• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2574 Courses in Cardiff delivered Online

Adult Nursing

By NextGen Learning

Course Overview: The Adult Nursing course offers a comprehensive foundation for those seeking a career in nursing, providing learners with essential knowledge and skills for adult healthcare. Covering a wide range of topics, from the legal and ethical aspects of nursing practice to practical issues like pain management and infection control, this course ensures that learners gain the expertise needed to excel in various healthcare environments. Through detailed modules, learners will explore the roles and responsibilities of nurses, the complexities of adult care, and key nursing principles. Upon completion, learners will be well-prepared to contribute effectively to patient care, enhancing their capabilities in diverse healthcare settings. Course Description: This course covers critical topics necessary for the competent practice of adult nursing. Learners will explore healthcare settings, legal frameworks, and ethical considerations in nursing, building a solid understanding of professional standards. The curriculum includes comprehensive modules on infection control, pain management, fluid balance, and more, providing essential knowledge for a well-rounded nursing career. Learners will engage with the core concepts of communication, health and safety, hygiene, and mobility, ensuring they are prepared to meet the challenges of adult care. By the end of the course, learners will possess the skills required to manage patient care in a variety of contexts, making them valuable assets in the healthcare workforce. Course Modules: Module 01: Introduction to Nursing Module 02: Working in Different Healthcare Settings Module 03: Understanding Legal, Professional Standards of Practice and Ethical Aspects of Health Care - Part 1 Module 04: Understanding Legal, Professional Standards of Practice and Ethical Aspects of Health Care - Part 2 Module 05: Effective Communication in Nursing Module 06: Health and Safety in Nursing Module 07: Hygiene in Nursing Module 08: Infection Control Module 09: Asepsis in Nursing Module 10: Medication Administration in Nursing Module 11: Adult Care in Different Life Stages Module 12: Understanding Immune System in Nursing Module 13: Rest and Sleep Management in Nursing Module 14: Mobility and Immobility Issues of Patients in Nursing Module 15: Pain Management for Nurses Module 16: Nutrition in Nursing Module 17: Fluid and Electrolyte Balance Module 18: Assisting with Elimination Module 19: Oxygenation in Nursing (See full curriculum) Who is this course for? Individuals seeking to enter the nursing profession. Professionals aiming to expand their expertise in adult healthcare. Beginners with an interest in healthcare and nursing. Those looking to understand essential nursing concepts for career development. Career Path Registered Nurse (RN) Healthcare Assistant Nurse Practitioner Adult Care Specialist Medical/Surgical Nurse Community Health Nurse Healthcare Administrator Clinical Nurse Educator

Adult Nursing
Delivered OnlineFlexible Dates
£7.99

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered OnlineFlexible Dates
Price on Enquiry

DP120 Data Protector 9.x Essentials

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Storage and system administrators using HP Data Protector software, System Engineers, Consultants, Project Managers, Professional Services, and Sales. Overview Upon successful completion of this course, you should be able to:Install and distribute HP Data Protector software in your environmentConfigure the HP Data Protector software productConfigure your tape and disk-based backup solutions for use with HP Data Protector softwareUse HP Data Protector software to run backups and restores, and monitor these sessions from both the Data Protector GUI and command lineManage the HP Data Protector software Internal Database (IDB)Create custom reports and notification proceduresSecure your installation by configuring user access and adding security to the Cell Manager and DP client systemsPrepare your client to recover from a disaster situationUnderstand the Data Protector processes and perform basic troubleshooting of your installation The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations. The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations. Additional course details: Nexus Humans DP120 Data Protector 9.x Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP120 Data Protector 9.x Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP120 Data Protector 9.x Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Disability Studies Training Course

5.0(2)

