• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

292 Data Security courses

Data Protection (GDPR) Foundation Certificate

By CloudLearn

The Data Protection (GDPR) Foundation Certificate is the course for people who need a formal qualification to demonstrate a clear, concise and generic understanding of the UK General Data Protection Regulation and Data Protection Act 2018, in support of the practical knowledge often acquired in the workplace. It is suitable for the public, private and third sectors and will teach participants essential UK GDPR skills and sufficient knowledge to assist their organisation toward their data protection implementation and UK GDPR accountability requirement. The course is suitable for beginners but anyone with significant data protection knowledge will also get considerable benefit from it. This Foundation Certificate is an internationally recognised qualification, endorsed by TQUK, which is regulated by Ofqual, a UK Government department. Copies of the slides for the course are sent out a few days in advance. As the course covers a lot of ground in a short time we recommend attendees who know nothing about data protection to read through these. Note: This course is delivered live, online, using Zoom. It will be delivered 9.30 - 12.30 and 13.30 - 16.30 approx. Course Content Topics covered include: Background to Data Protection Legislation Scope Essential Definitions The Core of Data ProtectionPrinciplesLegal BasisTransparency/Privacy NoticesRights and Their Management Data Security Obligations and Breach Notification International Transfers (including cloud) Data Processors and ContractsDue Diligence Data Sharing and Joint ControllersAd Hoc and Planned Data Protection by DesignData Protection Impact Assessments Data Protection Officers Accountability and Action Plan The ICO and Enforcement Questions/discussion throughout the course Suitability - Who should attend? Anyone with an interest in data protection or needing a detailed introduction. Anyone involved in supporting data protection compliance in an organisation. Outcome / Qualification etc. Learning Outcomes: Be aware of the importance of data protection legislation and the GDPR Understand the key obligations of the GDPR and DPA Understand the rationale behind a data protection audit and gap analysis Assist with policies and procedures required for data protection compliance and accountability

Data Protection (GDPR) Foundation Certificate
Delivered OnlineFlexible Dates
£300

Salesforce Implement and Manage Tableau CRM (ANC301)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is ideal for integration specialists or Salesforce Administrators who want to learn more about connecting and securing data in Tableau CRM. This course is also great for business analysts or developers interested in creating advanced dashboards. Overview When you complete this course, you will be able to: Determine your user, data, and security requirements, and establish a development process. Set up apps and control what users can do in Tableau CRM by assigning them licenses, permission sets, and app permissions. Load external data to Tableau CRM. Create and run dataflows to load Salesforce data, and join it with data from other datasets. Understand and use Data Sync effectively. Understand Recipes and Data Prep. Understand and implement data security in Tableau CRM, and override security for implementation and testing. Understand how filters on dashboards function and be able to use interactions when necessary. Understand a dashboard's JSON file. Explain the process of dashboard queries and modify a query to meet specific analytic requirements. Modify dataset metadata. Take your Tableau CRM skills to the next level. In this 3-day, expert-led class, you?ll learn how to develop and implement a Tableau CRM environment that contains both Salesforce and non-Salesforce data. Our team of experts will walk you through Tableau CRM features and settings, user setup, how to load and transform data, data security, and how to modify queries to customize dashboards so you can work more efficiently, spot trends, and predict outcomes faster. Discovery and Planning Discovery Meeting Establishing Your Users and Development Process Set Up Users and Apps Overview of User Access on the Tableau CRM Platform Creating Tableau CRM Permission Sets Assigning Licenses and Permission Sets to Users Creating and Sharing Tableau CRM Apps Connect Data Overview of Connecting Data Data Mapping Overview of the Dataflow Process Designing a Dataflow Loading External CSV Data Creating Dataflows Optimizing Dataflows Running, Monitoring, and Scheduling a Dataflow Preparing Datasets with Recipes with Data Prep Data Connectors Additional Transformations Data Security Overview of Security in Tableau CRM Determining Security Requirements Overview of Using Predicate Filters Implementing Ownership-Based Row-Level Security Implementing Role-Based Row-Level Security Implementing Team-Based Row-Level Security Overriding Security for Implementation and Testing Sharing Inheritance Extended Metadata in a Dataset Overview of Extended Metadata (XMD) Updating Field Metadata Adding Quick Action Menus for Records in Tableau CRM Dashboard Templates and Mobile Dashboards Overview of Tableau CRM Dashboard Templates Overview of JSON for Dashboards Building a Dashboard Using a Template Optimizing Dashboards for a Mobile Device Bindings in Dashboards Understanding Filters in Lenses and Dashboards Multi-Dataset Dashboards Filters with Interactions Custom Queries Query Modification Overview of Modifying Queries Maximizing the Use of the Compare Table Salesforce Analytics Query Language (SAQL) SAQL Queries in a Tableau CRM Dashboard Additional course details: Nexus Humans Salesforce Implement and Manage Tableau CRM (ANC301) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Implement and Manage Tableau CRM (ANC301) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Implement and Manage Tableau CRM (ANC301)
Delivered OnlineFlexible Dates
Price on Enquiry

