IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management
Learn the foundation to colour analysis with this 5 day live and online, interactive course
The IECB ISO 9001 Internal Auditor training course enables you to develop the necessary competence to perform quality management system (QMS) audits by applying widely recognized audit principles, procedures, and techniques. About This Course This training course combines the requirements of ISO/IEC 17021-1, the recommendations of ISO 19011, and other good practices of auditing and integrates them into a comprehensive methodology which enables you to successfully plan, conduct, and close ISO 9001 conformity assessment audits. Apart from a theoretical basis, the training course also provides examples, exercises, and quizzes to help you practice the most important aspects of conformity assessment audits: interpretation of ISO 9001 requirements in the context of an audit, principles of auditing, application of audit methods, approaches to evidence collection and verification, leading an audit team, drafting nonconformity reports, and preparing the final audit report. The successful completion of the training course is followed by an exam. If you successfully pass the exam, you gain the 'Certified ISO 9001 Internal Auditor' credential. This certificate validates your professional capabilities and demonstrates that you have the knowledge and skills to audit a QMS based on ISO 9001. Learning objectives By the end of this training course, the participant will be able to: Explain the foundational concepts and principles of a quality management system (QMS) based on ISO 9001 Interpret the ISO 9001 requirements for a QMS from the perspective of an auditor Evaluate the QMS conformity to ISO 9001 requirements, in accordance with the foundational audit concepts and principles Plan, conduct, and close an ISO 9001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing Manage an ISO 9001 audit programme Educational approach This training course is participant centred and contains: Theories, approaches, and best practices used in ISO management system audits Lecture sessions illustrated with examples based on case studies Practical exercises based on a case study Interaction between participants by means of questions and suggestions Stand-alone and scenario-based quizzes, tailored to prepare the participants for the certification exam Course Overview Module 1 Foundational principles and concepts of a quality management system Module 2 Quality management system (QMS) requirements Module 3 Foundational audit concepts and principles Module 4 Preparing an ISO 9001 audit Module 5 Conducting an ISO 9001 audit Module 6 Closing an ISO 9001 audit Module 7 Managing an ISO 9001 Internal audit programme Course Agenda Day 1: Introduction to the quality management system (QMS) and ISO 9001 Day 2: Audit principles and the preparation for and initiation of an audit Day 3: On-site audit activities, Closing of the Audit and the Certification exam Accreditation Assessment All candidates at official training courses are tested throughout their course with quizzes and exercises, in combination with a final exam held on the last day of the course. Both elements are a part of the overall score. For this course, the final exam constitutes a 10 question essay type exam which should be completed within 125 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. Exam results are returned within 24 hours, with successful candidates receiving both a digital badge and a Certificate of Achievement Prerequisites The main requirements for participating in this training course are a foundational understanding of ISO 9001 requirements for a QMS and a comprehensive knowledge of audit principles. Provided by This course is Accredited by NACSand Administered by the IECB What's Included? Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides CPD Certificate The Exam Who Should Attend? The ISO 9001 Internal Auditor training course is intended for: Auditors seeking to perform and lead QMS audits on behalf of their organisation bodies Professionals wishing to adopt a recognised methodology for conducting audits based on ISO 19011 Individuals responsible for maintaining conformity to the requirements of ISO 9001 Technical experts seeking to prepare for a QMS audit Professionals wanting to pursue a career in conformity assessment
This training course is designed to help participants acquire the knowledge and skills needed to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program based on ISO/IEC 27017 and ISO/IEC 27018. It provides a comprehensive elaboration of cloud computing concepts and principles, cloud computing security risk management, cloud-specific controls, cloud security incident management, and cloud security testing. About This Course Learning objectives Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of a cloud security program Acknowledge the correlation between ISO/IEC 27017, ISO/IEC 27018, and other standards and regulatory frameworks Gain the ability to interpret the guidelines of ISO/IEC 27017 and ISO/IEC 27018 in the specific context of an organization Develop the necessary knowledge and competence to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program Acquire the practical knowledge to advise an organization in managing a cloud security program by following best practices Course Agenda Day 1: Introduction to ISO/IEC 27017 and ISO/IEC 27018 and the initiation of a cloud security program Day 2: Cloud computing security risk management and cloud-specific controls Day 3: Documented information management