• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3 Data Security courses in Manchester

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Fundamentals of E&P Data Management

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) The energy industry has started its journey to be more data centric by embracing the industry 4.0 concept. As a result, data management - which was considered until recently as a back-office service to support geoscience, reservoir management, engineering, production and maintenance - is now given the spotlight! To become an active stakeholder in this important transition in E&P data management, it is necessary to understand the new technical opportunities offered by the Cloud, Artificial Intelligence and how data governance can pave the way towards more reliable and resilient processes within E&P domain. Several key questions that need to be addressed: Why place more focus on data assets? Is data management just about serving geoscientists or engineers with fresh data? What is the value of data management in the E&P sector for decision making? How to convince the data consumers that the data we provide is reliable? Is the data architecture of my organization appropriate and sustainable? The purpose of this 5 half-day Virtual Instructor Led Training (VILT) course is to present the data challenges facing the energy organizations today and see how they practically solve them. The backbone of this course is based on the DAMA Book of Knowledge for Data Management. The main data management activities are described in sequence with a particular focus on recent technological developments. Training Objectives Upon completion of this VILT course, the participants will be able to: Understand why the data asset is now considered as a main asset by energy organizations Appreciate the importance of data governance and become an active stakeholder of it Understand the architecture and implementation of data structure in their professional environment Get familiarized with the more important data management activities such as data security and data quality Integrate their subsurface and surface engineering skills with the data managements concepts This VILT course is unique on several points: All notions are explained by some short presentations. For each of them, a set of video, exercises, quizzes will be provided to help develop an engaging experience between the trainer and the participants A pre-course questionnaire to help the trainer focus on the participants' needs and learning objectives A detailed reference manual A lexicon of terms for data-management Limited class size to encourage the interactivity Target Audience This VILT course is intended for: Junior/new data managers Geoscientists Reservoir engineers Producers Maintenance specialists Construction specialists Human resources Legal Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-days consisting 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your expert course leader is a geologist by education who has dedicated his career to subsurface data management services. In 2016, he initiated a tech startup dedicated to Data Management using Artificial Intelligence (AI) tools. He is heavily involved in developing business plans, pricing strategies, partnerships, marketing and SEO, and is the co-author of several Machine Learning publications. He also delivers training on Data Management and Data Science to students and professionals. Based in France, he was formerly Vice President, Sales & Marketing at CGG where he was in charge of the Data Management Services strategy, Sales Manager at Spie O&G Services where he initiated the Geoscience technical assistance activities and Product Manager of interactive seismic inversion software design and marketing at Paradigm.       POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Fundamentals of E&P Data Management
Delivered in Internationally or OnlineFlexible Dates
£953 to £1,799

Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

Cyber Safe
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£30

Online Options

Show all 290

Advanced Architecting on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Solution Architects Overview At the end of this course, you will be able to: Apply the AWS Well-Architected Framework Manage multiple AWS accounts for your organization Connect an on-premises datacenter to AWS cloud Move large data from an on-premises datacenter to AWS Design large datastores for AWS cloud Understand different architectural designs for scalability Protect your infrastructure from DDoS attack Secure your data on AWS with encryption Enhance the performance of your solutions Select the most appropriate AWS deployment mechanism Building on concepts introduced in Architecting on AWS, Advanced Architecting on AWS is intended for individuals who are experienced with designing scalable and elastic applications on the AWS platform. Building on concepts introduced in Architecting on AWS, this course covers how to build complex solutions which incorporate data services, governance, and security on AWS. This course introduces specialized AWS services, including AWS Direct Connect and AWS Storage Gateway to support Hybrid architecture. It also covers designing best practices for building scalable, elastic, secure, and highly available applications on AWS. Module 1: AWS Account Management Multiple accounts Multi-account patterns License management Manage security and costs with multiple accounts AWS Organizations AWS Directory Service Hands-on lab: Multi-VPC connectivity using a VPN Module 2: Advanced Network Architectures Improve VPC network connections Enhance performance for HPC workloads VPN connections over AWS AWS Direct Connect AWS Transit Gateway Amazon Route 53 Exercise: Design a hybrid architecture Module 3: Deployment Management on AWS Application lifecycle management Application deployment using containers AWS Elastic Beanstalk AWS OpsWorks AWS CloudFormation Module 4: Data Optimize Amazon S3 storage Amazon ElastiCache AWS Snowball AWS Storage Gateway AWS DataSync Backup and archival considerations Database migration Designing for big data with Amazon DynamoDB Hands-on lab: Build a failover solution with Amazon Route 53 and Amazon RDS Module 5: Designing for large scale applications AWS Auto Scaling Migrating over-provisioned resources Blue-green deployments on AWS Hands-on lab: Blue-green deployment with AWS Module 6: Building resilient architectures DDoS attack overview AWS Shield AWS WAF Amazon GuardDuty High availability using Microsoft SQL Server and Microsoft SharePoint on AWS High availability using MongoDB on Amazon EC2 AWS Global Accelerator Hands-on lab: CloudFront content delivery and automating AWS WAF rules Module 7: Encryption and data security Encryption primer DIY key management in AWS AWS Marketplace for encryption products AWS Key Management Service (AWS KMS) Cloud Hardware Security Module (HSM) Comparison of key management options Hands-on lab: AWS KMS with envelope encryption

