• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

267 Courses in Edinburgh delivered Live Online

ICA Advanced Certificate in Business Compliance

By International Compliance Association

ICA Advanced Certificate in Business Compliance The ICA Advanced Certificate in Business Compliance has been specifically designed for those working outside financial services. The need for guidance and training in meeting regulatory requirements extends to many industry sectors including oil and gas, aerospace, pharmaceuticals, telecoms, and manufacturing. This course will enable practitioners working in areas such as these to gain knowledge of the essentials of compliance in a practical business context as well as understand the roles of both the compliance function and compliance professionals. The Advanced Certificate will develop the compliance/risk management knowledge and skills of individuals and thereby help to enhance the overall reputation and performance of their firms. Benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Upon successful completion of this course, students will be awarded the ICA Advanced Certificate in Business Compliance and will be able to use the designation - Adv.Cert(Bus.Comp). This qualification is awarded in association with Alliance Manchester Business School, the University of Manchester. What will you learn? The context of compliance and its origins Building an effective control framework The skills needed to be an effective compliance professional Risk management, alert systems and investigations Managing financial crime risk Creating competitive advantage How will you be assessed? Assessed by a one-hour, question-based exam and one research-based assignment

ICA Advanced Certificate in Business Compliance
Delivered OnlineFlexible Dates
£1,950

Better Business Cases Foundation & Practitioner: In-House

By IIL Europe Ltd

Better Business Cases™ Foundation and Practitioner: In-House Training Using this best-practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the combined foundation and practitioner course is to develop a candidate's ability to deliver a comprehensive business case through encouraging expanded knowledge to guide the practical application of theoretical foundations. Upon the completion of this course, a candidate will be able to start applying the model to a real business case development project. The outline presented in the course overview will be addressed in the first 2 days, with the Foundation exam conducted on the morning of Day 3. Then the topics will be revisited at a deeper level, for 2 more days, with the Practitioner exam conducted on the afternoon of Day 5. What you will Learn At the end of this program, you will be able to: Develop the lifecycle of a business case and establish the relationships between the five cases Apply the steps in the business case development framework, in order to support the production of a business case, using the Five Case Model, for a given scenario. Overview of Better Business Cases Alignment with the strategic planning process Importance of the Business Case using the Five Case Model Overview of the Five Case Model Purpose of the key stages in the development of a spending proposal Purpose of a Business Justification Case Business Case Development Process Purpose of project / programme assurance and assurance reviews Responsibility for producing the Business Case Determining the Strategic Context and Undertaking the Strategic Assessment Scoping the Scheme and Preparing the Strategic Outline Case Planning the Scheme and Preparing the Outline Business Case Procuring the Solution and Preparing the Full Business Case Implementation and monitoring Evaluation and feedback Making the Case for Change Agree on the strategic context Determine spending objectives, existing arrangements, and business needs Determine potential business scope and key service requirements Determine benefits, risks, constraints, and dependencies Exploring the Preferred Way Forward Agree on critical success factors Determine long list options and SWOT analysis Recommend a preferred way forward Determining Potential Value for Money Revisit the short list Prepare the economic appraisal for short-listed options Undertake benefits appraisal Undertake risk appraisal Select preferred option and undertake sensitivity analysis Preparing for the Potential Deal Determine the procurement strategy Determine service streams and required outputs Outline potential risk apportionment Outline potential payment mechanisms Ascertain contractual issues and accountancy treatment Ascertaining Affordability and Funding Requirement Prepare the financial model Prepare the financial appraisals Planning for Successful Delivery Plan programme / project management Plan change and contract management Plan benefits realization Plan risk management Plan programme / project assurance and post-project evaluation Procuring the Value for Money Solution Revisit the case for change Revisit the OBC options Detail procurement process and evaluation of best and final offers (BAFOs) Contracting for the Deal Set out the negotiated deal and contractual arrangements Set out the financial implications of the deal Ensuring Successful Delivery Finalize project management arrangements and plans Finalize change management arrangements and plans Finalize benefits realization arrangements and plans Finalize risk management arrangements and plans Finalize contract management arrangements and plans Finalize post-project evaluation arrangements and plans

Better Business Cases Foundation & Practitioner: In-House
Delivered in London or UK Wide or OnlineFlexible Dates
£3,990

