Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize the basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize the alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze a Workspace ONE UEM deployment Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionalities that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform, endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge for effectively implementing Workspace ONE UEM.Also, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to securely distribute business-critical applications from any device and to configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure Workspace ONE Access and Workspace ONE UEM system and productivity integrations.You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Overall, the course lays out the foundational principles of identity and access management.Please note - This course is a combination of the VMware Workspace ONE: Skills for UEM and the VMware Workspace ONE: Integrations course. Course Introduction Introductions and course logistics Course objectives Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for the Workspace ONE solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process of integrating with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize the platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use case for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable. Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway Describe the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List view and the Details view. Analyze endpoint deployment and compliance data from the Workspace ONE UEM Monitor page. Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline the authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application SSO authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile SSO Outline the mobile SSO workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Workspace ONE: Deploy and Manage [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Workspace ONE: Deploy and Manage [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course Overview The GDPR Certificate course provides an essential foundation for understanding the General Data Protection Regulation (GDPR) and its implications for businesses and individuals. This course offers a comprehensive guide to GDPR principles, legal obligations, and the responsibilities of data controllers and processors. Learners will develop a strong grasp of compliance strategies, risk management practices, and data subject rights. By completing this course, individuals will gain the knowledge needed to support GDPR compliance within organisations, enhancing both personal expertise and professional credibility. The course is designed to be accessible and engaging, making it ideal for those entering data protection roles, as well as professionals seeking to update their knowledge. Upon successful completion, learners will be better equipped to contribute to organisational governance, reduce compliance risks, and promote ethical data handling practices across various industries. Course Description This GDPR Certificate course delves deeply into the key areas of General Data Protection Regulation, offering a structured exploration of its background, core principles, and practical application. Learners will study topics such as lawful bases for processing, data subject rights, breach management, and the roles of the Information Commissioner's Office (ICO). The course also covers organisational responsibilities including data protection impact assessments (DPIAs) and record-keeping requirements. Designed to provide a professional and comprehensive learning experience, this course builds analytical skills and regulatory awareness, preparing individuals to address GDPR obligations confidently. Through detailed explanations and real-world scenarios, learners will develop the ability to interpret legislation, support compliance strategies, and foster a culture of data protection within their workplace. The course is well-suited for a wide range of learners, from complete beginners to professionals needing formalised GDPR training to enhance their career prospects. Course Modules Module 01: Introduction to GDPR Module 02: Key Terms and Definitions Module 03: Principles of Data Processing Module 04: Rights of Data Subjects Module 05: Lawful Bases for Data Processing Module 06: Roles and Responsibilities of Data Controllers and Processors Module 07: Data Protection Impact Assessments (DPIAs) Module 08: Data Breach Management and Notification Module 09: Accountability and Record Keeping Module 10: Enforcement, Penalties, and the Role of the ICO (See full curriculum) Who is this course for? Individuals seeking to understand and apply GDPR principles. Professionals aiming to ensure their organisation’s data compliance. Beginners with an interest in data protection and privacy regulations. Compliance officers, administrators, or managers looking to enhance regulatory knowledge. Business owners wishing to safeguard organisational data practices. Career Path Data Protection Officer (DPO) GDPR Compliance Specialist Information Governance Officer Legal and Compliance Consultant Risk and Compliance Analyst Data Privacy Advisor Administrative roles requiring data protection expertise
This course is aimed at health and social care staff who are both registered and unregistered, who work with or support individuals where safeguarding concerns are a possibility.
KYC, AML, & GDPR Training Course Overview This KYC, AML, and GDPR Training course offers a comprehensive introduction to the regulatory frameworks governing financial institutions and businesses. Learners will gain in-depth knowledge of Know Your Customer (KYC) protocols, Anti-Money Laundering (AML) procedures, and GDPR compliance, understanding their importance in maintaining legal and ethical business operations. The course equips professionals with the necessary skills to navigate the regulatory landscape, safeguard businesses against financial crime, and ensure compliance with data privacy laws. By the end of the course, learners will be well-prepared to apply their knowledge in real-world business environments, contributing to secure and compliant operations. Course Description This course delves into the key principles of KYC, AML, and GDPR, exploring their relevance across different industries. Learners will understand the processes involved in customer due diligence, how to identify and prevent money laundering, and how businesses must comply with data privacy regulations. The course provides a structured learning experience, focusing on the practical application of compliance measures, exploring case studies, and providing insights into current and future trends in the industry. Upon completion, participants will possess the expertise to implement these regulations within their organisations, mitigate risks, and contribute to a culture of compliance. KYC, AML, & GDPR Training Curriculum Module 01: Introduction to KYC Module 02: Customer Due Diligence Module 03: AML (Anti-Money Laundering) Module 04: KYC, AML, and Data Privacy Regulations for Business Operations in the United Kingdom Module 05: Regulations to be Complied by Industries Module 06: Methods for Carrying out KYC and AML and the Future of KYC Compliance (See full curriculum) Who is this course for? Individuals seeking to understand financial regulations and compliance. Professionals aiming to develop their knowledge of KYC, AML, and GDPR in their career. Beginners with an interest in the financial services or regulatory compliance industry. Business owners or managers who want to ensure their organisation’s compliance. Career Path Compliance Officer Anti-Money Laundering Specialist KYC Analyst Data Protection Officer Regulatory Compliance Consultant Risk Management Professional
This driver CPC course Vehicle Roadworthiness & Load Safety is suitable for LGV drivers only and will cover: Requirements, Walk Around Checks, Legal Requirements, Additional Checks, Safety Equipment, Defect Reporting, Maintenance, Prohibitions, Considerations Before Loading, Overloading, Load Distribution, Load Security, Vehicle Dimensions, Loading Equipment.