Cloud Operations on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview Identify the AWS services that support the different phases of Operational Excellence, an AWS Well-Architected Framework pillar Manage access to AWS resources using AWS accounts and organizations and AWS Identity and Access Management (IAM) Maintain an inventory of in-use AWS resources by using AWS services, such as AWS Systems Manager, AWS CloudTrail, and AWS Config Develop a resource deployment strategy using metadata tags, Amazon Machine Images (AMIs), and AWS Control Tower to deploy and maintain an AWS cloud environment Automate resource deployment by using AWS services, such as AWS CloudFormation and AWS Service Catalog Use AWS services to manage AWS resources through CloudOps lifecycle processes, such as deployments and patches Configure a highly available cloud environment that uses AWS services, such as Amazon Route 53 and Elastic Load Balancing, to route traffic for optimal latency and performance Configure AWS Auto Scaling and Amazon EC2 Auto Scaling to scale out your cloud environment based on demand Use Amazon CloudWatch and associated features, such as alarms, dashboards, and widgets, to monitor your cloud environment Manage permissions and track activity in your cloud environment by using AWS services, such as AWS CloudTrail and AWS Config Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service State the purpose, benefits, and appropriate use cases for mountable storage in your AWS Cloud environment Explain the operational characteristics of object storage in the AWS Cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier Build a comprehensive cost model to help gather, optimize, and predict your cloud costs by using services such as AWS Cost Explorer and the AWS Cost & Usage Report This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems. The course also covers specific AWS features, tools, and best practices related to these functions. Prerequisites Successfully completed the AWS Technical Essentials course Background in either software development or systems administration Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows Basic knowledge of networking protocols (TCP/IP, HTTP) 1 - Introduction to Cloud Operations on AWS What is Cloud Operations AWS Well-Architected Framework AWS Well-Architected Tool 2 - Access Management AWS Identity and Access Management (IAM) Resources, accounts, and AWS Organizations 3 - System Discovery Methods to interact with AWS services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config 4 - Deploy and Update Resources Cloud Operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower 5 - Automate Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Hands-On Lab: Infrastructure as Code 6 - Manage Resources AWS Systems Manager Hands-On Lab: Operations as Code 7 - Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 8 - Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager 9 - Monitor and Maintain System Health Monitoring and maintaining healthy workloads Monitoring AWS infrastructure Monitoring applications Hands-On Lab: Monitor Applications and Infrastructure 10 - Data Security and System Auditing Maintaining a strong identity and access foundation Implementing detection mechanisms Automating incident remediation 11 - Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC 12 - Mountable Storage Configuring Amazon Elastic Block Store (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Hands-On Lab: Automating with AWS Backup for Archiving and Recovery 13 - Object Storage Deploying Amazon Simple Storage Service (Amazon S3) Managing storage lifecycles on Amazon S3 14 - Cost Reporting, Alerts, and Optimization Gaining AWS cost awareness Using control mechanisms for cost management Optimizing your AWS spend and usage Hands-On Lab: Capstone lab for CloudOps Additional course details: Nexus Humans Cloud Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloud Operations on AWS
Delivered OnlineFlexible Dates
£2,025

Digital Transformation: What Are Cryptocurrency and Blockchain?

5.0(1)

By Enspark

Blockchain presents many opportunities for businesses around the world, though many people are still trying to wrap their heads around what it means and how it works. This easy-to-digest video explains all of this, and why it is an important aspect of knowledge around technology today. Length: 3:40 Learning Objectives Analyze the core principles of blockchain technology and the significance of blockchain's incorruptibility and ability to prevent fraud and data tampering.;Evaluate the diverse applications of blockchain across industries and explore how blockchain facilitates microtransactions and automates machine-to-machine transactions, making previously unfeasible payment models practical.;Assess the transformative potential of blockchain in loyalty programs and customer engagement strategies and its contributions to inventory management, asset tracking, and supply chain integrity, exemplified by its implementation in major organizations.;Anticipate the ongoing disruption, innovation, and changes blockchain technology will bring to the realms of commerce, marketing, and data security.

