• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

686 Compliance courses in Wetherby delivered Live Online

ISO 37001 Foundation Training

By Training Centre

  ISO 37001 Foundation training enables you to learn the basic elements to implement and manage an Anti-bribery Management System (ABMS) as specified in ISO 37001. About This Course   During this training course, you will be able to understand the different modules of an ABMS, including ABMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.   After completing this course, you can sit for the exam and gain "Certified ISO 37001 Foundation' credential. An IECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.   Learning objectives   Understand the elements and operations of an Anti-bribery Management System and its principal processes Acknowledge the correlation between ISO 37001 and other standards and regulatory frameworks Understand the approaches, methods and techniques used for the implementation and management of an ABMS   Educational approach   Lecture sessions are illustrated with practical questions and examples Practical exercises include examples and discussions Practice tests are similar to the Certification Exam Prerequisites   There are no prerequisites for this course. What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides The Exam fees Who Should Attend?   Individuals concerned about Anti-bribery Management Individuals seeking to gain knowledge about the main processes of Anti-bribery Management Systems (ABMS) Individuals interested to pursue a career in Anti-bribery Management Accreditation Assessment   The examination consists of 40 multiple choice questions stemming from the course materials. The exam should be completed within 60 minutes, with a 70% pass mark. Exam results are provided within 24 hours. Provided by   This course is accredited by NACS and Administered by the IECB

ISO 37001 Foundation Training
Delivered OnlineFlexible Dates
£795

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. Exploring Cisco Tetration Data Center Challenges Define and Position Cisco Tetration Cisco Tetration Features Cisco Tetration Architecture Cisco Tetration Deployment Models Cisco Tetration GUI Overview Implementing and Operating Cisco Tetration Explore Data Collection Install the Software Agent Install the Hardware Agent Import Context Data Describe Cisco Tetration Operational Concepts Examining Cisco Tetration ADM and Application Insight Describe Cisco Tetration Application Insight Perform ADM Interpret ADM Results Application Visibility Examining Cisco Tetration Intent-Based Networking Describe Intent-Based Policy Examine Policy Features Implement Policies Enforcing Tetration Policy Pipeline and Compliance Examine Policy Enforcement Implement Application Policy Examine Policy Compliance Verification and Simulation Examining Tetration Security Use Cases Examine Workload Security Attack Prevention Attack Detection Attack Remediation Examining IT Operations Use Cases Key Features and IT Operations Use Cases Performing Operations in Neighborhood App-based Use Cases Examining Platform Enhancement Use Cases Integrations and Advanced Features Third-party Integration Examples Explore Data Platform Capabilities Exploring Cisco Tetration Analytics Administration Examine User Authentication and Authorization Examine Cluster Management Configure Alerts and Syslog Additional course details: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Optimize and Scale [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use VMware vSphere Client™ to manage certificates Use Identity Federation to configure VMware vCenter Server to use external identity sources Use VMware vSphere Trust Authority™ to secure the infrastructure for encrypted VMs Use host profiles to manage VMware ESXi™ host compliance Create and manage a content library for deploying virtual machines Manage VM resource usage with resource pools Monitor and analyze key performance indicators for compute, storage, and networking resources for ESXi hosts Optimize the performance in the vSphere environment, including vCenter Server This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere© 7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. As an exclusive benefit, those who participate in this course will receive additional premium recorded lecture material on vSphere security. Course Introduction Introductions and course logistics Course objectives Network Scalability Configure and manage vSphere distributed switches Describe how VMware vSphere© Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Storage Scalability Explain why VMware vSphere© VMFS is a high-performance, scalable file system Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O filtering Configure and assign virtual machine storage policies Create VMware vSAN? storage policies Recognize components of the VMware vSphere© Virtual Volumes? architecture Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Host and Management Scalability Use the vSphere Client to manage vSphere certificates Describe identity federation and recognize its use cases Configure identity federation to allow vCenter Server to use external identity provider Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority Use host profiles to manage ESXi configuration compliance Create a local content library and subscribe to a published content library Deploy VMs from a content library Create and manage resource pools in a cluster Describe how scalable shares work CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, transparent page sharing, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Discuss vSphere support for NVMe and iSER technologies Use esxtop to monitor key storage performance metrics Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Supplemental Content Appendix A: vSphere Auto Deploy Explain the purpose of VMware vSphere© ESXi ? Image Builder CLI Explain the purpose of VMware vSphere© Auto Deploy? Describe how an autodeployed ESXi host boots Configure a vSphere Auto Deploy environment Appendix B: vSphere Security Configure ESXi Host Access and Authentication Recognize strategies for securing vSphere components, such as vCenter Server, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs Encrypt core dumps List VM encryption events and alarms

VMware vSphere: Optimize and Scale [v7.0]
Delivered OnlineFlexible Dates
Price on Enquiry

Mental Health Skills for Managers

5.0(2)

By Changing Minds Training

This is a practical and immersive course for people managers which provides you with the skills, knowledge, and confidence to have effective conversations with staff about mental health and wellbeing.