By Training Express

The Disability Studies Training Course provides in-depth insights into the challenges and opportunities within the field of disability. Whether you are looking to understand the social, legal, or healthcare aspects of disability, this course offers a broad exploration of relevant topics. You will develop a strong understanding of disability theories, models, and the key policies that shape the lives of individuals with disabilities. With engaging modules, you'll explore diverse areas, from education and employment to healthcare provision and social support systems, offering a holistic view of how society interacts with and supports disabled individuals. Designed for those interested in creating a more accessible and supportive environment for all, this course delves into the critical issues that people with disabilities face in their daily lives. By studying various perspectives on disability, you will gain a well-rounded knowledge base, preparing you to better advocate for and work alongside individuals with disabilities in various settings. Whether you're looking to improve your understanding for personal growth or career development, this course provides valuable insights into an important and often underrepresented area of study. Key Features CPD Accredited FREE PDF + Hardcopy certificate Fully online, interactive course Self-paced learning and laptop, tablet and smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum Module 1: Introduction to Disability Studies Module 2: Social and Cultural Perspectives on Disability Module 3: Disability and Society Module 4: Health and Well-being for People with Disabilities Module 5: Disability and Intersectionality Module 6: Disability and Global Perspectives Learning Outcomes: Analyse societal perceptions influencing disability dynamics. Demonstrate a nuanced understanding of disability's social and cultural dimensions. Evaluate the impact of disability on individuals and wider society. Implement strategies to enhance health and well-being for people with disabilities. Recognise and navigate intersections between disability and various identities. Apply a global perspective to understand diverse manifestations of disability. Accreditation This course is CPD Quality Standards (CPD QS) accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certificate After completing this course, you will get a FREE Digital Certificate from Training Express. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals passionate about social justice. Students aspiring to work in healthcare or advocacy. Educators seeking a deeper understanding of diversity. Professionals in social work or community development. Anyone interested in fostering an inclusive society. Advocates for human rights and equality. Individuals pursuing careers in public health. Those committed to promoting global inclusivity. Career path Disability Rights Advocate Inclusive Education Coordinator Community Support Worker Public Health Consultant Diversity and Inclusion Specialist NGO Program Manager Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hard copy certificate Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

Disability Studies Training Course
Delivered Online On Demand1 hour
£12

Disability Awareness & Inclusion Training

By The Teachers Training

Learn essential skills for a more inclusive world with our Disability Awareness & Inclusion Training course. Gain insights, strategies, and tools to foster equality.

Disability Awareness & Inclusion Training
Delivered Online On Demand2 hours
£15

Chef Training: Hospitality & Catering with HACCP and Food Hygiene & Safety Level 2 & 3

By Wise Campus

Chef: Chef Course Online Are you enthusiastic about pursuing a career as a professional chef? You've found it! With the help of our thorough Level 5 Professional Chef Course, you will be given the information and abilities necessary to succeed in this fascinating industry. With the help of this thorough Level 5 Professional Chef Course, you will learn the essential ideas and their practical implementations. You also learn about the ethical aspects of transformational educational experiences in the Level 5 Professional Chef Course. In this Level 5 Professional Chef Course, all the fundamental knife skills and food preservation and maintenance techniques are covered. Your ability to manage foreign food will improve by our specialised Level 5 Professional Chef Course. After completing the Level 5 Professional Chef Course, you will be able to create menus, develop recipes, and maintain the cooking area's sanitary procedure. Use our Level 5 Professional Chef Course to immerse yourself in practical activities so that you can grow in your professional chef career with competence and assurance. Learning Outcome With the help of this Level 5 Professional Chef Course you will knowledgeable about the food storage process, menu planning and recipe development You will know about Culinary Foundations, Culinary Foundations and Culinary Techniques You will know about how International Cuisine manage, serve and maintain cleanliness of their items Level 5 Professional Chef Course help you to understand proper Food Safety, Sanitation and Operations Management Through this Level 5 Professional Chef Course Plating and Presentation Techniques will be explained Level 5 Professional Chef Course will help you for Culinary Entrepreneurship and Career Development Main Course: Level 5 Professional Chef Course Free Courses are including with this Chef: Chef Course Close Chef Course, We Offer a free Level 5 hospitality Management Course Close Chef Course, We Offer a free HACCP Course Close Chef Course, We Offer a free Food hygiene level 2 Course Close Chef Course, We Offer a free Food hygiene level 3 Course Special Offers of this Chef: Chef Course This Chef: Chef Course includes a FREE PDF Certificate. Lifetime access to this Chef: Chef Course Instant access to this Chef: Chef Course Get FREE Tutor Support to this Chef: Chef Course Chef: Chef Course Online With Chef: Chef, our all-inclusive course for aspiring chefs, take a culinary adventure. Chef: Chef discusses fundamental methods, Chef: Chef abilities, and Chef: Chef originality. Use Chef: Chef to enhance your culinary skills and ignite your love of food. Enroll in Chef: Chef now to avoid missing out on the ultimate culinary experience! Who is this course for? Chef: Chef Course Online This Level 5 Professional Chef: Chef Course is open to everyone. Requirements Chef: Chef Course Online To enrol in this Chef: Chef Course, students must fulfil the following requirements. To join in our Chef: Chef Course, you must have a strong command of the English language. To successfully complete our Chef: Chef Course, you must be vivacious and self driven. To complete our Chef: Chef Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this Chef: Chef Course. Career path Chef: Chef Course Online Multiple career will be open with our Level 5 Professional Chef: Chef Course: Restaurant chefs Kitchen or Chef Assistant Food Hygiene and Safety Officer