Know Your Customer (KYC) Course Overview: The "Know Your Customer (KYC)" course is designed to provide learners with a comprehensive understanding of KYC processes, their relevance in financial services, and the associated regulatory requirements. Covering vital topics such as customer identification, anti-money laundering (AML) strategies, and the protection of data privacy, this course equips learners with the knowledge needed to navigate the complex landscape of KYC compliance. By the end of the course, learners will be able to apply these concepts in their daily professional roles, ensuring adherence to industry regulations and maintaining robust compliance standards. Course Description: This course delves deeper into the principles of KYC, focusing on customer due diligence, risk management, and anti-money laundering (AML) practices that safeguard organisations against financial crimes. Learners will explore the relevant regulations governing KYC in the UK and the methods used to conduct thorough customer verification. Additionally, the course provides insights into data privacy requirements, helping businesses mitigate risks and comply with industry standards. With interactive learning modules and assessments, this course ensures that participants gain practical knowledge, enhance their professional skills, and build a strong foundation in KYC and AML compliance. Know Your Customer (KYC) Curriculum: Module 01: Introduction to KYC Module 02: Customer Due Diligence Module 03: AML (Anti-Money Laundering) Module 04: KYC, AML, and Data Privacy Regulations for Business Operations in the United Kingdom Module 05: Regulations to be Complied by Industries Module 06: Methods for Carrying Out KYC and AML and the Future of KYC Compliance (See full curriculum) Who is this course for? Individuals seeking to understand KYC compliance Professionals aiming to enhance their knowledge of financial regulations Beginners with an interest in finance and regulatory compliance Anyone looking to advance their career in risk management or compliance Career Path Compliance Officer Anti-Money Laundering (AML) Specialist Risk Management Consultant KYC Analyst Financial Compliance Advisor
Course Overview This comprehensive Anti-Money Laundering (AML) Training Level 5 course offers a deep exploration of the UK’s anti-money laundering regulations and reporting requirements. Learners will gain a solid understanding of money laundering typologies, the legal framework surrounding the Proceeds of Crime Act 2002, and the roles and responsibilities of compliance professionals. Through structured learning, this course prepares individuals to effectively identify, assess, and report suspicious activity within financial and non-financial institutions. Ideal for professionals in banking, finance, legal, and corporate sectors, the course builds awareness of AML obligations and supports regulatory alignment. Upon completion, learners will possess the theoretical knowledge required to contribute to financial crime prevention, risk management, and organisational integrity. Course Description The Anti-Money Laundering (AML) Training Level 5 course is designed to equip learners with an in-depth understanding of regulatory requirements, reporting procedures, and due diligence obligations. The course examines key legislation such as the Proceeds of Crime Act 2002, and outlines the development of AML frameworks across sectors. Learners will study the responsibilities of the Money Laundering Reporting Officer (MLRO), the importance of record-keeping, and how to implement a risk-based approach in compliance programmes. Emphasis is placed on identifying suspicious transactions, maintaining regulatory standards, and fostering awareness throughout an organisation. Whether preparing for a role in compliance or enhancing existing knowledge, this course supports learners in aligning with UK regulatory expectations and strengthening their ability to safeguard businesses from financial crime. Course Modules: Module 01: Introduction to Money Laundering Module 02: Proceeds of Crime Act 2002 Module 03: Development of Anti-Money Laundering Regulation Module 04: Responsibility of the Money Laundering Reporting Office Module 05: Risk-based Approach Module 06: Customer Due Diligence Module 07: Record Keeping Module 08: Suspicious Conduct and Transactions Module 09: Awareness and Training (See full curriculum) Who is this course for? Individuals seeking to understand financial crime regulations and prevention measures. Professionals aiming to transition into compliance, audit, or financial regulation roles. Beginners with an interest in anti-money laundering, financial oversight, or legal studies. Employees responsible for ensuring compliance within financial or legal institutions. Career Path Anti-Money Laundering Officer Compliance Analyst Risk and Governance Associate Financial Crime Consultant Internal Auditor Regulatory Affairs Specialist Legal and Compliance Assistant
Duration 0.25 Days 1.5 CPD hours This course is intended for This course is intended for individuals who want to learn how to stay safe online. Overview Upon successful completion of this course, students will be able to understand how to avoid social engineering and stay safe online. In this course, students will learn how to use the internet safely, and learn traps to avoid. The need for security Compliance Recognize social engineering and other attacks Secure Devices Passwords Identify viruses and malware Use the Internet safely Browsing the web Email Social media Cloud services Additional course details: Nexus Humans CyberSAFE: Staying Safe in a Digital World training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CyberSAFE: Staying Safe in a Digital World course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Board members face a huge amount of information and review before the board meeting. Here is step-by-step process for mastering your board meeting prep challenge.