• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3387 Courses delivered Live Online

Enterprise Linux System Admin 2 with Exam Prep

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators and/or earn RHCSA certifications This course focuses on the key tasks needed to become a full time Linux administrator and goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. Schedule future Linux tasks Schedule tasks to automatically execute in the future. Manage priority of Linux processes Influence the relative priorities at which Linux processes run. Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. Connect to network-defined users and groups Configure systems to use central identity management services. Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. Manage logical volume management (LVM) storage Manage logical volumes from the command line. Access networked attached storage with network file system (NFS) Access (secure) NFS shares. Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall, Configure a basic firewall. Comprehensive review Practice and demonstrate knowledge and skills learned in this course.

Enterprise Linux System Admin 2 with Exam Prep
Delivered OnlineFlexible Dates
Price on Enquiry

JSPX - Junos Service Provider Switching

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Introduction to carrier Ethernet Describe the function of an Ethernet LAN Describe Ethernet frame filtering Implement VLAN tagging Implement IRB Implement a virtual switch Describe interconnecting routing instances Describe provider bridging Configure and monitor provider bridging Configure and monitor provider backbone bridging Explain the purpose of the Spanning Tree Protocol (STP) Configure and monitor the STP, the RSTP, the MSTP, and the VSTP Explain the purpose of bridge protocol data unit (BPDU), loop, and root protection Describe the basic operation of link fault management (LFM) Describe the basic operation of connectivity fault management (CFM) Configure and monitor Ethernet OAM Describe and configure Ethernet Ring Protection (ERP) The Junos Service Provider Switching course is a two-day course that provides students with intermediate switching knowledge and configuration examples that are most common in a Service provider implementation. Course Outline Course Introduction Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Backbone Bridging Configuring and Monitoring Provider Backbone Bridging Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring OAM Ethernet Ring Protection ERP Overview Configuring and Monitoring ERP LAG Overview Configuring and Monitoring a LAG

JSPX - Junos Service Provider Switching
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Certification Preparation for Platform App Builder (CRT403)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Certification Preparation for Platform App Builder is ideal for administrators, system integrators, and independent software vendors (ISVs) with an interest in sharpening the development, deployment, and administrative skills required to succeed in becoming a Salesforce Certified Platform App Builder Overview Architect and manage the correct data model based on business requirements. Configure application security. Define business logic and process automation declaratively. Design user interfaces. Customize applications for mobile use and Lightning. Deploy applications. Are you ready to take the next step in your career by becoming a Salesforce Certified Platform App Builder? By covering the details around the exam objectives, this course will help hone your knowledge of Salesforce application lifecycle management and the declarative and programmatic solutions available to you through guided scenarios, lecture, and discussion. Salesforce Fundamentals Capabilities of core CRM objects Boundaries of declarative customizations Use cases for programmatic customizations Security Restricting and extending object, record, and field access Determining appropriate sharing solutions Data Modeling and Management Determining an appropriate data model Relationship types and impact on record access, user interface, and reporting Considerations for changing field types Considerations of the schema builder Considerations for importing and exporting data Use cases of external objects Reporting Creating reports Report types Dashboards User Interface Customization options Custom buttons, links, and actions Declarative options for incorporating Lightning Components Mobile Declarative customizations available for the Salesforce1 user interface Business Logic and Process Automation Record types Formula fields Roll-up summary fields Validation rules Approval processes Workflow Visual workflow Process builder Automating business processes Ramifications of field updates and potential for recursion App Deployment Application lifecycle Sandboxes Change sets Unmanaged and managed packages Determining an appropriate deployment plan Wrapping Up Test preparation Practice exam

Salesforce Certification Preparation for Platform App Builder (CRT403)
Delivered OnlineFlexible Dates
Price on Enquiry

