This radical way of building empathy is inspired by the work of the ‘Roots of Empathy’ organisation in Canada. Roots of Empathy (ROE) is dedicated to building caring and peaceful societies through the development of empathy in children. It is a parenting education programme for elementary school students (between the ages of 3 to 14 years) based on monthly visits to the classroom by a parent and infant from the school neighbourhood. Course Category Behaviour and Relationships Autism and Communication Meeting emotional needs Description This radical way of building empathy is inspired by the work of the ‘Roots of Empathy’ organisation in Canada. As Mary Gordon founder of this way of working describes: ‘By regular visits to the classroom of local mums and their children build an empathic relationship with the baby.MARY GORDON Roots of Empathy (ROE) is dedicated to building caring and peaceful societies through the development of empathy in children. It is a parenting education program for elementary school students (between the ages of 3 to 14 years) based on monthly visits to the classroom by a parent and infant from the school neighbourhood. We teach teachers and educators to help children to observe, over the school year, how their baby forms an attachment to his or her parent. Children are encouraged to record how the infants develop. The children learn to spot their babies cues and unique temperament, while celebrating developmental milestones. Children are prepared for responsible and responsive parenting as they increase their knowledge about human development, learning, and infant safety. The baby project program brings about the development of empathy and emotional literacy: As children learn to take the perspective of others they are less likely to hurt through bullying, exclusion, aggression, and violence. Children learn how to challenge cruelty and injustice in their own classroom. Messages of social inclusion and activities that are consensus-building contribute to a culture of caring that changes the tone of the classroom. Involving fathers and men provides rich models of male nurturance Testimonials ‘13% increase in empathy scores for our year 1s’ ‘Years 2s empathy had increased by 35%’ ‘Now that I am older I can be happy for other people’ (6 year old) ‘Everyone is special – thats the truth – but when I was small I thought its not fair when someone got a present and I didn’t’ (7 year old) Dramatic improvements in children taking responsibility for actions and being less defiant over the year of the project. Learning Objectives Understanding of method and approach to building empathy with babies Full understanding of background to this approach Practical advice received as to how to set up baby project in classrooms across school Who Is It For ? Teachers School leaders Project Coordinators Social Care Course Content We will provide theoretical and evidence back ground to impact of this work. We will describe existing UK school based work. We will inspire staff in attendance to want to actively engage in this work There may even be a baby to hold!!
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
LOOKING FOR: MG, YA AND ADULT SCI-FI / FANTASY, CHILDREN'S NON-FICTION After graduating from St Andrews University with a degree in English Literature and Art History, Maddy followed her love of literature to an internship at non-fiction literary agency Graham Maw Christie. At GMC, Maddy worked her way up to Agent and built a list of authors who wrote for both for adults and children, spanning history, tarot, and nature writing. An avid reader of anything magical, Maddy joined Madeleine Milburn in 2022 to build a list specialising in SFF. Maddy would like to see SFF across all genres for all ages, including: grim dark, thriller, historical, romance, cosy fantasy, sci-fi, epic, YA fantasy, dark academia, contemporary fantasy, fantasy middle-grade, mythology, fairy tale and queer fantasy. Inspiring children’s non-fiction. She loves worlds to get lost in, adventures that transform what it means to be a hero, and unique magic that offers as many problems as solutions. She likes books that make her cry and books that change her mind. Above all, when she finishes a story about another world, she wants it to have taught her a lesson which helps her live in this one. She loves all fantasy, but favours richly imagined, complex worlds with a history to discover and a future to protect. Worldbuilding is one of her favourite aspects of this genre and she is always looking for a new, dense world with series potential. Think Brandon Sanderson’s Cosmere or the Marvel Cinematic Universe – the bigger the better! Maddy also likes character-driven fantasy with a diverse cast to root for (or root against) and she wants to see a range of different relationships depicted authentically. She particularly like epics that dip into big, universal themes such as grief, climate change, or war and which ask impossible questions in the vein of R.F. Kuang or N.K. Jemisin. She is also excited by authors that play with form and language in a fantasy setting. In YA, she is looking for much the same as in an adult fantasy, but with younger protagonists and a closer focus on relationships. She wants to see the tropes she knows and loves in new and exciting forms and her favourite YA books often centre around belonging and becoming. She likes a dash of romance in everything, because she is sentimental that way, but it’s particularly important in the YA space. Sci-fi is a big passion of hers, especially when it comes with a strong hook. She is a huge fan of Becky Chamber’s The Long Way to a Small Angry Planet and