Digital Transformation: What Are Cryptocurrency and Blockchain?
Delivered Online On Demand5 minutes
£4.95

Cyber Risk Framework - Protect Assets

By Study Plex

This is a multi-part series to assist the participant in evaluating all the necessary components to conducting a cyber risk assessment. The purpose of a cyber risk assessment lies in the objectives of ensuring: Availability Confidentiality Integrity of data Integrity of processing We utilize the National Institute of Standards and Technology (NIST) cybersecurity framework to walk through various elements that should be considered with a cyber risk assessment. A previous segment delved into the first function outlined by NIST which is the “Identify” concept. This segment will delve into the “protect” function. We try to protect our information assets and systems against attack. Protection strategies can be the first line of defense, and breaches usually are a failure of protection strategies. Utilizing the concepts of categories and sub-categories an organization can effectively begin to map out their cyber risk process. The sub-categories of the protect function include: Awareness control Awareness and training Data security Information protection and procedures Maintenance Protective technologies This segment is dedicated to delving into each of these sub-categories and outlining possible considerations for protecting information and cyber assets. Learning Objectives Explore the objectives of a cyber risk management assessment. Explore security control designations. Explore the concept of baseline controls. Identify the requirements of ensuring awareness control within the protect function. Identify the requirements of ensuring awareness and training within the protect function. Identify the requirements of ensuring data security within the protect function. Identify the requirements of ensuring information protection and procedures within the protect function. Identify the requirements of ensuring maintenance within the protect function. Identify the requirements of ensuring protective technology within the protect function. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction and Objectives to Cyber Risk Assessment: Protect 00:04:00 Identify Critical Assets 00:07:00 Prioritize 00:07:00 Prioritize with Criticality 00:16:00 Prioritize Further Utilizing Impacts 00:10:00 Prioritize Further Utilizing Impacts Continued 00:10:00 Applying Likelihood to Impact 00:02:00 Integrating Priority with Impact/Likelihood 00:10:00 Summary 00:10:00 Supplementary Resources Supplementary Resources - Cyber Risk Framework - Protect Assets 00:00:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Cyber Risk Framework - Protect Assets
Delivered Online On Demand
£19.99

GDPR - Your Passport to Data Privacy's Evolving Landscape! The digital realm hums with the constant exchange of information, and safeguarding it has become paramount. The EU's General Data Protection Regulation (GDPR) stands as a cornerstone in this data-driven era, empowering individuals with control over their personal information and dictating responsible business data handling. Mastering its intricacies unlocks a wealth of opportunities in this burgeoning field. Consider these staggering figures: the UK data protection market alone is forecast to reach a staggering £8.8 billion by 2025, fuelled by the ever-growing need for GDPR compliance expertise. This translates to a thriving job market ripe for savvy individuals with the necessary knowledge. Empower yourself, safeguard data, and unlock your potential in the ever-evolving world of data privacy. Enrol in the GDPR Certificate course today and take your first step towards a rewarding career in this crucial domain. You will Learn The Following Things: Grasp the core aim and guiding principles of the GDPR. Navigate the nuances of data processing, consent mechanisms, and individual rights. Understand the roles and responsibilities of data controllers and processors. Implement robust data security measures to safeguard personal information. Fulfil the obligations of processors under the GDPR framework. This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this GDPR Certificate. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-to-one support from a dedicated tutor throughout your course. Study online - whenever and wherever you want. Instant Digital/ PDF certificate 100% money back guarantee 12 months access Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement After completing the GDPR Certificate course, you will receive your CPD-accredited Digital/PDF Certificate for £5.99. To get the hardcopy certificate for £12.99, you must also pay the shipping charge of just £3.99 (UK) and £10.99 (International). Who Is This Course for? Business owners and managers: Ensure your enterprise confidently navigates GDPR compliance. Data protection professionals: Enhance your skillset and stay ahead of the curve in this dynamic field. IT Specialists: Deepen your understanding of data security best practices. Marketing and Sales Professionals: Gain essential knowledge for responsible data-driven campaigns. HR Professionals: Equip yourself to handle employee data with utmost accuracy and compliance. Requirements There is no prerequisite to enrol in this course. You don't need any educational qualification or experience to enrol in the GDPR Certificate course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path Data Protection Officer: £45K to £75K/year. GDPR Consultant: £35K to £55K/year. Privacy Analyst: £30K to £45K/year. Information Security Specialist: £28K to £40K/year. Compliance Manager: £40K to £60K/year. Course Curriculum Module 01: GDPR Aim Module 01: GDPR Aim 00:30:00 Module 02: GDPR Definition and Principles Module 02: GDPR Definition and Principles 00:30:00 Module 03: Processing, Consent and Subject Rights Module 03: Processing, Consent and Subject Rights 00:30:00 Module 04: Data Controller, Security and Processor Obligations Module 04: Data Controller, Security and Processor Obligations 00:30:00

