Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management
Highfield Level 1 Award In Food Safety In Catering (RQF) Half day course Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely This Level 1 Award in Food Safety in Catering helps to prepare people for working in a low-risk role, where some food handling takes place. Course Contents: The Importance of Food Safety Legal responsibilities of food handlers Personal hygiene Contamination and cross contamination The importance of keeping one's work areas clean Pest control Basic bacteriology Benefits of this course: Businesses have a duty to their customers to produce food that is safe for consumption. There are one million cases of food poisoning in the UK each year. More than 6,000 are admitted to hospital. In 2014/2015, businesses in Chesterfield were issued 344 written enforcement notices. Derby received 1,116. Doing our Ofqual regulated, nationally accredited course ensures that nothing of importance is left out. EU and UK regulations state that all food handlers must receive appropriate training in food safety practices relevant to their duties. The Food Standards Agency says that 'Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely’. This Highfield Level 1 Award in Food Safety in Catering (RQF) is a nationally accredited qualification especially suitable for people working in, or planning to work in, the food retail industry where some food handling takes place Accredited, Ofqual regulated qualification: This Level 1 Food Safety in Catering training course is a nationally recognised, Ofqual regulated qualification accredited by Highfield Qualifications. This means that you can be rest assured that your level 1 Food safety in Catering certificate fulfils the legal requirements and is a very good way to make sure your low-risk employees are trained appropriately in Food Safety. The Ofqual Register number for this course is 603/2615/3
During this live-online masterclass we will focus on understanding recent developments in the mental health and wellbeing of children in the UK, including looking at the impact of cultural and technological changes over recent years and the impact this is having in schools.
Course Summary: This workshop aims to increase awareness of Safeguarding and Protecting Children, helping coaches to recognise signs of abuse and poor practice, and deal sensitively and effectively with issues that arise. It also prompts a review of coaching practice to ensure that sport provides a positive and enriching experience for children. The 3 hour workshop covers the following and learners will be able to: Identify and recognise good coaching practice and the implications for them. Explore their values and feelings in relation to child abuse, and recognise how these may potentially impact on their response. Recognise and respond to the signs and symptoms of child abuse and poor practice. Take appropriate action if concerns about a child arise. If you require a group booking for your staff/volunteers, please select group booking to request a private group session. This option will require a minimum of 8 delegates. If we do not have 8 delegates the course will be rearranged for a later date.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, End User, Network Administrator, and Systems Administrator. Overview Upon completion of this course, students will be able to Describe and determine database security requirements, Understand Oracle security solutions to help meet security requirements, Implement basic database security, Configure network security, and Discover basic security configuration issues. This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help meet the security, privacy and compliance requirements of your organization. Introduction Course Objectives Course Schedule Detective Security Controls Preventive Security Controls Your Learning Aids Basic Workshop Architecture Understanding Security Requirements Fundamental Data Security Requirements Security Risks Techniques to Enforce Security Choosing Security Solutions Database Access Control: Authentication Protecting Against Database Bypass with Encryption Protecting Sensitive Data Protecting against Application Bypass Detecting Threats Compliance Implementing Basic Database Security Database Security Checklist Reducing Administrative Effort Principle of Least Privilege Objects Protection Configuring Network Security Network Access Control Listener Security Listener Usage Control Manage fine-grained access to external network services Discovering Basic Configuration Issues Accessing Enterprise Manager Security Reports Using Various Security Reports
Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance
Highfield Level 1 Award In Food Safety In Retail (RQF) Half day course Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely This Level 1 Award in Food Safety for Retail helps to prepare people for working in a low-risk role, where some food handling takes place. Course Contents: The Importance of Food Safety Legal responsibilities of food handlers Personal hygiene Contamination and cross contamination The importance of keeping one's work areas clean Pest control Basic bacteriology Benefits of this course: Businesses have a duty to their customers to produce food that is safe for consumption. There are one million cases of food poisoning in the UK each year. More than 6,000 are admitted to hospital. In 2014/2015, businesses in Chesterfield were issued 344 written enforcement notices. Derby received 1,116. Doing our Ofqual regulated, nationally accredited course ensures that nothing of importance is left out. EU and UK regulations state that all food handlers must receive appropriate training in food safety practices relevant to their duties. The Food Standards Agency says that 'Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely’. This Highfield Level 1 Award in Food Safety in Retail (RQF) is a nationally accredited qualification especially suitable for people working in, or planning to work in, the food retail industry where some food handling takes place Accredited, Ofqual regulated qualification: This Level 1 Food Safety in Retail training course is a nationally recognised, Ofqual regulated qualification accredited by Highfield Qualifications. This means that you can be rest assured that your level 1 Food safety in Retail certificate fulfils the legal requirements and is a very good way to make sure your low-risk employees are appropriately trained in Food Safety. The Ofqual Register number for this course is 603/2617/7
Become a certified ISO 9001:2015 Lead Auditor with our CQI and IRCA accredited course. Gain the skills to lead quality management audits and enhance your career. Enroll now!
CPD Accredited, Interactive Short Course 2 hr session This training session gives a good introduction to epilepsy How can you best understand and help those affected with different types of seizures Great for those who have contact with people with epilepsy, such as family and friends, those working in education and afterschool clubs, sports and good CPD for nurses Course Contents: What is Epilepsy The different types of seizures Keeping someone safe while they're having a seizure Understand how having epilepsy affects someone's life Great for teachers and TAs in schools, for those working in care or community events, and those close to people with epilepsy Benefits of this Short Course: Epilepsy is one of the most common neurological conditions In the UK, there are over 600,000 people with a diagnosis of epilepsy That is about 1 in 103 people, or 1 child or young person in every 3 classrooms Every year, 1000 people in the UK die due to their epilepsy Help avoid unnecessary suffering or even death by knowing what to do to help while they're having an epileptic seizure, and keep them safe