• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

33 Educators providing Computer System Validation (CSV) courses

SeerPharma UK

seerpharma uk

Littlehampton, West Sussex

How we help the UK pharmaceutical sector The UK pharmceutical sector is highly regulated, highly specialised and highly competitive. But we believe these three factors are not mutually exclusive. What it takes to be rigidly compliant in an operation is the same as what it takes to be relentlessly focused on high quality output. Attention to detail and a comprehensive understanding of the detail are both required corporate traits. SeerPharma UK has an extensive knowledge of the detail of the regulatory environment and can communicate this effectively to those staff in key positions within your business. We also have a deep knowledge of the quality and productivity tools and techniques your business needs to succeed. So whether that’s improving your compliance history with the regulator, differentiating yourself against national and international competition or driving greater profitability from your operation, we can help you reach your goals. Part of something much bigger SeerPharma UK is the European centre of SeerPharma which has extensive coverage across Asia-Pacific. There is much regulatory convergence across UK & European and Asia-Pacific pharmaceutical compliance and we frequently share knowledge and materials with our colleagues in the Australian Head Office. How we go about our business Our philosophy can be summarised as follows: Understanding the Regulations is good, but understanding the Regulator is, we believe, the gold standard. As former MHRA inspectors we have both the insight and practical understanding of the regulatory regime as well as practical knowledge of how those regulations are interpreted. Our aim is to share that inside knowledge to help you compete successfully in the regulated environments of pharmaceutical, biotechnology, medical devices and related industries. Our technical partners in the UK We work with a range of organisations in the UK to provide our clients with the breadth and depth of knowledge required in this highly regulated and competitive market.

Courses matching "Computer System Validation (CSV)"

Show all 95

Computer System Validation Training Course (ONLINE). Extend Your Role to CSV Projects. Get Certified and Become a CSV Professional

By Getreskilled (UK)

Has the Computer System Validation Engineer left and you’ve been handed their responsibilities? Do the thoughts of your next audit fill you with dread? CSV can be frustrating but this program will show you how to manage electronic data in a regulated manufacturing/laboratory/clinical environment using the GAMP framework and ensure compliance with FDA’s 21 CFR Part 11, EU Annex 11 or other regulatory guidelines.

Computer System Validation Training Course (ONLINE). Extend Your Role to CSV Projects. Get Certified and Become a CSV Professional
Delivered Online On Demand
£699 to £9,996

50255 Managing Windows Environments with Group Policy

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design. Overview At Course Completion: - Features and functions of Group Policy - Use Group Policy management tools to manage security policies - Design a Group Policy infrastructure - Group Policy processing architecture - Back up, restore, import, and copy Group Policy Objects through the Group Policy - Management Console - Use Windows PowerShell to manage Group Policy - Implement security using Group Policy - Configure the desktop environment with Group Policy - Configure roaming profiles and Folder Redirection - Assign and publish software packages - Implement AppLocker and software restriction policies - Create and deploy Administrative Templates - Configure Group Policy preferences In this course, you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server 2016 and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks, implement administrative and security templates, and determine best practices when deploying software packages. 1 - Introduction to Configuration Management Configuration Management Overview Configuration Management Using Group Policy Group Policy Features Introduced with Later Versions of Windows Using Windows PowerShell in the Configuration Management Process 2 - Using Group Policy Management Tools Local and Domain Policies Using Group Policy Management Console Understanding Group Policy Refresh 3 - Designing a Group Policy Infrastructure Design Stages for a Group Policy Infrastructure Planning your Group Policy Design Designing Your Group Policy Solution Deploying Your Group Policy Solution Managing Your Group Policy Solution 4 - Understanding the Architecture of Group Policy Processing Group Policy Components in AD DS Understanding the Group Policy Deployment Order Modifying Group Policy Processing 5 - Troubleshooting and Backing Up GPOs Using Group Policy Troubleshooting Tools Integration of RSoP Functionality Group Policy Logging Options Backing Up, Restoring, Importing, and Copying GPOs Building Migration Tables 6 - Securing Windows Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Windows Firewall with Advanced Security Implementing Domain Security Security Policy Options for Window Client and Windows Server 7 - Implementing Application Security Using Group Policy Managing UAC Settings Defending Against Malware Using AppLocker to Restrict Software Implementing Windows App Security Settings 8 - Configuring the Desktop Environment with Group Policy Exploring Script Types and Controlling Script Execution Defining the Desktop, Start Menu, and Taskbar Settings Defining the Control Panel Settings Defining the Windows Components Settings Configuring the Printer Management and Pruning Settings Defining the Network Settings Discovering the new Group Policy Settings 9 - Implementing User State Virtualization Configuring Folder Redirection Managing Offline Files Implementing User Experience Virtualization OneDrive for Business 10 - Assigning and Publishing Software Packages Using MSI Packages to Distribute Software Using Group Policy as a Software Deployment Method Deploying Software Setting Up Distribution Points Using the Systems Center Configuration Manager to Distribute Software 11 - Configuration Management with Windows PowerShell Introducing Windows PowerShell Using Windows PowerShell Writing PowerShell Scripts Windows PowerShell Library for Group Policy Windows PowerShell-Based Logon Scripts 12 - Implementing PowerShell Desired State Configuration Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configure Preference Settings 13 - Configuring Group Policy Preferences Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configuring Preferences Settings Additional course details: Nexus Humans 50255 Managing Windows Environments with Group Policy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 50255 Managing Windows Environments with Group Policy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