Michaiah Johnson’s The Space Between Worlds. She likes space as a metaphor, and would love something that explores different alien species. Please send her your space operas and sci-fi romances which combine space, magic and mayhem! In fantasy middle grade, she favours whimsy and animal companions; she would love to follow a group of kids through magic school. She tends to look for plenty of humour with a strong friendship at the centre, and she wants middle grade stories which engage with the concerns of children growing up as well as offering an all-important escape (preferably on a dragon/unicorn’s back). She is also looking for children’s non-fiction for all ages. In this space, she wants something as creative as it is informative, and thinks diverse voices are increasingly important. Maddy would like you to submit a covering letter, one page synopsis and the first three chapters (Max 5000 words) of your completed manuscript in a single word document. (In addition to the paid sessions, Maddy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 17th September 2025
Whatever your position in the team, good communications skills are vital. They are at the centre of every work place interaction and can make a real difference to your work environment. Here’s a worthwhile day to increase your skills in this area. These skills will not only help your personal growth but they will increase job satisfaction and in turn relationships with adults and children. Course Category Team Building and Leadership Visioning and Problem Solving Strategic Work Early Years Description “The leaders who work most effectively, it seems to me, never say ‘I’. And that’s not because they have trained themselves not to say ‘I’. They don’t think ‘I’. They think ‘we’; they think ‘team’. They understand their job to be to make the team function. They accept responsibility and don’t sidestep it, but ‘we’ gets the credit…. This is what creates trust, what enables you to get the task done.”PETER DRUCKER. Whatever your position in the team, good communications skills are vital. They are at the centre of every work place interaction and can make a real difference to your work environment. Here’s a worthwhile day to increase your skills in this area. These skills will not only help your personal growth but they will increase job satisfaction and in turn relationships with adults and children. With these new skills you will also increase your abilities in co-operative partnerships and network building. Communication is at the core of what you do; it’s how we influence people. We use it for persuading others, creating alliances, gaining support, motivating others and teaching. Being good at communicating with others will allow you to influence them and this in turn will make you more effective whilst making your job easier. A lot of our time at work consists of acting, taking or giving instructions. Past research shows that lack of good communication at the work place is not uncommon. This has a high cost including tension amongst staff and lower trust levels and effectiveness. Problems can be caused when communication problems result in instructions being misinterpreted. A simple discussion can be turned into a conflict just by poor communication. What communication skills are needed in the 21st century for the most effective leaders and managers of schools, colleges and early years settings? Would the following qualities make sense to you in describing your communication with staff, parents and your wider community? a high concern for both people and outcomes a style motivated by relationship building the flexibility to change leadership styles depending on the challenge the ability to follow as well as lead a team leadership style< able to communicate and engage the emotional support of staff quiet leadership with restraint, modesty and tenacity Perhaps you would add to or challenge this list of attributes? How do you deal with ‘yes buts’ and those who don’t do what you ask them to do? How do you motivate? How do you encourage? During this training we will explore your communication in a range of challenging situations and build consensus around desirable communication skills. Testimonials Be the first to comment on this training… Learning Objectives To explore effective communication skills for leaders and managers Self reflection and feedback opportunities To develop and extend your repertoire of communication skills Deepen your understanding of team members who don’t do what you ask and expect them to do Who Is It For? Leaders and managers of schools, colleges and early years settings Course Content Exploration of typical challenging situations- skill practice Building Shared Vision for communication Opportunities to develop and extend your communication skills for leadership in a safe environment