Data Analysis and Forecasting in Excel

By NextGen Learning

Course Overview This comprehensive course on "Data Analysis and Forecasting in Excel" provides learners with essential skills to manage, analyse, and visualise data effectively using Excel. Whether you are analysing historical data or forecasting future trends, this course covers key tools such as PivotTables, charts, and lookup functions to make your data work for you. Learners will also gain proficiency in automating tasks and creating dynamic reports, which are invaluable for decision-making processes in various professional settings. By the end of the course, you will have the capability to work with complex data sets, produce insightful reports, and apply forecasting techniques to guide future strategies. Course Description In this course, learners will delve into the full spectrum of data analysis capabilities offered by Excel. Topics include modifying worksheets, working with lists, and using advanced tools such as PivotTables, PivotCharts, and lookup functions. Learners will explore the process of visualising data through charts and sparklines, allowing them to convey complex information in an accessible manner. The course also covers automating workbook functionality and creating mapping data for better analysis. Additionally, learners will gain expertise in forecasting data trends to support strategic planning. By the end of the course, participants will have developed a comprehensive understanding of Excel’s analytical tools, enabling them to manage data with efficiency and precision in various business contexts. Course Modules Module 01: Modifying a Worksheet Module 02: Working with Lists Module 03: Analyzing Data Module 04: Visualizing Data with Charts Module 05: Using PivotTables and PivotCharts Module 06: Working with Multiple Worksheets and Workbooks Module 07: Using Lookup Functions and Formula Auditing Module 08: Automating Workbook Functionality Module 09: Creating Sparklines and Mapping Data Module 10: Forecasting Data (See full curriculum) Who is this course for? Individuals seeking to enhance their Excel data analysis skills. Professionals aiming to improve their forecasting and reporting capabilities. Beginners with an interest in data management and analysis. Those seeking to enhance their proficiency in Excel for career advancement. Career Path Data Analyst Business Analyst Financial Analyst Marketing Analyst Operations Manager Project Manager Excel Specialist in various industries such as finance, marketing, and logistics

Data Analysis and Forecasting in Excel
Delivered OnlineFlexible Dates
£9.99

GDPR Compliance, Data Protection & Cyber Security Law

By NextGen Learning

Course Overview This comprehensive course is designed to provide a well-rounded understanding of GDPR compliance, data protection frameworks, and key cyber security legislation in the UK and beyond. Covering topics from legal obligations under the General Data Protection Regulation to the implications of cyber crime on modern business, this programme equips learners with the knowledge needed to navigate the increasingly regulated digital landscape. Whether you are responsible for handling sensitive data or advising on compliance procedures, this course offers vital insight into maintaining data integrity and organisational transparency. Upon completion, learners will be able to interpret key legal requirements, identify risk areas, and support best practices within their professional setting. Course Description The GDPR Compliance, Data Protection & Cyber Security Law course explores a range of essential subjects that influence today’s data-driven industries. Learners will gain a strong foundation in legal and regulatory aspects of data handling, including the principles of GDPR, cyber law, and anti-money laundering frameworks. The course also includes modules on commercial and business law to deepen understanding of corporate responsibilities in data management. Ideal for legal assistants, compliance officers, or business managers, this course helps learners enhance their ability to assess data security measures and ensure alignment with current regulations. With a structured curriculum and accessible learning materials, this programme supports learners in achieving a robust legal and regulatory understanding. Course Modules: Module 01: GDPR Module 02: Data Protection Module 03: Paralegal Training Module 04: Commercial Law Module 05: Cyber Law Online Course Module 06: Business Law Module 07: Cyber Security Awareness Training Module 08: Anti-Money Laundering (AML) Training (See full curriculum) Who is this course for? Individuals seeking to understand GDPR and data security regulations. Professionals aiming to improve compliance and data governance within their roles. Beginners with an interest in legal and cyber regulatory frameworks. Business owners, managers, or HR personnel responsible for policy implementation. Career Path Data Protection Officer (DPO) Compliance Consultant Cyber Security Policy Advisor Paralegal in Commercial or Cyber Law Information Governance Analyst Risk and Compliance Coordinator Legal and Regulatory Affairs Assistant

GDPR Compliance, Data Protection & Cyber Security Law
Delivered OnlineFlexible Dates
£9.99

Oral Health Care

By NextGen Learning

Course Overview: The "Oral Health Care" course is designed to provide a comprehensive understanding of the essential concepts and practices in maintaining optimal oral health. Learners will explore a wide range of topics, from the basics of oral hygiene to the management of common oral health issues and preventive strategies. The course equips learners with the knowledge necessary to support dental care practices effectively. By the end of the course, participants will have developed a solid understanding of oral health, preventive care, and the importance of ongoing maintenance. This course offers valuable insights for those looking to advance their knowledge in dental care or enhance their qualifications in the health sector. Course Description: This course covers a range of topics designed to enhance learners' understanding of oral health care. Modules will guide participants through the fundamentals of oral health, common issues like tooth decay and gum disease, and preventive dentistry techniques. Emphasis is placed on promoting oral health, particularly in children and special populations. Learners will gain insights into the relationship between diet and oral health, as well as the importance of ongoing maintenance to prevent future complications. By completing this course, learners will be prepared to contribute to effective oral health care strategies and will acquire valuable knowledge to apply in various healthcare and dental settings. Course Modules: Module 01: Introduction to Oral Health Care Module 02: Fundamentals of Oral Health Module 03: Common Oral Health Issues Module 04: Preventive Dentistry Module 05: Oral Health Promotion in Children Module 06: Oral Health Care for Special Populations Module 07: Dental Care Procedures Module 08: Oral Health and Nutrition Module 09: Oral Health Maintenance and Beyond (See full curriculum) Who is this course for? Individuals seeking to improve their knowledge of oral health care. Professionals aiming to enhance their understanding of dental health. Beginners with an interest in pursuing a career in health and dental care. Anyone looking to gain a deeper understanding of oral health issues and prevention. Career Path Dental Care Assistant Oral Health Educator Community Health Worker Public Health Specialist Dental Practice Manager

