• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2454 Courses in Bristol delivered Online

Critical Care Nurse Skills Training for Hospitals and Ministries of Health

5.0(1)

By Generation Leader

We Deliver Neonatal, Paediatric & Adult Intensive Care Nurse Training Programmes Face to face clinical skills training is supported by our platform which provides relatable and impactful content that helps nurses develop their leadership skills, embed their learning and earn certified CPD. See course content. Available World-Wide Delivered by prominent nurse educators and senior current ICU doctors with global experience in public and private healthcare We take pride in uplifting capabilities, inspiring the nursing workforce and improving patient care Overview Theoretical knowledge, clinical skills & competencies NICU Intensive Care Nurse Training This course will provide: Development of foundation to deeper theoretical knowledge and skills within various topics in critical care Demonstration of application of knowledge and understanding in practice Problem solving through critical analysis and evaluation of complex situations Maintaining quality care and positive patient experience Proactively manage problems, issues and challenges as they present Workforce management Risk management skills Decision making skills Course Structure: On the first day the participants will be allocated to groups in order to facilitate the practical skills teaching. The participants are encouraged to utilise this group for study purposes throughout this course. Each group will be allocated a senior nurse coach who will be their point of contact for queries and provide support throughout the course and for a period after the course has finished, until the participants have achieved their competencies in their respective place of work. Each participant will be given a workbook populated with competencies for each of the 7 topics within NICU. This workbook will provide guidance and it is intended for the participants to use it in their clinical practice. The participants will require a senior nurse allocated to them locally in their respective hospital who can oversee the application of the gained knowledge in practice. The participants will be assessed throughout the course via: Active participation Simulation in applying knowledge during workshops and practical sessions Completion of workbook and record achievements Reflective practice Contact us for a full training schedule 2. PICU Intensive Care Nurse Training This course will provide: Development of foundation to deeper theoretical knowledge and skills within various topics in critical care Demonstration of application of knowledge and understanding in practice Problem solving through critical analysis and evaluation of complex situations Maintaining quality care and positive patient experience Proactively manage problems, issues and challenges as they present Workforce management Risk management skills Decision making skills Course Structure: On the first day the participants will be allocated to groups in order to facilitate the practical skills teaching. The participants are encouraged to utilise this group for study purposes throughout this course. Each group will be allocated a senior nurse coach who will be their point of contact for queries and provide support throughout the course and for a period after the course has finished, until the participants have achieved their competencies in their respective place of work. Each participant will be given a workbook populated with competencies for each of the 12 topics within PICU. This workbook will provide guidance and it is intended for the participants to use it in their clinical practice. The participants will require a senior nurse allocated to them locally in their respective hospital who can oversee the application of the gained knowledge in practice The participants will be assessed throughout the course via: Active participation Simulation in applying knowledge during workshops and practical sessions Completion of workbook and record achievements Reflective practice Contact us for a full training schedule 3. AICU Intensive Care Nurse Training This course will provide: Development of foundation to deeper theoretical knowledge and skills within various topics in critical care Demonstration of application of knowledge and understanding in practice Problem solving through critical analysis and evaluation of complex situations Maintaining quality care and positive patient experience Proactively manage problems, issues and challenges as they present Workforce management: safe staffing levels, utilising skill mix, safe and effective patient care Ability to assess the complex patient in the ICU Rehabilitation and recovery planning for ICU patients Risk management skills Decision making skills Course Structure: On the first day the participants will be allocated to groups in order to facilitate the practical skills teaching. The participants are encouraged to utilise this group for study purposes throughout this course. Each group will be allocated a senior nurse coach who will be their point of contact for queries and provide support throughout the course and for a period after the course has finished, until the participants have achieved their competencies in their respective place of work. Each participant will be given a workbook populated with competencies for each of the 13 topics within adult critical care. This workbook will provide guidance and it is intended for the participants