• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

29 Educators providing Data Security courses

RW Consulting Solutions Ltd/ Controlled Events

rw consulting solutions ltd/ controlled events

Buckinghamshire

Please read the terms and conditions of this agreement (the “Agreement” or “Terms” or “Terms of Service”) before logging into ECR Manager, Accreditation software or other systems provided by RW Consulting Solutions Limited (trading as Controlled Events). By completing the registration process, accessing the Service, using the Site or adding a log entry, you agree that you have read and understood these terms and conditions of this Agreement and you agree to be bound by them. We may periodically update these terms and conditions. Your continued use of this site will constitute your acceptance of any new or amended terms and conditions. 1. DEFINITIONS “Account” means access to the Service. “Agreement” means these customer Terms of Service and all materials referenced or linked. “Data” means all information that Customer adds or views on the log. “Documentation” means online user guides, documentation and help and training materials published by Controlled Events or accessible through the Service, as may be updated by Controlled Events from time to time. “Service” means our cloud-based application you have subscribed to and developed, operated and maintained by us. “Site” means www.controlledevents.com/log – known as ECR Manager “Third-Party Sites” means third-party websites linked from within the Service. “Users” means your employees, representatives, consultants, contractors or agents who are authorized to use the Service for your benefit and have unique user identifications and passwords for the Service. “You”, “your” or “Customer” means the person or entity using the Service and identified in the applicable registration process, billing statement, online subscription process or Order Form as the customer. 2. WHO WE ARE 2.1. www.controlledevents.com/log and the Controlled Events Service are provided by RW Consulting Solutions Limited (RWCS), a registered private limited company in England and Wales, which has its registered office at New Burlington House, 1075 Finchley Road, London NW11 0PU with Company Registration Number: 7493058 (collectively, “we”, “us”, “Controlled Events”). 3. DESCRIPTION OF THE SERVICE 3.1. The Service gathers and transfers log data to a cloud based system which is provided by a User of the Service. Customer who successfully subscribes will be given an Account to have its Data relating to an event, exercise or incident visualized, analyzed and stored. 3.2. Details of the Client’s service level (one off, retained, 24/7) and associated charges are provided at the point of purchase; any additional terms or conditions contained on those pages are incorporated into this Agreement by reference. 3.3. Additional functionality and services may be offered or provided by us from time to time and these will be described on the Site. 4. STORAGE SPACE AND USAGE LIMITS 4.1. Customer can upload a certain volume of log and document data, dependent on the Service level selected, which is referred to as the “Usage Limit.” Project admins can manage their Account by archiving logs no longer needed. 4.2. An email alert or alternative notification by Controlled Events will be provided when Customer is near or over its Usage Limit. 5. OUR CLOUD-BASED SOLUTION 5.1. Controlled Events will maintain commercially appropriate administrative, physical, and technical safeguards to protect Data. Controlled Events hosts and stores data on Amazon Web Services’ cloud platform and on other cloud platforms as necessary. The level of security provided in Amazon’s cloud platform is described in more detail on http://aws.amazon.com/security/. Our Data Protection and Cyber Security Manual is available upon request. 5.2. Controlled Events provides you with the option to encrypt the transmission of your Data. You acknowledge that it is your responsibility to encrypt the transmission of your Data should you wish to protect it. In the event you decide to transmit your Data unencrypted to the Service, You assume all related risks for doing so. Controlled Events will not be liable for any liabilities arising from your transmission of Data over the Internet or other network. 6. REGISTRATION 6.1. Upon registering for the Service, Users will have a username, password and email address associated with their account for password resets, which is Customer’s and its Users’ responsibility to keep secure and may not be shared with any other party. Customer agrees to immediately notify Controlled Events of any unauthorized use or any other breach of security or breach of this Agreement of which the Customer becomes aware. Controlled Events will not be liable for any loss or damage resulting from Customer’s failure to maintain proper security of its account or for unauthorized access to the Service. 7. CHARGES AND PAYMENT 7.1. Fees. The Service is made available to Customer at the price indicated in the accepted quotation. Fees are non-cancellable and non-refundable during the Term. Controlled Events reserves the right to change its price list and to institute new charges at any time, upon notice to You, which may be sent by email or posted on the Site. Your use of the Services following such notification constitutes your acceptance of any new or increased charges. Additional Charges may apply for additional services requested by Customer such as supporting data analysis of logs and usage or the transfer of data after closing the Account. Customer will be notified of services requiring additional Charges which have not been previously agreed upon before any such additional Charge will be applied. 7.2. Payment for Subscriptions is required to be paid in full at the beginning of each billing period by BACS transfer. If Controlled Events extends credit to Customer, all Charges must be paid within 30 days of issue of invoice. Payment of Charges for metered billing is required at the end of each month by credit or debit card and is based on the volume of Data uploaded and stored during the month. 7.3. In addition to the Charges, Customer must pay to Controlled Events, or to the relevant taxing authority, as appropriate, all applicable sales, use, goods and services, value added or other taxes payable under this Agreement (other than taxes levied or imposed on our income). In all cases, the amounts due under this Agreement will be paid by Customer to us in full without any right of set-off or deduction. 8. TRIAL ACCOUNTS 8.1. Customers who are provided with a free or trial Controlled Events Account or who are otherwise provided with any other promotional Controlled Events Service(s) for which they have not paid a Charge acknowledge and agree that such services are provided “as is” and so, to the fullest extent permitted by law, those services are provided without any warranties or representations whatsoever and the Customer agrees to avail of such services entirely at its own risk. 9. TERM AND TERMINATION 9.1. The subscription term shall begin on the effective date of your subscription and expire at the end of the period selected during the subscription process (“Subscription Term”). 9.2 The Subscription and Agreement will automatically renew at the published rates on a monthly, annual or otherwise mutually agreed upon period of time, unless one party notifies the other party in writing of its intent not to renew at least thirty (30) days in advance of the expiration of the Subscription Term. 9.3 Customer may terminate the Service at any time, however, fees are non-refundable except in the event of Controlled Events’ incured material breach as set forth below. 9.4. Either party may terminate this Agreement at any time, effective immediately, upon written notice to the other party, if such other party: (i) breaches any of its material obligations hereunder and fails to cure such breach within thirty (30) days of written notice thereof; (ii) becomes insolvent or has a receiver, administrator, liquidator or examiner appointed over all or part of its assets or (iii) becomes the subject of a resolution, petition or order for winding up or bankruptcy. We may terminate this Agreement if, at any time, we cease providing the Service. 9.5. On termination or expiry of this Agreement for any reason, Customer will remain liable to Controlled Events for any outstanding Charges owed, Customer’s rights under this Agreement will immediately terminate, You will lose all access to the Service, including access to Your account and to Your content, and We will delete Your content and the data stored in or as part of Your account. 