• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

56 Courses delivered Live Online

Confidentiality and Data Protection

By Prima Cura Training

This confidentially & effective record keeping training course is aimed at assisting staff to understand what is expected of them regarding confidentiality, maintaining accurate up to date records and documents.

Confidentiality and Data Protection
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Confidentiality & Record Keeping

By Prima Cura Training

This course aims to provide a more in depth understanding of confidentiality and record keeping. Providing information on the importance of accurate and true record keeping.

Confidentiality & Record Keeping
Delivered in person or OnlineFlexible Dates
Price on Enquiry

M.D.D CELEBRITY THERAPIST LONDON PACKAGE (SELF IMPROVEMENT)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Introducing Celebrity Therapist London Package: Discreet and Customized Counseling for Public Figures Are you a public figure seeking confidential and personalized counseling in London? Miss Date Doctor’s Celebrity Therapist London Package offers you discreet and specialized therapy services tailored to meet the unique needs and challenges faced by individuals in the public eye. Being a public figure can come with its own set of stressors and pressures. Our experienced celebrity therapists are dedicated to providing you with a safe and non-judgmental space to address personal concerns, manage stress, and find support for emotional well-being. Here’s how the Celebrity Therapist London Package can support you: Confidentiality: Our celebrity therapists are well-versed in maintaining confidentiality and respecting your privacy at all times. Specialized Support: We offer customized counseling, recognizing the specific challenges that public figures may encounter in their personal and professional lives. Emotional Regulation: Therapy can assist you in managing emotions related to public scrutiny, criticism, and constant attention. Stress Management: We’ll work on stress management techniques to help you navigate the demands of your public role. Coping Strategies: Our therapists will equip you with effective coping strategies to manage the unique stressors you may face. Balancing Personal and Professional Life: Therapy can help you find a balance between your personal life and the demands of your public career. Building Resilience: We’ll focus on developing resilience to handle the challenges of public life with strength and grace. Self-Care and Well-being: Our celebrity therapists emphasize self-care practices to support your emotional and mental well-being. The Celebrity Therapist London Package at Miss Date Doctor is designed to cater to your specific needs as a public figure, offering you a supportive and understanding space to navigate challenges and enhance your overall well-being. Invest in your emotional health and take the first step towards confidential support with the Celebrity Therapist London Package. Embrace the opportunity to receive specialized therapy services tailored to your unique experiences and demands as a public figure. Let our experienced celebrity therapists guide you towards greater emotional resilience, balance, and well-being. 6×1 hour sessions https://relationshipsmdd.com/product/celebrity-therapist-london-package/

M.D.D CELEBRITY THERAPIST LONDON PACKAGE (SELF IMPROVEMENT)
Delivered in London or UK Wide or OnlineFlexible Dates
£2,600

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

M.D.D PRIVATE COUNSELLING PACKAGE (SELF IMPROVEMENT)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Introducing Private Counselling Package: Personalized Support for Your Mental and Emotional Well-Being Are you looking for private and confidential support to address personal challenges, improve your emotional well-being, and enhance your overall quality of life? Miss Date Doctor’s Private Counselling Package offers you individualized sessions with experienced therapists who are dedicated to helping you navigate life’s difficulties and achieve personal growth. Private counselling provides you with a safe and supportive environment to explore your thoughts, feelings, and concerns without judgment. Our skilled therapists are committed to understanding your unique needs and providing you with personalized guidance to promote healing and positive change. Here’s how the Private Counselling Package can support you: Personalized Assessment: Our private counsellors will conduct a thorough assessment to gain a comprehensive understanding of your unique challenges and aspirations. Individualized Approach: Your counselling sessions will be tailored to address your specific concerns, ensuring that you receive the most relevant and effective support. Emotional Support: Our therapists provide a compassionate and empathetic space where you can freely express your feelings and experiences. Confidentiality: Private counselling ensures complete confidentiality, allowing you to discuss sensitive topics with confidence and peace of mind. Coping Strategies: We’ll equip you with practical coping strategies to manage stress, anxiety, and other emotional difficulties. Self-Exploration: Private counselling encourages self-discovery and personal growth, helping you gain insights into your thoughts, behaviours, and motivations. Goal Setting: Together with your counsellor, you’ll set achievable goals to work towards positive change and improved well-being. Flexible Sessions: Private counselling offers flexibility in scheduling sessions, making it convenient for your busy lifestyle. The Private Counselling Package at Miss Date Doctor is designed to provide you with personalized support and guidance on your journey to emotional well-being and personal growth. Our skilled therapists are committed to helping you overcome challenges, enhance your resilience, and lead a more fulfilling life. Invest in your mental and emotional health and take the first step towards positive change with the Private Counselling Package. Embrace the opportunity to explore your thoughts and feelings in a confidential and supportive environment. Let our experienced counsellors guide you towards a brighter and more empowered future. 3 x 1 hour https://relationshipsmdd.com/product/private-counselling-package/

