• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

92 Data Protection Officer courses in Cardiff delivered Live Online

GDPR Workshop

By Computer Law Training

A one day course on GDPR for beginners, including practical exercises.

GDPR Workshop
Delivered OnlineFlexible Dates
£250

Data Protection (GDPR) for Small Charities

By Computer Law Training

Straightforward GDPR training for small charities - because you want to get it right!

Data Protection (GDPR) for Small Charities
Delivered OnlineFlexible Dates
£50

GDPR Surgery

By Computer Law Training

Help with GDPR

GDPR Surgery
Delivered OnlineFlexible Dates
£60 to £100

Computing - GCSE Syllabus - Online Tuition

5.0(8)

By GLA Tutors Home or Online

Computer Science GCSE Syllabus The GCSE Computer Science Tutor Syllabus is designed to provide tutors in England with a comprehensive framework for teaching the GCSE Computer Science curriculum effectively. This syllabus aims to equip tutors with the necessary knowledge and skills to support students in their understanding and application of core computer science concepts.  Module 1: Introduction to Computer Science - Overview of computer science and its relevance in today's world - Understanding the components of a computer system - Introduction to algorithms and problem-solving techniques - Exploration of programming languages and their uses Module 2: Computer Hardware - Understanding the main components of a computer system, including CPU, memory, and storage devices - Exploring input and output devices and their functionalities - Understanding the role of operating systems and software in computer systems Module 3: Software Development - Introduction to programming concepts and languages (e.g., Python or Java) - Understanding variables, data types, and operators - Building algorithms and logical reasoning skills - Introduction to flowcharts and pseudocode - Implementation of simple programs and debugging techniques Module 4: Data Representation - Understanding binary, hexadecimal, and denary number systems - Representation of text, images, and sound using binary - Introduction to data compression and encryption techniques Module 5: Computer Networks - Understanding the basics of computer networks, including LAN, WAN, and the Internet - Introduction to network topologies, protocols, and security - Exploring the impact of digital communication on society Module 6: Cybersecurity and Ethical Issues - Understanding the importance of cybersecurity and data protection - Introduction to common threats and vulnerabilities - Exploring ethical issues related to computer science, such as privacy and intellectual property rights Module 7: Algorithms and Programming Techniques - Advanced programming concepts, including conditionals, loops, and functions - Introduction to sorting and searching algorithms - Exploring data structures, such as arrays and lists Module 8: System Architecture - Understanding the structure and function of a CPU - Introduction to memory hierarchy and cache - Exploring the Von Neumann architecture and its limitations Module 9: Computational Thinking and Problem Solving - Advanced problem-solving techniques using computational thinking - Introduction to algorithms for complex problems - Exploring algorithmic efficiency and optimization techniques Module 10: Exam Preparation and Revision - Reviewing key concepts covered throughout the syllabus - Practicing past exam questions and providing guidance on exam techniques - Supporting students with exam preparation strategies Please note that the duration and depth of each module can vary depending on the level of expertise required and the specific needs of the learners. Additionally, it's important to adapt the curriculum to the learners' proficiency levels, whether they are A Level/GCSE students or adult learners with different experience levels.

Computing - GCSE Syllabus - Online Tuition
Delivered OnlineFlexible Dates
£40

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Engineers Channel Partners System Engineers Overview By the end of this course, you will be able to: Describe how ONTAP 9 fits into NetApp?s Cloud and Data Fabric strategy Identify supported ONTAP platforms Define ONTAP cluster components Create a cluster Manage ONTAP administrators Configure and manage storage resources Configure and manage networking resources Describe a Storage Virtual Machine?s (SVM?s) role in NetApp?s storage architecture Create and configure an SVM Create and manage FlexVols Implement storage efficiency features Create protocol servers within an SVM Upgrade and revert ONTAP patches and releases Describe the levels on which ONTAP protects data Describe the ONTAP 9 data protection features Understand the various data mirroring relationships available with ONTAP 9 Configure and operate SnapMirror and SnapVault data replication Demonstrate Storage Virtual Machine data protection Explain the components and configuration involved with SyncMirror and MetroCluster Describe NDMP protocol operation, configuration and management Pre/Post Assessment The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager.Includes: ONTAP commands for software versions 8.3.x to 9.0 The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager. Includes: ONTAP commands for software versions 8.3.x to 9.0