and cloud security awareness and training Day 4: Cloud security incident management, testing, monitoring, and continual improvement; the examination Additional Information Certification fees are included in the exam price. An attendance record worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course. In case candidates fail the exam, they can retake it within 12 months of the initial attempt for free. Accreditation Prerequisites The main requirement for participating in this training course is having a fundamental understanding of ISO/IEC 27017 and ISO/IEC 27018 and a general knowledge of cloud computing concepts. Who Should Attend? Cloud security and information security professionals seeking to manage a cloud security program Managers or consultants seeking to master cloud security best practices Individuals responsible for maintaining and managing a cloud security program Technical experts seeking to enhance their cloud security knowledge Cloud security expert advisors What's Included? Delegates will be provided with; Course Slide deck Participant Guide Exam fees Our Guarantee We are an Accredited Training Provider of IECB. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam. Assessment The Certified Lead Cloud Security Manager exam meets the requirements of the National Accreditation Service's Examination and Certification Program (ECP). It covers the following competency domains: Domain 1: Fundamental principles and concepts of cloud computing Domain 2: Information security policy for cloud computing and documented information management Domain 3: Cloud computing security risk management Domain 4: Cloud-specific controls based on ISO/IEC 27017 and ISO/IEC 27018 and best practices Domain 5: Cloud security awareness, training, roles, and responsibilities Domain 6: Cloud security incident management Domain 7: Cloud security testing, monitoring, and continual improvement All delegates attending an official training course will be offered the opportunity to sit the associated examination. To pass the examination, a passing score of 70% must be obtained by answering 12 essay type questions covering the scope of the course materials. Successful examination candidates will be issued with a Certificate confirming a passing grade along with the relevant CPD certificate. Provided by This course is Accredited by NACS and Administered by the IECB
PYTHON BOOTCAMP: This 12-week Python Data Analytics Data Boot Camp is designed to give you a complete skill set required by data analysts . You will be fully fluent and confident as a Python data analyst, with full understanding of Python Programming. From Data, databases, datasets, importing, cleaning, transforming, analysing to visualisation and creating awesome dashboards The course is a practical, instructor-lead program.
Duration 3 Days 18 CPD hours This course is intended for This course is aimed at people in senior roles including CIOs, chief digital officers and other aspiring CxOs, as well as consultants and others involved in digital transformations, service delivery and strategic delivery. Overview By the end of this course, you will understand: The internal and external factors to consider while crafting digital strategy How IT strategy differs from digital strategy and how they can be integrated Creating a digital strategy that achieves the most value from digital Implementing and sustaining digital strategy Developing and nurturing digital capabilities for continual business innovation and value co-creation This course takes you on a digital strategy journey. Its iterative, eight-step model moves from ?vision? through to ?actions? and is about creating sustainable, digital momentum. You experience the four key capabilities to develop a holistic, digital capability framework: digital leadership, managing innovation and emerging technologies, risk management and structuring a digital enterprise. This class includes an exam voucher. Prerequisites Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in IT Service Management. 1 - ITIL GUIDING PRINCIPLES TO ALL ASPECTS OF DIGITAL AND IT STRATEGY Focus on Value Start Where You Are Progress Iteratively with Feedback Collaborate and Promote Visibility Think and Work Holistically Keep It Simple and Practical Optimise and Automate 2 - LEVERAGE DIGITAL STRATEGY TO REACT TO DIGITAL DISRUPTION Digital Technology Digital Business Digital Organisation Digitisation Digital Transformation Business Strategy and Business Models Digital and IT Strategy Products Services Relationship Between Digital, IT Strategy and Components of ITIL SVS. 3 - RELATIONSHIP BETWEEN CONCEPTS OF DIGITAL AND IT STRATEGY, SERVICE VALUE SYSTEM AND SERVICE VALUE CHAIN Environmental Analysis External Analysis: PESTLE Internal Analysis: Four Dimensions of Service Management 4 - HOW AN ORGANISATION USES DIGITAL AND IT STRATEGY TO REMAIN VIABLE IN ENVIRONMENTS How an Organisation?s Viability is Related to Agile, Resilient, Lean, Continuous and Co-Creational it is How to Analyse the VUCA Factors and Address them in a Digital and IT Strategy Organisation?s Position in a Particular Market or Industry Digital Positioning Tool to Determine Appropriate Position for a Digital Organization 5 - EXPLAIN AND COMPARE THREE LEVELS OF DIGITAL DISRUPTION Ecosystem Industry/Market Organisational Influenced factors Achieving Customer/Market Relevance Achieving Operational Excellence Internal and External Focus Balanced Approach 6 - STRATEGIC APPROACHES BY DIGITAL AND IT TO ACHIEVE CUSTOMER/MARKET RELEVANCE AND OPERATIONAL EXCELLENCE How to Apply Approaches to Achieve Customer/Market