• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7002 Compliance courses

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495

Certificate in Compliance

5.0(10)

By Apex Learning

Overview Adherence to rules, regulations, and risk recognition is essential for any UK or International Company. Train to be a Compliance officer and become indispensable. This Certificate in Compliance course provides the knowledge and tools you will need to install and supervise an effective Compliance Management System. If a business does not manage risk or distribute awareness of lawful procedures, it is doomed to fail. The course's contents will teach you the duties and responsibilities of a professional Compliance Officer and the role's value to an organisation. You will also learn the primary processes of auditing and improvement, ensuring a stable environment for success. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is this course for? There is no experience or previous qualifications required for enrolment on this Certificate in Compliance. It is available to all students, of all academic backgrounds. Requirements Our Certificate in Compliance is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on wifi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 2 sections • 12 lectures • 03:00:00 total length •Module 1: Introduction to Compliance: 00:10:00 •Module 2: Compliance Management System: 00:15:00 •Module 3: Basic Elements of Effective Compliance: 00:15:00 •Module 4: Compliance Audit: 00:20:00 •Module 5: Compliance and Ethics: 00:20:00 •Module 6: Introduction to Risk and Basic Risk Types: 00:20:00 •Module 7: Further Risk Types: 00:20:00 •Module 8: Introduction to Risk Management: 00:10:00 •Module 9: Risk Management Process: 00:10:00 •Module 10: Risk Assessment and Risk Treatment: 00:20:00 •Module 11: Types of Risk Management: 00:20:00 •Assignment - Compliance Training Level 2: 00:00:00

Certificate in Compliance
Delivered Online On Demand3 hours
£12

Hospitality Compliance Management Course

4.3(43)

By John Academy

Overview The core purpose of hospitality compliance management is to promote customer welfare and ensure employees return home safe and sound every day. This Hospitality Compliance Management Course will introduce you to the compliance requirements hospitality venues must follow to mitigate risks and stand apart from the competition.  The Hospitality Compliance Management Course covers a comprehensive range of modules to deepen your understanding of health and safety compliance in hospitality. Here, you'll learn about food safety and hygiene, health and safety, alcohol licensing, data protection and privacy, etc. You'll also learn how to conduct internal audits and inspections to monitor compliance and identify any areas of improvement. Course Preview Learning Outcomes Understand the importance of compliance in the hospitality industry Explore the HACCP principles in the hospitality industry Gain an excellent understanding of health and safety compliance Familiarise yourself with the essential principles of food safety and hygiene Discover the effective strategies for risk management Learn how to implement sustainability in the hospitality industry Why Take This Course From John Academy? Affordable, well-structured and high-quality e-learning study materials Engaging tutorial videos, materials from the industry-leading experts Opportunity to study in a user-friendly, advanced online learning platform Efficient exam systems for the assessment and instant result Earn UK & internationally recognised accredited qualification Easily access the course content on mobile, tablet, or desktop from anywhere, anytime Excellent career advancement opportunities Get 24/7 student support via email. Who Should Take this Hospitality Compliance Management Course? Whether you're an existing practitioner or an aspiring professional, this course is an ideal training opportunity. It will elevate your expertise and boost your CV with key skills and a recognised qualification attesting to your knowledge. Are There Any Entry Requirements? This Hospitality Compliance Management Course is available to all learners of all academic backgrounds. But learners should be aged 16 or over to undertake the qualification. And a good understanding of the English language, numeracy, and ICT will be helpful. Certificate of Achievement After completing this course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates & Transcripts can be obtained either in Hardcopy at £14.99 or in PDF format at £11.99. Career Path​ Hospitality Compliance Management Course provides essential skills that will make you more effective in your role. It would be beneficial for any related profession in the industry, such as: Compliance Officer in Hospitality Food Safety Inspector Hotel Manager Data Protection Officer in Hospitality Environmental Compliance Specialist Module 1: Introduction to Hospitality Compliance Management Introduction to Hospitality Compliance Management 00:16:00 Module 2: Food Safety and Hygiene Compliance Food Safety and Hygiene Compliance 00:19:00 Module 3: Safety and Security Compliance Safety and Security Compliance 00:21:00 Module 4: Environmental Compliance Environmental Compliance 00:16:00 Module 5: Alcohol and Beverage Compliance Alcohol and Beverage Compliance 00:17:00 Module 6: Data Protection and Privacy Compliance Data Protection and Privacy Compliance 00:23:00 Module 7: Compliance Audits and Training Programmes Compliance Audits and Training Programmes 00:21:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Hospitality Compliance Management Course
Delivered Online On Demand2 hours 13 minutes
£24.99

EU Customs and Compliance

By Course Cloud

The comprehensive EU Customs and Compliance has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the EU Customs and Compliance today, and learn from the very best the industry has to offer! This best selling EU Customs and Compliance has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth EU Customs and Compliance is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The EU Customs and Compliance is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The EU Customs and Compliance is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the EU Customs and Compliance, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the EU Customs and Compliance will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the EU Customs and Compliance to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

EU Customs and Compliance
Delivered Online On Demand
£25

FD&FA BS5839-1 RQF Certified 5-Day Combined Course - 2 Part Course

5.0(1)

By Ember Compliance

At the end of the 5 days, Learners will attain an RQF Award in the requirements of FD&FA systems for non-domestic buildings BS 5839-1: 2017.