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

CCTV Operator Course

By NextGen Learning

Course Overview The CCTV Operator Course is designed to equip learners with the knowledge and skills required to operate CCTV systems effectively and efficiently. This comprehensive course covers the essential aspects of CCTV operations, focusing on the operational requirements, technical guidance, and regulatory standards. Learners will gain an understanding of how to monitor surveillance systems, ensure data protection compliance, and meet job requirements. By the end of the course, learners will be prepared to manage surveillance systems with confidence, supporting security operations across various industries. Course Description This course delves into the various aspects of CCTV operations, from understanding basic system components to applying data protection regulations in practice. Key topics include the operational requirements of CCTV systems, the technical aspects of monitoring and surveillance, and the necessary skills for effective performance in the role. Learners will also gain an understanding of data protection regulations, such as GDPR, and learn the requirements specific to CCTV operators. Throughout the course, learners will be introduced to the different job responsibilities and the critical competencies required to succeed in this field. Course Modules Module 01: Operational Requirement Module 02: CCTV Operator Skills and Ability Module 03: Basics of CCTV Module 04: Technical Guidance Module 05: Monitoring CCTV Cameras Module 06: Watch Surveillance Module 07: Data Protection Regulations Module 08: Job Requirements of a CCTV Operator (See full curriculum) Who is this course for? Individuals seeking to pursue a career in security operations. Professionals aiming to enhance their expertise in CCTV monitoring. Beginners with an interest in surveillance and security. Anyone interested in gaining qualifications in security operations. Career Path CCTV Operator Security Surveillance Specialist Security Manager Facility Security Supervisor Operations Manager in Security Systems Compliance Officer in Security Operations

CCTV Operator Course
Delivered OnlineFlexible Dates
£9.99

UK Employment Law Level 5

By NextGen Learning

Course Overview The "UK Employment Law Level 5" course offers a comprehensive introduction to the key aspects of employment law within the UK. This course is designed for those seeking to understand the legal framework that governs workplace relations, from recruitment through to dismissal. Covering crucial topics such as employment contracts, discrimination, and health and safety, this course provides valuable knowledge applicable across various industries. By the end of the course, learners will be equipped with the legal understanding required to navigate and implement employment laws effectively, ensuring compliance and fostering fair workplace practices. Course Description This course delves into the fundamental areas of UK employment law, offering learners a thorough grounding in legislation that affects both employers and employees. Learners will explore areas including recruitment procedures, employment contracts, employee handbooks, and the disciplinary process, along with in-depth coverage of national minimum wage laws and workplace discrimination. The course also includes key topics such as parental rights, sick pay, pension schemes, and the health and safety obligations of employers. Learners will gain a comprehensive understanding of employment law, empowering them to contribute to a fair, legal, and well-managed workplace. Course Modules Module 01: Basics of Employment Law Module 02: Legal Recruitment Process Module 03: Employment Contracts Module 04: Employee Handbook Module 05: Disciplinary Procedure Module 06: National Minimum Wage & National Living Wage Module 07: Parental Rights, Sick Pay & Pension Scheme Module 08: Discrimination in the Workplace Module 09: Health & Safety at Work Module 10: Dismissal, Grievances and Employment Tribunals Module 11: Workplace Monitoring & Data Protection (See full curriculum) Who is this course for? Individuals seeking to understand UK employment law. Professionals aiming to advance their careers in HR or management. Beginners with an interest in workplace legislation and employee relations. HR managers and team leaders looking to update their legal knowledge. Career Path HR Manager Employment Lawyer Compliance Officer Payroll Specialist Workplace Policy Advisor Employee Relations Consultant