50255 Managing Windows Environments with Group Policy
Delivered Online
£2,975

Introduction to Computer Systems Validation

By Research Quality Association

Course Information Join our comprehensive three-day training programme tailored for individuals seeking a foundational grasp of computerised system validation. This course equips participants with essential knowledge to effectively validate systems within their respective organisations for utilisation in GxP (GLP, GCP, GMP, GDP, and GPvP) environments. Attendees will also gain proficiency in auditing validated computerised systems, ensuring compliance with pertinent GxP regulations. Commencing with an overview of regulatory prerequisites and the system life cycle, the course transitions into practical aspects, centered around validating computerised systems and conducting subsequent audits. Engage in a dynamic blend of presentations, interactive discussions, and hands-on practical workshops throughout the course. This course will provide delegates with an understanding of the computerised system validation process, including: Definition of end user requirements Risk management, including supplier assessment and techniques for audit planning Validation planning and reporting Linking system development with good business practices Formal testing and qualification Understanding of data integrity and security issues How to assess system validation documentation to verify compliance. Is this course for you? IT professionals new to implementing computerised systems into regulated environments Quality professionals who monitor or audit computerised systems System owners, end users, tester and project staff. Tutors Tutors will be comprised of (click the photos for biographies): Nichola Stevens Director and Principal Consultant, Nuncius Compliance Solutions Ltd Barry McManus Consultancy Partner, Empowerment Quality Engineering Ltd Programme Please note timings may be subject to alteration. Day 1 09:00 Welcome, Introduction and Course Objectives 09:45 Why Validate? Regulations and Guidance on Computerised System Validation Overview of the regulations and guidance applicable to CSV and their key expectations. 10:30 Break 10:45 The System Lifecycle The concept of the SLC and the key outputs from it. 12:00 Lunch 12:45 The Validation Process The approach to validation for different system types and a look at some of the key deliverables. 14:00 Project Introduction 14:15 Exercise 1 - User Requirements Capturing, agreeing and documenting the user requirements for a system. 15:15 Break 15:30 Exercise 1 - Feedback 16:00 Risk Management Risk management and its impact on validation. Identifying the deliverables required. Then group discussion on risk assessment for three systems. 17:00 Questions and Answers Answers to any outstanding questions from Day 1. 17:15 Close of Day Day 2 09:00 Supplier Assessment The different approaches to supplier assessment and the things to be considered when assessing a supplier. 10:15 Exercise 2 - Supplier Assessment Planning a vendor audit with a focus on the key validation deliverables. 11:00 Break 11:15 Exercise 2 - Feedback 11:45 Test Overview and Test Planning The different test phases, the purpose of each test phase and things to be considered when planning and reporting testing. 12:45 Lunch 13:30 Test Overview and Test Planning Continued. 14:15 Test Script Design, Execution and Review What a good test script looks like and the key things to consider when creating, executing and reviewing a test script. 15:30 Break 15:45 Exercise 3 - Creating a Test Script Create a test script based on user requirements created on Day 1. 17:15 Close of Day Day 3 09:00 Exercise 3 Feedback 09:30 Infrastructure Configuration and Qualification 10:30 Break 10:45 Validation Reporting Overview of the Validation Report and what should be included in it. 11:15 Maintaining the Validated State The procedures and records needed to ensure the system remains fit for purpose. 12:30 Lunch 13:15 Change Control Key concepts related to making changes to validated systems. 14:00 Data Integrity and Security How can we assure the integrity and security of our data. 15:15 Break 15:30 Course Objectives Summary and Panel Discussion A round up of key learning from the course. 17:00 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 19 Points Development Level Develop