Advanced Architecting on AWS
Delivered Online
£1,717

Level 2 Certificate in Understanding Data Protection and Data Security - CPD Certified

4.5(3)

By Studyhub UK

24 Hour Flash Deal **33-in-1 Data Protection and Data Security Mega Bundle** Data Protection and Data Security Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Data Protection and Data Security package online with Studyhub through our online learning platform. The Data Protection and Data Security bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Data Protection and Data Security course provides complete 360-degree training on Data Protection and Data Security. You'll get not one, not two, not three, but thirty-three Data Protection and Data Security courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Data Protection and Data Security courses are yours for as long as you want them once you enrol in this course This Data Protection and Data Security Bundle consists the following career oriented courses: Course 01: Cyber Security Awareness Training Course 02: Web Application Penetration Testing Course 03: Data Protection Level 3 and Data Security (GDPR) Training Certification Course 04: Cyber Security Law Course 05: Cyber Security Incident Handling and Incident Response Course 06: GDPR Training Course 07: Information Architecture (IA) Fundamentals for Website Design Course 08: Financial Crime Officer Course 09: Transaction Monitoring in Financial Services: Ensuring Security Course 10: Financial Statements Fraud Detection Training Course 11: CompTIA CySA+ Cybersecurity Analyst Course Course 12: Machine Learning Basics Course 13: Python Basic Programming for Absolute Beginners Course 14: Data Analysis & Forecasting Course 15: SQL for Data Science, Data Analytics and Data Visualization Course 16: Microsoft Excel Complete Course 2019 Course 17: VLOOKUP: Master Excel Formula VLOOKUP in 60 minutes! Course 18: Excel: Top 50 Microsoft Excel Formulas in 50 Minutes! Course 19: JavaScript Foundations Course 20: jQuery Masterclass Course: JavaScript and AJAX Coding Bible Course 21: PHP Web Development with MySQL Course 22: Node JS: API Development with Swagger Interface Description Language Course 23: Digital Marketing for Beginners to Advanced Course 24: Google Analytics Course 25: Content Management Course 26: Info Graphics Web Design - Affinity Designer Training Course 27: Responsive Web Design Course 28: MVC and Entity Framework Course 29: Web Design with Adobe XD Course 30: Diploma in Adobe Illustrator Course 31: Digital Art - Sketching In Photoshop Course 32: AutoCAD VBA Programming - Beginner course Course 33: Learn MySQL from Scratch In this exclusive Data Protection and Data Security bundle, you really hit the jackpot. Here's what you get: Step by step Data Protection and Data Security lessons One to one assistance from Data Protection and Data Security professionals if you need it Innovative exams to test your knowledge after the Data Protection and Data Security course 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all thirty-three Data Protection and Data Security courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Data Protection and Data Security certificate and transcript on the next working day Easily learn the Data Protection and Data Security skills and knowledge you want from the comfort of your home The Data Protection and Data Security course has been prepared by focusing largely on Data Protection and Data Security career readiness. It has been designed by our Data Protection and Data Security specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Data Protection and Data Security Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Data Protection and Data Security bundle course has been created with thirty-three premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Data Protection and Data Security Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Data Protection and Data Security Elementary modules, allowing our students to grasp each lesson quickly. The Data Protection and Data Security course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. CPD 330 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Data Protection and Data Security training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Data Protection and Data Security After completing this course you can progress towards- BCS Foundation Certificate in Data Protection BCS Practitioner Certificate in Data Protection NCFE Level 2 Certificate in Understanding Data Protection and Data Security Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. Requirements To participate in this Data Protection and Data Security course, all you need is - A smart device A secure internet connection And a keen interest in Data Protection and Data Security Career path You will be able to kickstart your Data Protection and Data Security career because this course includes various courses as a bonus. This Data Protection and Data Security is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Data Protection and Data Security career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free