Chef Training: Hospitality & Catering with HACCP and Food Hygiene & Safety Level 2 & 3
Delivered Online On Demand2 hours 24 minutes
£12

Child Protection and Risk Assessment Course

5.0(3)

By School Of Health Care

Child Protection: Child Protection Course Online This Child Protection: Child Protection Course is designed to provide learners a thorough understanding of the childcare sector, equipping them with sector-specific knowledge and skills about Child Protection: Child Protection Course and risk assessment as well as a range of transferable career development. To become successful in your profession, you must have a specific set of skills to succeed in today’s competitive world. Through this Child Protection: Child Protection Course, you will develop the most in-demand skills to kickstart your career as a child protection officer, as well as upgrade your existing knowledge about child protection and risk assessment. In this exclusive Child Protection: Child Protection Course students will also learn about children rights. These include the child's right to life, the right to survive, and the right to develop. Their best interests must be considered at all times for their protection at any cost. This Child Protection: Child Protection Course will give students a thorough understanding about safety assessment of a child. A safety assessment of a child is the methodical gathering of information about dangerous family situations as well as present, severe, and plainly evident dangers to the child or youth's safety. This Child Protection: Child Protection Course is a great medium if you want to improve your skills and understanding about Child Protection: Child Protection Course. It is one of the most popular courses. This Child Protection: Child Protection Course will also help students to understand more about risk assessment in child protection: child protection. The collection and analysis of information to identify the degree to which important elements are present in a family context that enhance the possibility of future mistreatment of a child or teenager is known as risk assessment. This Child Protection: Child Protection Course will look at the function of assessment in child welfare practice. The Child Protection: Child Protection Course will discuss how a planned, methodical approach to assessment may help professionals make better judgments about how to detect problems and respond correctly. Using a range of interactive tasks and other tools designed to help students understand the skills and ideas covered in this Child Protection: Child Protection Course. This Child Protection: Child Protection Course is designed primarily for students who want to study assessments of child protection: child protection. It may also be of interest to people seeking a more comprehensive knowledge of evaluations and how they complement other initiatives to protect children. This Child Protection: Child Protection Course is a great medium if you want to improve your skills and understanding; it is one of the most popular courses. Main Course: Child Protection course Free courses included with Child Protection: Child Protection Course Course 01: Designated Safeguarding Lead Training Course Course 02: Child and Adolescent Mental Health Special Offers of this Child Protection: Child Protection Course: This Child Protection: Child Protection Course includes a FREE PDF Certificate. Lifetime access to this Child Protection: Child Protection Course Instant access to this Child Protection: Child Protection Course 24/7 Support Available to this Child Protection: Child Protection Course [ Note: Free PDF certificate as soon as completing Child Protection: Child Protection Course] Child Protection: Child Protection Course Online Course Curriculum of Child Protection: Child Protection Course Module 01: Introduction to Child Protection Module 02: Laws & Guidance Module 03: Understanding Child Abuse Module 04: Understanding Risk & Risk Assessment Module 05: Responding to Disclosure Module 06: What Should You Do Next to Referral Module 07: Record Keeping Who is this course for? Child Protection: Child Protection Course Online There are no specific learning requirements for this Child Protection: Child Protection Course, which is ideal for those who work with children or are responsible for caring for children, such as: Tutor. Child carer. Paediatric Nurses. Social Caregiver. Anyone in a profession where children are under their supervision. Requirements Child Protection: Child Protection Course Online To enrol in this Child Protection: Child Protection Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Child Protection: Child Protection Course. Be energetic and self-motivated to complete our Child Protection: Child Protection Course. Basic computer Skill is required to complete our Child Protection: Child Protection Course. If you want to enrol in our Child Protection: Child Protection Course, you must be at least 15 years old. Career path Child Protection: Child Protection Course Online Taking this Child Protection: Child Protection Course will strengthen your CV and open up numerous future work prospects.

Child Protection and Risk Assessment Course
Delivered Online On Demand1 hour 18 minutes
£12

Symantec ProxySG 6.6 Advanced Administration (BCCPP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution

Symantec ProxySG 6.6 Advanced Administration (BCCPP)
Delivered OnlineFlexible Dates
Price on Enquiry

CCSA Check Point Certified Security Administrator

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. Overview Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.

CCSA Check Point Certified Security Administrator
Delivered OnlineFlexible Dates
Price on Enquiry