GDPR Certificate
Delivered Online On Demand2 hours
£11

European Data Protection & Privacy Programme Management - DPO Ready

By Training Centre

  European Data Protection   Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.   The training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program. Privacy Programme Management   Principles of Privacy Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organisation through process and technology-regardless of jurisdiction or industry.   The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Manager (CIPM) certification programme. Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle.  About This Course   Delivered in a modular format, this four day course covers   Days 1 & 2   Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework.  Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories.  Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors.  Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities.  Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor.  Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches.  Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer.  Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations.  Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance.  Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing.    Days 3 & 4   Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management.  Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks.  Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy.  Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments.  Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation.  Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten.  Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs.  Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design.  Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach.  Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP SITE What's Included?   1 years membership of the IAPP Breakfast, Lunch, mid-morning and afternoon snacks, teas, coffees Official Study Guides* Official Participant Guides* Official Exam Q&A's* Both exam fees * In electronic format for Live Online and hard copy for Classroom delegates     Who Should Attend?   This course is suitable for aspiring Data Protection Officers, as well as Information Security Managers, Lawyers, Data Managers, Analysts and Risk Teams. Provided by Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

European Data Protection & Privacy Programme Management - DPO Ready
Delivered OnlineFlexible Dates
£2,750

Complete Python from Scratch: Start your career in Python 3+

By Course Cloud

Kickstart your career with our Complete Python from Scratch: Start your career in Python 3+ course. Python is an all-purpose language with one of the biggest and abundant library features. It is used for a wide range of purposes such as web development, scripting, testing, app development, and data science. So it's one of the most sought after skills by employers. The Complete Python from Scratch: Start your career in Python 3+ course is designed to give you a complete understanding of the programming language right from setup to advanced level applications.The experience will provide you with the chance to work in a variety of sectors including web development, machine learning, data security, analytics and so much more. It will prepare you with sound theoretical and practical knowledge of Python programming that will prepare you to work with evidence-based strategies. If you are keen to equip yourself with knowledge of programming with Python and make a strategic career intervention, then choose our Complete Python from Scratch: Start your career in Python 3+ course. Upon completion of this CPD accredited course, you will be awarded a certificate of completion, as proof of your expertise in this field, and you can show off your certificate in your LinkedIn profile and in your resume to impress employers and boost your career. Our Complete Python from Scratch: Start your career in Python 3+ course is packed with 14 modules, with a total of 18 hours of learning materials. You will be able to study this course at your own pace, from anywhere and at any time. Enrol today and upgrade your knowledge on Python programming to lead a more prosperous life.

Complete Python from Scratch: Start your career in Python 3+
Delivered Online On Demand
£25

IT Security & Cyber Security

5.0(10)

