• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

16 Courses delivered Live Online

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Data Protection Officer Training (CDPO)

By Training Centre

  The IECB Certified Data Protection Officer training course will help you acquire the knowledge and skills to serve as a Data Protection Officer (DPO), allowing you to help organizations understand and implement solutions that meet the compliance requirements of the General Data Protection Regulation (GDPR), as well as a number of other regulatory requirements. The course takes a practical look at the GDPR requirements and advises on the mapping of solutions. In this way, delegates can master the role of the DPO and become competent to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority. About This Course   After attending the training course, you can sit for the exam, and gain the 'Certified Data Protection Officer' credential, which validates that you have the Legal and regulatory knowledge required of a key adviser and practical knowledge to advise organisations how to meet their obligations regarding the GDPR compliance   Learning Outcomes; Acquire a thorough understanding of the basic concepts and components of global Data Protection Regulation(s) Understand the correlation between the General Data Protection Regulation and best practice standards such as ISO 27701 Acquire a thorough understanding of the data protection by design requirements, particularly in relation to the protection of data Interpret the data protection requirements within the context of an organization Understand how to support an organization to plan, implement, manage, monitor and maintain ongoing compliance to the GDPR   Our approach  This training course is based on the practical application of best practices used in exercising the role of the DPO. Course modules include practical examples of the role of DPO. Delegates are encouraged to engage in discussions and exercises. A Case Study which brings the materials to life.   Course agenda   Day 1: Introduction to the GDPR Principles Day 2: The role of the DPO in the determination of a GDPR compliance program Day 3: The role of the DPO in business operations Day 4: Monitoring and maintenance of the GDPR compliance programme, as well as the examination   Prerequisites   A basic understanding of the GDPR will benefit course delegates.  What's Included?   Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Materials CPD Certificate The Exam fees Who Should Attend?   Individuals seeking to move into the role of DPO Team members who define, implement, and maintain a GDPR compliance programme Information Security Managers responsible for the personal data protection of an enterprise and the management of its risks Members of an information security, risk management, or Data Governance team Our Guarantee   We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and train for free, with the exam retake included too. Assessment   All candidates at official training courses will be offered the opportunity to sit the associated exam. For CDPO, this constitutes a 12 question essay type exam which should be completed within 240 minutes. A passing score is achieved at 70%. Accreditation Provided by   This course is Accredited by NACS and Administered by the IECB.

Certified Data Protection Officer Training (CDPO)
Delivered OnlineFlexible Dates
£1,450

Certified Information Privacy Professional (CIPP/E)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Lawyers Records Managers Information Officers Compliance Officers Human Resource Officers Anyone who uses, processes and maintains personal data Overview The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There's a lot to know, there's a lot at stake and there's a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation's data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There?s a lot to know, there?s a lot at stake and there?s a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe?and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation?s data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. Data protection laws Key European data protection laws and regulatory bodies Evolving toward a harmonised legislative framework Personal Data Understanding and differentiating between types of data as defined by the GDPR Personal, anonymous, pseudonymous and special categories Controllers and Processors Roles and relationships of controllers and processors as defined by the GDPR Processing Personal Data Data processing and GDPR processing principles Applying the GDPR Legal grounds for processing personal data Data subject rights Data subject rights Applying rights Controller and processor obligations Information provision obligations Controller obligations for providing information about data processing activities to data subjects Supervisory authorities as set out in the GDPR Cross-border data transfers Options and obligations under the GDPR for transferring data outside the European Economic Area Adequacy decisions Safeguards and derogations Compliance considerations Applying European data protection laws Legal bases and compliance requirements for processing personal data in practice Processing employee data Surveillance Direct marketing Internet technology and communications Security of processing Considerations and duties of controllers and processors for ensuring security of personal data GDPR specifications for providing notification of data breaches Accountability Accountability requirements Data protection management systems Data protection impact assessments Data protection policies Role of the data protection officer Supervision and enforcement Role, powers and procedures of supervisory authorities Composition and tasks of the European Data Protection Board Role of the European Data Protection Supervisor Remedies, liabilities and penalties for noncompliance as set out in the GDPR Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/E) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/E) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/E)
Delivered OnlineFlexible Dates
Price on Enquiry