UK Employment Law Level 5
Delivered OnlineFlexible Dates
£9.99

Computer Maintenance, PAT & Cyber Security

By NextGen Learning

Course Overview The Computer Maintenance, PAT & Cyber Security course offers a comprehensive introduction to the essential components of modern IT systems, combining core knowledge in hardware setup, system troubleshooting, and security protocols. Designed to build foundational understanding as well as introduce advanced cybersecurity concepts, this course equips learners with the confidence to navigate today’s digital infrastructure. From building a computer to understanding network vulnerabilities, learners will explore a variety of modules that address both traditional and emerging technologies, including IoT and encryption. By the end of the course, students will have developed the skills to identify risks, support device performance, and understand secure systems architecture—essential for any role in technology-focused sectors. Course Description This course blends key topics across computer hardware maintenance, PAT (Portable Appliance Testing), and cyber security to prepare learners for a well-rounded understanding of IT system management. The curriculum begins with assembling and configuring computers, progressing into network security and advanced Windows troubleshooting. Learners are introduced to essential software tools and coding applications like C++ with OpenCV, and gain insights into the Internet of Things and encryption principles. Additionally, the course includes training in cyber security awareness, addressing the latest threats and preventative frameworks. With clear instructional guidance and structured content delivery, the course is suitable for learners aiming to understand technical environments and the protocols behind secure computing. It is ideal for those seeking career progression or looking to explore new opportunities in IT security, maintenance, or systems analysis. Course Modules: Module 01: Building Your Own Computer Module 02: Computer Networks Security from Scratch to Advanced Module 03: Computer Vision By Using C++ and OpenCV with GPU support Module 04: Advance Windows 10 Troubleshooting for IT HelpDesk Module 05: Portable Appliance Testing (PAT) Module 06: Internet of Things Module 07: Cyber Security Awareness Training Module 08: Encryption (See full curriculum) Who is this course for? Individuals seeking to understand IT maintenance and cybersecurity principles. Professionals aiming to broaden their knowledge of system configuration and data protection. Beginners with an interest in computer technology and digital safety. Employers looking to upskill their IT or facilities staff in security and device compliance. Career Path IT Support Specialist Systems Administrator Network Security Analyst Cyber Security Consultant Electrical Safety Compliance Officer Technical Services Coordinator

Computer Maintenance, PAT & Cyber Security
Delivered OnlineFlexible Dates
£9.99

Microsoft Power BI Masterclass 2021

By NextGen Learning

Microsoft Power BI Masterclass 2021 Course Overview: The "Microsoft Power BI Masterclass 2021" provides learners with the skills to become proficient in data analysis and visualization using Power BI. This comprehensive course covers the core functionalities of Power BI, from data preparation and transformation to creating impactful reports and dashboards. Learners will gain valuable insights into data modelling, visualisation, and the use of DAX for advanced calculations. By the end of the course, participants will be able to apply their knowledge to real-world projects, improving their ability to communicate data-driven insights effectively. This course is ideal for professionals and beginners who want to leverage Power BI to unlock the potential of their data. Course Description: This masterclass delves into the essential features of Microsoft Power BI, guiding learners through every stage of data analysis. Starting with project setup and data transformation in the Query Editor, the course progresses to advanced topics such as DAX functions and data storytelling. Learners will explore how to build data models, create dashboards, and employ Python in Power BI to enhance their reports. The course also covers Power BI Service for cloud-based analytics, row-level security for data protection, and integrating additional data sources. With a focus on empowering users to communicate insights clearly, the course ensures learners gain the expertise to manage data efficiently, make informed decisions, and stay up to date with evolving tools and features. Microsoft Power BI Masterclass 2021 Curriculum: Module 01: Introduction Module 02: Preparing our Project Module 03: Data Transformation - The Query Editor Module 04: Data Transformation - Advanced Module 05: Creating a Data Model Module 06: Data Visualization Module 07: Power BI & Python Module 08: Storytelling with Data Module 09: DAX - The Essentials Module 10: DAX - The CALCULATE function Module 11: Power BI Service - Power BI Cloud Module 12: Row-Level Security Module 13: More data sources Module 14: Next steps to improve & stay up to date (See full curriculum) Who is this course for? Individuals seeking to enhance their data analysis skills. Professionals aiming to advance their data visualization expertise. Beginners with an interest in data science or business analytics. Business analysts or data professionals looking to upskill in Power BI. Career Path: Data Analyst Business Intelligence Analyst Data Scientist Power BI Developer Reporting Analyst Data Visualisation Expert

Microsoft Power BI Masterclass 2021
Delivered OnlineFlexible Dates
£7.99

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
Price on Enquiry
1...45678...10