Duration 5 Days 30 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, Security Specialist, and Systems Administrator. Overview Upon successful completion of this course, students will be able to Enumerate Oracle auditing solutions to monitor database security requirements, Implement Oracle Audit Vault and Database Firewall, Configure Oracle Audit Vault and Database Firewall, Explain Oracle Compliance Framework, and Configure basic Compliance Framework rules. In the Oracle Database Security: Detective Controls course, students learn how they can use Oracle Database administration auditing features to meet the compliance requirements of their organization. IntroductionUsing Unified AuditUsing Fine-Grained AuditIntroduction to Oracle Audit Vault and Database Firewall (AVDF)Planning the Oracle Audit Vault and Database Firewall ImplementationInstalling the Audit Vault ServerConfiguring the Audit Vault ServerConfiguring Oracle AVDF and Deploying the Audit Vault AgentNetworking and Oracle AVDFInstalling a Database FirewallConfiguring Oracle AVDF and Deploying Database FirewallUsing Host MonitoringConfiguring High AvailabilityCreating Custom Collection Plug-insManaging the Audit Vault ServerManaging the Database FirewallsOverview of the Auditing and Reporting FeaturesPerforming Administrative TasksCreating Audit Policies for Oracle DatabasesCreating Database Firewall PoliciesOracle AVDF ReportsManaging Entitlements Additional course details: Nexus Humans Oracle Database Security - Detective Controls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database Security - Detective Controls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Learners will develop knowledge of FD&FA systems and apply this to the provision of detection and electrical actuation for gas extinguishing systems.
Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions
QA Level 2 Award In Fire Safety (RQF) Face to Face Classroom: Full day course Online / Virtual Classroom: 3 sessions of 2½ hours Suitable for Fire Wardens/Fire Marshals and all other members of staff Provides a foundation of fire safety knowledge on which employers and ‘responsible persons’ can build, keeping the business safe from fire Benefits of this course: How much do you know about keeping yourself and others safe in the workplace? Fire Safety Law breaches can result in unlimited fines and imprisonment More importantly, how would you feel if someone got injured or even killed by a fire you could have prevented? This course is for anyone who has a specific responsibility for fire safety in the workplace, such as designated fire wardens/fire marshals Successful candidates will gain an understanding of fire safety management at work and the specific roles and responsibilities related to fire safety in the workplace. Course Contents: Causes of Fire in the Workplace The Fire Triangle Hazards during and after a Fire Fire and Smoke Spread Identifying and Controlling Fire Hazards Fire Safety Laws Duties and Responsibilities of Employers and Employees Undertaking a Fire Safety Inspection Fire Safety Risk Assessments Contents of a Fire Safety Briefing Roles and Responsibilities of the Nominated Fire Warden Accredited, Ofqual regulated qualification: Our Fire Safety course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.You can rest assured that the training your employees receive is of a high quality and the candidates will get a strong grounding in Fire Safety, helping to keep your staff and your business safe from fire.The Ofqual Register number for this course is 603/2756/X
Overview This course provides an explanation of the underlying concepts of the Risk-Based Maintenance approach, guidance on its relationship and integration within asset management and the overall risk management process. This course will show delegates how to develop an action plan for implementation into an effective and cost-efficient maintenance strategy.
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management
Course Information This highly interactive course will provide guidance on why and how to implement a quality system successfully into the research laboratory. By doing so, you will position your innovation for the success it deserves. But leave things as they are and there is a good chance that your science will not realise its full potential should success, and its consequences, come your way. A quality system in your research laboratory is the most effective and efficient way to: Help scientists work more efficiently Ensure discoveries can be defended Protect the value of intellectual property. This course is particularly aimed at those working in early phase research environments which are not constrained by the regulatory requirements of the Good Practice regulations but are producing intellectual property, testing and/or products for the therapeutic market. For organisational reasons, rather than regulatory ones, this is a place where you need to get it right. The programme is delivered by leaders in the field who, quite simply, ‘have done it’. Whether delegates are at senior management level seeking strategic direction, a laboratory head wishing to deliver science that will stand the test of time or a quality professional thrown in at the deep end, this course will provide key insight and practical guidance to underpin future success. Based on risk based systems, tried and tested over many years in the workplace, the programme will help delegates to define, train, implement and monitor the quality of their research, irrespective of field or discipline. Delegates will learn how to help position their organisation for success. Course content: Delegates will be guided thoughtfully through each key component of the process in a stimulating learning environment. The course probes all avenues of the research quality arena, from an initial understanding of the cultural aspects of the scientific discovery environment, to managing quality in outsourced research programmes. Computer systems and e-data security in the research environment will be discussed and pragmatic solutions described to help manage the ballooning cloud of e-data. In addition, the ever blurring boundary between the regulated and non-regulated research environments will be discussed and delegates given perspective on future developments in the field. With this knowledge, delegates will be able to get it ‘right first time’. Is this course for you? The course is designed for all those involved in the research laboratory quality arena and it has been tailored to meet the needs of scientific management, bench scientists and quality professionals alike. Delegates get immediate access to highly experienced tutors who will share their wisdom and insights in an area where few others have been successful. The course is linked with the RQA guidance which builds on years of experience and forms the foundation of the programme. Tutors Tutors will be comprised of (click the photos for biographies): Louise Handy Director, Handy Consulting Ltd Sandrine Bongiovanni Associate Director in Research and Quality Compliance, Novartis Programme Please note timings may be subject to alteration. Day 1 09:00 Registration 09:10 Welcome and Introductions 09:20 History and Overview of the Field Examples of business and regulatory risks and the consequences of low quality in research. A look at the standards and guidelines that exist. 