• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1070 Courses in Nottingham delivered Online

Level 2 & 3 Behaviour Management

By Imperial Academy

Level 3 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited | 120 CPD Points | Lifetime Access

Level 2 & 3 Behaviour Management
Delivered Online On Demand
£100

Level 3, 4, 5 Change Management

By Imperial Academy

Level 5 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited | 150 CPD Points | Lifetime Access

Level 3, 4, 5 Change Management
Delivered Online On Demand
£100

Level 2 & 3 Information Management

By Imperial Academy

Level 3 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited | 120 CPD Points | Lifetime Access

Level 2 & 3 Information Management
Delivered Online On Demand
£100

Level 2 & 3 Office Management

By Imperial Academy

Level 3 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited | 120 CPD Points | Lifetime Access

Level 2 & 3 Office Management
Delivered Online On Demand
£100

Level 2 & 3 Stress Management

By Imperial Academy

Level 3 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited | 120 CPD Points | Lifetime Access

Level 2 & 3 Stress Management
Delivered Online On Demand
£100

Level 3, 4, 5 Compliance Management

By Imperial Academy

Level 5 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited | 150 CPD Points | Lifetime Access

Level 3, 4, 5 Compliance Management
Delivered Online On Demand
£100

CertNexus Certified Cyber Secure Coder (CSC-210)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. Identifying the Need for Security in Your Software Projects Identify Security Requirements and Expectations Identify Factors That Undermine Software Security Find Vulnerabilities in Your Software Gather Intelligence on Vulnerabilities and Exploits Handling Vulnerabilities Handle Vulnerabilities Due to Software Defects and Misconfiguration Handle Vulnerabilities Due to Human Factors Handle Vulnerabilities Due to Process Shortcomings Designing for Security Apply General Principles for Secure Design Design Software to Counter Specific Threats Developing Secure Code Follow Best Practices for Secure Coding Prevent Platform Vulnerabilities Prevent Privacy Vulnerabilities Implementing Common Protections Limit Access Using Login and User Roles Protect Data in Transit and At Rest Implement Error Handling and Logging Protect Sensitive Data and Functions Protect Database Access Testing Software Security Perform Security Testing Analyze Code to find Security Problems Use Automated Testing Tools to Find Security Problems Maintaining Security in Deployed Software Monitor and Log Applications to Support Security Maintain Security after Deployment

CertNexus Certified Cyber Secure Coder (CSC-210)
Delivered OnlineFlexible Dates
£2,085

Kitchen Management

5.0(1)

By LearnDrive UK

Sharpen your culinary leadership skills with our Kitchen Management course. Master safety, sanitation, menu creation, and strategic financial planning to excel as a kitchen manager. Dive into this all-encompassing guide to managing a high-functioning kitchen.

Kitchen Management
Delivered Online On Demand1 hour
£5

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered OnlineFlexible Dates
£2,037

Level 3, 4 & 5 Facilities Management

By Imperial Academy

Level 5 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited | 150 CPD Points | Lifetime Access

Level 3, 4 & 5 Facilities Management
Delivered Online On Demand
£100