About this Training Course Well engineers who are responsible for technically evaluating and authorizing programs for drilling or working over wells must have the required skills and competencies to safely design wells of varying nature. They also need to be able to confirm that well delivery and intervention programs generate intrinsic well control assurance. Such work programs must establish, verify, monitor and maintain suitable and sufficient barriers for the entire well lifecycle - from spud to abandonment. Well engineers must also be able to select a suitable drilling or workover rig, capable of safely performing the work within its operational envelope. This 3 full-day course aims to further develop and assess the knowledge required to work on and eventually, authorize a well delivery program as deemed fit for purpose. It also addresses elements of well control that must be embedded into well design, well work programming and equipment selection. This course is intended for participants who already have a sound understanding of the principles of the design and/or delivery of wells and with more than 3 years of relevant industry experience. Training Objectives By the end of this course, participants will be able to: Feel confident to design and plan drilling and workover activities while considering geological risks, formation pressures/strengths, and any integrity or well control concerns. Monitor wells operations and ensure that they can and will remain within the accepted design envelope. Assess risks and then apply mitigation or recovery methods in cases where design envelopes are threatened. Participants should be capable of assessing a drilling or workover program and then be able to answer the following key questions: Does the program delivery have a sound design and work plan that allows the well(s) to be drilled or worked over safely? Have we determined the appropriate kick tolerance for each open hole section and is it realistic for all drilling hazards that may be encountered? Have all drilling hazards been suitably assessed, and the associated risk mitigated to a level as low as reasonably practicable? Are there adequate, verifiable barriers in place throughout the operation and does everybody know their role and responsibility? And, as applicable, is the selected rig capable of implementing the work program? Target Audience This course is intended for personnel directly or indirectly involved in the preparation, review or authorization of drilling and workover programs. This includes: Well engineers and drilling supervisors who are responsible for planning and executing drilling and workover operations. Contractor well engineers, rig managers and other senior drilling staff. Senior well engineers and rig superintendents who are responsible for managing the delivery of a project or well. Technical authority holders who are responsible for licensing drilling and workover operations from a regulatory perspective. Assessment: A satisfactory command of critical knowledge and skills is assured by a 1+ hour closed book assessment. This assessment has a mix of multiple-choice questions (MCQs), calculations and answers that must be written up. The exam is taken electronically. Participants are provided with a suitable formula sheet. The pass mark for issuing a certificate is 70% and participants who are not successful will be issued with a certificate of attendance instead. Trainer Your expert course leader has over 45 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in the well engineering domain. After being employed in 1974 by Shell, one of the major oil & gas producing operators, he worked as an apprentice on drilling rigs in the Netherlands. After a year, he was sent for his first international assignment to the Sultanate of Oman where he climbed up the career ladder from Assistant Driller, to Driller, to wellsite Petroleum Engineer and eventually on-site Drilling Supervisor, actively engaged in the drilling of development and exploration wells in almost every corner of this vast desert area. At that time, drilling techniques were fairly basic and safety was just a buzz word, but such a situation propels learning and the fruits of 'doing-the-basics' are still reaped today when standing in front of a class. After some seven years in the Middle East, a series of other international assignments followed in places like the United Kingdom, Indonesia, Turkey, Denmark, China, Malaysia, and Russia. Apart from on-site drilling supervisory jobs on various types of drilling rigs (such as helicopter rigs) and working environments (such as jungle and artic), he was also assigned to research, to projects and to the company's learning centre. In research, he was responsible for promoting directional drilling and surveying and advised on the first horizontal wells being drilled, in projects, he was responsible for a high pressure drilling campaign in Nigeria while in the learning centre, he looked after the development of new engineers joining the company after graduating from university. He was also involved in international well control certification and served as chairman for a period of three years. In the last years of his active career, he worked again in China as a staff development manager, a position he nurtured because he was able to pass on his knowledge to a vast number of new employees once again. After retiring in 2015, he has delivered well engineering related courses in Australia, Indonesia, Brunei, Malaysia, China, South Korea, Thailand, India, Dubai, Qatar, Kuwait, The Netherlands, and the United States. The training he provides includes well control to obtain certification in drilling and well intervention, extended reach drilling, high pressure-high temperature drilling, stuck pipe prevention and a number of other ad-hoc courses. He thoroughly enjoys training and is keen to continue taking classes as an instructor for some time to come. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