M.D.D PRIVATE COUNSELLING PACKAGE (SELF IMPROVEMENT)
Delivered in London or UK Wide or OnlineFlexible Dates
£450

M.D.D DOMESTIC VIOLENCE SUPPORT PACKAGE (DEPRESSION AND LONELINESS)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Support and advice Confidentiality and directional advice Daily support Self-esteem building Domestic advice helpline assistance Help understanding individuals situation Progressive coaching Moving forward and finding true love 30 mins x 4 a week 4 weeks package https://relationshipsmdd.com/product/domestic-violence-support-package/

M.D.D DOMESTIC VIOLENCE SUPPORT PACKAGE (DEPRESSION AND LONELINESS)
Delivered in London or UK Wide or OnlineFlexible Dates
£500

ISO 27701 Internal Auditor

By Training Centre

  Being ISO 27701 Certified proves your Information Privacy Systems Audit experience, skills and knowledge, and demonstrates you are capable in the assessment of vulnerabilities, Compliance with GDPR and institutional controls within the enterprise.   Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards Enhance your existing or learn with new skills in the field of Data Protection Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements Become a Technical expert on the preparation required for ISO 27701 Certification Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit About This Course   ISO 27701 Internal Auditor Certification;    Confirms your knowledge and experience Quantifies and markets your expertise Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise Is globally recognized as the mark of excellence for the Information Privacy Audit professional Increases your value to your organization Gives you a competitive advantage over peers when seeking a new role Is administered by the International Examination & Certification Board (IECB), based in Estonia, and fully aligned to the ISO/IEC 17024:2012 standard (Conformity assessment - General requirements for bodies operating certification of persons)   Certified Individuals:    Are highly qualified, experienced professionals in the field of Data Protection Systems Audit Provide the enterprise with a Certification route for Information Privacy Assurance that is recognized by multinational clients, lending credibility to the enterprise Are excellent indicators of proficiency in control requirements creation and monitoring Demonstrate competence in five domains, including standards and practices; organization and management; processes; integrity, confidentiality and availability; and software development, acquisition and maintenance Demonstrate a commitment to providing the enterprise with trust in and value from your Privacy Compliance Framework Maintain ongoing professional development for successful on -the -job performance   The below job practice is organized by domains. Each domain is covered in the course.   Domain 1-The Process of Auditing Information Privacy Systems and Solutions   Provide audit services in accordance with ISO 19011 audit standards to assist the organization in protecting and controlling information privacy systems.    Domain 2 - Governance and Management of Information Privacy Technology   Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy.    Domain 3-Information Systems Acquisition, Development and Implementation   Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization's strategies and objectives.    Domain 4-Information Systems Operations, Maintenance and Service Management Provide assurance that the processes for information systems operations, maintenance and service management meet the organization's strategies and objectives.   Domain 5-Protection of Personally Identifiable Information (PII) Assets   Provide assurance that the organization's policies, standards, procedures and controls ensure the confidentiality, integrity and availability of PII.   Prerequisites   A thorough understanding of current Data Protection legislation, Information Security & Risk Management knowledge as well as ISO 19011 Auditing Standards is required to successfully pass the examination. What's Included?   Teas, Coffees, refreshments and a full Lunch* Course Slides Study Guide Exam Fees * For Classroom based Courses only Accreditation   Who Should Attend?   Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)   Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 3 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Our Guarantee   We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE.   *FREE training offered for retakes - come back within a year and train for free. Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 27701 Internal Auditor
Delivered OnlineFlexible Dates
£1,250

