and Forecast Trends Use Data Tables and Scenarios to Project Potential Outcomes Use Goal Seek to Calculate Outcomes Forecast Data Trends Using Solver
The IECB ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO 27001 During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness. About This Course After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and gain the 'IECB Certified ISO/IEC 27001 Lead Implementer' credential. By holding an IECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization. This official IECB course is delivered in either our Live Online or Classroom format, as follows; Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS Day 2: Plan the implementation of an ISMS Day 3: Implementation of an ISMS Day 4: ISMS monitoring, measurement, continuous improvement and preparation for a certification audit, as well as the examination. Learning Objectives Acknowledge the correlation between ISO/IEC 27001, ISO 27002 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acquire the expertise to advise an organization in implementing Information Security Management System best practices The exam covers the following competency domains: Domain 1: Fundamental principles and concepts of an Information Security Management System (ISMS) Domain 2: Information Security Management System controls and best practices based on ISO/IEC 27002 Domain 3: Planning an ISMS implementation based on ISO/IEC 27001 Domain 4: Implementing an ISMS based on ISO/IEC 27001 Domain 5: Performance evaluation, monitoring and measurement of an ISMS based on ISO/IEC 27001 Domain 6: Continual improvement of an ISMS based on ISO/IEC 27001 Domain 7: Preparing for an ISMS certification audit Prerequisites A foundational understanding of ISO/IEC 27001 and knowledge of implementation principles. What's Included? Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Materials CPD Certificate The Exam Who Should Attend? The course is suitable for any of the following roles; Security Analyst Network Administrator Data Architect Security Manager Our Guarantee We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Accreditation Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 240 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Provided by This course is Accredited by NACS and Administered by theIECB.
This training course aims to equip you with in-depth knowledge on ISO 9001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of a QMS. By attending this training course, you can help organizations utilize a structured and evidence-based approach for managing the quality of their products and services. Apart from this, you will also learn about the importance of customer focus and benefits of setting the foundations of an organizational culture which enables and supports quality. The training course is followed by a certification exam. If you pass, you can gain the "Certified ISO 9001 Lead Implementer' credential. This certificate validates your competence to implement a QMS based on the requirements of ISO 9001. About This Course Learning objectives By the end of this training course, the participant will be able to: Explain the fundamental concepts and principles of a quality management system (QMS) based on ISO 9001 Interpret the requirements of ISO 9001 for a QMS from the perspective of an implementer Initiate and plan the implementation of a QMS based on ISO 9001, by utilizing best practice Support an organization in operating, maintaining, and continually improving a QMS based on ISO 9001 Prepare an organization to undergo a third-party certification audit Educational approach This training course is learner-centred and contains: Theories, approaches, and best practices used in management system implementation, operation, maintenance, and continual improvement Theoretical basis supported by practical examples, throughout the four days of the training course Interaction between the trainers and participants by means of questions and discussions Essay-type homework exercises at the end of each day Quizzes with stand-alone items (after each section) and scenario-based quizzes (at the end of each day), intended to prepare the participants for the certification exam Accreditation Assessment The exam covers the following competency domains: Domain 1: Fundamental principles and concepts of a quality management system Domain 2: Initiation of a QMS implementation Domain 3: Planning of a QMS implementation based on ISO 9001 Domain 4: Implementation of a QMS based on ISO 9001 Domain 5: Monitoring and measurement of a QMS based on ISO 9001 Domain 6: Continual improvement of a QMS based on ISO 9001 Domain 7: Preparation for a QMS certification audit The exam itself is a 12 question, essay type format, to be completed within a 150 minute window. The exam pass mark is 70%. Exam results are provided within 24 hours. Our Guarantee We are an official IECB Training Provider If you fail an exam, you can try again for free If you feel you need additional training, you can train for free too Prerequisites The main requirements for participating in this training course are a basic knowledge of ISO management system standards, overall knowledge of ISO 9001, and the MS implementation principles. An understanding of ISO's quality management principles may also facilitate the learning process. What's Included? Official Study Guides 4 day's Instructor led training Exam fees Who Should Attend? The ISO 9001 Lead Implementer training course is intended for: Personnel responsible for maintaining and improving the quality of the products and services of the organization Personnel responsible for meeting customer requirements Consultants, advisors, professionals wishing to obtain in-depth knowledge of ISO 9001 requirements for a QMS Professionals wishing to acquaint themselves with best practice methodology for implementing a QMS Individuals responsible for maintaining the conformity of QMS to ISO 9001 requirements Members of QMS implementation and operation teams Individuals aspiring to pursue a career in quality management Provided by This course is Accredited by NACSand Administered by the IECB.