10:00 The Culture, the Politics and the Scientist's Perspective Understanding research environments, the drivers and the challenges. 10:30 Break 10:45 Workshop - Risk Management Thinking about risk management and prioritisation. Looking at the critical factors for the implementations of a successful quality system. 12:15 Workshop - Feedback 12:45 Lunch 13:45 Personnel, Plans, Procedures, Facilities, Equipment, Materials and Reagents Looking at planning the work, defining procedures in a way which promotes robust science without compromising brilliance and ensuring that all these elements are demonstrably fit for their intended purpose. 14:30 Workshop - Assay Validation How much validation is required at what stage? What do we need to validate an assay? 15:00 Workshop - Feedback 15:15 Research, Work Records, Archives and Research Review Data and records which are accurate, attributable, legally attestable and safe to permit reconstruction experiments and studies. Looking at aspects of the work where there is a chance to review, correct or improve the science, the data and the processes. 16:15 Continual Improvement and Quality Systems Reviewing implementation of a quality system, finding opportunities for improvement, understanding culture change. 16:45 Questions and Answers 17:00 Close of Course Extra Information Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points Development Level Develop
Course Introduction Covers B12 deficiency, pernicious anaemia, diagnosis, treatment and management. It also covers signs and symptoms. This course does cover how to set up your own service. Please note: this course is for health care professionals or those working in Primary Care. It is not open to Beauticians unless you are a registered healthcare professional. If in doubt- please email annie at training@anniebarr.com or phone +44 7500048222 About this event Course Introduction This course concentrates on B12 deficiency, symptoms, treatments and management. The course covers B12 deficiency, pernicious anaemia, diagnosis, treatment and management. It also covers signs and symptoms of pernicious anaemia. This course is interactive and we include case studies and discuss issues regarding diagnostic testing. We review inclusion and exclusion criteria and identification of appropriate clients. Delegates will get the opportunity to review practice with hands on practical demonstrations of how to give injections correctly. We will cover administration techniques, where to give the injections and record keeping / documentation. We will discuss role and responsibilities and contraindications and precautions. The delegates will leave this course with an example of an individual protocol of Patient Specific Direction (PSD) and a competence based framework document to be used in practice. This course is very interactive. AIMS AND OBJECTIVES Understand the need for accountability and responsibility in relation to role development Demonstrate an understanding of safe practice Describe the signs and symptoms of pernicious anaemia Describe pernicious anaemia and its impact on patients Fully understand the principles, and practice B12 deficiency and B12 injections Understand the importance of safety issues related to giving injections Understand the law relating to role and function of the HCA and prescribing. Describe why patients require B12 injectionsBe able to correctly identify anatomical sites for injectionsDemonstrate correct administration techniquesDemonstrate how to correctly dispose of wasteDemonstrate correct infection control procedures and use of PPEDescribe when patients require referral and understand the importance of referral using correct clinical pathwaysDemonstrate an understanding of anaphylaxis and emergency proceduresUnderstand the need for correct prescribing proceduresBe able to document consultations following your organisations procedures COURSE CONTENTS Role and responsibilities Accountability guidelines and requirements Pernicious anaemia Blood- function B12 Deficiency Risk factors/groups Causes of B12 deficiency Diagnosis and reference ranges, testing Protocols and guidelines Factors affecting B12 diagnosis and treatment Factors affecting absorption B12 injections and common side effects Could it be B12 Deficiency Supplements Side effects and management including ADR’s Contraindications and Precautions Correct Administration and techniques including practical session Injection sites Legal Issues including consent Prescribing and Patient Specific Directions What to record Storage Disposal of injections/waste Infection control Needle stick injuries Competence and supervised practice Policies and procedures Facts and Figures Setting up and running a clinic Insurance/indemnity Research/evidence base and resources Please note Anaphylaxis is not covered on this course, however we do run a separate Anaphylaxis 1hr training course, which takes place at the end of this B12 webinar. If you wish to do the 1 hr Anaphylaxis also, you should book onto BOTH courses. WHO SHOULD ATTEND? HCAs Nurses Doctors Pharmacists Anyone interested in Vitamin B12 deficiency and pernicious anaemia and those working with clients with B12 deficiency AB Health Group awards CPD points / certificate of attendance for each course. If you would prefer an accredited certificate by our accrediting body Aim Qualifications we can organise this. The charge for the certificate including postage is £30.
In this masterclass we'll unravel the complexities of the online world, shedding light on the most pressing current and emerging risks and opportunities faced by children and young people, from the perspective of the DSL, as Online Safety Lead.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, End User, Network Administrator, and Systems Administrator. Overview Upon completion of this course, students will be able to Describe and determine database security requirements, Understand Oracle security solutions to help meet security requirements, Implement basic database security, Configure network security, and Discover basic security configuration issues. This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help meet the security, privacy and compliance requirements of your organization. Introduction Course Objectives Course Schedule Detective Security Controls Preventive Security Controls Your Learning Aids Basic Workshop Architecture Understanding Security Requirements Fundamental Data Security Requirements Security Risks Techniques to Enforce Security Choosing Security Solutions Database Access Control: Authentication Protecting Against Database Bypass with Encryption Protecting Sensitive Data Protecting against Application Bypass Detecting Threats Compliance Implementing Basic Database Security Database Security Checklist Reducing Administrative Effort Principle of Least Privilege Objects Protection Configuring Network Security Network Access Control Listener Security Listener Usage Control Manage fine-grained access to external network services Discovering Basic Configuration Issues Accessing Enterprise Manager Security Reports Using Various Security Reports