Lead Cloud Security Manager

By Training Centre

  This training course is designed to help participants acquire the knowledge and skills needed to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program based on ISO/IEC 27017 and ISO/IEC 27018. It provides a comprehensive elaboration of cloud computing concepts and principles, cloud computing security risk management, cloud-specific controls, cloud security incident management, and cloud security testing. About This Course   Learning objectives   Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of a cloud security program  Acknowledge the correlation between ISO/IEC 27017, ISO/IEC 27018, and other standards and regulatory frameworks Gain the ability to interpret the guidelines of ISO/IEC 27017 and ISO/IEC 27018 in the specific context of an organization Develop the necessary knowledge and competence to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program Acquire the practical knowledge to advise an organization in managing a cloud security program by following best practices Course Agenda   Day 1: Introduction to ISO/IEC 27017 and ISO/IEC 27018 and the initiation of a cloud security program Day 2: Cloud computing security risk management and cloud-specific controls Day 3: Documented information management and cloud security awareness and training Day 4: Cloud security incident management, testing, monitoring, and continual improvement; the examination Additional Information   Certification fees are included in the exam price. An attendance record worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course. In case candidates fail the exam, they can retake it within 12 months of the initial attempt for free. Accreditation Prerequisites   The main requirement for participating in this training course is having a fundamental understanding of ISO/IEC 27017 and ISO/IEC 27018 and a general knowledge of cloud computing concepts. Who Should Attend?   Cloud security and information security professionals seeking to manage a cloud security program Managers or consultants seeking to master cloud security best practices Individuals responsible for maintaining and managing a cloud security program Technical experts seeking to enhance their cloud security knowledge Cloud security expert advisors What's Included?   Delegates will be provided with; Course Slide deck Participant Guide Exam fees Our Guarantee   We are an Accredited Training Provider of IECB. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam. Assessment   The Certified Lead Cloud Security Manager exam meets the requirements of the National Accreditation Service's Examination and Certification Program (ECP). It covers the following competency domains:   Domain 1: Fundamental principles and concepts of cloud computing Domain 2: Information security policy for cloud computing and documented information management Domain 3: Cloud computing security risk management Domain 4: Cloud-specific controls based on ISO/IEC 27017 and ISO/IEC 27018 and best practices Domain 5: Cloud security awareness, training, roles, and responsibilities Domain 6: Cloud security incident management Domain 7: Cloud security testing, monitoring, and continual improvement   All delegates attending an official training course will be offered the opportunity to sit the associated examination. To pass the examination, a passing score of 70% must be obtained by answering 12 essay type questions covering the scope of the course materials. Successful examination candidates will be issued with a Certificate confirming a passing grade along with the relevant CPD certificate.  Provided by   This course is Accredited by NACS and Administered by the IECB