Introduction to Computer Systems Validation
Delivered in Manchester or Online
£1,297 to £1,687

Auditing Computerised Systems

By Research Quality Association

Course Information Join our comprehensive three-day programme designed as an invaluable external training opportunity for auditors, audit programme managers, and individuals subject to audits. This course is tailored to foster a deep understanding and cultivate essential skills for auditing the validation of computer systems intended for GxP environments (GLP, GCP, GMP, GDP, GPvP). Commencing with an overview of regulatory prerequisites and the system life cycle, the course swiftly transitions to focus on the pragmatic aspects of auditing computer system validation. Experience a blend of presentations, interactive discussions, and immersive practical workshops throughout the duration of the course. Delegates will benefit from practical examples of how to understand the framework of applicable regulations and guidance. Apply risk management techniques to audit planning Plan and conduct computerised system audits Assess system validation documentation to verify compliance Evaluate data integrity and security issues Prepare for regulatory inspection. The course is structured to encourage delegates to: Discuss and develop ideas Solve specific problems Understand the vulnerabilities of computerised systems Learn how to create a compliance checklist Link system development with good business practice. Is this course for you? Auditors Audit programme managers Individuals subject to audits. Tutors Tutors will be comprised of (click the photos for biographies): Nichola Stevens Director and Principal Consultant, Nuncius Compliance Solutions Ltd Barry McManus Consultancy Partner, Empowerment Quality Engineering Ltd Programme Please note timings may be subject to alteration. Day 1 09:00 Welcome and Introductions 09:45 Why We Validate and Regulatory Trends 10:30 Break 10:45 Audit Overview, High Level Process and Scheduling 11:30 System Lifecycle 12:30 Lunch 13:15 Exercise 1 - Audit Scheduling 14:45 Exercise 1 - Feedback 15:15 Break 15:30 Validation Deliverables 16:30 Risk Assessments 17:30 Close of Day 1 Day 2 09:00 Supplier Assessment 10:30 Break 10:45 Exercise 2 - Planning a Supplier Audit 12:00 Exercise 2 - Feedback 12:30 Lunch 13:15 Exercise 3 - Auditing a Computerised System Validation Package 15:30 Break 15:45 Exercise 3 - Feedback 16:30 Change Control 17:15 Close of Day Day 3 09:00 Infrastructure Qualification 09:45 Maintaining a Validated State - Operational Processes 11:00 Break 11:15 Exercise 4 - Auditing Systems in Operational Use 12:45 Lunch 13:30 Exercise 4 - Feedback 14:15 Exercise 5 - Auditing Trail Review 15:30 Break 15:45 Exercise 5 - Feedback 16:15 Course Objectives Summary and Any Additional Questions 16:45 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 19 Points Development Level Develop