9.6. Without limitation of the foregoing, we may suspend or terminate the Service without notice if Customer shall fail to pay any amounts when due, if the Services are used for other purposes including but not limited to tampering, hacking, modifying or otherwise corrupting the security or functionality of Controlled Events Services, if the Services are used in a manner contrary to the law or the terms of this Agreement or if Controlled Events experiences unexpected technical or security issues. 9.7. Customer shall provide notice of termination of the Service to Controlled Events at support@controlledevent.com 10. ACCEPTABLE USAGE POLICY 10.1. The Controlled Events Acceptable Usage Policy prohibits the processing of data which are deemed by us in our sole discretion as being inappropriate or unlawful. We aim to ensure that we are not associated with any website content (including linked content) which is illegal, fraudulent, offensive, embarrassing, sexually explicit, obscene, threatening, defamatory or otherwise inappropriate. We prohibit the processing of data using the Service where the processing would breach the laws or rights of third parties and the Customer represents, warrants and undertakes to us that no such transactions will be processed via the Services. 10.2. Customer agrees not to use the Site or the Service or cause or permit the Site or the Service to be used: 10.2.1. so as to jeopardize or prejudice the operation, quality or integrity of the Site, the Service or the operation, quality or integrity of any telecommunications network; 10.2.2. for any commercial purpose including screen shots and copying feature information from the log, nor to go against the spirit of the log platform by sharing data outside of the agreed user base for the project; 10.2.3. to harvest or otherwise collect information about others, including e-mail addresses, without their consent; 10.2.4. to distribute, download, upload or transmit any material that contains viruses, trojan horses, worms, time bombs, cancelbots, or any other harmful or deleterious programs; 10.2.5. contrary to the terms and conditions of any Internet Service Provider whose services you may use. 11. SERVICE AVAILABILITY AND CUSTOMER SUPPORT 11.1. The Service is available 24 hours a day, 7 days a week, except for: (a) planned downtime (of which Controlled Events shall endeavor to give at least 8 hours’ notice and which Controlled Events shall schedule to the extent practicable outside of any event or user peak times), or (b) any unavailability caused by circumstances beyond Controlled Events’ reasonable control, including without limitation, Internet and telecommunications service provider failures or delays, failures of independent service providers, or denial of service attacks. Customer support is provided through the online and email channels: support@controlledevents.com and 020 3286 6392 12. DISCLAIMERS; LIMITATION OF LIABILITY 12.1. The service including any software included in or provided as part of the software is provided on an “as is” and “as available” basis, and Controlled Events expressly disclaims any warranties and conditions of any kind, whether express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, title, accuracy, or non-infringement. without limiting the foregoing, Controlled Events does not warrant that the service will meet your specific requirements, that the service will be uninterrupted, timely, secure, or error-free, that the results that may be obtained from the use of the service will be complete, accurate, or reliable, that the quality of any products, services, information, or other material purchased or obtained by you through the service will meet your expectations, or that any errors in the service will be corrected. 12.2. Although this site is accessible worldwide, not all products or services discussed or referenced herein are available to all persons or in all geographic locations. we reserve the right to limit, in our sole discretion, the provision and quantity of any product or service to any person or geographic area it so desires. any offer for any product or service made in or through this site is void where prohibited. 12.3 Because it is not possible to guarantee data security, you acknowledge unauthorized access to your data may occur and you agree in such event that any loss you may suffer is subject to the limitation of liability provisions of this agreement. under no circumstances will Controlled Events be liable in any way for any data, including, but not limited to, any errors or omissions in any data, or any loss or damage of any kind incurred in connection with use of or exposure to any data posted, emailed, accessed, transmitted, or otherwise made available via the service. 12.4. Notwithstanding anything to the contrary contained herein, Controlled Events’ liability to customer for any direct damages, losses, expenses and causes of action (whether in contract or tort) arising from or relating to the service (for any cause whatsoever and regardless of the form of the action) will at all times be limited to the amount you paid Controlled Events in the three (3) months immediately preceding the incident giving rise to the claim. 12.5. You expressly understand and agree that Controlled Events (including its affiliates, subsidiaries, officers, directors, employees, agents, partners, and licensors) shall not be liable for any indirect, incidental, special, consequential or exemplary damages, including but not limited to damages for loss of profits, goodwill, use, data or other intangible losses (even if Controlled Events has been advised of the possibility of such damages. 13. DATA SECURITY 13.1. If Customer processes personal data using the Service, Customer shall comply with its obligations as a data controller and data processor under all applicable laws. 13.2. Customer is solely responsible for the lawful collection, delivery, obtaining of consents and use of all Data. All personal data and log data that we collect from you will be processed in accordance with Controlled Events’ Privacy Policy. You should review our Privacy Policy, which is incorporated into this Agreement by this reference and made a part hereof. Click here to read our Privacy Policy. 13.3. We do not have any obligation to review or scan any Customer data for any purpose, including without limitation for measuring quality, filtering content, or detecting the presence of malware. 14. INTELLECTUAL PROPERTY 14.1. Customers own their own log data. 14.2. Subject to this Agreement, Controlled Events grants Customer a non-exclusive, revocable, non-transferable, limited right to access and use the Service and the material displayed thereon. However, no right, title, or interest in any such materials will be granted or transferred to you as a result of any permitted use of such materials. 14.3. Customer hereby grants Controlled Events a worldwide, irrevocable, perpetual, non-exclusive, transferable, royalty-free license: (a) to process and use their data for the purposes of delivering the Service to Customer; (b) to access the client’s project internally within Controlled Events for the purposes of improving, developing and marketing the Service; and (c) to disclose anonymized and/or aggregated versions of log data to third parties in connection with the development, improvement and marketing of the Service, provided that such anonymized or aggregated log data shall not identify Customer. This license continues after the termination of this Agreement. Controlled Events’ rights under the license in this Section may be exercised by Controlled Events’ officers and employees and by contractors engaged to provide services to Controlled Events. 14.4. All materials incorporated in or accessible through the Site or the Service, including, without limitation, text, photographs, images, graphics, illustrations, trademarks, service marks, logos, button icons, audio clips, video clips, software, and other content, and the compilation, collection, arrangement, and assembly thereof (including the look and feel of the Site and the Service), are protected by applicable national and international trademark and copyright laws, and are owned, controlled or licensed by Controlled Events, or by the original creators of such materials or their permitted licensors. Such materials may be used only for viewing the Site in the ordinary course or as a resource for purchasing the products offered through the Site. Any other use of such materials, including any copying, reproduction, modification, sale, distribution, extraction, re-utilization, transmission, republication, downloading, display, posting, performance, or other exploitation thereof by any means or medium without the prior written permission of the copyright owner is strictly prohibited. 