Lead Cloud Security Manager
Delivered OnlineFlexible Dates
£1,450

Better Business Cases Foundation & Practitioner: Virtual In-House Training

By IIL Europe Ltd

Better Business Cases™ Foundation and Practitioner: Virtual In-House Training Using this best-practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the combined foundation and practitioner course is to develop a candidate's ability to deliver a comprehensive business case through encouraging expanded knowledge to guide the practical application of theoretical foundations. Upon the completion of this course, a candidate will be able to start applying the model to a real business case development project. The outline presented in the course overview will be addressed in the first 2 days, with the Foundation exam conducted on the morning of Day 3. Then the topics will be revisited at a deeper level, for 2 more days, with the Practitioner exam conducted on the afternoon of Day 5. What you will Learn At the end of this program, you will be able to: Develop the lifecycle of a business case and establish the relationships between the five cases Apply the steps in the business case development framework, in order to support the production of a business case, using the Five Case Model, for a given scenario. Overview of Better Business Cases Alignment with the strategic planning process Importance of the Business Case using the Five Case Model Overview of the Five Case Model Purpose of the key stages in the development of a spending proposal Purpose of a Business Justification Case Business Case Development Process Purpose of project / programme assurance and assurance reviews Responsibility for producing the Business Case Determining the Strategic Context and Undertaking the Strategic Assessment Scoping the Scheme and Preparing the Strategic Outline Case Planning the Scheme and Preparing the Outline Business Case Procuring the Solution and Preparing the Full Business Case Implementation and monitoring Evaluation and feedback Making the Case for Change Agree on the strategic context Determine spending objectives, existing arrangements, and business needs Determine potential business scope and key service requirements Determine benefits, risks, constraints, and dependencies Exploring the Preferred Way Forward Agree on critical success factors Determine long list options and SWOT analysis Recommend a preferred way forward Determining Potential Value for Money Revisit the short list Prepare the economic appraisal for short-listed options Undertake benefits appraisal Undertake risk appraisal Select preferred option and undertake sensitivity analysis Preparing for the Potential Deal Determine the procurement strategy Determine service streams and required outputs Outline potential risk apportionment Outline potential payment mechanisms Ascertain contractual issues and accountancy treatment Ascertaining Affordability and Funding Requirement Prepare the financial model Prepare the financial appraisals Planning for Successful Delivery Plan programme / project management Plan change and contract management Plan benefits realization Plan risk management Plan programme / project assurance and post-project evaluation Procuring the Value for Money Solution Revisit the case for change Revisit the OBC options Detail procurement process and evaluation of best and final offers (BAFOs) Contracting for the Deal Set out the negotiated deal and contractual arrangements Set out the financial implications of the deal Ensuring Successful Delivery Finalize project management arrangements and plans Finalize change management arrangements and plans Finalize benefits realization arrangements and plans Finalize risk management arrangements and plans Finalize contract management arrangements and plans Finalize post-project evaluation arrangements and plans

Better Business Cases Foundation & Practitioner: Virtual In-House Training
Delivered OnlineFlexible Dates
£3,700

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475

Risk Assessing

By Prima Cura Training

This course is designed to enable learners to increase their understanding of risk assessment and risk management in Health and Social Care settings.

Risk Assessing
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Well Integrity (Basic and Advanced)

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This intensive 5 full-day has been designed as a separately bookable course comprising 3 days of Well Integrity (Basic) and 2 days of Advanced Well Integrity. The intensive 3 full-day course will equip the participants with a thorough knowledge of well integrity management and risk assessment in producing assets. Based on the regulatory requirements and using real examples and exercises from around the world, this represents best practice integrity management within the oil and gas industry. When to take action with a well is a critical decision, both from a safety and economic perspective. A consistent approach to decision-making provides certainty within the organisation, focusing effort, and spending wisely. The decision-making steps will be set out to ensure all critical aspects are captured consistently. Risk analysis approaches used by different organisations and examples of risk management and risk-ranking methods will be discussed. The 2 full-day course will deepen the participants' knowledge of well integrity management, and skills for designing, operating, and maintaining well equipment. The ultimate goal is to optimise productivity at the lowest Unit Operating Cost (UOC) and to maintain mechanical integrity throughout well life cycle. Well Integrity management is looked at in three distinct stages. The first stage is during the well design which includes material selection, engineering design, cement design, coating and inhibitors and cathodic protection. The second stage is monitoring the well during the life of the well, locating possible leaks and / or loss of metal. The last stage is to manage and control any well integrity issues using specialised products, services and techniques. Training Objectives 1. Well Integrity Training: Upon completion of this course, the participants will be able to: Define the building blocks of a successful well integrity management system Develop an approach to risk management, understand risk analysis and methods applied across the industry How do we 'Make Wells Safer', learn about emerging technologies for well integrity problem diagnosis and new techniques available to 'repair' the issues Execute the basic elements of well integrity management training for field operators Evaluate well design elements that enhance or hinder well integrity status definition during the operating phase of the well life-cycle Gain the demonstrable benefits of well integrity management from field experience Review cases studies and discuss them to enhance knowledge and take on board lessons learned 2. Advanced Well Integrity: Define well integrity well categorization based on compliance to the barrier policy outlined in the regulations and develop an approach to risk management Discuss well-completion design and construction to create a 'integer' well with the lowest life cycle maintenance cost from a WIM perspective Monitoring and surveillance of well integrity, focusing on barrier competence such as cementing and corrosion Investigate and manage well integrity issues, causes & potential solutions Understand repairs needed to address 'Loss of Well Operating Envelope' Gain an overview understanding of Well Suspension & Well Abandonment Discuss further case studies as well as conduct a post course test Target Audience Invaluable for production, operations, and integrity professionals involved in implementing & managing well integrity and seeking to improve performance. It is also essential for those who need to develop and implement such systems, or who have a general need to know and understand more about well integrity management. The course will also provide a fresh approach for senior professionals and managers. Designed for professionals in the oil and gas industry who are involved in the design, construction and operation of wells from the following disciplines: Production Maintenance Production Operations Drilling Engineering Safety engineering Well Intervention Well Integrity Engineering Asset Management Course Level Intermediate Advanced Trainer Gordon Duncan has over 40 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in well intervention and completions. After a number of years working for intervention service companies (completions, slickline & workovers), he joined Shell as a well service supervisor. He was responsible for the day-to-day supervision of all well intervention work on Shell's Persian/Arabian Gulf platforms. This included completion running, coil tubing, e-line, slickline, hydraulic workovers, well testing and stimulation operations. An office-based role as a senior well engineer followed. He was responsible for planning, programming and organising of all the well engineering and intervention work on a number of fields in the Middle East. He had a brief spell as a Site Representative for Santos in Australia before joining Petro-Canada as Completions Superintendent in Syria, then moved to Australia as Completions Operations Superintendent for Santos, before returning to Shell as Field Supervisor Completions and Well Interventions in Iraq where he carried out the first ever formal abandonment of a well in the Majnoon Field. While working on rotation, he regularly taught Completion Practices, Well Intervention, Well Integrity and Reporting & Planning courses all over the world. In 2014, he started to focus 100% on training and became the Technical Director for PetroEDGE. Since commencing delivering training courses in 2008, he has taught over 300 courses in 31 cities in 16 countries to in excess of 3,500 participants. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Well Integrity (Basic and Advanced)
Delivered in Internationally or OnlineFlexible Dates
£1,891 to £2,199