to use it in their clinical practice. The participants will require a senior nurse allocated to them locally in their respective hospital who can oversee the application of the gained knowledge in practice. Course Content The content helps nurses succeed in gaining essential skills to excel in day-to-day work activities, such as; communicating with colleagues and patients, conducting difficult conversations, knowing how to lead and motivate teams and problem solving. The content is mapped to the leadership requirements as stated by the UK Royal Colleges, including the Royal College of Nursing What is the role of leader? Building and Leading Successful teams CPDwatch Building and Leading Successful teams Building and Leading Successful teams Leading with Values and Ethics CPDwatch Leading with Values and Ethics Leading with Values and Ethics watch Leadership Insights on Leading with Executive Presence Leadership Insights on Leading with Executive Presence watch Leadership Insights on Building & Leading Teams Leadership Insights on Building & Leading Teams watch Leadership Toolkit: Facilitating a Workshop Leadership Toolkit: Facilitating a Workshop watch Leadership Toolkit: Facilitating a Brainstorming Session Leadership Toolkit: Facilitating a Brainstorming Session watch Leadership Toolkit: Running a Team Debrief Leadership Toolkit: Running a Team Debrief watch The Characteristics of an Accountable Leader The Characteristics of an Accountable Leader Leading through Shared Vision CPDwatch Leading through Shared Vision Leading through Shared Vision watch Evaluating Your Management Style Evaluating Your Management Style watch The Adaptive Leader: Be an Iceberg The Adaptive Leader: Be an Iceberg The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader Leading through Problem Solving and Decision Making CPDwatch Leading through Problem Solving and Decision Making Leading through Problem Solving and Decision Making watch Leadership Insights on Leading Diversity Leadership Insights on Leading Diversity watch Leadership Insights on Judgment and Decisiveness Leadership Insights on Judgment and Decisiveness Leading with Judgment and Decisiveness CPDwatch Leading with Judgment and Decisiveness Leading with Judgment and Decisiveness Accountable Leadership CPDwatch Accountable Leadership Accountable Leadership watch Leadership Insights on Being Accountable Leadership Insights on Being Accountable watch Expert Insights on Networking & Building Relationships Expert Insights on Networking & Building Relationships watch Building Your Professional Network Building Your Professional Network watch Leadership Insights on Networking with your Peers Leadership Insights on Networking with your Peers watch Networking to Improve Leadership Effectiveness Networking to Improve Leadership Effectiveness watch Empowering Employees Empowering Employees read MIT Sloan Management Review on New Leader Transitions MIT Sloan Management Review on New Leader Transitions read All the Leader You Can Be: The Science of Achieving Extraordinary Executive Presence All the Leader You Can Be: The Science of Achieving Extraordinary Executive Presence read MIT Sloan Management Review on The Adaptive Leader MIT Sloan Management Review on The Adaptive Leader read MIT Sloan Management Review Article on Looking for Opportunity in the Midst of Crisis MIT Sloan Management Review Article on Looking for Opportunity in the Midst of Crisis read Executive Presence: The Art of Commanding Respect like a CEO, Second Edition Executive Presence: The Art of Commanding Respect like a CEO, Second Edition read MIT Sloan Management Review on Leader as Motivator MIT Sloan Management Review on Leader as Motivator listen The Accountable Leader: Developing Effective Leadership Through Managerial Accountability The Accountable Leader: Developing Effective Leadership Through Managerial Accountability listen From Bud to Boss: Secrets to a Successful Transition to Remarkable Leadership From Bud to Boss: Secrets to a Successful Transition to Remarkable Leadership listen Strategic Connections: The New Face of Networking in a Collaborative World Strategic Connections: The New Face of Networking in a Collaborative World listen The Courage Way: Leading and Living with Integrity The Courage Way: Leading and Living with Integrity listen Executive Presence: The Art of Commanding Respect Like a CEO Executive Presence: The Art of Commanding Respect Like a CEO The importance of skillful communication Leading across Cultures CPDwatch Leading across Cultures Leading across Cultures watch Leadership Insights on Setting and Managing Priorities Leadership Insights on Setting and Managing Priorities watch Expert Insights on Collaboration Expert Insights on Collaboration Becoming a Successful Collaborator CPDwatch Becoming a Successful Collaborator Becoming a Successful Collaborator Leading with Judgment and Decisiveness CPDwatch Leading with Judgment and Decisiveness Leading with Judgment and Decisiveness watch Managing Conflict across Cultures Managing Conflict across Cultures watch Managing Conflict in High Performance Teams Managing Conflict in High Performance Teams watch Leadership Insights on Conflict Management Leadership Insights on Conflict Management The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader watch Leadership Insights on Leading Across Cultures Leadership Insights on Leading Across Cultures Leading Diversity CPDwatch Leading Diversity Leading Diversity Encouraging Team Communication and Collaboration CPDwatch Encouraging Team