14.5. Where any software is supplied by us for use by Customer on its computer(s), Controlled Events grants Customer a limited, personal, non-exclusive, non-transferable license to install and use the software for use solely for the purpose of enabling you to use the Service in the manner permitted by this Agreement and for no other purpose whatsoever. Customer may not copy, modify, distribute, sell, or lease any part of the Services or any software supplied in connection with the Services, nor may Customer reverse engineer or attempt to extract the source code of that software, unless laws prohibit those restrictions or you have our written permission. To the extent that the Customer is provided with access to open source software in the course of receiving or using the Service, Customer shall be responsible for complying with the open source license associated with that open source software. 14.6. Except as expressly set forth herein, Controlled Events alone (and its licensors, where applicable) will retain all intellectual property rights relating to the Service or the Software or any suggestions, ideas, enhancement requests, feedback, recommendations or other information provided by you or any other party relating to the Service and/or the Software, which are hereby assigned by You. Customer will not copy, distribute, reproduce or use any of the foregoing except as expressly permitted under this Agreement. 15. CONFIDENTIALITY 15.1. Each party (the “Receiving Party”) understands that the other party (the “Disclosing Party”) has disclosed or may disclose information relating to the Disclosing Party’s technology or business (hereinafter referred to as “Proprietary Information” of the Disclosing Party). The Receiving Party agrees: (i) not to divulge to any third person (except as set forth below) any such Proprietary Information, (ii) to give access to such Proprietary Information solely to those employees and third parties with a need to have access thereto for purposes of this Agreement, and (iii) to take the same security precautions to protect against disclosure or unauthorized use of such Proprietary Information that the party takes with its own proprietary information, but in no event will a party apply less than reasonable precautions to protect such Proprietary Information. 15.2. The Disclosing Party agrees that the foregoing will not apply with respect to any information that the Receiving Party can document (a) is or becomes generally available to the public without any action by, or involvement of, the Receiving Party, or (b) was in its possession or known by it prior to receipt from the Disclosing Party, or (c) was rightfully disclosed to it without restriction by a third party, or (d) was independently developed without use of any Proprietary Information of the Disclosing Party. Nothing in this Agreement will prevent the Receiving Party from disclosing the Proprietary Information pursuant to any judicial or governmental order, provided that the Receiving Party gives the Disclosing Party reasonable prior notice of such disclosure to contest such order. Customer acknowledges that Controlled Events does not wish to receive any Proprietary Information from Customer that is not necessary for Controlled Events to perform its obligations under this Agreement, and, unless the parties specifically agree otherwise, Controlled Events may reasonably presume that any unrelated information received from Customer is not confidential or Proprietary Information. Both Parties will have the right to disclose the existence but not the terms and conditions of this Agreement, unless such disclosure is approved in writing by both Parties prior to such disclosure, or is included in a filing required to be made by a Party with a governmental authority (provided such party will use reasonable efforts to obtain confidential treatment or a protective order) or is made on a confidential basis as reasonably necessary to potential investors or acquirers. 16. INDEMNIFICATION 16.1. Customer shall defend, indemnify, and hold harmless Controlled Events and each of its, and its affiliates, employees, contractors, directors, suppliers and representatives, from and against any liabilities, losses, claims, and expenses, including reasonable attorneys’ fees, arising from or related to your Data, or Customer’s actions in connection with any unauthorised use of the Service, including any claim that such actions violate any applicable law or third party right. 16.2. Controlled Events will notify Customer in writing thirty (30) days of becoming aware of any such claim; give you sole control of the defence or settlement of such a claim; and provide you, at your expense, with any and all information and assistance reasonably requested by you to handle the defence or settlement of the claim. Customer shall not accept any settlement that (i) imposes an obligation on us; (ii) requires us to make an admission; or (iii) imposes liability not covered by these indemnifications or places restrictions on us without prior written consent. 17. CONTENT RESPONSIBILITY 17.1 You are solely responsible for a) Your content and Data (meaning Content You post or otherwise submit to the Site or Service), b) the accuracy, quality, and legality of Your content and of Your submissions, c) the means by which You acquired Your content, including ensuring that Your content and Your submissions do not infringe upon or violate the rights of any person, d) claims relating to Your content and Your submissions, and e) responding to any person claiming Your content and/or Your submissions violate such persons rights, including notices pursuant to the Data Protection Act and General Data Protection Regulations. 18. GENERAL 18.1. The headings to the clauses in this Agreement are for reference only and shall not affect the interpretation of this Agreement. 18.2. The waiver or failure of either party to exercise any right provided for herein shall not be deemed a waiver of any further right hereunder. 18.3. This Agreement shall not constitute any party, the legal representative, partner or agent of the other parties or any of them nor shall any party or any successor of any party have the right or authority to assume, create or incur any liability or obligation of any kind express or implied against or in the name of or on behalf of any other party. The parties hereto enter this Agreement as principals for and on their own behalf. 18.4. This Agreement or the benefit hereof may not be assigned by Customer in whole or in part without the prior written consent of Controlled Events. Customer may not re-sell or make available the Services to any third parties. Controlled Events may assign this Agreement to any purchaser of, or successor in interest to, the Controlled Events business. 18.5 Except for failure to make payments when due, neither party shall be liable to the other by reason of any failure in performance of this Agreement by either party if the failure arises out of any cause beyond the reasonable control of that party, including, but not limited to, the unavailability or faulty performance of communication networks or energy sources, any act of God, any act or omission of governmental or other competent authority, fires, strikes, industrial dispute, riots, war, inability to obtain materials, embargo, refusal of license, theft, destruction, denial of service (DoS) attacks, unauthorized access to computer systems or records, programs, equipment, data, or services. 18.6. You grant us the right to add your name and company logo to our customer list and website. 18.7. This Agreement represents the entirety of the understanding of the parties concerning the subject matter hereof and overrides and supersedes all prior promises, representations, undertakings, understandings, arrangements, agreements, side letters or heads of agreement concerning the same which are hereby revoked by mutual consent of the parties. The Customer is not relying on any warranties or representations which are not expressly set out in this Agreement. 18.8. Questions about the Terms of Service should be sent to support@controlledevent.com. 18.9. Survival. The following sections shall survive the expiration or termination of this Agreement: Definitions, Fees and Payments, Intellectual Property, Confidentiality, Indemnification, Disclaimers, Limitations of Liability, Termination and General.