Auditing Computerised Systems
Delivered in Manchester or Online
£1,297 to £1,687

Implementing Good Clinical Laboratory Practice

By Research Quality Association

Course Information Join our comprehensive course, meticulously designed to equip individuals implementing Good Clinical Laboratory Practice (GCLP) within laboratories handling samples from clinical trials. Delve into the current regulatory landscape governing laboratory work supporting clinical trials, referencing key guidelines such as the ICH Guideline for Good Clinical Practice, the Clinical EU Trials Directive, relevant regulations, and leveraging insights from the RQA guidance document on GCLP. Is this course for you? This course is tailored for laboratory managers, analysts, investigators, trial coordinators, monitors, and auditors operating in diverse settings such as pharmaceutical company laboratories, central laboratories, contract research organisations, hospital laboratories, clinics, and investigator sites. This course will give you: Guidance on effectively interpreting and applying GCLP within the broader framework of Good Clinical Practice (GCP) Insight into the seamless integration of GCLP within clinical programmes (GCP) Practical strategies for implementing GCLP in the nuanced environment of clinical research laboratories The chance to update your knowledge with the latest interpretations and guidance on clinical laboratories by the UK Medicines and Healthcare Products Regulatory Agency (MHRA) Access to a seasoned panel of speakers with extensive expertise A unique opportunity to deepen your understanding of GCLP's application across diverse scenarios. Engage in: Lively discussions to foster ideas Problem-solving sessions targeting specific challenges Detailed exploration of specific aspects within the realms of GCP and GCLP. Tutors Tutors will be comprised of (click the photos for biographies): Vanessa Grant -, - Louise Handy Director, Handy Consulting Ltd Tim Stiles Consultant, Qualogy Ltd Programme Please note timings may be subject to alteration. Day 1 08:50 Registration 09:00 Welcome and Introduction 09:20 Good Clinical Practice and the Requirements of Good Clinical Laboratory Practice A review of Good Clinical Practice and its requirements for the laboratory analysis of samples from a trial. The thought processes behind the development of Good Clinical Laboratory Practice, its objective, scope, interpretation and application are explained. 10:00 Safety and Ethical Consideration Informed consent, confidentiality, expedited reporting, blinding and unblinding and serious breaches of the GCP are discussed. 10:40 Break 10:55 Organisation and Personnel Responsibilities within GCP and the Laboratory The responsibilities of key functions that should exist within a clinical laboratory including personnel records of training and competence are discussed. 11:30 Staff Training and Training Records Personnel records of training and competency assessments are discussed. 11:45 Laboratory Facilities, Equipment and Materials Suitable facility design, organisation and operation will be discussed. The calibration, validation and maintenance of equipment used in the conduct of sample analysis are examined, as are the suitability of materials and the identification and labelling of reagents and solutions. 12:30 Lunch 13:15 Workshop 1 - Facilities, Equipment and Responsibilities Some practical problems with regard to the facilities, equipment and responsibilities are explored. 13:45 Workshop 1 - Feedback 14:15 Computer Systems Validation Systems, including computerised systems, used in the analysis, collection and reporting of results should be appropriately tested, operated and controlled. What this means in practice is discussed. 14:45 Trial Protocols, Analytical Plans During this session we examine the purpose, content, control and change of these important documents. 15:30 Break 15:45 Workshop 2 - SOPs, Clinical Protocols, Analytical Plans and Validation The practicalities of managing and documenting the planning phase of analytical work on a trial are explored along with computerised system validation. 16:30 Workshop 2 - Feedback 17:00 Close of Day Day 2 09:00 Conduct of the Work and Quality Control Many of the issues that surround the conduct of sample collection, shipment, storage, analysis and management of Analytical Methods are discussed. This includes the quality control of the assay that may be employed and Quality Control checks. 10:00 Deviation Management The expectations around deviations and CAPA are discussed. 10:15 Workshop 3 - Conduct of the Work and Quality Control Practical work conduct and quality control issues are explored. 10:45 Break 11:00 Workshop 3 - Feedback 11:30 Source Data, Data Integrity, Records and Reports The creation and subsequent management of source data and records, data integrity, are discussed, together with the process of reporting analytical results. 12:10 Workshop 4 - Data, Records and Reports Practical problems with data, records and reports are investigated. 12:45 Lunch 13:30 Workshop 4 - Feedback 14:00 Quality Audit The requirements for and purpose of quality audits are discussed. The difference between quality audit and quality control are explained along with the role of the quality audit staff and their interaction with the analytical project managers, laboratory management and study staff. 14:40 Risk Management How should we assess risk and how can we use the process to assist in evaluation of audit findings. 15:15 Break 15:30 Regulatory Inspection The conduct of regulatory inspections and current expectations of the inspectors. Preparation for inspections and conduct during them will be discussed. 16:00 Panel Session This panel session will address any outstanding issues raised by the delegates. 16:15 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 14 Points Development Level Develop