GDPR Data Protection Officer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for Managers or consultants seeking to prepare and support an organization in planning, implementing, and maintaining a compliance program based on the GDPR DPOs and individuals responsible for maintaining conformance with the GDPR requirements Members of information security, incident management, and/or business continuity teams Technical and compliance experts seeking to prepare for a data protection officer role Expert advisors involved in the security of personal data Overview Understand the concepts of the GDPR and interpret its requirements Understand the content and the correlation between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134 Develop the ability to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority Acquire the competence to perform the role and daily tasks of the data protection officer in an organizationit Considering that data breaches have become highly sophisticated in the recent years, the need for data protection has increased as well.Information Security is crucial to the success of any organization since it deals with the protection of sensitive data from unauthorized access, use, replication and destruction. As such, organizations should put in place measures and controls to manage and diminish Information Security risks and comply with GDPR requirements. In case organizations fail to comply with the GDPR requirements, the penalties can reach up to 2% of an organization?s annual turnover. Also, in case of more serious infringements, the penalties can amount to 4% of an organization?s annual revenue. The implementation of a Privacy Framework, on the other hand, will allow professionals to develop and implement reliable controls that are generally accepted.Becoming a Certified Data Protection Officer will enable you to acquire the necessary expertise to understand the risks that could have a negative impact on your organization and implement the required strategic responses based on the GDPR best practices, requirements and principles. Introduction to the GDPR concepts and principles Training course objectives and structure General Data Protection Regulation (GDPR) Core considerations for the GDPR Designation of the DPO and analysis of the GDPR compliance program Designation of the DPO Analysis of the GDPR compliance program Relationship with the top management Data protection policy Register of processing activities Risk management process DPO operations Data protection impact assessment Documentation management Evaluation of the data protection controls Data protection and technology Awareness, training, and communication Monitoring and continual improvement of GDPR compliance Incident management and personal data breaches Monitoring and measuring compliance Data protection internal audit Treatment of nonconformities Continual improvement Closing the training course