We are data protection specialists and this is our flagship training programme for Data Protection Officers, Data Protection Managers, Compliance Managers or anyone with a responsibility for Data Protection. The Data Protection (GDPR) Practitioner Certificate is an internationally recognised qualification, endorsed by TQUK, which is regulated by Ofqual, a UK Government department. It equips current and aspiring data protection officers and data protection managers with knowledge and skills to undertake data protection compliance activities throughout an organisation. It is a valuable course for anybody with data protection compliance responsibilities. The course takes account of the latest developments in this fast moving subject, together with the latest guidance from the ICO and includes real life, practical examples throughout. There are two versions of the course (with the same content and same trainer). The courses priced at £1200 are run by Computer Law Training and lead to the TQUK endorsed certificate. The courses priced at £1440+VAT are run in collaboration with, and are booked through, the Law Society of Scotland and, on successful completion, lead to the TQUK endorsed certificate and a 'Certified Specialist' certification from the Law Society of Scotland. Suitability - Who should attend? The training programme for Data Protection Officers, Data Protection Managers, Compliance Managers, Corporate Governance Managers or anyone with a responsibility for Data Protection. The Data Protection (GDPR) Practitioner Certificate is ideal for you if you: Are already undertaking the role of Data Protection Officer Expect to be filling the post of Data Protection Officer in their current employment Are looking for employment as a Data Protection Officer Have, or expect to have, data protection responsibilities in their organisation Need to advise others on data protection compliance Wish to be able to demonstrate verifiable practical skills and learning in this area. It is suitable for those working in: the public sector, the private sector and the third sector. In either case, it will teach participants essential data protection skills and in depth knowledge. Outcome / Qualification etc. Understand the importance of data protection legislation and compliance in the UK and beyond. Interpret key terminology of the UK GDPR and Data Protection Act 2018 (DPA) in a practical context Understand the key obligations of the UK GDPR and DPA Create appropriate policies and procedures necessary for data protection compliance Carry out a data protection audit and gap analysis Develop an action plan to address a data protection gap analysis Respond appropriately to data protection issues arising in an organisation Carry out the duties of a data protection officer Undertake accountability and risk analysis activities Training Course Content Day 1 Data Protection – history and background GDPR Overview What, really, is personal data Purposes & Legal Bases Day 2 Consent Special Categories of Personal Data Data Subject Rights Transparency Requirements Data Processors and Controllers Information Security Obligations Breach Reporting and Recording Day 3 Restricted (International) Transfers Cloud Services Accountability The Personal Data Audit & Record of Processing The “Accountability Portfolio” Data Protection by Design & Default Data Protection Impact Assessments Privacy Enhancing Technologies Data Protection Officers Direct Marketing & Cookies Day 4 Data Protection Act 2018 HR Issues Risk Frameworks Data Protection Governance Day 5 Data Protection Audit Gap Analysis Action Plan Implementation The ICO and Enforcement Brexit and the future (crystal ball!) The European Data Protection Board (EDPB) Questions Course delivery details The course is delivered on Zoom. It lasts 5 days over 3 weeks, 9.30-16.30. The advertised start date is usually a Tuesday which is the first day of the course. The course normally continues on the Thursday of that week, Tuesday and Thursday the following week and one day in the third week: 24, 26, 31 January & 2, 7 February 2023 The one-hour test to obtain the certificate is online by arrangement in the week or two following the course. The trainer for the course is Tim Musson, who has a Master of Laws degree in IT and Telecoms Law, is a Certified Information Privacy Professional (CIPP/E) and a Certified Information Privacy Technologist (CIPT).
