• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

311 Educators providing Certified in Cybersecurity (CC) courses

Read Faster

read faster

London

With over 35 years commercial experience in building running and managing businesses operating across International markets in many channels I found this course to be hugely beneficial. As someone famously said I was so impressed I bought the company. Whether it is long commercial or legal documents, the endless trail of emails that flood our phones and computers more and more precious time is being taken up reading. Bu understanding both the mechanical and psychological elements that go into “smart reading” we can help you increase both the speed at which you read and also retain more of the understanding of what you have read. These courses have been proven over 30 years and thousands of satisfied customers (many in the public sector) and now more than ever before do we need to be able to read effectively. At our latest course in Durham the group on the course averaged more than a doubling of the speed at which they could read by the end of the day – oh and to add to that the understanding of what they had read also increased significantly — a real win – win. Just imagine what you could do with the time you would save each week ! Meet the Team From start up’s through to multi national organisation Tim’s expertise and commercial acumen has helped deliver profitable growth across many differing businesses. Dedicated to helping people get the most out of every opportunity in their work life balance. I always see opportunity and get great satisfaction in seeing people grow and develop their skills through the various training and development courses. Outside of work most Saturdays sees me involved in Rugby in some way shape or form (coaching / managing) and even still pull on the boots on the odd occasion, best rugby memory was playing in a game where both my sons were playing.

Hull Business Training Centre Limited

hull business training centre limited

HBTC (Hull Business Training Centre) was founded by Judith Dolman-Williams and Margaret Wingfield in 1994. At this time the world was a very different place. The use of mobile phones was extremely rare. The internet had been created but not many people had heard of it. A small band called Oasis released their debut album. The TV show ‘Friends’ first aired and Forrest Gump was the top grossing film of the year. Initially HBTC was based out of small office on Coelus Street, Hull. We carried out training for employers on our premises, across Hull and the East Riding. Within just a couple of months, the office on Coelus Street proved to be too small, as the business grew rapidly. So we relocated to an office block within Chamberlain Business Centre on Chamberlain Road, Hull. Initially we rented just a couple of rooms in this large block. But HBTC went from strength to strength, and added further rooms to our lease, as other businesses moved out. By the late 1990s, HBTC proudly occupied the full block. We secured our first apprenticeship training contract in 1996. Which has become the main focus of the business. The main areas were, and still remain, business, IT and teaching. In late 2001, an exciting opportunity arose to expand our already successful Job Centre Plus contract. This saw HBTC move our unemployed provision to the city centre. We decided to move all of our operations to one location on Spyvee Street at the end of 2004. In more recent years we have expanded our provision to the south of the Humber. Opening our Grimsby office in 2011 and our Scunthorpe office in 2013. Enabling us to cover Hull and East Yorkshire, Northern Lincolnshire and North East Lincolnshire. In 2015 we moved to the city centre at Charlotte Street Mews. Where we are still currently located. Not far from the New Theatre and Queens Gardens. In the old Citizens Advice building. We have moved with the times as the business landscape has evolved due to the impact of technological and digital advancements. But the core emphasis on what we offer has remained the same. The offer now includes apprenticeships, online courses and work-based learning opportunities across a range of sectors, including team leading, digital and customer service. HBTC are an Ofsted rated ‘Good’ training provider. Ofsted is the Office for Standards in Education, Children’s Services and Skills. They inspect services providing education and skills for learners of all ages. HBTC also hold the Matrix Standard, which is the international quality standard for organisations that deliver information, advice and/or guidance (IAG). At lot has changed since 1994, but our original HBTC Mission Statement still remains. “Committed to providing the opportunity for everyone to develop, in a caring and nurturing learning environment, through a highly trained and motivated workforce.”

Courses matching "Certified in Cybersecurity (CC)"

Show all 3

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

RESILIA Foundation

By IIL Europe Ltd

RESILIA™ Foundation AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation
Delivered In-Person in LondonFlexible Dates
£1,995

ISO 14298:2021 Security Printing Management System Lead Auditor Course

5.0(1)

By Cognicert Limited

The "ISO 14298:2021 Lead Auditor Course" integrates the principles of ISO 14298:2021, the International Standard for Security Printing Management, with the methodologies outlined in ISO 19011:2018, the Guidelines for Auditing Management Systems. The course equips participants with the skills and knowledge required to lead security printing audits effectively, ensuring compliance with ISO 14298:2021, and applies the principles of ISO 17011:2017 for conformity assessment bodies. It covers audit planning, execution, and reporting while emphasizing risk management and continual improvement.

ISO 14298:2021 Security Printing Management System Lead Auditor Course
Delivered In-Person in London
£640 to £800