Nexus Human

nexus human

London

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK.  For over two decades, Nexus Human has been a steadfast source of reliable and high-quality training solutions, catering to a diverse range of professional and educational needs. With a strong reputation in the Training Industry, Nexus Human has consistently demonstrated its commitment to equipping individuals and organisations with the skills and knowledge required to thrive in today's dynamic world.  Our training programs span a wide spectrum, encompassing IT certifications, business skills, and much more.   What sets Nexus Human apart is our unwavering dedication to staying at the forefront of industry trends and technology advancements.  Our expert instructors, coupled with cutting-edge training resources, ensure that students receive the most up-to-date and relevant knowledge available. The impact of Nexus Human extends far and wide, helping individuals enhance their career prospects and aiding businesses in achieving their goals.  This 20-year journey has solidified our institution's standing as a trusted partner in personal and professional growth, offering reliable, excellent training that continues to shape the future.  Whether you seek to upskill, reskill, or simply stay ahead of the curve, Nexus Human is the place to turn for an educational experience marked by quality, reliability, and innovation.

IOMH - Institute of Mental Health

iomh - institute of mental health

London

The IOMH - Institute of Mental Health [https://iomh.co.uk/]is dedicated to empowering individuals to unlock their full potential and thrive in multiple areas of life. Whether you're seeking personal growth, professional development, or support in overcoming life's challenges, we have the resources and expertise to guide you on your transformative journey. Our Vision At the IOMH (Institute of Mental Health), we envision a world where every person is inspired to embrace change, overcome obstacles, motivate others, and find hope in the face of adversity. We believe that through education and support, individuals can tap into their inner strength and create meaningful transformations in all aspects of life. Our Mission Our mission is to break barriers and ignite the spark of possibility within you. We are committed to offering a diverse range of courses and programs that encompass various niches, allowing you to explore and excel in multiple areas of interest. Our skillfully crafted content, designed by specialists, provides you with the knowledge and skills you need to become a well-rounded and empowered individual. WHAT WE OFFER * Expert-Curated Courses: Our courses are developed by industry-leading experts. * Fully Accredited Courses and Study Materials: Ensure quality and credibility. * Business Team Training: Tailor-made programs for corporate teams. * Affordable Subscriptions: Flexible payment options to suit your budget. * Accredited Certifications: Validate your skills and expertise. * New Courses Monthly: Stay updated with the latest trends. * Flexible Learning: Learn at your own pace and convenience. * 24/7 Support: Dedicated assistance whenever you need it. OUR VISION AT THE IOMH (INSTITUTE OF MENTAL HEALTH), WE ENVISION A WORLD WHERE EVERY PERSON IS INSPIRED TO EMBRACE CHANGE, OVERCOME OBSTACLES, MOTIVATE OTHERS, AND FIND HOPE IN THE FACE OF ADVERSITY. WE BELIEVE THAT THROUGH EDUCATION AND SUPPORT, INDIVIDUALS CAN TAP INTO THEIR INNER STRENGTH AND CREATE MEANINGFUL TRANSFORMATIONS IN ALL ASPECTS OF LIFE. OUR VISION AT THE IOMH (INSTITUTE OF MENTAL HEALTH), WE ENVISION A WORLD WHERE EVERY PERSON IS INSPIRED TO EMBRACE CHANGE, OVERCOME OBSTACLES, MOTIVATE OTHERS, AND FIND HOPE IN THE FACE OF ADVERSITY. WE BELIEVE THAT THROUGH EDUCATION AND SUPPORT, INDIVIDUALS CAN TAP INTO THEIR INNER STRENGTH AND CREATE MEANINGFUL TRANSFORMATIONS IN ALL ASPECTS OF LIFE.