FD&FA BS5839-1 RQF Certified 5-Day Combined Course - 2 Part Course
Delivered Online + more
£965

Compliance and Risk Management: Part 1

By iStudy UK

Course Description Understand the ins and outs of compliance management with the Compliance and Risk Management: Part 1 course. This course will give you a detailed introduction to compliance. You will learn about the five essential elements of compliance. From the course, you will get an elaborate understanding of the Compliance Management System. This course will also provide you with valuable insight into compliance audits. Enrol in the course and get ready for a promising career in the compliance sector.  Learning outcome  Broaden your understanding of compliance Familiarise yourself with the five essential components of compliance Learn about the compliance management system Enrich your knowledge of compliance audit How Much Do Facilities Managers Earn? Senior - £56,000(Appx.) Average - £51,000(Appx.) Starting - £48,000(Appx.) Requirement Our Compliance and Risk Management: Part 1 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Compliance and Risk Management: Part 1 Module 01: Introduction to Compliance 00:12:00 Module 02: Five basic elements of compliance 00:20:00 Module 03: Compliance Management System (CMS) 00:20:00 Module 04: Compliance Audit 00:30:00 Assignment Assignment - Compliance and Risk Management: Part 1 00:00:00

Compliance and Risk Management: Part 1
Delivered Online On Demand1 hour 22 minutes
£25

Contract Law (UK), Compliance & GDPR

5.0(10)

By Apex Learning

Contract Law (UK), Compliance & GDPR is a comprehensive course that provides students with a deep understanding of the legal principles governing contracts in the UK, as well as the compliance requirements of the General Data Protection Regulation (GDPR). Along with this Contract Law (UK), Compliance & GDPR course, you will get 10 other premium courses. Also, you will get an original Hardcopy and PDF certificate for the title course and a student ID card absolutely free. Learning Outcomes of Contract Law (UK), Compliance & GDPR: Understand the basic principles of UK contract law Apply GDPR compliance requirements to business contracts Analyze and resolve complex contract law issues Develop effective contract drafting and negotiation skills Stay up-to-date on the latest developments in contract law and GDPR compliance This Contract Law (UK), Compliance & GDPR Bundle Consists of the following Premium courses: Course 01: Contract Law UK Level 3 Course 02: Business Law Course 03: Understanding Wills and Probate Laws - Level 2 Course 04: Employment Law Level 3 Course 05: AML and Criminal Intelligence Analysis Diploma Course 06: GDPR Data Protection Level 5 Course 07: Compliance & Business Risk Management Course 08: International Law Course 09: Family Law 2021 Course 10: Mental Health Laws and Awareness - Level 2 Course 11: Real Estate Investor Level 3 So, enrol in this Contract Law (UK), Compliance & GDPR course now to advance your career! This Contract Law (UK), Compliance & GDPR course is designed for anyone who wants to gain a deeper understanding of UK contract law, GDPR compliance, and other related legal concepts. It is ideal for business professionals, lawyers, and anyone else who needs to understand the legal implications of contracts. Course Curriculum of Contract Law (UK), Compliance & GDPR Bundle: Course 01: Contract Law UK Level 3 Module 01: Introduction to UK Laws Module 02: Ministry of Justice Module 03: Agreements and Contractual Intention Module 04: Considerations and Capacities of Contact Laws Module 05: Terms within a Contract Module 06: Misinterpretations and Mistakes Module 07: Consumer Protection Module 08: Privity of Contract Module 09: Insurance Contract Laws Module 10: Contracts for Employees Module 11: Considerations in International Trade Contracts Module 12: Laws and Regulations for International Trade Module 13: Remedies for Any Contract Breach =========>>>>> And 10 More Courses <<<<<========= How will I get my Certificate? After successfully completing this Contract Law (UK), Compliance & GDPR course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) Enrol today and start your journey to becoming a contract law expert! CPD 110 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Contract Law (UK), Compliance & GDPR course is for anyone who wants to gain a deeper understanding of UK contract law, GDPR compliance, and other related legal concepts. It is ideal for: Business professionals Lawyers Anyone else who needs to understand the legal implications of contracts Requirements Our Contract Law (UK), Compliance & GDPR is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this Contract Law (UK), Compliance & GDPR course, it can be studied in your own time at your own pace. Career path Having this Contract Law (UK), Compliance & GDPR course, will increase the value of your CV and open you up to multiple job sectors. Contract lawyer: £35,000 - £100,000 per year Data protection officer: £30,000 - £70,000 per year Compliance officer: £30,000 - £60,000 per year Business consultant: £40,000 - £100,000 per year Legal researcher: £25,000 - £40,000 per year Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Contract Law UK Level 3) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The de.livery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost

Contract Law (UK), Compliance & GDPR
Delivered Online On Demand
£53

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered Online
£2,380

COMMODITY CODES MASTERCLASS

By Export Unlocked Limited

Understanding commodity codes is vital to internationally trading businesses. Commodity codes are used worldwide to determine the customs duty and other charges levied on the goods when importing and exporting. They also determine any preferential treatments or restrictions and prohibitions that may apply to the goods and are used for monitoring trade volumes and applying international trade measures. This virtual half-day course will provide an insight into what commodity codes are and how getting them wrong can have a big impact on your business. By attending this course, we will ensure you: Are aware of what a commodity code is and what it is used for Understand the process of how to classify goods Successfully classify a range of goods Understand the importance of getting your commodity codes correct. Please note: If you are working towards your British Chamber of Commerce (BCC) Foundation Award, this course will count towards 1 of your 6 modules. Please make sure you select the ‘Yes’ option in the dropdown option for BCC when booking.

COMMODITY CODES MASTERCLASS
Delivered in Oldham or Online + more
£295

Real Estate Analyst (Investment Cash Flow Modelling in Excel)

4.3(5)

By Bayfield Training

The Real Estate Analyst course has been taught non-stop to global real estate firms over the last 25 years, and is without doubt the core financial modelling training in your career portfolio. Whether you have an upcoming financial modelling test for a new job or an APC exam, the Real Estate Analyst course is the choice for you.

Real Estate Analyst (Investment Cash Flow Modelling in Excel)
Delivered in person or Online + more
£1,750