Level 2 Certificate in Understanding Data Protection and Data Security - CPD Certified
Delivered Online On Demand7 days
£329

Level 3 Certificate in Understanding Data Protection and Data Security

4.7(26)

By Academy for Health and Fitness

***24 Hour Limited Time Flash Sale*** Level 3 Certificate in Understanding Data Protection and Data Security Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter Are you a professional feeling stuck in your career, struggling to keep up with the ever-changing demands of the industry? Or perhaps you're a beginner, unsure of where to start or how to break into your desired field. Whichever stage you're in, our exclusive Level 3 Certificate in Understanding Data Protection and Data Security Bundle provides unique insights and tools that can help you achieve your goals. Designed to cater to the needs of both seasoned professionals and aspiring newcomers, our Level 3 Certificate in Understanding Data Protection and Data Security bundle is a comprehensive program that will equip you with the essential skills and knowledge you need to succeed. Whether you're looking to advance in your current role or embark on a new career journey, this bundle has everything you need to take your professional life to the next level. But that's not all. When you enrol in Level 3 Certificate in Understanding Data Protection and Data Security Online Training, you'll receive 30 CPD-Accredited PDF Certificates, Hard Copy Certificates, and our exclusive student ID card, all absolutely free. Courses Are Included In this Level 3 Certificate in Understanding Data Protection and Data Security Career Bundle: Course 01: Level 3 Certificate in Understanding Data Protection and Data Security Course 02: General Data Protection Regulation (GDPR) & Cyber Security Management Course 03: GDPR Training Course 04: Network Security Engineer Diploma - CPD Certified Course 05: Computer Networks Security from Scratch to Advanced Course 06: Network Security and Risk Management Course 07: Diploma in CompTIA Network+ Training at QLS Level 7 Course 08: CompTIA Network+ (N10-008) Course 09: CompTIA Network+ Certification (N10-007) Course 10: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 11: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 12: CompTIA Security+ (SY0-601) Course 13: CompTIA A+ (220-1001) Course 14: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 15: CompTIA PenTest+ (Ethical Hacking) Course 16: Learn Ethical Hacking From A-Z: Beginner To Expert Course 17: IT: Ethical Hacking & IT Security Course 18: Web Application Penetration Testing Course Course 19: Penetration Testing with OWASP ZAP: Mastery course Course 20: Data Management Training Course 21: Learn Ethical Hacking From A-Z: Beginner To Expert Course 22: Course 08: Financial Crime Officer Course 23: Quick Data Science Approach from Scratch Course 24: Deep Learning Neural Network with R Course 25: SQL Database Management Course 26: Learn MySQL from Scratch Course 27: Information Management Course 28: Data Center Training Essentials: Mechanical & Cooling Course 29: Computer Workstation Safety Training Course 30: Touch Typing Complete Training Diploma With a Level 3 Certificate in Understanding Data Protection and Data Security, you'll embark on an immersive learning experience that combines interactive lessons with voice-over audio, ensuring that you can learn from anywhere in the world, at your own pace. And with 24/7 tutor support, you'll never feel alone in your journey, whether you're a seasoned professional or a beginner. Don't let this opportunity pass you by. Enrol in the Level 3 Certificate in Understanding Data Protection and Data Security today and take the first step towards achieving your goals and dreams. Why buy this Level 3 Certificate in Understanding Data Protection and Data Security? Free CPD Accredited Certificate upon completion of Level 3 Certificate in Understanding Data Protection and Data Security Get a free student ID card with a Level 3 Certificate in Understanding Data Protection and Data Security Lifetime access to the Level 3 Certificate in Understanding Data Protection and Data Security course materials Get instant access to this Level 3 Certificate in Understanding Data Protection and Data Security course Learn Level 3 Certificate in Understanding Data Protection and Data Security from anywhere in the world 24/7 tutor support with the Level 3 Certificate in Understanding Data Protection and Data Security course. Start your learning journey straightaway with our Level 3 Certificate in Understanding Data Protection and Data Security Training! Level 3 Certificate in Understanding Data Protection and Data Security premium bundle consists of 30 precisely chosen courses on a wide range of topics essential for anyone looking to excel in this field. Each segment of the Level 3 Certificate in Understanding Data Protection and Data Security is meticulously designed to maximise learning and engagement, blending interactive content and audio-visual modules for a truly immersive experience. Certification You have to complete the assignment given at the end of the Level 3 Certificate in Understanding Data Protection and Data Security course. After passing the Level 3 Certificate in Understanding Data Protection and Data Security exam You will be entitled to claim a PDF & Hardcopy certificate accredited by CPD Quality standards completely free. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Level 3 Certificate in Understanding Data Protection and Data Security course is ideal for: Students seeking mastery in Level 3 Certificate in Understanding Data Protection and Data Security Professionals seeking to enhance Level 3 Certificate in Understanding Data Protection and Data Security skills Individuals looking for a Level 3 Certificate in Understanding Data Protection and Data Security-related career. Anyone passionate about the Level 3 Certificate in Understanding Data Protection and Data Security Requirements This Level 3 Certificate in Understanding Data Protection and Data Security doesn't require prior experience and is suitable for diverse learners. Career path This Level 3 Certificate in Understanding Data Protection and Data Security bundle will allow you to kickstart or take your career in the related sector to the next stage. Certificates CPD Accredited Digital certificate Digital certificate - Included CPD Accredited Hard copy certificate Hard copy certificate - Included If you are an international student, then you have to pay an additional 10 GBP for each certificate as an international delivery charge.