Oral Health Care
Delivered OnlineFlexible Dates
£9.99

Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Those who will provide container orchestration management in the AWS Cloud including: DevOps engineers Systems administrators Overview In this course, you will learn to: Review and examine containers, Kubernetes and Amazon EKS fundamentals and the impact of containers on workflows. Build an Amazon EKS cluster by selecting the correct compute resources to support worker nodes. Secure your environment with AWS Identity and Access Management (IAM) authentication by creating an Amazon EKS service role for your cluster Deploy an application on the cluster. Publish container images to ECR and secure access via IAM policy. Automate and deploy applications, examine automation tools and pipelines. Create a GitOps pipeline using WeaveFlux. Collect monitoring data through metrics, logs, tracing with AWS X-Ray and identify metrics for performance tuning. Review scenarios where bottlenecks require the best scaling approach using horizontal or vertical scaling. Assess the tradeoffs between efficiency, resiliency, and cost and impact for tuning one over the other. Describe and outline a holistic, iterative approach to optimizing your environment. Design for cost, efficiency, and resiliency. Configure the AWS networking services to support the cluster. Describe how EKS/Amazon Virtual Private Cloud (VPC) functions and simplifies inter-node communications. Describe the function of VPC Container Network Interface (CNI). Review the benefits of a service mesh. Upgrade your Kubernetes, Amazon EKS, and third party tools Amazon EKS makes it easy for you to run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane. In this course, you will learn container management and orchestration for Kubernetes using Amazon EKS. You will build an Amazon EKS cluster, configure the environment, deploy the cluster, and then add applications to your cluster. You will manage container images using Amazon Elastic Container Registry (ECR) and learn how to automate application deployment. You will deploy applications using CI/CD tools. You will learn how to monitor and scale your environment by using metrics, logging, tracing, and horizontal/vertical scaling. You will learn how to design and manage a large container environment by designing for efficiency, cost, and resiliency. You will configure AWS networking services to support the cluster and learn how to secure your Amazon EKS environment. Module 0: Course Introduction Course preparation activities and agenda Module 1: Container Fundamentals Best practices for building applications Container fundamentals Components of a container Module 2: Kubernetes Fundamentals Container orchestration Kubernetes objects Kubernetes internals Preparing for Lab 1: Deploying Kubernetes Pods Module 3: Amazon EKS Fundamentals Introduction to Amazon EKS Amazon EKS control plane Amazon EKS data plane Fundamentals of Amazon EKS security Amazon EKS API Module 4: Building an Amazon EKS Cluster Configuring your environment Creating an Amazon EKS cluster Demo: Configuring and deploying clusters in the AWS Management Console Working with eksctl Preparing for Lab 2: Building an Amazon EKS Cluster Module 5: Deploying Applications to Your Amazon EKS Cluster Configuring Amazon Elastic Container Registry (Amazon ECR) Demo: Configuring Amazon ECR Deploying applications with Helm Demo: Deploying applications with Helm Continuous deployment in Amazon EKS GitOps and Amazon EKS Preparing for Lab 3: Deploying App Module 6: Configuring Observability in Amazon EKS Configuring observability in an Amazon EKS cluster Collecting metrics Using metrics for automatic scaling Managing logs Application tracing in Amazon EKS Gaining and applying insight from observability Preparing for Lab 4: Monitoring Amazon EKS Module 7: Balancing Efficiency, Resilience, and Cost Optimization in Amazon EKS The high level overview Designing for resilience Designing for cost optimization Designing for efficiency Module 8: Managing Networking in Amazon EKS Review: Networking in AWS Communicating in Amazon EKS Managing your IP space Deploying a service mesh Preparing for Lab 5: Exploring Amazon EKS Communication Module 9: Managing Authentication and Authorization in Amazon EKS Understanding the AWS shared responsibility model Authentication and authorization Managing IAM and RBAC Demo: Customizing RBAC roles Managing pod permissions using RBAC service accounts Module 10: Implementing Secure Workflows Securing cluster endpoint access Improving the security of your workflows Improving host and network security Managing secrets Preparing for Lab 6: Securing Amazon EKS Module 11: Managing Upgrades in Amazon EKS Planning for an upgrade Upgrading your Kubernetes version Amazon EKS platform versions Additional course details: Nexus Humans Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS)
Delivered OnlineFlexible Dates
Price on Enquiry