Communication and Collaboration Encouraging Team Communication and Collaboration Navigating Challenging Situations with Diplomacy and Tact CPDwatch Navigating Challenging Situations with Diplomacy and Tact Navigating Challenging Situations with Diplomacy and Tact Facing Virtual Team Challenges CPDwatch Facing Virtual Team Challenges Facing Virtual Team Challenges watch Leadership Insights on Problem Solving & Decision Making Leadership Insights on Problem Solving & Decision Making watch Leadership Insights on Leading through Disruption Leadership Insights on Leading through Disruption watch Leadership Insights on Leading through Motivation Leadership Insights on Leading through Motivation Leading Others through Conflict CPDwatch Leading Others through Conflict Leading Others through Conflict Cultivating Cross-functional Team Collaboration CPDwatch Cultivating Cross-functional Team Collaboration Cultivating Cross-functional Team Collaboration watch Running a Team Debrief Running a Team Debrief watch Leaders Have to Be Human Leaders Have to Be Human watch Collaborating Beyond the Team Collaborating Beyond the Team watch How the Power of Listening Can Reveal Your Team's Motivating Tensions How the Power of Listening Can Reveal Your Team's Motivating Tensions read Successful Time Management: How to be Organized, Productive and Get Things Done Successful Time Management: How to be Organized, Productive and Get Things Done read Managing Conflict at Work: Understanding and Resolving Conflict for Productive Working Relationships Managing Conflict at Work: Understanding and Resolving Conflict for Productive Working Relationships read Conflict Management Conflict Management read Committed Teams: Three Steps to Inspiring Passion and Performance Committed Teams: Three Steps to Inspiring Passion and Performance read Building the Team Organisation: How to Open Minds, Resolve Conflict, and Ensure Cooperation Building the Team Organisation: How to Open Minds, Resolve Conflict, and Ensure Cooperation read MIT Sloan Management Review on Problem Solving and Decision Making MIT Sloan Management Review on Problem Solving and Decision Making read Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done read MIT Sloan Management Review on Negotiation MIT Sloan Management Review on Negotiation read 5 Critical Conversations to Talent Development: Tips, Tools & Intelligence for Developing Talent 5 Critical Conversations to Talent Development: Tips, Tools & Intelligence for Developing Talent read MIT Sloan Management Review on Developing People MIT Sloan Management Review on Developing People read MIT Sloan Management Review on Cross-Functional Collaboration MIT Sloan Management Review on Cross-Functional Collaboration listen Opening Doors to Teamwork and Collaboration: 4 Keys That Change Everything Opening Doors to Teamwork and Collaboration: 4 Keys That Change Everything How to create and lead change Contributing as a Virtual Team Member CPDwatch Contributing as a Virtual Team Member Contributing as a Virtual Team Member Leading Innovation CPDwatch Leading Innovation Leading Innovation Leading with Strategic Thinking CPDwatch Leading with Strategic Thinking Leading with Strategic Thinking watch Leadership Insights on Strategic Thinking Leadership Insights on Strategic Thinking Building and Leading Successful Teams CPDwatch Building and Leading Successful Teams Building and Leading Successful Teams watch Leadership Insights on Building & Leading Teams Leadership Insights on Building & Leading Teams Creating a Successful Business Execution Culture CPDwatch Creating a Successful Business Execution Culture Creating a Successful Business Execution Culture watch How to Build Trust in a Team How to Build Trust in a Team watch Leadership Insights on Leading Innovation Leadership Insights on Leading Innovation watch Leadership Insights on Leading a Culture of Execution Leadership Insights on Leading a Culture of Execution watch Leadership Insights on Leading through Change Leadership Insights on Leading through Change Leading through the Challenge of Change CPDwatch Leading through the Challenge of Change Leading through the Challenge of Change watch Leadership Insights on Leading Collaboratively Leadership Insights on Leading Collaboratively Facilitating Sustainable Change CPDwatch Facilitating Sustainable Change Facilitating Sustainable Change watch Disruptive Leadership Disruptive Leadership read Learning to Think Strategically Learning to Think Strategically read Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results read Demystifying Strategic Thinking: Lessons from Leading CEOs Demystifying Strategic Thinking: Lessons from Leading CEOs read MIT Sloan Management Review on Building and Leading Teams MIT Sloan Management Review on Building and Leading Teams read Virtual Leadership: Practical Strategies for Getting the Best Out of Virtual Work and Virtual Teams Virtual Leadership: Practical Strategies for Getting the Best Out of Virtual Work and Virtual Teams read Managing and Leading People through Organizational Change: The Theory and Practice of Sustaining Change through People Managing and Leading People through Organizational Change: The Theory and Practice of Sustaining Change through People read The Effective Change Manager's Handbook: Essential Guidance to the Change Management Body of Knowledge The Effective Change Manager's Handbook: Essential Guidance to the Change Management Body of Knowledge read Choosing to Change: An Alternative Understanding of Change Management Choosing to Change: An Alternative Understanding of Change Management Why leaders should possess emotional intelligence Leading by Developing People CPDwatch Leading by Developing People Leading by Developing People watch Leadership Insights on Critical Thinking Leadership Insights on Critical Thinking watch Knowing When to Think Critically Knowing When to Think Critically Developing Your Critical Thinking and Cognitive Flexibility CPDwatch Developing Your Critical Thinking and Cognitive Flexibility Developing Your Critical Thinking and Cognitive Flexibility Leading through Setting and Managing Priorities CPDwatch Leading through Setting and Managing Priorities Leading through Setting and Managing Priorities watch Managing Priorities Managing Priorities watch Leadership Insights on Leading with Values & Ethics Leadership Insights on Leading with Values & Ethics The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader The Agile Leader CPDwatch The Agile Leader The Agile Leader watch Disruptive Leadership Disruptive Leadership Make The Time You Need: Get Organised CPDwatch Make The Time You Need: Get Organised Make The Time You Need: Get Organised watch Leadership Insights on Emotional Intelligence Leadership Insights on Emotional Intelligence Becoming an Emotionally Intelligent Leader CPDwatch Becoming an Emotionally Intelligent Leader Becoming an Emotionally Intelligent Leader Managing in a Crisis CPDwatch Managing in a Crisis Managing in a Crisis watch Planning Crisis Communications Planning Crisis Communications watch Crisis Management for Leaders Crisis Management for Leaders watch Take a Deep Breath and Manage Your Stress Take a Deep Breath and Manage Your Stress watch Being a Mindful Leader Being a Mindful Leader watch Overcome Emotional Feelings Overcome Emotional Feelings Managing Pressure and Stress to Optimise Your Performance CPDwatch Managing Pressure and Stress to Optimise Your Performance Managing Pressure and Stress to Optimise Your Performance watch Expert Insights on Managing Stress Expert Insights on Managing Stress watch Emotional Intelligence and Effective Leadership Emotional Intelligence and Effective Leadership watch Helping Your Team Work Helping Your Team Work watch Fair and Just Decision Making Fair and Just Decision Making read MIT Sloan Management Review on Setting and Managing Priorities MIT Sloan Management Review on Setting and Managing Priorities read Advances in Authentic and Ethical Leadership Advances in Authentic and Ethical Leadership read Resilient Organisations: How to Survive, Thrive and Create Opportunities Through Crisis and Change Resilient Organisations: How to Survive, Thrive and Create Opportunities Through Crisis and Change read 50 Activities For Managing Stress 50 Activities For Managing Stress read Emotional Intelligence Pocketbook: Little Exercises for an Intuitive Life Emotional Intelligence Pocketbook: Little Exercises for an Intuitive Life read Mindful Leadership: The 9 Ways to Self-Awareness, Transforming Yourself, and Inspiring Others Mindful Leadership: The 9 Ways to Self-Awareness, Transforming Yourself, and Inspiring Others The significance of coaching in your career Developing Successful Coaching Relationships CPDwatch Developing Successful Coaching Relationships Developing Successful Coaching Relationships watch Working on Shared Goals through Teaming Working on Shared Goals through Teaming watch Initiating a Coaching Relationship Initiating a Coaching Relationship watch Coaches Build Self-Confidence Coaches Build Self-Confidence watch Be a Better Coach Be a Better Coach watch Coaching Team Members Coaching Team Members Leading by Developing People CPDwatch Leading by Developing People Leading by Developing People watch Delivering Results While Developing People Delivering Results While Developing People watch How to Increase Engagement How to Increase Engagement watch Leadership Insights on Coaching Leadership Insights on Coaching watch Leadership Insights on Developing Women Leaders Leadership Insights on Developing Women Leaders watch Leadership Insights on Leading Collaboratively Leadership Insights on Leading Collaboratively watch Creating a Vision Creating a Vision watch Becoming A More Effective Delegator Becoming A More Effective Delegator read MIT Sloan Management Review on Leader as Coach Special Collection MIT Sloan Management Review on Leader as Coach Special Collection read Anytime Coaching: Unleashing Employee Performance, Second Edition Anytime Coaching: Unleashing Employee Performance, Second Edition read Coaching and Mentoring: Practical Techniques for Developing Learning and Performance, Third Edition Coaching and Mentoring: Practical Techniques for Developing Learning and Performance, Third Edition read The Extraordinary Coach: How the Best Leaders Help Others Grow The Extraordinary Coach: How the Best Leaders Help Others Grow read Leading the Unleadable: How to Manage Mavericks, Cynics, Divas, and Other Difficult People Leading the Unleadable: How to Manage Mavericks, Cynics, Divas, and Other Difficult People read 100 Ways to Motivate Others: How Great Leaders Can Produce Insane Results without Driving People Crazy, Third Edition 100 Ways to Motivate Others: How Great Leaders Can Produce Insane Results without Driving People Crazy, Third Edition read Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done listen 50 Top Tools for Coaching: A Complete Toolkit for Developing and Empowering People, Third Edition 50 Top Tools for Coaching: A Complete Toolkit for Developing and Empowering People, Third Edition