Work Breakdown Structures: In-House Training

By IIL Europe Ltd

Work Breakdown Structures: In-House Training It's amazing how often project managers begin the project planning process by making an outlined list of every task they believe will be required to complete a project and then proclaim they have created the work breakdown structure (WBS) for the project. The result is a list of hundreds, or even thousands of tasks, many of them having durations of a few days or a few hours. Essentially, what they have done is create a 'to do' list, which they then use as a 'checklist' to measure progress. This approach leads to, and even encourages, micromanagement of the resources working on the project without consideration of more critical aspects of project management such as: requirements management, risk management, procurement management, estimating, scheduling, executing, and controlling. Further, it makes it impossible to see the big picture, at levels of detail, in keeping with the needs of sponsors, clients, project and functional managers, team leaders, and project performers. Join us for this exciting program and learn how to use the WBS to make better-informed business decisions. What You Will Learn You will learn how to: Describe the need for a project WBS Describe the WBS role in the project Gain practical experience in the development, decomposition, and use of the WBS Determine the appropriate level of detail in the WBS. Explain how the WBS integrates with project requirements, risk, procurement, estimating, scheduling, and overall project execution. Provide the basic tools to enhance efficient re-use of key information in your future projects Foundation Concepts Key definitions History of the WBS Importance of the WBS Overall structure Terminology Other breakdown structures WBS tools WBS & Scope Project scope management processes Specification of the project objectives WBS design based on project deliverable WBS decomposition process and 'The 100% rule' Work Packages and Control Accounts WBS & Risk Risk management planning and WBS Risk identification to enhance the WBS Risk analysis and the WBS Risk responses and updating the WBS Implementing risk response and Monitoring risks and the WBS WBS & Estimating Use of WBS in the estimating process Components and work packages Sizing and algorithmic estimates WBS & Scheduling Component Scheduling - High-Level Milestones WBS activity decomposition WBS elements dependencies Work Package Level Schedules Responsibility assignment matrix WBS & Execution and Control Earned Value Management and tracking of work performance Progress reports, forecasts, and corrective and preventive actions used to manage work performance Necessary information to close out a project

Work Breakdown Structures: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,295