Mental Health Skills for Managers
Delivered in London or UK Wide or OnlineFlexible Dates
£2,400

ISACA CGEIT Training Boot Camp

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Risk professionals Business analysts Project managers Compliance professionals IT professionals Anyone whose work includes evaluating and mitigating risk Overview This boot camp prepares you to pass the ISACA CGEIT exam, which covers four domain areas designed to reflect the work performed by individuals who have a significant management, advisory or assurance role relating to the governance of IT. Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization This CGEIT Boot Camp is designed for experienced IT governance personnel and those who have responsibilities for the stewardship of IT resources. You will learn how to effectively implement and manage governance across all areas of technology ? as well as align that technology with strategic enterprise goals. This training also explains the CGEIT examination process and helpsprepare you for your CGEIT exam by providing guidance and testing your exam readiness through sample questions. You?ll leave fully prepared to earn your CGEIT certification. Course Outline Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization

ISACA CGEIT Training Boot Camp
Delivered OnlineFlexible Dates
Price on Enquiry

Suicide First Aid

5.0(2)

By Changing Minds Training

This one-day Suicide First Aid training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.

Suicide First Aid
Delivered in London or UK Wide or OnlineFlexible Dates
£2,495

LETTERS OF CREDIT AND METHOD OF PAYMENT MASTERCLASS

By Export Unlocked Limited

This workshop covers the five main types of payment for exports, from advance payment to open account. It includes the use of Bills of Exchange with and without documents

LETTERS OF CREDIT AND METHOD OF PAYMENT MASTERCLASS
Delivered Online
£295

BOHS/OHTA W504 - Asbestos and other fibres

By Airborne Environmental Consultants Ltd

P404 Air Sampling of Asbestos and MMMF and Requirements for a Certificate of Reoccupation Following Clearance of Asbestos is the industry standard qualification for those whose work involves air sampling and clearance testing, such as asbestos analysts. In addition to holding the qualification, they are required to undertake and provide evidence of annual refresher training. RP404 Refresher is a new course, specifically designed to meet this requirement. RP404 Refresher enables candidates to revise and update their knowledge on air sampling and clearance testing techniques, and to receive a certificate of course completion by passing a written examination, which covers both the theory and practice of air sampling and clearance testing.

BOHS/OHTA W504 - Asbestos and other fibres
Delivered in Manchester + 1 more or OnlineFlexible Dates
£1,015

IOSH Managing and Working Safely Course

5.0(43)

By Knight Training (UK) Ltd

Being safe at the workplace should be a priority for any business. Come to Knight Training to train with us and start working safe with our IOSH Managing and Working Safely Course!

IOSH Managing and Working Safely Course
Delivered in Leeds + 3 more or OnlineFlexible Dates
£425

Certified Asset Management Security Expert (CAMSE)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for IT Asset Managers and other professionals involved in Asset Management, strategic planning, security programs and those affected or influenced by ITAM and security initiatives. The mission of IAITAM?s CAMSE course is to maximize the contribution of IT Asset Management professionals to the information security and physical security of the organization by bridging the gap between ITAM and IT security processes while incorporating security strategies throughout the ITAM policies, processes and procedures so that ITAM enhances the security program and improves the applicable governance. This course includes the comprehensive online examination necessary for achieving CAMSE Certification. Course Outline Scope of IT Security & ITAM Threat Prevention vs. Threat Protection Decentralized vs. Centralized Security The IT Security Plan ITAM?s Role in Risk Management The 12 KPAs & Security Program Management & Security Communication & Education Management & Security Policy Management & Security Acquisition Management & Security Asset Identification Management & Security Disposal Management & Security Project Management & Security Documentation Management & Security Financial Management & Security Legislation Management & Security Compliance Management & Security Vendor Management & Security Assessing Asset Risk Level Program Issues by Asset Type ITAM Program Assessment for Security

Certified Asset Management Security Expert (CAMSE)
Delivered OnlineFlexible Dates
Price on Enquiry