Level 3 Certificate in Understanding Data Protection and Data Security
Delivered Online On Demand5 days
£149

Data Protection and Data Security Level 2

5.0(10)

By Apex Learning

Overview Know how to protect personal data and ensure that neither you nor your clients experience fraud or serious criminal acts. This comprehensive course delivers all the information needed to follow the UK's Data Protection Act and safeguard confidential details from exposure. The Data Protection and Data Security Level 2 course is an invaluable overview of crucial data legislation for commercial businesses and individuals. You will be made aware of the latest threats and methods by which a computer can be illegally accessed, and vital material can be stolen. Alongside this, you will be enlightened as to the available security protocols, and the actions that you must legally take. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is this course for? There is no experience or previous qualifications required for enrolment on this Data Protection and Data Security Level 2. It is available to all students, of all academic backgrounds. Requirements Our Data Protection and Data Security Level 2 is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management , Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 2 sections • 6 lectures • 02:02:00 total length •GDPR Basics: 00:22:00 •GDPR Explained: 00:17:00 •Lawful Basis for Preparation: 00:29:00 •Rights and Breaches: 00:25:00 •Responsibilities and Obligations: 00:29:00 •Assignment - Data Protection and Data Security Level 2: 00:00:00

Data Protection and Data Security Level 2
Delivered Online On Demand2 hours 2 minutes
£12

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online
£2,975

Data Protection Level 3 and Data Security (GDPR) Training Certification

4.5(3)