Relevance Customer Journeys Omnichannel Delivery and Support Context-Sensitive Delivery and Support Customer Analytics Customer Feedback and 360ø Approaches How to Achieve Operational Excellence in the Four Dimensions of Service Management Understand the Financial Aspects of Digital and IT Strategy in Terms of the Following Financial Policies Portfolio Optimization Funding Projects, Products and Services Balancing Cost of Innovation and Operation Charging Models Assess Strategic Approaches for Digital Organizations 7 - RISKS AND OPPORTUNITIES OF DIGITAL AND IT STRATEGY Concept of Risk Management in the Context of a Digital Organisation Context of Digital and IT Strategy Identify Risk Assess Risk Concept of Risk Posture and Show How to Determine an Acceptable Balance Between Opportunity and Risk Explain the Concept of Innovation, Including its Key Elements and Techniques Apply Techniques to Develop and Maintain a Culture of Innovation 8 - STEPS AND TECHNIQUES INVOLVED IN DEFINING AND ADVOCATING FOR DIGITAL AND IT STRATEGY How to Use Digital Readiness Assessment to Perform Gap Analysis Between an Organisation?s Current and Desired Positions Approaches for Scraping Data from Dynamic Websites How to Define and Communicate a Vision and a Strategy How to Use Business Cases to Advocate for a Digital and IT Strategy 9 - IMPLEMENTATION OF A DIGITAL AND IT STRATEGY How to Define Operating Models for Digital Organisations Major Skills Required of Leaders in Digital Organisation Apply Approaches to Strategy Coordination and Implementation: Large-Scale Transformation Incremental Transformation Mergers and Acquisitions Individual Changes Approaches to POMs (Parallel Operating Models) How to Assess Success of a Digital and IT Strategy Typical Activities of a Digital Transformation Programme
About this Training Course In turbulent times for the entire Energy Sector, Oil & Gas E & P segments are coming under tremendous pressure to reinvigorate. Oil Majors like Shell Plc are no longer termed as Oil & Gas Company but also branded as SHELL Energy, with technology at its forefront. The Risks, Scope and Context of Engineering, Procurement, Construction, Installation and Commissioning (EPCIC) Projects is evolving rapidly. Thus, the success of a project is dependent on the practical 'know how' in scoping, contract drafting, negotiation and execution competencies. Understanding the essential ingredients of contracts and mastering the international contracting principles will equip the participants to identify vague and ambiguous clauses, avoid dangerous and often hidden terms, and better understand the controlling position in a project. In this 3 full-day course, the participants will find out how to negotiate legacy contracts where parties are not allowed to edit any clauses during the bidding process. The participants will learn from the Case Law Reports and analysis to take home lessons learned from bitter experiences of their peers in the industry. It is designed to help those who need a solution to manage current contractual issues or those who execute contracts regularly and want to be more proficient in managing their contracts and projects, with changing contexts. The course is developed with the underlying objectives for the participants to: Enhance their current knowledge of the legal principles governing international Contracts from formation, execution to breaches, redresses and dispute resolution either as a party or as a consortium member or as a coverture. Manage Consortium and Joint Venture Partners inter-relationship and contractual responsibilities. Identify dangerous exposures due to joint and severally liable requirements of consortium-based contracts. Effectively Manage Risks of Projects, with Enforceable Contract Documents, by learning the purpose and potential benefits of maintaining evidence in compliance to the contract clauses. Learn the Contract Enforcement Nuggets of Owners and the Variation Claims Strategies of the Contractors. Allocation of contract management related roles / assignments and WBS within consortium partners for effective project management and profitable results. Use of Contract Terms & Conditions for enhancing project performance, monitoring, reporting, and achieving timely completion, thereby avoiding delays and disputes. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Upon completion of the course, the participants will have learnt: Project management strictly in accordance with the contract and the corporate strategies. How to ensure that Variations Order claims are appropriately managed in turnkey and lump-sum contracts. Manage contemporary challenges and market factors with direct or indirect impact on the contracts. Managing all members of the Supply Chain from vendors to logistics services providers. Cost Engineering and Performance Management. How to manage Consortium Partners, Contractors, and Owner's representatives. When and how to obtain / grant extension of time (EOT) and costs. Ability to identify rights and obligations of each party to a contract instead of making subjective decisions. Ability to be firm in negotiations without violating terms of the agreements. Ability to spot different legal systems, contract laws and arbitration rules. Ability to negotiate and avoidance of disputes and resolution in amicable manner, in accordance with the provisions of the contract. Competency in developing and maintaining documentary evidence and traceability for all works executed during the project. Target Audience This course is specially curated for professionals from International Oil & Gas Industries