iStudy UK

istudy uk

We understand more than anyone how important it is for you to get the right qualifications at the right time. We also understand that when you have a lot to do, you might not always have the time free to go to a place of study. That is why we created this site, so you can take all the time you need to learn more about your chosen topics as well as be able to do the whole thing from home. We believe in empowering people by offering them opportunities to expand and extend their knowledge and skill set as well as giving them the support they need to achieve great things. With thousands of courses available and a team who will do just about anything to help you, it is safe to say that you will not find a better course provider on the internet and so we would love to work with you to make sure that you get the best experience and best results out of your education. WHAT WE DO Here at iStudy we provide a range of online training courses for those who want to gain new skills, and qualifications and update their knowledge. iStudy training courses are delivered entirely online through our sophisticated student learning portal. The student learning portal is an online learning management system that allows students to study for their courses online. This innovative technology means there is no need to attend any classes or take time off work to study. Professionally accredited courses All our courses are delivered in partnership with nationally recognised awarding bodies so be assured that what you learn with us matters when it comes to achieving your career goals. Study that suits you You do not have to give up your job or your life to get a new qualification, you can learn anytime, anywhere.

Education And Skills Training & Development

education and skills training & development

Doncaster

Welcome to the Education and Skills Training & Development Ltd's privacy notice. Education and Skills Training & Development Ltd respects your privacy and is committed to protecting your personal data. This privacy notice will inform you as to how we look after your personal data when you visit our website (regardless of where you visit it from) and tell you about your privacy rights and how the law protects you. This privacy notice is provided in a layered format so you can click through to the specific areas set out below. Please also use the Glossary to understand the meaning of some of the terms used in this privacy notice. 1. IMPORTANT INFORMATION AND WHO WE ARE 2. THE DATA WE COLLECT ABOUT YOU 3. HOW IS YOUR PERSONAL DATA COLLECTED 4. HOW WE USE YOUR PERSONAL DATA 5. DISCLOSURES OF YOUR PERSONAL DATA 6. INTERNATIONAL TRANSFERS 7. DATA SECURITY 8. DATA RETENTION 9. YOUR LEGAL RIGHTS 10. GLOSSARY 1. Important information and who we are Purpose of this privacy notice This privacy notice aims to give you information on how Education and Skills Training & Development Ltd collects and processes your personal data through your use of this website, including any data you may provide through this website when you sign up to our newsletter, purchase a product or service, take part in a competition or enrol yourself or one of your employees onto one of our courses. This website is not intended for children and we do not knowingly collect data relating to children. It is important that you read this privacy notice together with any other privacy notice or fair processing notice we may provide on specific occasions when we are collecting or processing personal data about you so that you are fully aware of how and why we are using your data. This privacy notice supplements the other notices and is not intended to override them. Controller Education and Skills Training & Development Ltd is the controller and responsible for your personal data (collectively referred to as "COMPANY", "we", "us" or "our" in this privacy notice). We have appointed a data protection officer (DPO) who is responsible for overseeing questions in relation to this privacy notice. If you have any questions about this privacy notice, including any requests to exercise your legal rights, please contact the DP] using the details set out below. Contact details Our full details are: Full name of legal entity: Education and Skills Training & Development Ltd Name or title of DPO : James Hart Email address: james.hart@education-and-skills.com Postal address: 5C Oxford House, Sixth Avenue, Doncaster DN9 3GG Telephone number: 01302 802220 You have the right to make a complaint at any time to the Information Commissioner's Office (ICO), the UK supervisory authority for data protection issues (www.ico.org.uk). We would, however, appreciate the chance to deal with your concerns before you approach the ICO so please contact us in the first instance. Changes to the privacy notice and your duty to inform us of changes This version was last updated on 1st July 2018 and is reviewed annually. It is important that the personal data we hold about you is accurate and current. Please keep us informed if your personal data changes during your relationship with us. Third-party links This website may include links to third-party websites, plug-ins and applications. Clicking on those links or enabling those connections may allow third parties to collect or share data about you. We do not control these third-party websites and are not responsible for their privacy statements. When you leave our website, we encourage you to read the privacy notice of every website you visit. 2. The data we collect about you Personal data, or personal information, means any information about an individual from which that person can be identified. It does not include data where the identity has been removed (anonymous data). We may collect, use, store and transfer different kinds of personal data about you which we have grouped together follows: · Identity Data includes first name, maiden name, last name, username or similar identifier, marital status, title, date of birth, national insurance number and gender. · Contact Data includes billing address, delivery address, email address and telephone numbers. · Financial Data includes bank account and payment card details. · Transaction Data includes details about payments to and from you and other details of products and services you have purchased from us. · Technical Data includes internet protocol (IP) address, your login data, browser type and version, time zone setting and location, browser plug-in types and versions, operating system and platform and other technology on the devices you use to access this website. · Profile Data includes your username and password, purchases or orders made by you, your interests, preferences, feedback and survey responses. · Usage Data includes information about how you use our website, products and services. · Marketing and Communications Data includes your preferences in receiving marketing from us and our third parties and your communication preferences. We also collect, use and share Aggregated Data such as statistical or demographic data for any purpose. Aggregated Data may be derived from your personal data but is not considered personal data in law as this data does not directly or indirectly reveal your identity. For example, we may aggregate your Usage Data to calculate the percentage of users accessing a specific website feature. However, if we combine or connect Aggregated Data with your personal data so that it can directly or indirectly identify you, we treat the combined data as personal data which will be used in accordance with this privacy notice. We do not collect any Special Categories of Personal Data about you (this includes details about your race or ethnicity, religious or philosophical beliefs, sex life, sexual orientation, political opinions, trade union membership, information about your health and genetic and biometric data). Nor do we collect any information about criminal convictions and offences. If you fail to provide personal data Where we need to collect personal data by law, or under the terms of a contract we have with you and you fail to provide that data when requested, we may not be able to perform the contract we have or are trying to enter into with you (for example, to provide you with goods or services). In this case, we may have to cancel a product or service you have with us but we will notify you if this is the case at the time. 3. How is your personal data collected? We use different methods to collect data from and about you including through: · Direct interactions. You may give us your Identity, Contact and Financial Data by filling in forms or by corresponding with us by post, phone, email or otherwise. This includes personal data you provide when you: · apply for our products or services; · enrol on one of our courses – government funded or not · create an account on our website; · subscribe to our service or publications; · request marketing to be sent to you; · enter a competition, promotion or survey; or · give us some feedback. · Automated technologies or interactions. As you interact with our website, we may automatically collect Technical Data about your equipment, browsing actions and patterns. We collect this personal data by using cookies, server logs and other similar technologies. We may also receive Technical Data about you if you visit other websites employing our cookies. · Third parties or publicly available sources. We may receive personal data about you from various third parties and public sources as set out below: · Technical Data from the following parties: (a) analytics providers such as Google based outside the EU; (b) advertising networks based inside the EU; and (c) search information providers based inside OR outside the EU. · Contact, Financial and Transaction Data from providers of technical, payment and delivery services based inside OR outside the EU. · Identity and Contact Data from data brokers or aggregators based inside OR outside the EU. · Identity and Contact Data from publicly availably sources such as Companies House and the Electoral Register based inside the EU. · Achievement of prior qualifications from the Learner Records Service and Department of Education via the ESFA or Student Loans Company 4. How we use your personal data We will only use your personal data when the law allows us to. Most commonly, we will use your personal data in the following circumstances: · Where we need to perform the contract we are about to enter into or have entered into with you. · Where it is necessary for our legitimate interests (or those of a third party) and your interests and fundamental rights do not override those interests. · Where we need to comply with a legal or regulatory obligation. Generally we do not rely on consent as a legal basis for processing your personal data other than in relation to sending third party direct marketing communications to you via email or text message. You have the right to withdraw consent to marketing at any time by contacting us. Purposes for which we will use your personal data We have set out below, in a table format, a description of all the ways we plan to use your personal data, and which of the legal bases we rely on to do so. We have also identified what our legitimate interests are where appropriate. Note that we may process your personal data for more than one lawful ground depending on the specific purpose for which we are using your data. Please contact us if you need details about the specific legal ground we are relying on to process your personal data where more than one ground has been set out in the table below.

