• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

742 Data Protection courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Certified Data Centre Professional (CDCP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and who has the responsibility to achieve and improve the availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Choose an optimum site for mission-critical data centre based on current and future needs? Describe all components that are important for high availability in a data centre and how to effectively setup the data centre? Name and apply the various industry standards? Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc, and to select and apply them effectively to cost-efficiently enhance the high-availability of the data centre.? Review the electrical distribution system to avoid costly downtime? Enhance cooling capabilities and efficiency in the data centre by using existing and new techniques and technologies for the increased cooling requirements of the future? Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques? Create effective maintenance contracts with equipment suppliers ensuring the best return on investment? Setup effective data centre monitoring ensuring the right people get the right message? Ensure proper security measures, both procedural and technical, are established to safeguard your company's valuable information in the data centre The course will address how to setup and improve key aspects such as power, cooling, security, cabling, safety, etc., to ensure a high available data centre. It will also address key operations and maintenance aspects. THE DATA CENTRE, IT?S IMPORTANCE AND CAUSES FOR DOWNTIME DATA CENTRE STANDARDS AND BEST PRACTICES DATA CENTRE LOCATION, BUILDING AND CONSTRUCTION * Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup RAISED FLOOR/SUSPENDED CEILING * Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements LIGHT * Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) POWER INFRASTRUCTURE * Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics ELECTRO MAGNETIC FIELDS * Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions EQUIPMENT RACKS * Rack standards, properties and selection criteria Security considerations Power rail/strip options COOLING INFRASTRUCTURE * Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment WATER SUPPLY * Importance of water supply and application areas Backup water supply techniques DESIGNING A SCALABLE NETWORK INFRASTRUCTURE * The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements FIRE SUPPRESSION * Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices DATA CENTRE MONITORING * Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations OPERATIONAL SECURITY AND SAFETY PRACTICES * Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage LABELLING * Choosing a labelling scheme Recommended labelling practices Network labelling DOCUMENTATION * How to setup proper documentation Document management policies and procedures CLEANING * Cleaning practices for the data centre MTBF/MTTR * Standards and definitions Calculation models The ?real? value MAINTENANCE CONTRACTS/SLA/OLA EXAM: CERTIFIED DATA CENTRE PROFESSIONAL ADDITIONAL COURSE DETAILS: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Professional (CDCP)
Delivered Online3 days, Jun 3rd, 07:00 + 5 more
£1500

Mandatory Refresher Training

4.8(42)

By EF Training & Consultancy Ltd

Health & Safety, PPE Covid COSHH & RIDDOR Equality & Diversity, Human Rights Infection Control Food Safety Information Governance Data Protection (GDPR) Records Management Fraud & Bribery Conflict Resolution Lone Worker Moving & Handling level 2(practical covered) Fire Safety Freedom of Information Safeguarding Adult & Children level 3 Radicalisation Slips Trips & Falls Your Healthcare Career Person Centred Care Duty of Care Consent Communication Privacy & Dignity Complaints Handling BLS –CPR & Choking for Adults and Children (practical covered) Mental Capacity Act—DoLS Mental Health Act

Mandatory Refresher Training
Delivered In-Person in LondonFull day, Jun 3rd, 08:30 + 12 more
£72

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online6 days, Jun 3rd, 13:00 + 25 more
£2475