If employees are involved in a crisis, and cannot speak for themselves, it is an essential responsibility of any organisation to be prepared to speak with families on their behalf. The Family Liaison in a Crisis training will provide practical skills for engaging with family members of staff during and after a crisis. The goal of this training is to equip each participant with the knowledge of common reactions to crisis events, creating a structure for conversations with family members, and implementing the family liaison role when a critical incident occurs. The training also includes aspects of self care as effective boundaries are an essential part of the family liaison role. This training can be either delivered face to face or as an interactive online course, with breakout rooms for participating in role plays and frequent discussions on working with families in multicultural teams. Learning Outcomes What Family Liaison is How it fits with a crisis management team Principles and skills for managing a professional relationship with families in distress Understand the framework of engaging and disengaging with families Become aware of the impact of social media on family liaison work Understand the risks of FLIC work Identify self-care strategies Create an action plan
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and who has the responsibility to achieve and improve the availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Choose an optimum site for mission-critical data centre based on current and future needs? Describe all components that are important for high availability in a data centre and how to effectively setup the data centre? Name and apply the various industry standards? Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc, and to select and apply them effectively to cost-efficiently enhance the high-availability of the data centre.? Review the electrical distribution system to avoid costly downtime? Enhance cooling capabilities and efficiency in the data centre by using existing and new techniques and technologies for the increased cooling requirements of the future? Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques? Create effective maintenance contracts with equipment suppliers ensuring the best return on investment? Setup effective data centre monitoring ensuring the right people get the right message? Ensure proper security measures, both procedural and technical, are established to safeguard your company's valuable information in the data centre The course will address how to setup and improve key aspects such as power, cooling, security, cabling, safety, etc., to ensure a high available data centre. It will also address key operations and maintenance aspects. The Data Centre, it?s Importance and Causes for DowntimeData Centre Standards and Best PracticesData Centre Location, Building and Construction Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup Raised Floor/Suspended Ceiling Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements Light Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) Power Infrastructure Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics Electro Magnetic Fields Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions Equipment Racks Rack standards, properties and selection criteria Security considerations Power rail/strip options Cooling Infrastructure Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment Water Supply Importance of water supply and application areas Backup water supply techniques Designing a Scalable Network Infrastructure The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements Fire Suppression Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices Data Centre Monitoring Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations Operational Security and Safety Practices Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage Labelling Choosing a labelling scheme Recommended labelling practices Network labelling Documentation How to setup proper documentation Document management policies and procedures Cleaning Cleaning practices for the data centre MTBF/MTTR Standards and definitions Calculation models The ?real? value Maintenance Contracts/SLA/OLAEXAM: Certified Data Centre Professional Additional course details: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview
The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles. Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you. The CIPT certification also holds accreditation under ISO 17024: 2012 About This Course What will you learn? Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to pre-empt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal. This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice. MODULE 1: Fundamentals of Information Privacy Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. MODULE 2: Privacy in Technology Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments. Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams. Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle. Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them. Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data. Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection. Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use. Prerequisites There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. What's Included? 1 years membership of the IAPP Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees Who Should Attend? The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialists Accreditation Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.
Leadership Foundations introduces the ideas and practical tools that help individuals, teams and organisations function more effectively. It is also known as 'Foundations of Success' and comprises the core principles and some initial resources that we share with all our clients: The Four Foundations of Leadership Personal responsibility and prioritisation The tyranny of the urgent & the secret of uninterrupted time Developing a planning and goal setting system Understanding Communication Styles Your personal goals and life balance 10 Magic Minutes daily planning