GDPR Data Protection Officer
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Advanced Call Control and Mobility Services v.1.0 (CLACCM)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for Collaboration engineers and administration professionals in job roles such as: Network administrator Network architect Network designer Network engineer Network manager Overview After taking this course, you should be able to: Analyze and troubleshoot SIP, H.323, and media protocols Implement time-of-day routing, call park, call pickup, and meet-me conferences in Cisco Unified Communications Manager Implement call coverage in Cisco Unified Communications Manager Configure and troubleshoot Cisco Unified Communications Manager Device Mobility Configure and troubleshoot Cisco Unified Communications Manager Extension Mobility Configure and troubleshoot Cisco Unified Communications Manager Unified Mobility Implement Cisco Unified Communications Manager Express for SIP phones Implement globalized call routing within and between Cisco Unified Communications Manager clusters Implement Media Gateway Control Protocol (MGCP) fallback and Survivable Remote Site Telephony (SRST) in Cisco Unified Communications Manager and in Cisco IOS XE gateways Implement Call Admission Control and Automated Alternate Routing (AAR) in Cisco Unified Communications Manager Implement URI calling in Cisco Unified Communications Manager for calls within a cluster and between clusters Troubleshoot multisite Cisco Unified Communications Manager deployments Implement Intercluster Lookup Service (ILS) between Cisco Unified Communications Manager clusters and enable General Data Protection Regulation (GDPR) Configure and troubleshoot Cisco Unified Border Element In this course, you will learn how to use Cisco© Unified Communications Manager features to consolidate your communications infrastructure into a scalable, portable, and secure collaboration solution. This course prepares you for the 300-815 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) concentration exam and CCNP-Collaboration certification. Course Outline Analyzing and Troubleshooting Signaling and Media Protocols Implementing Cisco Unified Communications Manager Supplemental Services Implementing Call Coverage in Cisco Unified Communications Manager Configuring and Troubleshooting Cisco Unified Communications Manager Device Mobility Configuring and Troubleshooting Cisco Unified Communications Manager Extension Mobility Configuring and Troubleshooting Cisco Unified CM Unified Mobility Implementing Cisco Unified Communications Manager Express Implementing Globalized Call Routing Implementing Remote Site Survivability Implementing Call Admission Control in Cisco Unified Communications Manager Implementing URI Calling in Cisco Unified Communications Manager Troubleshooting Multisite Cisco Unified Communications Manager Deployments Examining Global Dial Plan Replication Configuring and Troubleshooting Cisco Unified Border Element Lab outline Analyze SIP, H.323, and Media Protocols Troubleshoot SIP and Media Protocols Implement Cisco Unified Communications Manager Supplemental Services Implement Call Hunting and Call Queueing in Cisco Unified Communications Manager Configure Device Mobility Troubleshoot Cisco Unified Communications Manager Device Mobility Configure Cisco Unified Communications Manager Extension Mobility Troubleshoot Cisco Unified Communications Manager Extension Mobility Configure Cisco Unified Mobility Troubleshoot Cisco Unified Mobility Implement Endpoints in Cisco Unified Communications Manager Express Implement Endpoint Addressing and Call Routing in Cisco Unified Communications Manager Express Implement Calling Privileges in Cisco Unified Communications Manager Express Implement Hunt Groups, Call Park, and Paging in Cisco United Communications Manager Express Implement Globalized Call Routing Implement TEHO, PSTN Backup, and CoS in a Globalized Call-Routing Deployment Implement MGCP Fallback and Survivable Remote Site Telephony Implement Call Admission Control Implement a URI-Based Dial Plan for Multisite Deployments Troubleshoot Globalized Call Routing Troubleshoot Call Admission Control Implement Global Dial Plan Replication Implement Cisco Unified Border Element Troubleshoot Cisco Unified Border Element

Cisco Implementing Cisco Advanced Call Control and Mobility Services v.1.0 (CLACCM)
Delivered OnlineFlexible Dates
Price on Enquiry

Veeam Availability Suite v11: Configuration and Management (VASv11CM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Students should be experienced professionals with solid knowledge of servers, storage, networking and virtualization. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans Veeam Availability Suite v11: Configuration and Management (VASv11CM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Availability Suite v11: Configuration and Management (VASv11CM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Veeam Availability Suite v11: Configuration and Management (VASv11CM)
Delivered OnlineFlexible Dates
Price on Enquiry

VASCM-11 Veeam Availability Suite v11: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans VASCM-11 Veeam Availability Suite v11: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VASCM-11 Veeam Availability Suite v11: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VASCM-11 Veeam Availability Suite v11: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry

VEEAM-VMCE Availability Suite v10.0: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction Restoring from Backup Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time Using Secure Restore to prevent the restoration of malware Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios Backup Copy Jobs Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery Utilizing tape jobs, how to create and modify Replication Identify and describe the options available for replication, the use cases and impacts of using Create, modify and delete replication jobs, outline considerations to ensure success Failover Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios Advanced Repository Capabilities Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Ensure scalability by integrating off-site S3 storage Ensure compatibility with existing deduplication appliances Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production Veeam Backup Enterprise Manager Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. Create user and group roles, delegate workloads whilst maintaining data control Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords Veeam ONE Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business Support Locate, migrate or restore backup configuration Identify and locate appropriate support resources Troubleshooting methodology to identify, isolate and remediate support issues Additional course details: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VEEAM-VMCE Availability Suite v10.0: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry

Veeam Certified Architect v11 (VMCE11-A)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. This includes Senior Engineers and Architects responsible for creating architectures for Veeam environments. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. Design and architect a Veeam solution in a real-world environment Describe best practices, review an existing infrastructure and assess business/project requirements Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing Provide implementation and testing guidelines in line with designs Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirements Veeam Certified Architect is the highest level of Veeam technical certifications. Engineers who complete both Veeam Availability Suite v11: Configuration and Management and Veeam Backup & Replication V11: Architecture and Design programs (courses + exams) will be granted with the 'Veeam Certified Architect' (VMCA) title by Veeam. Introduction Veeam Availability Suite v11: Configuration and Management Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Introduction Veeam Backup & Replication v11: Architecture and Design Review the architecture principles Explore what a successful architecture looks like Review Veeam?s architecture methodology Discovery Analyze the existing environment Uncover relevant infrastructure metrics Uncover assumptions and risks Identify complexity in the environment Conceptual design Review scenario and data from discovery phase Identify logical groups of objects that will share resources based on requirements Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks Review infrastructure data with each product component in mind Create high level design and data flow Logical design Match critical components and features of VBR with requirements Create logical groupings Determine location of components and relationship to logical grouping Aggregate totals of component resources needed per logical grouping Calculate component (storage, CPU, memory) quantity sizing Physical/tangible design Convert the logical design into a physical design Physical hardware sizing Create a list of physical Veeam backup components Implementation and Governance Review physical design and implantation plan Review Veeam deployment hardening Describe the architect?s obligations to the implementation team Provide guidance on implementation specifics that relate to the design Validation and Iteration Provide framework for how to test the design Further develop the design according to a modification scenario

Veeam Certified Architect v11 (VMCE11-A)
Delivered OnlineFlexible Dates
Price on Enquiry

Lexcel Standard Training Requirements Course

By DG Legal

This training is for lawyers and covers key topics to ensure compliance with the Lexcel standard and other regulations.

Lexcel Standard Training Requirements Course
Delivered Online + more
£225 to £300

Educators matching "General Data Protection Regulation(GDPR) "

Show all 10
Academii

academii

London

Academii Limited is committed to protecting the privacy and security of your personal information. This privacy notice describes how we collect and use personal information about you during and after your working relationship with us, in accordance with the General Data Protection Regulation (GDPR). It applies to all workers and contractors. Academii Limited is a “data controller”. This means that we are responsible for deciding how we hold and use personal information about you. We are required under data protection legislation to notify you of the information contained in this privacy notice. This notice applies to workers and contractors. This notice does not form part of any contract of employment or other contract to provide services. We may update this notice at any time. It is important that you read this notice, together with any other privacy notice we may provide on specific occasions when we are collecting or processing personal information about you, so that you are aware of how and why we are using such information. Data Protection Principles We will comply with data protection law. This says that the personal information we hold about you must be: Used lawfully, fairly and in a transparent way. Collected only for valid purposes that we have clearly explained to you and not used in any way that is incompatible with those purposes. Relevant to the purposes we have told you about and limited only to those purposes. Accurate and kept up to date. Kept only as long as necessary for the purposes we have told you about. Kept securely. The kind of information we hold about you

Voncap Recruitment And Development

voncap recruitment and development

Great Yarmouth

Since Covid, older workers are the most likely to have become economically inactive (House of Commons, 2021), with only a third of self-employed people over the age of 54 still working. One in five people reporting that they could not carry on work as usual because of pandemic related issues (Institute for Fiscal Studies, 2020). One third of the UK employment market is currently aged over 50 (Centre for Better Ageing, 2020). Companies across England can no longer discriminate against older people. There is a need to increase recruitment of skilled, experienced personnel, who, through no fault of their own, find themselves in a very tough employment and recruitment situation. Many people over the age of 45, find that they need upskilling and help to move forward and make career adjustments. We facilitate learning for the prospective Employees and guide Companies to achieve the highest standard through their people. We focus on technology, General Data Protection Regulation (GDPR), wellbeing, and advertising to reach the key audience when looking for work. The issue is one of technology, Applicant Tracking Systems, (ATS) and the need for a unique CV that is non-Bias and one that can navigate these systems with ease. We help with reprogramming the mindset and overcoming the perceived barriers to regain self-respect and employment. With the increasing skills shortage across the UK, a large number of companies are reliant on recruitment agencies for both lower level roles and senior roles. The skills are there but due to the employers need to utilise intuitive recruitment systems in house, they are missing those who are just as capable of completing the role. Many people are not ‘Marketing People’ so cannot write a CV in order to sell themselves! We started our journey in 2017 with courses for the over 45’s, since then we have grown our courses to also have one which focuses on getting professionals back to work – those who have been managers, directors, business owners, who have lost work due to a variety of reasons within the economy and elsewhere. We now work with colleges and job centres to help people achieve their goals, find work, train and grow to where they deserve to be. We also have a selection of distance learning courses available, where people can focus on a particular area they would like to move their career towards. Contact us today for learning opportunities, employment courses, and the next step in finding both work and the mindset so achieve your individual goals.