Courses matching "Data Security"

Show all 290

Level 2 Certificate in Understanding Data Protection and Data Security - CPD Certified

4.5(3)

By Studyhub UK

24 Hour Flash Deal **33-in-1 Data Protection and Data Security Mega Bundle** Data Protection and Data Security Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Data Protection and Data Security package online with Studyhub through our online learning platform. The Data Protection and Data Security bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Data Protection and Data Security course provides complete 360-degree training on Data Protection and Data Security. You'll get not one, not two, not three, but thirty-three Data Protection and Data Security courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Data Protection and Data Security courses are yours for as long as you want them once you enrol in this course This Data Protection and Data Security Bundle consists the following career oriented courses: Course 01: Cyber Security Awareness Training Course 02: Web Application Penetration Testing Course 03: Data Protection Level 3 and Data Security (GDPR) Training Certification Course 04: Cyber Security Law Course 05: Cyber Security Incident Handling and Incident Response Course 06: GDPR Training Course 07: Information Architecture (IA) Fundamentals for Website Design Course 08: Financial Crime Officer Course 09: Transaction Monitoring in Financial Services: Ensuring Security Course 10: Financial Statements Fraud Detection Training Course 11: CompTIA CySA+ Cybersecurity Analyst Course Course 12: Machine Learning Basics Course 13: Python Basic Programming for Absolute Beginners Course 14: Data Analysis & Forecasting Course 15: SQL for Data Science, Data Analytics and Data Visualization Course 16: Microsoft Excel Complete Course 2019 Course 17: VLOOKUP: Master Excel Formula VLOOKUP in 60 minutes! Course 18: Excel: Top 50 Microsoft Excel Formulas in 50 Minutes! Course 19: JavaScript Foundations Course 20: jQuery Masterclass Course: JavaScript and AJAX Coding Bible Course 21: PHP Web Development with MySQL Course 22: Node JS: API Development with Swagger Interface Description Language Course 23: Digital Marketing for Beginners to Advanced Course 24: Google Analytics Course 25: Content Management Course 26: Info Graphics Web Design - Affinity Designer Training Course 27: Responsive Web Design Course 28: MVC and Entity Framework Course 29: Web Design with Adobe XD Course 30: Diploma in Adobe Illustrator Course 31: Digital Art - Sketching In Photoshop Course 32: AutoCAD VBA Programming - Beginner course Course 33: Learn MySQL from Scratch In this exclusive Data Protection and Data Security bundle, you really hit the jackpot. Here's what you get: Step by step Data Protection and Data Security lessons One to one assistance from Data Protection and Data Security professionals if you need it Innovative exams to test your knowledge after the Data Protection and Data Security course 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all thirty-three Data Protection and Data Security courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Data Protection and Data Security certificate and transcript on the next working day Easily learn the Data Protection and Data Security skills and knowledge you want from the comfort of your home The Data Protection and Data Security course has been prepared by focusing largely on Data Protection and Data Security career readiness. It has been designed by our Data Protection and Data Security specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Data Protection and Data Security Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Data Protection and Data Security bundle course has been created with thirty-three premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Data Protection and Data Security Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Data Protection and Data Security Elementary modules, allowing our students to grasp each lesson quickly. The Data Protection and Data Security course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. CPD 330 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Data Protection and Data Security training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Data Protection and Data Security After completing this course you can progress towards- BCS Foundation Certificate in Data Protection BCS Practitioner Certificate in Data Protection NCFE Level 2 Certificate in Understanding Data Protection and Data Security Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. Requirements To participate in this Data Protection and Data Security course, all you need is - A smart device A secure internet connection And a keen interest in Data Protection and Data Security Career path You will be able to kickstart your Data Protection and Data Security career because this course includes various courses as a bonus. This Data Protection and Data Security is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Data Protection and Data Security career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free

Level 2 Certificate in Understanding Data Protection and Data Security - CPD Certified
Delivered Online On Demand7 days
£329