Total sFlow training course description A comprehensive hands on course covering sFlow. The course starts with the basics of flows moving swiftly onto configuring sFlow and studying the information it provides. What will you learn Describe sFlow. Use Nmap. Recognise how sFlow can be used. Describe the issues in using sFlow. Compare SFlow with SNMP and NetFlow. Total sFlow training course details Who will benefit: Technical staff working with sFlow. Prerequisites: TCP/IP foundation for engineers. Duration 1 day Total sFlow training course content What is SFlow? Where to monitor traffic. Packet based sampling, Time based sampling. Adaptive sampling. Flow samples, Counter samples. Hands on Wireshark flow analysis. Getting started with sFlow sFlow configuration. Enabling sFlow. Per interface. Hands on Accessing sFlow data using the CLI. sFlow architecture SFlow agents and collectors. When flows are exported. Distributed sFlow architecture, subagents. sFlow reporting products. SolarWinds. Hands on Collector software. sFlow features and benefits Troubleshooting with sFlow, controlling congestion, security and audit trail analysis. Hands on Using sFlow. sFlow versus other technologies Flows. sFlow impact and scalability. sFlow versus SNMP and RMON, SFlow versus NetFlow/IPFIX. Hands on Advanced sFlow configuration.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is someone who works, or has ambition to work, in a leadership role in data center operations such as a data center facilities manager, data center operations manager, who has the responsibility to achieve and improve the high-availability and manageability of the data center operations. Overview After completion of the course the participant will be able to: Perform the needs analysis translating business requirements to data center services Set-up and manage the data center operations team Implement and monitor safety- and security practices Identify a suitable maintenance program for the data center facility and its equipment Select the appropriate policies and procedures required for data center operations Monitor the data center availability, capacity and capability Manage and implement basic data center projects Set-up and implement an environmental sustainability program Select an appropriate back-up site to support organizational resilience Identify and respond to risk in the data center Manage and support the document life cycle Create a basic budget proposal Select and manage vendors and measure their performance Manage data center assets Managing the facilities of today?s high-end and high-availability data centers is an extremely demanding and complex task which is often underestimated. There is often very little appreciation and understanding of the complexities of managing today's mission-critical data centers where downtime is not an option, especially since many of the data centers are operating at, or near, their design limits. Operations management at the facilities layer makes all the difference. Even a data center designed to the highest redundancy level as per the ANSI/TIA-942 standard could still experience many unscheduled downtime events due to poor planning, operations, maintenance and management processes. Service Level Management Service Level Management Needs analysis Capability assessment Service portfolio Service catalogue Service Level Agreements (SLAs) Availability measurement Data points in SLA Service reporting Complaint procedure Customer satisfaction measurement Service Improvement Process (SIP) SLA content The Data Center Organization Operational issues Organization chart Roles and responsibilities Skills matrix Contingency / backup roles Shift management Performance management Career development Training and assessment Job rotation Succession planning Disciplinary program Managing Safety & Statutory Requirements Safety policies and regulations Occupational Health and Safety (OH&S) Safety awareness training Permit to Work (PTW) Lock-out / Tag-out Personal Protective Equipment (PPE) Testing and tagging of equipment Emergency preparedness and response Reporting of safety issues Reviews / internal audit / external audit Managing Physical Security Security policies and procedures Security standards and guidelines Security staff Security awareness Security incident management Disciplinary program Reviews, internal and external audits Facilities Management Maintenance policies and procedures Various maintenance programs Outsourcing of maintenance activities Maintenance contract options Warranty Maintenance schedule Service situations Spart part management Contamination control Data Center Operations Policies and procedures for data center operations Service operations and the daily data center operations Monitoring / Reporting / Control Monitoring requirements Escalation procedures Reporting Trend analysis Reviews Project Management Project management Project organization Project manager Project phases