Clear 7 Consultancy

clear 7 consultancy

Ipswich

Clear 7 Consultancy is committed to protecting the privacy and security of your personal information. This policy informs you of the data we collect, what we do with your information, what we do to keep it secure as well as the rights and choices you have over your personal information. The information we collect and when We only collect information that we know we will genuinely use and in accordance with the Data Protection Act 2018 which incorporates the General Data Protection Regulation (GDPR) and the Privacy and Electronic Communications (EC Directive) Regulations 2003. The type of information that we will collect on you, and you voluntarily provide to us on this website, enquiry form or other contact methods includes: - Your name - Telephone number(s) - Email address - Survey responses - Cookies - IP address. We may, in further dealings with you, extend this information to include your address, purchases, services used, and subscriptions and records of conversations and agreements. - You are under no statutory or contractual requirement or obligation to provide us with your personal information; however we require at least the information above in order for us to deal with you as a prospect or customer in an efficient and effective manner. - The legal basis for processing your data is based on your specific consent/performance of a contract/compliance with a legal obligation or our legitimate interest that we will have requested/stated at the point the information was initially provided. We will not store, process or transfer your data outside the parties detailed above unless we have an appropriate lawful reason to do so. How we use your information - To contact you, following your enquiry, reply to any questions, suggestions, issues or complaints you have contacted us about - Fulfilling our contract to provide you with the agreed service - Make available our services to you - Process your orders - For statistical analysis and to get feedback from you about our service. We occasionally may invite you to participate in a case study following an engagement - To power our security measures and services so you can safely access our website - Help us understand more about you as a customer, the products and services you consume, so we can serve you better - Contact you about services from us - Help answer your questions and solve any issues you have. Clear 7 Consultancy provides clear independent services to schools and academies helping them meet their legal responsibility to adhere to, and be seen to adhere to, the 7 principles of Public Life. Honesty, integrity, transparency, selflessness, objectivity, accountability, openness and leadership I have over 20 years experience of providing schools with business services. Many Headteachers, Business Managers and Governors will recognise me from training events and conferences where I have provided updates, training and guidance. I am a qualified Data Protection Practitioner and since May 2018 I have supported many schools and trusts with ensuring compliance with the Data Protection Act 2018 and the UK General Data Protection Regulations (UK GDPR).

Severnvale Equestrian Centre

severnvale equestrian centre

4.6(45)