Level 3 Certificate in Understanding Data Protection and Data Security

4.7(47)

By Academy for Health and Fitness

***24 Hour Limited Time Flash Sale*** Level 3 Certificate in Understanding Data Protection and Data Security Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter Are you a professional feeling stuck in your career, struggling to keep up with the ever-changing demands of the industry? Or perhaps you're a beginner, unsure of where to start or how to break into your desired field. Whichever stage you're in, our exclusive Level 3 Certificate in Understanding Data Protection and Data Security Bundle provides unique insights and tools that can help you achieve your goals. Designed to cater to the needs of both seasoned professionals and aspiring newcomers, our Level 3 Certificate in Understanding Data Protection and Data Security bundle is a comprehensive program that will equip you with the essential skills and knowledge you need to succeed. Whether you're looking to advance in your current role or embark on a new career journey, this bundle has everything you need to take your professional life to the next level. But that's not all. When you enrol in Level 3 Certificate in Understanding Data Protection and Data Security Online Training, you'll receive 30 CPD-Accredited PDF Certificates, Hard Copy Certificates, and our exclusive student ID card, all absolutely free. Courses Are Included In this Level 3 Certificate in Understanding Data Protection and Data Security Career Bundle: Course 01: Level 3 Certificate in Understanding Data Protection and Data Security Course 02: General Data Protection Regulation (GDPR) & Cyber Security Management Course 03: GDPR Training Course 04: Network Security Engineer Diploma - CPD Certified Course 05: Computer Networks Security from Scratch to Advanced Course 06: Network Security and Risk Management Course 07: Diploma in CompTIA Network+ Training at QLS Level 7 Course 08: CompTIA Network+ (N10-008) Course 09: CompTIA Network+ Certification (N10-007) Course 10: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 11: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 12: CompTIA Security+ (SY0-601) Course 13: CompTIA A+ (220-1001) Course 14: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 15: CompTIA PenTest+ (Ethical Hacking) Course 16: Learn Ethical Hacking From A-Z: Beginner To Expert Course 17: IT: Ethical Hacking & IT Security Course 18: Web Application Penetration Testing Course Course 19: Penetration Testing with OWASP ZAP: Mastery course Course 20: Data Management Training Course 21: Learn Ethical Hacking From A-Z: Beginner To Expert Course 22: Course 08: Financial Crime Officer Course 23: Quick Data Science Approach from Scratch Course 24: Deep Learning Neural Network with R Course 25: SQL Database Management Course 26: Learn MySQL from Scratch Course 27: Information Management Course 28: Data Center Training Essentials: Mechanical & Cooling Course 29: Computer Workstation Safety Training Course 30: Touch Typing Complete Training Diploma With a Level 3 Certificate in Understanding Data Protection and Data Security, you'll embark on an immersive learning experience that combines interactive lessons with voice-over audio, ensuring that you can learn from anywhere in the world, at your own pace. And with 24/7 tutor support, you'll never feel alone in your journey, whether you're a seasoned professional or a beginner. Don't let this opportunity pass you by. Enrol in the Level 3 Certificate in Understanding Data Protection and Data Security today and take the first step towards achieving your goals and dreams. Why buy this Level 3 Certificate in Understanding Data Protection and Data Security? Free CPD Accredited Certificate upon completion of Level 3 Certificate in Understanding Data Protection and Data Security Get a free student ID card with a Level 3 Certificate in Understanding Data Protection and Data Security Lifetime access to the Level 3 Certificate in Understanding Data Protection and Data Security course materials Get instant access to this Level 3 Certificate in Understanding Data Protection and Data Security course Learn Level 3 Certificate in Understanding Data Protection and Data Security from anywhere in the world 24/7 tutor support with the Level 3 Certificate in Understanding Data Protection and Data Security course. Start your learning journey straightaway with our Level 3 Certificate in Understanding Data Protection and Data Security Training! Level 3 Certificate in Understanding Data Protection and Data Security premium bundle consists of 30 precisely chosen courses on a wide range of topics essential for anyone looking to excel in this field. Each segment of the Level 3 Certificate in Understanding Data Protection and Data Security is meticulously designed to maximise learning and engagement, blending interactive content and audio-visual modules for a truly immersive experience. Certification You have to complete the assignment given at the end of the Level 3 Certificate in Understanding Data Protection and Data Security course. After passing the Level 3 Certificate in Understanding Data Protection and Data Security exam You will be entitled to claim a PDF & Hardcopy certificate accredited by CPD Quality standards completely free. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Level 3 Certificate in Understanding Data Protection and Data Security course is ideal for: Students seeking mastery in Level 3 Certificate in Understanding Data Protection and Data Security Professionals seeking to enhance Level 3 Certificate in Understanding Data Protection and Data Security skills Individuals looking for a Level 3 Certificate in Understanding Data Protection and Data Security-related career. Anyone passionate about the Level 3 Certificate in Understanding Data Protection and Data Security Requirements This Level 3 Certificate in Understanding Data Protection and Data Security doesn't require prior experience and is suitable for diverse learners. Career path This Level 3 Certificate in Understanding Data Protection and Data Security bundle will allow you to kickstart or take your career in the related sector to the next stage. Certificates CPD Accredited Digital certificate Digital certificate - Included CPD Accredited Hard copy certificate Hard copy certificate - Included If you are an international student, then you have to pay an additional 10 GBP for each certificate as an international delivery charge.