LTE Architecture and Protocols

5.0(3)

By Systems & Network Training

LTE Architecture and Protocols course description This course provides a comprehensive tour of the LTE architecture along with services provided and the protocols used. What will you learn Describe the overall architecture of LTE. Explain the information flows through LTE. Describe the LTE security. Describe LTE mobility management. Recognise the next steps for LTE. LTE Architecture and Protocols course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 3 days LTE Architecture and Protocols course contents Introduction History, LTE key features. The 4G ITU process. The LTE 3GPP specifications. Specifications. System Architecture LTE hardware architecture. UE architecture and capabilities. E-UTRAN and eNB. EPC, MME functions, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM, RRC state diagrams. Radio transmission and reception OFDMA, SC-FDMA, MIMO antennas. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and signals. Cell acquisition, data transmission and random access. MAC, RLC, PDCP protocols. LTE spectrum allocation. Power-on procedures Network and cell selection. RRC connection establishment. Attach procedure, including IP address allocation and default bearer activation. LTE detach procedure. Security in LTE networks LTE security features, identity confidentiality, ciphering and integrity protection. Architecture of network access security in LTE. Secure key hierarchy. Authentication and key agreement procedure. Security mode command procedure. Network domain security architecture. Security associations using IKE and IPSec. Mobility management RRC_IDLE, RRC_CONNECTED. Cell reselection, tracking area updates. Measurement reporting. X2 and S1 based handovers. Interoperation with UMTS, GSM and non-3GPP technologies such as cdma2000. QoS, policy control and charging QoS in LTE, EPS bearers, service data flows and packet flows. The architecture and signalling procedures for policy and charging control. Data transport using GPRS, differentiated services and MPLS. Offline and online charging in LTE. Delivery of voice and text messages over LTE Difficulties and solutions for Voice over LTE. Architecture and call setup procedures for circuit switched fallback. Architecture, protocols and call setup procedures in IP multimedia subsystem. Enhancements in release 9 LTE location services. Multimedia broadcast / multicast service and MBSFN. Cell selection, commercial mobile alert service. LTE Advanced and release 10 Impact of carrier aggregation on LTE air interface. Enhanced MIMO processing on uplink and downlink. Relaying. Release 11 and beyond. OAM and self organising networks Operation, administration, maintenance and provisioning for LTE. Self-configuration of base station parameters. Fractional frequency re-use, inter-cell interference co-ordination. Self-optimisation of base station procedures. Self-healing to detect and recover from faults.

LTE Architecture and Protocols
Delivered in Internationally or OnlineFlexible Dates
£2,367

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered OnlineFlexible Dates
£3,250

CWISA Wireless IoT Solutions Administrator

5.0(3)

By Systems & Network Training

CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.

CWISA Wireless IoT Solutions Administrator
Delivered in Internationally or OnlineFlexible Dates
£2,797
123...6

Educators matching "confidentiality"

Show all 45
Edu Consultancy

edu consultancy

Our core values are our principles of practice. They embody our sense of social responsibility, accountability, and proper conduct. We will act appropriately as professionals charged with the important task of assisting students for higher education and learning. We keep all our team in line with latest standards by providing them relevant training. As you strive for excellence, so do we. Integrity - being straightforward and honest in all professional and business dealings; Objectivity -not allowing professional judgment to be compromised by bias or conflict of interest; Professional competence and due care - maintaining professional knowledge and professional service, and acting diligently; Transparency - declaring conflicts of interest to all clients, especially when service fees are charged to both the education provider and the prospective student; Confidentiality - respecting and preserving the confidentiality of personal information acquired and not releasing such information to third parties without proper authority; Professional behaviour – acting in accordance with relevant laws and regulations and dealing with clients competently, diligently and fairly; and Professionalism and purpose - acting in a manner that will serve the interests of clients and the wider society even at the expense of self-interest; recognising that dedication to these principles is the means by which the profession can earn the trust and confidence of stakeholder groups (individual clients, the public, business and government).