PL-300T00 Microsoft Power BI Data Analyst

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The audience for this course are data professionals and business intelligence professionals who want to learn how to accurately perform data analysis using Power BI. This course is also targeted toward those individuals who develop reports that visualize data from the data platform technologies that exist on both in the cloud and on-premises. This course covers the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will show how to access and process data from a range of data sources including both relational and non-relational sources. Finally, this course will also discuss how to manage and deploy reports and dashboards for sharing and content distribution. Prerequisites Understanding core data concepts. Knowledge of working with relational data in the cloud. Knowledge of working with non-relational data in the cloud. Knowledge of data analysis and visualization concepts. DP-900T00 Microsoft Azure Data Fundamentals is recommended 1 - DISCOVER DATA ANALYSIS * Overview of data analysis * Roles in data * Tasks of a data analyst 2 - GET STARTED BUILDING WITH POWER BI * Use Power BI * Building blocks of Power BI * Tour and use the Power BI service 3 - GET DATA IN POWER BI * Get data from files * Get data from relational data sources * Create dynamic reports with parameters * Get data from a NoSQL database * Get data from online services * Select a storage mode * Get data from Azure Analysis Services * Fix performance issues * Resolve data import errors 4 - CLEAN, TRANSFORM, AND LOAD DATA IN POWER BI * Shape the initial data * Simplify the data structure * Evaluate and change column data types * Combine multiple tables into a single table * Profile data in Power BI * Use Advanced Editor to modify M code 5 - DESIGN A SEMANTIC MODEL IN POWER BI * Work with tables * Create a date table * Work with dimensions * Define data granularity * Work with relationships and cardinality * Resolve modeling challenges 6 - ADD MEASURES TO POWER BI DESKTOP MODELS * Create simple measures * Create compound measures * Create quick measures * Compare calculated columns with measures 7 - ADD CALCULATED TABLES AND COLUMNS TO POWER BI DESKTOP MODELS * Create calculated columns * Learn about row context * Choose a technique to add a column 8 - USE DAX TIME INTELLIGENCE FUNCTIONS IN POWER BI DESKTOP MODELS * Use DAX time intelligence functions * Additional time intelligence calculations 9 - OPTIMIZE A MODEL FOR PERFORMANCE IN POWER BI * Review performance of measures, relationships, and visuals * Use variables to improve performance and troubleshooting * Reduce cardinality * Optimize DirectQuery models with table level storage * Create and manage aggregations 10 - DESIGN POWER BI REPORTS * Design the analytical report layout * Design visually appealing reports * Report objects * Select report visuals * Select report visuals to suit the report layout * Format and configure visualizations * Work with key performance indicators 11 - CONFIGURE POWER BI REPORT FILTERS * Apply filters to the report structure * Apply filters with slicers * Design reports with advanced filtering techniques * Consumption-time filtering * Select report filter techniques * Case study - Configure report filters based on feedback 12 - ENHANCE POWER BI REPORT DESIGNS FOR THE USER EXPERIENCE * Design reports to show details * Design reports to highlight values * Design reports that behave like apps * Work with bookmarks * Design reports for navigation * Work with visual headers * Design reports with built-in assistance * Tune report performance * Optimize reports for mobile use 13 - PERFORM ANALYTICS IN POWER BI * Explore statistical summary * Identify outliers with Power BI visuals * Group and bin data for analysis * Apply clustering techniques * Conduct time series analysis * Use the Analyze feature * Create what-if parameters * Use specialized visuals 14 - CREATE AND MANAGE WORKSPACES IN POWER BI * Distribute a report or dashboard * Monitor usage and performance * Recommend a development life cycle strategy * Troubleshoot data by viewing its lineage * Configure data protection 15 - MANAGE SEMANTIC MODELS IN POWER BI * Use a Power BI gateway to connect to on-premises data sources * Configure a semantic model scheduled refresh * Configure incremental refresh settings * Manage and promote semantic models * Troubleshoot service connectivity * Boost performance with query caching (Premium) 16 - CREATE DASHBOARDS IN POWER BI * Configure data alerts * Explore data by asking questions * Review Quick insights * Add a dashboard theme * Pin a live report page to a dashboard * Configure a real-time dashboard * Set mobile view 17 - IMPLEMENT ROW-LEVEL SECURITY * Configure row-level security with the static method * Configure row-level security with the dynamic method ADDITIONAL COURSE DETAILS: Nexus Humans PL-300T00: Microsoft Power BI Data Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-300T00: Microsoft Power BI Data Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-300T00 Microsoft Power BI Data Analyst
Delivered Online4 days, Jun 3rd, 13:00 + 17 more
£1785