Level 3 Certificate in Understanding Data Protection and Data Security
Delivered Online On Demand5 days
£149

Data Protection and Data Security Level 2

4.9(27)

By Apex Learning

Overview Know how to protect personal data and ensure that neither you nor your clients experience fraud or serious criminal acts. This comprehensive course delivers all the information needed to follow the UK's Data Protection Act and safeguard confidential details from exposure. The Data Protection and Data Security Level 2 course is an invaluable overview of crucial data legislation for commercial businesses and individuals. You will be made aware of the latest threats and methods by which a computer can be illegally accessed, and vital material can be stolen. Alongside this, you will be enlightened as to the available security protocols, and the actions that you must legally take. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is this course for? There is no experience or previous qualifications required for enrolment on this Data Protection and Data Security Level 2. It is available to all students, of all academic backgrounds. Requirements Our Data Protection and Data Security Level 2 is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management , Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 2 sections • 6 lectures • 02:02:00 total length •GDPR Basics: 00:22:00 •GDPR Explained: 00:17:00 •Lawful Basis for Preparation: 00:29:00 •Rights and Breaches: 00:25:00 •Responsibilities and Obligations: 00:29:00 •Assignment - Data Protection and Data Security Level 2: 00:00:00

Data Protection and Data Security Level 2
Delivered Online On Demand2 hours 2 minutes
£12

Data Protection Level 3 and Data Security (GDPR) Training Certification

4.5(3)

By Studyhub UK

Overview The Data Protection Level 3 and Data Security (GDPR) Training Certification course provides a comprehensive understanding of GDPR regulations and the fundamentals of data protection and security. It covers GDPR basics, lawful basis for data processing, rights and breaches, as well as the responsibilities and obligations related to data protection. Learning Outcomes: Develop a solid understanding of GDPR regulations and their implications for data protection and security. Gain knowledge of the lawful basis for processing personal data in compliance with GDPR requirements. Understand the rights of individuals and how to handle data breaches effectively. Identify and fulfill the responsibilities and obligations placed on organizations regarding data protection. Acquire practical skills and strategies to ensure compliance with GDPR regulations and maintain data security. Why buy this Data Protection Level 3 and Data Security (GDPR) Training Certification? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Data Protection Level 3 and Data Security (GDPR) Training Certification you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Data Protection Level 3 and Data Security (GDPR) Training Certification does not require you to have any prior qualifications or experience. You can just enrol and start learning.  Prerequisites This Data Protection Level 3 and Data Security (GDPR) Training Certification was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Data Protection Level 3 and Data Security (GDPR) Training Certification is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Data Protection Level 3 and Data Security (GDPR) Training Certification GDPR Basics 00:22:00 GDPR Explained 00:17:00 Lawful Basis for Preparation 00:29:00 Rights and Breaches 00:25:00 Responsibilities and Obligations 00:29:00 Mock Exam Mock Exam - Data Protection Level 3 and Data Security (GDPR) Training Certification 00:20:00 Final Exam Final Exam - Data Protection Level 3 and Data Security (GDPR) Training Certification 00:20:00

Data Protection Level 3 and Data Security (GDPR) Training Certification
Delivered Online On Demand2 hours 42 minutes
£10.99

Payment Card Industry Data Security Standards (PCI DSS)

By Study Academy

Any organisation that processes, transmits or stores payment card data must comply with PCI DSS. Failure to comply will result in heavy fines, restrictions or permanent expulsion from the payment card acceptance programme. This course describes the Payment Card Industry Data Security Standard (PCI DSS) and explains what you need to be aware of and when to take action to be PCI DSS compliant.

Payment Card Industry Data Security Standards (PCI DSS)
Delivered Online On Demand1 hour
£30

Level 1 Certificate in Understanding Data Protection and Data Security

5.0(1)

By Empower UK Employment Training

Level 1 Certificate in Understanding Data Protection and Data Security Unlock the world of Data Protection with our Level 1 Certificate course. Explore Data Protection Applications and delve into the essential Principles of GDPR. Learn about the Rights of Data Subjects, Data Protection Impact Assessments, Data Breaches, and the vital Exemptions in Data Protection. Learning Outcomes: Define Data Protection applications. Explain GDPR principles in Data Protection. Implement rights of a Data Subject. Evaluate Data Protection Impact Assessments (DPIA). Implement procedures for handling data breaches. Evaluate exemptions in Data Protection. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Level 1 Certificate in Understanding Data Protection and Data Security Course Syllabus Data Protection Applications: Explore the practical applications of data protection principles in various contexts, including business operations, information handling, and technology usage. Principles of GDPR: Gain a comprehensive understanding of the General Data Protection Regulation (GDPR) and its fundamental principles, including lawful processing, data subject rights, and accountability. Rights of Data Subject: Learn about the rights afforded to data subjects under data protection laws, such as the right to access, rectify, and erase personal data, and understand how to address these rights in compliance. Data Protection Impact Assessment (DPIA): Discover the importance of conducting DPIAs to assess and mitigate data protection risks associated with data processing activities, and learn how to perform effective DPIAs. Data Breaches: Understand the concept of data breaches, their implications, and the legal requirements for reporting and managing data breaches in accordance with data protection regulations. Exemptions in Data Protection: Explore specific exemptions and exceptions within data protection laws, including scenarios where data protection regulations may not apply or where limitations exist.

Level 1 Certificate in Understanding Data Protection and Data Security
Delivered Online On Demand1 hour 36 minutes
£5

Certified Cloud Security Professional (CCSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management

Certified Cloud Security Professional (CCSP)
Delivered OnlineFlexible Dates
£4,549

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495

Mandatory Refresher Training

By Marigold Care Services

A CPD approved and CSTF aligned one-day training course for Healthcare Professional; covering Health & Safety topics; including Equality and Diversity; Fire Safety; Risk Assessment; Preventing Radicalisation; Data Security; Infection Control; Manual & Handling; Conflict Resolution; Safeguarding Vulnerable Adults; Safeguarding Children; Lone worker; Autism and Basic Life Support. This is an annual requirement.

Mandatory Refresher Training
Delivered In-Person in OldburyFlexible Dates
£90

IT (Information Technology) Support Technician

4.9(27)

By Apex Learning

IT Support Technician | Functional Skills IT | Encryption | Cloud Computing ( CompTIA Cloud+ (CV0-002)) | Cyber Security | Data Center Training | Cisco ASA Firewall and much more...

IT (Information Technology) Support Technician
Delivered Online On Demand3 days
£79