Implementing Good Clinical Laboratory Practice
Delivered In-Person in Cambridge
£858 to £1,112

Digital Electronics Course Online

By Hi-Tech Training

This Digital Electronics Course is designed to give practical knowledge of the type of electronic circuitry used in a modern Computer System or in any type of Computer Controlled equipment such as Photocopiers, Cash Registers, Tablets, mobile phones and many other types of IT equipment. Digital Electronics involves the use of Silicon chips (Integrated Circuits). The internal structure of a computer is to a large extent comprised of Digital Electronic Circuits.

Digital Electronics Course Online
Delivered OnlineFlexible Dates
£85 to £685

CompTIA IT Fundamentals+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. Overview On course completion, participants will be able to: - Set up a computer workstation and use basic software applications. - Explain the functions and types of devices used within a computer system. - Apply basic computer maintenance and support principles. - Describe some principles of software and database development. - Configure computers and mobile devices to connect to home networks and to the Internet. - Identify security issues affecting the use of computers and networks. This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. 1 - Identifying Computer Hardware Identify Types of Computing Devices Identify Internal Computer Components Common Computer Connector Types Identify Common Peripheral Devices 2 - Identifying Computer Software Compare Functions and Features of Common Operating Systems Identify Application Software 3 - Setting Up a Basic Workstation Connect Hardware Install and Configure Operating Systems Install and Configure Applications Configure Accessibility Options 4 - Configuring Network Access Network Connection Types Install and Configure a SOHO Router Network and Alternative Technologies Sharing and Storage Methods 5 - Working with Files, Folders, and Applications Create Files Navigate a File Structure Manage Files and Folders Compress and Extract Files Create Screen Captures 6 - Configuring and Using Wireless Devices Configuring Wireless Devices Use Wireless Devices 7 - Securing Computing Devices Identify Security Threats Apply Security Best Practices Perform Secure Web Browsing 8 - Supporting Computers and Users Environmental and Safety Concepts Back Up and Restore Data Manage Software Implement Basic Support Measures Additional course details: Nexus Humans CompTIA IT Fundamentals Plus Certification (ITF Plus) (Exam FCO-U61) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA IT Fundamentals Plus Certification (ITF Plus) (Exam FCO-U61) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA IT Fundamentals+
Delivered OnlineFlexible Dates
£2,475

Equipment Validation Training Course (ONLINE) – For Starter Validation, CQV and C&Q Roles

By Getreskilled (UK)

Take our part-time online “Conversion Course into Pharmaceutical Manufacturing“ NO Previous Industry Experience or Science Qualifications Required

Equipment Validation Training Course (ONLINE) – For Starter Validation, CQV and C&Q Roles
Delivered Online On Demand
£699 to £3,499

Value Delivery System in Projects

By IIL Europe Ltd

This highly interactive program focuses on building the business focus on value to be achieved from initiatives. The practices in this program apply equally to projects and programs. Participants will gain insight into the capabilities needed to develop the culture, processes, and tools behind validation, what true initiatives' success looks like, which can be closely linked to achieving value. They will learn and experiment with a variety of value definition and management techniques. Working in small groups, they will collaborate with others to brainstorm, share experiences, and apply concepts to the ongoing value confirmation goal. Participants will also discover the importance of designing metrics around value and addressing blind spots that could happen when the focus is on the wrong metrics and how that could lead to the wrong behaviors being practiced. Participants will also gain insights into key skills for leading and working in the future. Hands-on experimentation activities enhance the theoretical learning, grounding it in real life and giving opportunities to practice creativity in capturing value.

Value Delivery System in Projects
Delivered OnlineFlexible Dates
£850 to £1,495

Cyber Security demystified

5.0(3)

By Systems & Network Training

Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.

Cyber Security demystified
Delivered in Internationally or OnlineFlexible Dates
£967