Critical Care Nurse Skills Training for Hospitals and Ministries of Health
Delivered OnlineFlexible Dates
Price on Enquiry

ISO 31000 Risk Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Risk managersBusiness Process OwnersBusiness Finance ManagersBusiness Risk ManagersRegulatory Compliance ManagersProject ManagementPersons responsible for information security or conformity within an organization Overview To understand the concepts, approaches, methods and techniques allowing an effective risk managementaccording to ISO 31000To understand the relationship between the risk management and the compliance with the requirements ofdifferent stakeholders of an organizationTo acquire the competence to implement, maintain and manage an ongoing risk management program accordingto ISO 31000To acquire the competence to effectively advise organizations on the best practices in risk management In this three-day intensive course participants develop the competence to master a model for implementing risk management processes throughout their organization using the ISO 31000:2009 standard as a reference framework. Day 1 Introduction to the Risk Management framework according to ISO 31000 Concepts and definitions related to Risk Management Risk Management standards, frameworks and methodologies Implementation of a Risk Management framework Understanding an organization and its context Day 2 Risk identification and assessment, risk evaluation, treatment, acceptance, communication and surveillance according to ISO 31000 Risk identification Risk analysis and risk evaluation Risk treatment Risk acceptance and residual risk management Risk communication and consultation Risk monitoring and review Day 3 Risk assessment methodologies according to ISO 31000 and Certification Exam Presentation of risk assessment methodologies Certification Exam

ISO 31000 Risk Manager
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Data Centre Risk Professional (CDRP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified Data Centre Risk Professional (CDRP)
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified CISO (C|CISO) w/exam