By Studyhub UK

Overview The Data Protection Level 3 and Data Security (GDPR) Training Certification course provides a comprehensive understanding of GDPR regulations and the fundamentals of data protection and security. It covers GDPR basics, lawful basis for data processing, rights and breaches, as well as the responsibilities and obligations related to data protection. Learning Outcomes: Develop a solid understanding of GDPR regulations and their implications for data protection and security. Gain knowledge of the lawful basis for processing personal data in compliance with GDPR requirements. Understand the rights of individuals and how to handle data breaches effectively. Identify and fulfill the responsibilities and obligations placed on organizations regarding data protection. Acquire practical skills and strategies to ensure compliance with GDPR regulations and maintain data security. Why buy this Data Protection Level 3 and Data Security (GDPR) Training Certification? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Data Protection Level 3 and Data Security (GDPR) Training Certification you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Data Protection Level 3 and Data Security (GDPR) Training Certification does not require you to have any prior qualifications or experience. You can just enrol and start learning.  Prerequisites This Data Protection Level 3 and Data Security (GDPR) Training Certification was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Data Protection Level 3 and Data Security (GDPR) Training Certification is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Data Protection Level 3 and Data Security (GDPR) Training Certification GDPR Basics 00:22:00 GDPR Explained 00:17:00 Lawful Basis for Preparation 00:29:00 Rights and Breaches 00:25:00 Responsibilities and Obligations 00:29:00 Mock Exam Mock Exam - Data Protection Level 3 and Data Security (GDPR) Training Certification 00:20:00 Final Exam Final Exam - Data Protection Level 3 and Data Security (GDPR) Training Certification 00:20:00

Data Protection Level 3 and Data Security (GDPR) Training Certification
Delivered Online On Demand2 hours 42 minutes
£10.99

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online
£3,395

Payment Card Industry Data Security Standards (PCI DSS)

By Study Academy

Any organisation that processes, transmits or stores payment card data must comply with PCI DSS. Failure to comply will result in heavy fines, restrictions or permanent expulsion from the payment card acceptance programme. This course describes the Payment Card Industry Data Security Standard (PCI DSS) and explains what you need to be aware of and when to take action to be PCI DSS compliant.

Payment Card Industry Data Security Standards (PCI DSS)
Delivered Online On Demand1 hour
£30

Level 1 Certificate in Understanding Data Protection and Data Security

5.0(1)

By Empower UK Employment Training

Level 1 Certificate in Understanding Data Protection and Data Security Unlock the world of Data Protection with our Level 1 Certificate course. Explore Data Protection Applications and delve into the essential Principles of GDPR. Learn about the Rights of Data Subjects, Data Protection Impact Assessments, Data Breaches, and the vital Exemptions in Data Protection. Learning Outcomes: Define Data Protection applications. Explain GDPR principles in Data Protection. Implement rights of a Data Subject. Evaluate Data Protection Impact Assessments (DPIA). Implement procedures for handling data breaches. Evaluate exemptions in Data Protection. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Level 1 Certificate in Understanding Data Protection and Data Security Course Syllabus Data Protection Applications: Explore the practical applications of data protection principles in various contexts, including business operations, information handling, and technology usage. Principles of GDPR: Gain a comprehensive understanding of the General Data Protection Regulation (GDPR) and its fundamental principles, including lawful processing, data subject rights, and accountability. Rights of Data Subject: Learn about the rights afforded to data subjects under data protection laws, such as the right to access, rectify, and erase personal data, and understand how to address these rights in compliance. Data Protection Impact Assessment (DPIA): Discover the importance of conducting DPIAs to assess and mitigate data protection risks associated with data processing activities, and learn how to perform effective DPIAs. Data Breaches: Understand the concept of data breaches, their implications, and the legal requirements for reporting and managing data breaches in accordance with data protection regulations. Exemptions in Data Protection: Explore specific exemptions and exceptions within data protection laws, including scenarios where data protection regulations may not apply or where limitations exist.

Level 1 Certificate in Understanding Data Protection and Data Security
Delivered Online On Demand1 hour 36 minutes
£5

Certified Cloud Security Professional (CCSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management

Certified Cloud Security Professional (CCSP)
Delivered OnlineFlexible Dates
£4,549