By Apex Learning

11 in 1 "IT Security & Cyber Security" Bundle only at £53 Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This IT Security & Cyber Security bundle will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate your skills for your next promotion, this IT Security & Cyber Security bundle will help you stay ahead of the pack. Throughout the IT Security & Cyber Security programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in the relevant job sector. Along with this IT Security & Cyber Security course, you will get 10 premium courses, an originalhardcopy, 11 PDF certificates (Main Course + Additional Courses) Student ID card as gifts. This IT Security & Cyber Security Bundle Consists of the following Premium courses: Course 01: Computer Networks Security Course 02: Cyber Security Incident Handling and Incident Response Course 03: CyberSecurity Law Online Course Course 04: Crash Course on Ecommerce Security Course 05: Linux Security and Hardening Course 06: Secure Programming of Web Applications Course 07: Complete Web Application Penetration Testing & Security Course 08: Data Protection and Data Security Level 2 Course 09: Information Management Course 10: Security Management Advanced Diploma Course 11: Internet of Things Hacking Enrol now in IT Security & Cyber Security to advance your career, and use the premium study materials from Apex Learning. How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your IT Security & Cyber Security expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn from any place in your own time without travelling for classes. Curriculum of Bundle Course 01: Computer Networks Security Introduction Section 01: An Introduction to Computer Networks Section 02: ISO/OSI Model Section 03: TCP/IP Protocols Section 04: Wireless Networks Section 05: Network Security Section 06: Firewalls and Honeypots Section 07: Intrusion Detection and Prevention System Section 08: Wireless Network Security Section 09: Physical Security and Incident Handling Section 10: Network Security: Conclusion Course 02: Cyber Security Incident Handling and Incident Response Cyber Security Incident Handling and Incident Response Section 01: An Introduction to Incident Handling Section 02: Preparation for an Incident Section 03: Identification Section 04: Containment Section 05: Eradication Section 06: Recovery Phase Section 07: Final Thoughts Course 03: CyberSecurity Law Online Course Module 01: Introduction to Cyber Law Module 02: Cyber Law, Cyber Ethics and Online Gambling Module 03: Cyber Crime, Cyber Security and Trust in Cyberspace Module 04: Threat Factors: Computer as a Target Module 05: Threats to Cyber Security by Criminals and Organised Crimes Module 06: Threats to Cybersecurity by Hacktivists and Nation-States Module 07: Cyberterrorism Module 08: An Evolving Threat: The Deep Web Module 9: Fraud Module 10: Jurisdiction Course 04: Crash Course on Ecommerce Security Unit 01: Introduction and Types of Ecommerce Unit 02: Ecommerce SEO Unit 03: Ecommerce Demo Unit 04: Ecommerce Website Vulnerability and Security Risk Scanning Unit 05: Basic Terms of Ecommerce Unit 06: Ecommerce Fraud Unit 07: Ecommerce Fraud Prevention Course 05: Linux Security and Hardening Unit 01: Course Overview and Downloads Unit 02: General Security Unit 03: Physical Security Unit 04: Account Security Unit 05: Network Security Unit 06: File System Security Unit 07: Additional Resources Course 06: Secure Programming of Web Applications Section 01: Introduction Section 02: Well-known Vulnerabilities and Secure Programming Section 03: Conclusion and Summary Course 07: Complete Web Application Penetration Testing & Security Unit 01: Introduction Unit 02: BE PREPARED Unit 03: WEB APPLICATION TECHNOLOGIES Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS Unit 05: CROSS-SITE SCRIPTING ATTACKS - XSS Unit 06: SQL INJECTION ATTACKS - EXPLOITATIONS Unit 07: CROSS SITE REQUEST FORGERY - XSRF Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS Unit 09: CLIENT SIDE SECURITY TESTING Unit 10: FILE RELATED VULNERABILITIES Unit 11: XML EXTERNAL ENTITY ATTACKS - XXE Course 08: Data Protection and Data Security Level 2 GDPR Basics GDPR Explained Lawful Basis for Preparation Rights and Breaches Responsibilities and Obligations Course 09: Information Management Module 01: Introduction to Information Management Module 02: Information Management Strategy Module 03: Databases and Information Management Module 04: Management Information Systems (MIS) Module 05: Auditing Information Systems Module 06: Ethical and Social Issues and Data Protection Course 10: Security Management Advanced Diploma Module 01: Introduction to Security Management Module 02: Organisational Security Management Module 03: Security Risk Analysis and Risk Reduction Module 04: Physical and Information Security Protection Module 05: Business Resilience and Crisis Management Module 06: Cyber Security and Fraud Prevention Module 07: Security Investigations and Threat Awareness Module 08: Laws and Regulations Course 11: Internet of Things Hacking Module 01: IoT Part 1 Module 02: IoT Part 2 Module 03: IoT Hacking Tools and Technique Module 04: IoT Hacking Tools and Technique Part 2 Module 05: IoT Scenario Part 1 Module 06: IoT Scenario Part 2 Module 07: Smart Devices Module 08: AWS Basics CPD 115 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this IT Security & Cyber Security bundle. Requirements Our IT Security & Cyber Security is fully compatible with PCs, Macs, laptops, tablets and Smartphone devices. Career path Having this IT Security & Cyber Security expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (IT: IT Security & Cyber Security) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

IT Security & Cyber Security
Delivered Online On Demand
£53

Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

Cyber Safe
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£30
1...45678...30