Our facilities Severnvale provides riding lessons for someone who has never ridden before, to those that want to just ‘brush-up’, or to improve their riding skills, and for all ages; in addition to full competition livery, breaking/schooling livery, as well as part and ‘do-it-yourself’ livery.The facilities that we offer include:•Friendly instructors who have a wide range of qualifications and experience•Indoor school - 20 metres X 40 metres, with a viewing area in the Gallery Café & shop•International size outdoor arena - 20 metres X 60 metres, with floodlighting•32 loose boxes for hire, which includes the use of the Centre’s facilities•Horse walker to improve equine condition and stamina, which is suitable for multiple horses•Full set of ‘Jump-4-Joy’ show jumps•Regular competitive events throughout the year•Marmite’s Café that offers tea, coffee and light refreshments •Careers with horses in a very rewarding industryThe grounds (shown in light green) and facilities are available for hire for equestrian events, dog shows, dog training sessions, etc. The indoor school is often used for sports training by rugby clubs, etc., and various types of indoor shows, as well as ‘parties’. CCTV is installed and in use in several areas of the Centre for security purposes.The centre is open: 9 am to 8 pm Tuesday to Friday and 9 am to 5 pm Saturday & SundayWhere to find us From the M48At junction 2 take the road to the north, up to the large roundabout, then take the A48 into Chepstow.From the traffic lights outside the Tesco supermarket, follow the A48 for approximately 2¼ miles, SVEC is on the right and is signposted.South on the A48After passing through Lydney, Woolaston & Stroat, watch out for the sign for Severnvale Farm and “The Beachpike Herd” on a barn to your left. The turning to SVEC is on the left a little distance after this barn and is signposted. Go to Google MapsFor your benefit The instructors at the Centre have a wide range of qualifications, expertise and experience; and have a sympathetic understanding of the needs of adults and children, so that they provide instruction that is appropriate to their needs. Their experience includes eventing at national and international levels; as well as working with competition horses. For your safety, as well as the safety of others, please make yourself aware of the obligations set out in the "Help to keep Severnvale safe" section of this website.If you are thinking of working with horses, then the Severnvale, in association with local schools, provides work experience as part of a careers guidance policy; as well as career training in the equine industry to become a qualified horse riding instructor, or to gain experience as eventing and/or show jumping groom.The best piece of advice that could be given to anyone is not to be afraid to give riding a go; as it's a rewarding and exciting sport that anyone, regardless of age, ability or background can have a go at - and it’s a great way to keep fit!Looking after your personal dataSo that Severnvale Equestrian Centre (SVEC) can successfully tailor its lessons to meet your riding abilities and individual needs; and/or to provide suitable stabling and other facilities for you, or to other outside parties, it needs to hold basic information about you. The information that is collected enables it to provide the best service to you; by ensuring that Severnvale has all the information it needs to deliver these facilities, safely and appropriately. The "General Data Protection Regulation" (GDPR) dictate how Severnvale must treat this; so its Privacy Notice describes what data it holds, and how it is used to provide these services to you. Download a copy of SVEC’s Privacy Notice

Course Gate

course gate

5.0(1)

London

Welcome to Course Gate, your gateway to a world of knowledge and opportunity. We are a leading online learning marketplace dedicated to empowering individuals and organisations with the skills they need to succeed in today's dynamic and competitive environment. -------------------------------------------------------------------------------- Our Mission Our mission is to make education accessible and enjoyable for everyone. We want to help you discover your passion, expand your knowledge, and grow your confidence. Whether you want to learn a new language, master software, or develop a hobby, we have the right course for you.  -------------------------------------------------------------------------------- Our Vision  At Course Gate, we envision a future where education knows no boundaries. Our goal is to eliminate the traditional barriers of time, location, and accessibility, empowering learners from diverse backgrounds to unlock their full potential. Through our innovative approach, we aim to revolutionise the learning experience by making top-quality education accessible to everyone, regardless of their location. -------------------------------------------------------------------------------- Why Choose Course Gate? When you opt for Course Gate, you're choosing excellence, convenience, and an unparalleled learning experience. Here's why learners and organisations worldwide trust us: * Unmatched Quality: We meticulously curate our courses, collaborating with industry-leading experts to provide the highest-quality, relevant, and up-to-date content. * Flexible Learning: Our platform enables you to learn at your own pace, fitting into your schedule. Whether you're a full-time professional, a stay-at-home parent, or a busy student. * 24/7 Customer Support: Our dedicated customer support team is available to assist you whenever you need help. * Accreditation & Endorsement: CPD accredited & UKRLP registered course provider in the UK. * Affordability: We believe education should be accessible to all. Course Gate provides competitive pricing and discounts, ensuring that the cost never becomes a barrier to your personal and professional development. So, what are you waiting for? Join the thousands of learners who have already chosen Course Gate as their trusted learning partner and unlock your full potential. --------------------------------------------------------------------------------