Advanced Process Safety Engineering

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course Managing process hazards in the hydrocarbon and chemical processing industries is a critical function that requires relevant knowledge and skills due to the risks involved. The Advanced Process Safety Engineering course will discuss the interrelation of the various techniques of process safety for analysing, with a particular emphasis on engineering design aspects, as well as how to manage process hazards in a safe and effective way and how they can potentially be avoided. In this 3 full-day advanced level course, the expert course leader will provide participants with insights and examples from his career and experience to show how their learning should be applied in real-life situations. Feedback and questioning is highly encouraged. Reference material and reports can be provided to give more information on any particular topic of interest. Individual and group exercises, tutored exercises and video case studies will be provided throughout the course to underpin the key learning points. Training Objectives Upon completion of this course, participants will acquire in-depth knowledge of: Risk management and 'As Low as Reasonably Practicable' (ALARP) principles. Different aspects of process design that influence process safety. Approach to 'inherently safer' design. Defence in depth using 'layers of protection'. Process for ensuring the technical integrity of safety-critical equipment. Hazards associated with process materials. Range of hazard identification and consequence modelling techniques. Causes and mitigation of human error. Reliability and availability of safety-critical protection equipment. Role of engineered safety-critical equipment and systems. Target Audience This course is suitable for industry professionals who need to acquire a comprehensive understanding of process safety. This includes those who are required to make managerial decisions where process safety is a key consideration, those who are moving into process safety positions or those who wish to broaden their process safety knowledge within their existing discipline. It is particularly suited for anyone involved in the design, operation, modification or maintenance of a major hazard installation, and will demonstrate a substantial understanding of process safety for those engaged in Continuous Professional Development or aiming for Chartered Engineer status. This course will benefit professionals such as: Operations and maintenance supervisors Process, mechanical and chemical engineers and technicians Design engineers, project engineers and HSE managers Control, automation and instrumentation engineers Course Level Advanced Trainer Your expert course leader has 50 years' experience in chemical and process safety engineering. His early career included 20 years in design and project engineering with various fine chemical and pharmaceutical companies where he designed chemical processes, specified plant equipment and selected materials for highly corrosive and toxic processes, often where textbook data was not available. This was followed by 10 years in offshore oil and gas design projects where he was responsible for setting up a Technical Safety group to change design safety practices in the aftermath of the 1988 Piper Alpha disaster. In recent years, he has been called upon to conduct various offshore and onshore incident investigations. His career has given him experience in project engineering, project management, process design and operations, safety engineering and risk management. He is a Fellow of the UK Institution of Chemical Engineers. He served on the Scottish Branch committee, and was elected chairman for a two-year term in 1991. He has also been chairman of the Safety and Reliability Society - North of Scotland Branch. He has delivered training courses in Process Hazard Analysis (HAZOP and HAZID), Process Safety Management, Hazard Awareness, Risk Assessment, Root Cause Analysis, Failure Modes & Effect Analysis and has lectured on Reliability Analysis to the M.Sc. course in Process Safety and Loss Prevention at Sheffield University. In addition to delivering training courses, he currently facilitates HAZOP / HAZID / LOPA studies and undertakes expert witness roles advising lawyers engaged in contractual disputes, usually involving the design or construction of chemical plants or Oil & Gas production facilities, or criminal prosecutions. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Advanced Process Safety Engineering
Delivered in Internationally or OnlineFlexible Dates
£3,499 to £4,199

CompTIA Cybersecurity Analyst (CySA+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of Reconnaissance Incidents Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of System Hacking Attacks Assess the Impact of Web-Based Attacks Assess the Impact of Malware Assess the Impact of Hijacking and Impersonation Attacks Assess the Impact of DoS Incidents Assess the Impact of Threats to Mobile Security Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES Assess Command and Control Techniques Assess Persistence Techniques Assess Lateral Movement and Pivoting Techniques Assess Data Exfiltration Techniques Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION Implement a Vulnerability Management Plan Assess Common Vulnerabilities Conduct Vulnerability Scans Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE Deploy a Security Intelligence Collection and Analysis Platform Collect Data from Network-Based Intelligence Sources Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA Use Common Tools to Analyze Logs Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS Analyze Incidents with Windows-Based Tools Analyze Incidents with Linux-Based Tools Analyze Malware Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS Deploy an Incident Handling and Response Architecture Mitigate Incidents Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS Apply a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES Remediate Identity and Access Management Issues Implement Security During the SDLC Additional course details: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cybersecurity Analyst (CySA+)
Delivered OnlineFlexible Dates
£2,475
1...56789...27