including Offshore & Marine Sectors. They include the heads of strategic business units, contracts managers, project directors, project managers, general managers, corporate legal counsels, procurements and supply chain managers, lawyers and legal professionals engaged in the EPCIC Segments of the Oil & Gas Industry. Course Level Intermediate Trainer Principal Management Consultant Chartered Valuer and Appraiser (CVA) FACICA | FAMTAC | FAIADR | M.S.I.D | Member, AIEN LL.M. (IP Law), M. Sc. (Maritime Studies), M. Tech (Knowledge Engineering), MBA, First Class CoC (MCA, UK), B. E. (Elect) Your expert course leader, during the last 47 year period, has worked and consulted in the industry verticals encompassing: Technology, Oil & Gas Exploration & Production, Petrochemical Process Plants and Power Plant Construction Projects, Logistics & Warehousing, Marine, Offshore, Oil & Gas Pipelines, Infrastructure Development Projects (Ports, Offshore Supply Bases, Oil & Gas Terminals and Airports etc), EPCIC Contracts, and Shipyards, in South East Asia, Africa, Middle East, Americas and Europe. He serves as the Principal Management Consultant with a management consultancy in Hong Kong and Singapore, specialising in the fields of corporate management consultancy, international contracts reviews and alternative dispute resolutions services. He undertakes special assignments for conducting audits and valuation of intangible properties involving proprietary processes for licensed production, and licensing of intellectual property rights (IP Rights) in patents, trademarks, and industrial designs. He is frequently engaged for assignments like due diligence, acquisitions, mergers, resolving various operational issues, technology transfer and agency services contracts reviews, cost controls, and enhancement of Supply Chain Management. He has been conferred the credentials of Chartered Valuer & Appraiser (CVA) by SAC and IVAS, in accordance with the international valuation standards setting body IVSC. His consulting experience includes Charterparty Management, Business Process Re-engineering, Diversifications, Corporate Development, Marketing, Complex Project Management, Feasibility Studies, Dispute Resolutions and Market Research. He has successfully assisted Marine and offshore E & P clients in managing contractual disputes arising from various international contracts for upgrading & conversion projects. He continues to be actively engaged in claims reviews, mediation, arbitration, litigation, and expert witness related assignments, arising from international contracts and Charterparty Agreements. He graduated with a Bachelor's degree in Electrical Engineering, MBA in General Management, Master of Technology in Knowledge Engineering, Master of Science in Maritime Studies, and LL.M. (IP Law). He also holds professional qualifications in Business Valuations and Appraisers for CVA, arbitration, law, and marine engineering, including the Chief Engineer's First-Class Certificate of Competency (MCA, UK). He is further qualified and accredited as Certified International Arbitrator, Chartered Arbitrator, Sports arbitrator under CAS Rules, WIPO Neutral, Australian Communications and Media Authority (ACMA) Bargaining Code Arbitrator, Accredited Adjudicator and Accredited Mediator (Malaysia). He is admitted to the international panels of arbitrators and neutrals with WIPO, Geneva; ACICA, AMTAC and ACMA, Australia; BVIAC (British Virgin Islands); JIAC (Jamaica); HKIAC Hong Kong; AIAC, Malaysia; AIADR, Malaysia; KCAB, Seoul, South Korea; ICA, Delhi, India; ICC (Singapore); SISV, Singapore; SCMA, Singapore; SCCA, Saudi Arabia; VIAC Vienna, Austria; Thailand Arbitration Centre (THAC), and Mediator with AIAC Malaysia, CMC, and SIMI Singapore. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Writing and Managing Requirements Documents: In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA™ Certification exam to become a Certified Business Analysis Professional (CBAP™). Learn more at www.iil.com/bacp. Once a business analyst has completed the information gathering and analysis to produce the solution to a business problem, the results must be documented for all stakeholders to see and understand. This course will enhance the skill set needed for writing and managing the complex readership that business analysts interact with on a day-to-day basis. What you will Learn Upon completion, participants will be able to: Write an understood requirements document that is approvable and acceptable Validate a requirements document Manage the changes to requirements documents through the SDLC Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide The business analyst and the product/project life cycle The requirements documentation process Planning for Effective Requirements Documentation Overview of requirements planning Planning for validation Planning for verification: well-formed criteria Planning for verification: understood and usable criteria Writing Effective Requirements Documents Overview of writing requirements documents Using a standard structure / template Applying formatting techniques Meeting the challenge of writing non-functional requirements Baselining Requirements Documents Overview of the requirements baseline process Validation Verification Approval Managing Requirements Change through the Product Life Cycle Overview of requirements change management Establishing a formal change management process Tracing requirements through design and development (build, test, and implementation) Following through to post-implementation (transition and early production)