Managing Campus Networks with Aruba AirWave, Rev. 19.21

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Ideal candidates are Network Administrators who monitor and troubleshoot wireless networks, and Network and System Administrators responsible for installing and configuring network monitoring systems. Overview This hands-on course prepares you with the knowledge and experience required to install and use the AirWave Wireless Management Suite: AirWave Management Platform (AMP), RAPIDS, Visual RF, network health diagnostics, client troubleshooting, alerts and reporting.  In this course, you learn about AirWave?s capabilities in troubleshooting network health and client status via the various stages of association and authentication, as well as redundancy and master consoles for large networks. Introduction to AWMS Airwave Platform. Features and Benefits of AMP RAPIDS and Visual RF. Airwave products. Basic operations using AWMS Installing AWMS Installing AMP. Hardware requirements. Cent OS and AWMS software. Basic configuration steps. Upgrade AWMS software. Licensing AWMS. AWMS documentation Adding Device to AWMS Folders and Groups. Adding devices general process. Manually adding devices. Device discovery and managing device discovery. Moving a device to a folder. Troubleshooting IAP Organizaion and Groups Overview of IAP.Airwave integration. Golden configuration. IAP Organization options. IAP Whitelist Using Visual RF and Visual RF Plan Navigation. Setup. Heat-maps and location information. Import floorplan graphics. Plan deployments. Provision APs. Manage Visual RF performance Network Health Diagnostics page indicators. Network performance tabs. Source of issues. Network issues Troubleshooting Clients and Wireless Networks Searching for users and Diagnostics tab. Client issues. Network issues. AP issues. Switch/Controller issues. General Issues Rogue Detection and Using RAPIDS Why use RAPIDS. Threat Detection Methods. Rules. Classifications. IDS Events Report. New Rogue Devices Report. Visualization. PCI Compliance.WMS Offload Managing Administrative Access, Alerts, Triggers and Reporting Configure role-based administrative use access to the AMP system. Triggers. Alerts. Define and generate reports Scalability and Redundancy VM Redundancy. Failover for Redundancy. Master Console for large deployments. Multiple AMP Server deployments. Large Deployment example System Administration AMP Maintenance. Device Maintenance Wired Device Management Monitoring wired devices in AWMS. Wired device port and interface information. Wired device bandwith statistics and counters. Managing and configuring wired devices via AWMS templates AirWave Aruba Groups How AWMS configures devices. Using groups to control policies. Creating and controlling groups. Basic Group Design.Configuration Audits IAP Template Configuration Fetching a Template. Template Variables. Templates Configuration IAP GUI Configuration Golden configuration. GUI mode. GUI configuration Additional course details: Nexus Humans Managing Campus Networks with Aruba AirWave, Rev. 19.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Campus Networks with Aruba AirWave, Rev. 19.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing Campus Networks with Aruba AirWave, Rev. 19.21
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Build and Analyze Customer Journeys using Marketing Cloud (MKT101)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This class is designed for email digital marketers who manage the email channel for their organization. Whether you are new to Marketing Cloud or looking for tips on how to improve your existing customer journeys, this class is a great place to start. No prior knowledge of Marketing Cloud is needed. Overview When you complete this course, you will be able to: Explain compliance concepts to ensure optimal deliverability. Use tools within Marketing Cloud to uphold deliverability standards. Utilize Email Design best practices to ensure the best customer experience. Develop effective, relevant messages using Content Builder. Design and test different delivery methods and options when sending an email message. Design and execute customer journeys using automation tools within Marketing Cloud. Differentiate the use cases for different automation activities in Automation Studio and Journey Builder. Define fundamental data management and structure terminology. Use data segmentation tools to create targeted emails. Apply a simple data model concept to a real-world scenario. Define subscriber statuses, unsubscribe methods, and preferences. Analyze marketing campaigns using common KPIs. Solve a common marketing problem using troubleshooting guidance. Prioritize testing methods and tools to ensure quality control. Explain fundamental account and sending administration. Know where to go for more information, guidance, and support. Describe capabilities across the platform. Start your journey to becoming a Marketing Cloud Specialist. In this 5-day, expert-led class, you will learn how to build customer journeys within Marketing Cloud. Our team of Marketing Cloud pros will walk you through best practices related to executing, monitoring, and analyzing your journeys, arming you with the tools and know-how to design personalized journeys and engage with your customers in a whole new way. Course Outline Introduction to Salesforce Marketing Cloud Administration Subscriber and Data Management Email Message Design and Creation Message Testing, Delivery, and Email Marketing Best Practices Marketing Automation Analytics and Troubleshooting Summary

Salesforce Build and Analyze Customer Journeys using Marketing Cloud (MKT101)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/CAN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/CAN)
Delivered OnlineFlexible Dates
Price on Enquiry