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - A. ORGANIZATIONAL GOVERNANCE * Organizational Strategy, Goals, and Objectives * Organizational Structure, Roles, and Responsibilities * Organizational Culture * Policies and Standards * Business Processes * Organizational Assets GOVERNANCE - B. RISK GOVERNANCE * Enterprise Risk Management and Risk Management Framework * Three Lines of Defense * Risk Profile * Risk Appetite and Risk Tolerance * Legal, Regulatory, and Contractual Requirements * Professional Ethics of Risk Management IT RISK ASSESSMENT - A. IT RISK IDENTIFICATION * Risk Events (e.g., contributing conditions, loss result) * Threat Modelling and Threat Landscape * Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) * Risk Scenario Development IT RISK ASSESSMENT - B. IT RISK ANALYSIS AND EVALUATION * Risk Assessment Concepts, Standards, and Frameworks * Risk Register * Risk Analysis Methodologies * Business Impact Analysis * Inherent and Residual Risk RISK RESPONSE AND REPORTING - A. RISK RESPONSE * Risk Treatment / Risk Response Options * Risk and Control Ownership * Third-Party Risk Management * Issue, Finding, and Exception Management * Management of Emerging Risk RISK RESPONSE AND REPORTING - B. CONTROL DESIGN AND IMPLEMENTATION * Control Types, Standards, and Frameworks * Control Design, Selection, and Analysis * Control Implementation * Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - C. RISK MONITORING AND REPORTING * Risk Treatment Plans * Data Collection, Aggregation, Analysis, and Validation * Risk and Control Monitoring Techniques * Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) * Key Performance Indicators * Key Risk Indicators (KRIs) * Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - A. INFORMATION TECHNOLOGY PRINCIPLES * Enterprise Architecture * IT Operations Management (e.g., change management, IT assets, problems, incidents) * Project Management * Disaster Recovery Management (DRM) * Data Lifecycle Management * System Development Life Cycle (SDLC) * Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - B. INFORMATION SECURITY PRINCIPLES * Information Security Concepts, Frameworks, and Standards * Information Security Awareness Training * Business Continuity Management * Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered Online4 days, Jun 5th, 13:00 + 2 more
£2037

Data Protection and Direct Marketing

By Computer Law Training

Half day course on data protection and direct marketing - GDPR & PECR

Data Protection and Direct Marketing
Delivered Online3 hours 30 minutes, Jun 12th, 12:00 + 1 more
£250

Data Protection for Clinical Trials and Medical Research

By Computer Law Training

Data Protection and Clinical Trials

Data Protection for Clinical Trials and Medical Research
Delivered Online6 hours, Jun 18th, 09:00
£550

Data Protection (GDPR) Foundation Certificate

By Computer Law Training

This Foundation Certificate  is an internationally recognised qualification, endorsed by TQUK, which is regulated by Ofqual, a UK Government department.

Data Protection (GDPR) Foundation Certificate
Delivered OnlineFull day, Jun 20th, 08:30
£320

Data Protection (GDPR) Practitioner Certificate

By Computer Law Training

5-day intensive data protection course, delivered by a specialist.

Data Protection (GDPR) Practitioner Certificate
Delivered Online
Dates arranged on request
£1200

Data Protection Course - BCS Practitioner

5.0(12)

By Duco Digital Training

Do you need a qualification in data protection or are you thinking about learning more about data protection for your organisation? The BCS Practitioner Certificate in Data Protection designed for those with some data protection responsibilities in an organisation and wish to achieve and demonstrate a broad understanding of the law and progresses from what is taught in the BCS Foundation Certificate in Data Protection.

Data Protection Course - BCS Practitioner
Delivered Online On Demand
£1650

Educators matching "Data Protection"

Show all 231
Propelfwd

propelfwd

We have built up vast experience with all business sectors, helping them on their data protection compliance journey. We are professional, approachable and motivated to work towards a great result. Propelfwd is a small company with a forward-thinking ethos, delivering a range of services to help your business fly with the knowledge that your data protection requirements are covered. Our dedicated team of experienced and qualified consultants will offer you a tailored service that meets your exact requirements, starting with establishing your current position with regard to data protection compliance . We can then recommend a data protection strategy and manage the journey for you. Propelfwd has a number of services available to cover your exact requirements, from customised training courses, online or trainer delivered, audits on current data protection compliance, full or tailored compliance projects, Data Protection Officer or Manager positions, EU GDPR Representative. You can be confident that Propelfwd will identify all your data protection operational needs and provide a solution for them. Propelfwd will offer support and guidance with your technical needs, working with your chosen provider or offer the services of one of our partner providers. Propelfwd take the complexity out of data protection and put in easy to follow solutions that your entire team will understand and keep you compliant with the requirements of the data protection law your organisation will have to comply with.