Environment Sustainability The importance of sustainability Sustainability policies Environmental management Power efficiency indicators - Waste management - Water management ICT utilisation management Environmental performance measurements Renewable energy factor (REF) Organizational Resilience Business continuity Data center facility options Business Impact Analysis Type of facility Human resources Facility, equipment and consumables Governance, Risk and Compliance Management commitment Coordination, collaboration and integration Compliance Risk management Document management Financial management Vendor management Asset management Additional course details: Nexus Humans Certified Data Center Facilities Operations Manager (CDFOM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Center Facilities Operations Manager (CDFOM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
HP iMC for engineers training course description A hands on course focusing on network management using HP iMC on Microsoft Windows or UNIX. What will you learn Describe the network management architecture. Use HP NNMi. Diagnose faults using HP iMC. Recognise the MIB structure. HP iMC for engineers training course details Who will benefit: Network administrators. Network operators Those wishing to find out more about how their NMS works Anyone wishing to implement NFV using OpenStack. Prerequisites: Introduction to Virtualization Duration 2 day HP iMC for engineers training course content Network management What is network management? Benefits, issues. Getting started with HP iMC Starting HP iMC, IP discovery, IP monitoring, controlling IP discovery. Hands on Initial HP iMC configuration. Using HP iMC Viewing devices, Device view, IP view, network view, polling. Hands on Using HP iMC. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Configuring network devices for HP iMC. Parts of SNMP SNMP architecture, MIBs, The protocol. HP iMC SNMP configuration. Hands on HP iMC SNMP configuration. MIBs The MIB2 groups, additional MIBs, MIB compilers, vendor MIBs. HP iMC MIB loader and browser. Hands on MIB browsing. Monitoring devices Polling, obtaining MIB information. Hands on HP iMC performance management. Configuration and change management Configuration templates, software library, configuration compare, configuration audit and reports. Hands on Using the configuration center. Reports Report templates, Real time reports, scheduling reports. Hands on Using real time reports. HP iMC fault management Alarms, polling, fault management, setting thresholds and configuring traps. Syslog. Hands on Working with alarms. Security alarms.
Administering Microsoft SQL Server course description This course provides students with the knowledge and skills to maintain a Microsoft SQL Server database. The course focuses on how to use SQL Server 2016 product features and tools related to maintaining a database. Note: This course is designed for customers who are interested in learning SQL Server 2014 or SQL Server 2016. It covers the new features in SQL Server 2016, but also the important capabilities across the SQL Server data platform. What will you learn Describe core database administration tasks and tools. Configure SQL Server databases and storage. Import and export data. Monitor SQL Server. Trace SQL Server activity. Manage SQL Server security. Audit data access and encrypt data. Administering Microsoft SQL Server course details Who will benefit: Individuals who work with SQL Server databases. Individuals who develop applications that deliver content from SQL Server databases. Prerequisites: Introduction to data communications & networking. Duration 3 days Administering Microsoft SQL Server course contents Introduction to SQL Server administration Database administration, SQL Server platform, database management tools and techniques. Hands on SQL Server Management Studio, sqlcmd Windows PowerShell with SQL Server. Working with databases and storage Data storage with SQL Server, managing storage for system databases, managing storage for user databases, moving database files, configuring the buffer pool extension. Hands on Configuring tempdb storage, creating databases, attaching a database. Importing and exporting data Transferring data, importing and exporting table data, copying or moving a database. Hands on import and export wizard, bcp utility, BULK INSERT statement, OPENROWSET function. Monitoring SQL Server 2014 Monitoring SQL Server, dynamic management views and functions, performance monitor. Hands on Baseline metrics, monitoring a workload. Tracing SQL Server activity Tracing workload activity, using traces. Hands on Capturing a trace in SQL Server profiler, generating tuning recommendations. Managing SQL Server security SQL Server security, server-level security, database-level principals, database permissions. Hands on SQL Server security. Testing access.
Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management