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for CCISOs are certified in the knowledge of and experience in the following CISO Domains:Governance (Policy, Legal & Compliance)IS Management Controls and Auditing Management (Projects, Technology & Operations)Management ? Projects and OperationsInformation Security Core CompetenciesStrategic Planning & Finance Overview Please refer to Overview. The Certified CISO (C|CISO) course has certified leading information security professionals around the world and is the first of its kind training and certification program aimed at producing top-level Information Security Leaders. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by seasoned CISOs for current and aspiring CISOs. Governance Drivers that Influence Governance Corporate Governance Activities Information Security Governance Activities Governance and Ethical Decision Making Security Risk Management, Controls, and Audit Management Risk Management Audit Management Risk Treatment Risk Management Frameworks Risk Communication and Organizational Reporting Security Program Management and Operations Information Security Portfolio Management Information Security Program Management Information Security Project Management Security Operations Information Security Core Competencies Access Control Physical Security Network and Communications Security Threat and Vulnerability Management System and Application Security Encryption Concepts and Technology Strategic Planning, Financial Management, and Vendor Management Strategic Planning Financial Management Vendor Risk Management Additional course details: Nexus Humans EC-Council Certified CISO (C|CISO) w/exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified CISO (C|CISO) w/exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified CISO (C|CISO) w/exam
Delivered OnlineFlexible Dates
Price on Enquiry

C)ISRM - Certified Information System Risk Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Risk Manager students will be prepared to pass the CISRM exam.  Certified Information Systems Risk Manager, CISRM, course is made for IT and IS professionals who are involved with all aspects of risk management. Requests for this particular area of certification is growing fast in the employment sector. Recent high-profile breaches in both the public and private sectors have increased awareness for the need for Risk Management professionals. Mile2?s CISRM certification exam will test your knowledge in all areas of risk management. If you would like some training and test preparation before taking the Certified Information System Risk Manager Exam we offer the CISRM course as both a live class and a self-study combo. First, you will learn to assess a system, then implement risk controls. Finally, you will be able to monitor and maintain risk procedures. With this training, you will be able to identify risks associated with specific industries. After course completion, you will be able to design, implement, monitor and maintain risk-based, efficient and effective IS controls. Knowledge of all of these areas will be required to pass the CISRM exam. Course Outline The Big Picture Domain 1 ? Risk Identification Assessment and Evaluation Domain 2 ? Risk Response Domain 3 ? Risk Monitoring Domain 4 ? IS Control Design and Implementation

C)ISRM - Certified Information System Risk Manager Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

GTS200 Configuring SAP Global Trade Services

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Project Team Members Consultants Overview This course will prepare you to: Configure selected application areas of Compliance Management, Customs Management and Risk Management. This course covers selected application areas of Compliance Management, Customs Management and Risk Management. Course Outline Communication between SAP ERP and SAP Global Trade Services Basic mapping settings Definition and activation of legal regulations Configuration of legal control Configuration of customs processing Configuration of preference determination and vendor declaration management Additional course details: Nexus Humans GTS200 Configuring SAP Global Trade Services training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GTS200 Configuring SAP Global Trade Services course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

GTS200 Configuring SAP Global Trade Services
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Incident Response for Business Professionals (IRBIZ)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed primarily for IT leaders and company executives who are responsible for complying with incident response legislation. This course focuses on the knowledge, resources, and skills necessary to comply with incident response, and incident handling process requirements. Overview In this course, you will understand, assess and respond to security threats and operate a system and network security analysis platform. You will: Explain the importance of best practices in preparation for incident response Given a scenario, execute incident response process Explain general mitigation methods and devices Assess and comply with current incident response requirements. This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT?s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response. This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. Assessment of Information Security Risks The Importance of Risk Management Integrating Documentation into Risk Management Response to Cybersecurity Incidents Deployment of Incident Handling and Response Architecture Containment and Mitigation of Incidents Preparation for Forensic Investigation as a CSIRT Investigating Cybersecurity Incidents Use a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation Complying with Legislation Examples of Legislation (if this is covered in above topics, no need to include here) GDPR, HIPPA, Elections Case study: Incident Response and GDPR (Using GDPR legislation, create a response that is compliant with it ? this could be discussion-based activity as well.) State Legislation Resources and Example Search terms to find state legislation Using NYS as example use the NYS Privacy Response act or other legislation to create a similar case study as previous. Provide answers on when to use federal versus state and do you have to follow both?

CertNexus Incident Response for Business Professionals (IRBIZ)
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional
Delivered OnlineFlexible Dates
Price on Enquiry

C)ISSM - Certified Information Systems Security Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSM - Certified Information Systems Security Manager Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry