• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

138 Courses delivered Online

Project Management Level 3 Diploma (Project Manager) - CPD Certified

4.7(26)

By Academy for Health and Fitness

***Limited Time Deal*** Complete Project Management Training for Project Managers with Free PDF and Hard Copy Certificate Project management is a critical skill in today's fast-paced business world. According to the Project Management Institute (PMI), the UK project management industry is worth over £27 billion. However, a staggering 70% of projects fail due to poor management. Are you ready to master the art of project management and lead your team to success? Courses Are Included In This Project Management for Project Managers Training: Course 01: Level 3 Diploma in Project Management for Project Managers Course 02: Diploma in Six Sigma & Lean Process Course 03: Global Project Management This comprehensive Project Management course will guide you through everything you need to know to manage projects effectively. From understanding the fundamentals of project management to mastering goal-setting techniques and stakeholder management, you'll gain a holistic understanding of the project lifecycle. Explore project planning methodologies, risk management strategies, and budgeting principles, empowering you to navigate complex projects with confidence. This course holds immense significance as it is CPD Accredited and Quality Licence Scheme Level 7 endorsed. These prestigious accreditations validate its quality and align it with professional standards, making it an ideal choice for individuals seeking to broaden their knowledge and skills in the Project Management sector. Learning Outcomes of Project Management Training: Master the fundamentals of project management and its key principles. Learn to set SMART goals and align project objectives. Develop effective stakeholder management and communication strategies. Explore project planning tools and techniques for successful execution. Understand budget management and procurement processes for resource optimization. Gain insights into risk identification, mitigation, and project closure. Take control of your projects and propel your career forward! This course provides the knowledge and practical skills needed to become a confident and effective project manager. Enroll today and unlock your full project management potential! Why Choose Us? Get a free CPD Accredited PDF and Hard Copy Certificate. This course is entirely online, interactive lesson with voiceover audio Get Lifetime access to the Project management course materials The Project management comes with 24/7 tutor support What Our Students Say About This Project Management for Project Managers Certificate: "I would gladly recommend anyone to take up courses with Red.'' From: Francis Offiong "This is very good medium of learning new era of education." From: MUHAMMAD ANSAR "This is a course suitable for all carers to partake on." From: Orheuan Iriajen ''It's an interesting course. I hope to use the knowledge to advance in my career as a Project Manager'' From: Vivian Berenibara. Take a step toward a brighter future! This project management course equips you with the skills to initiate, plan, execute, and close projects effectively. You'll master the art of setting SMART goals, managing stakeholders, creating project plans, handling budgets, and mitigating risks. *** Course Curriculum of Project Management*** Module 1: The Fundamentals of Project Management What Is Project? Project Management Duties of a Project Manager Prioritising, Delegating and Communicating Required Skills Module 2:Project Landscapes Project Lifecycle Project Management Methodologies Module 3: How to Get Started for a Successful Project Importance of Project Initiation Key Components of Project Initiation Determining Project Goals and Deliverables Module 4: SMART Goals Specific Measurable Attainable Relevant Time-Bound Module 5:Managing Stakeholders Effectively Stakeholders Assigning Roles and Responsibilities Different Roles on a Project Stakeholder Analysis Influence and Interest Communicating with Stakeholders RACI Chart Module 6:Starting off with Project Planning Importance of Planning Launching Planning Phase Project Kick-off Meeting Importance of Milestones Setting Project Milestones The Project Plan Components of a Project Plan Module 7: Project Planning Tools Work Breakdown Structure (WBS) Gantt Chart Kanban Boards Module 8:Budget Management and Procurement Project Budget Components of a Budget Creating a Project Budget Managing the Budget Procurement Process Module 9: Risk Identification and Management What is risk How do we identify risk Risk Priority Single Point Failure Risk Mitigation Planning Module 10: Running a Successful Project Track and Measure Project Progress Quality Management DMAIC PDCA Module 11: Closing a Project Project Closing Criteria Impact Reporting How will I get my Certificate? After successfully completing the course, you will be able to order your Certificates as proof of your achievement. PDF Certificate: FREE (Previously, it was £12.99) CPD Hard Copy Certificate: FREE (Previously, it was £29.99) CPD 10 CPD hours / points Accredited by CPD Quality Standards Project Management Promo Video 00:54 1: Project Management Promo Video Preview 00:54 Module 1: The Fundamentals of Project Management 13:17 2: Module 1: The Fundamentals of Project Management Preview 13:17 Module 2: Project Landscapes 07:54 3: Module 2: Project Landscapes 07:54 Module 3: How to Get Started for a Successful Project 07:57 4: Module 3: How to Get Started for a Successful Project 07:57 Module 4: SMART Goals 09:39 5: Module 4: SMART Goals 09:39 Module 5: Managing Stakeholders Effectively 15:23 6: Module 5: Managing Stakeholders Effectively 15:23 Module 6: Starting off with Project Planning 13:18 7: Module 6: Starting off with Project Planning 13:18 Module 7: Project Planning Tools 05:35 8: Module 7: Project Planning Tools 05:35 Module 8: Budget Management and Procurement 13:55 9: Module 8: Budget Management and Procurement 13:55 Module 9: Risk Identification and Management 15:06 10: Module 9: Risk Identification and Management 15:06 Module 10: Running a Successful Project 14:53 11: Module 10: Running a Successful Project 14:53 Module 11: Closing a Project 11:23 12: Module 11: Closing a Project 11:23 Order Your Certificate 02:00 13: Order Your CPD Certificate 01:00 14: Order Your QLS Endorsed Certificate 01:00 Who is this course for? This Project Manager Training course is ideally suited to any individual working in a standard. Particularly, this course is perfect for: New members of the project team Level 7 Diploma Project Management Level 6 Certificate in Project Management Project finance Project Management Insititute (PMI) NB: Please note that this Project Management course does not provide any professional qualifications. To get professional qualifications, please check: Project Management Insititute (PMI) Courses PMI Project Management Professional Courses PMI Certified Associate in Project Management Courses APM Project Management Qualification (PMQ) Level 7 Diploma - Project Management pmi project management professional Requirements You will not need any prior background or expertise to enrol in this Project management course. Career path After completing this course, you are to start your career or begin the next phase of your career. Project Coordinator Project Manager Senior Project Manager Project Director Program Manager Portfolio Manager Chief Project Officer (CPO) Project Assistant Project co-ordinator Project management support Project Analyst Certificates Certificate Accredited by CPD Digital certificate - Included Cademy certificate of completion Digital certificate - Included Will be downloadable when all lectures have been completed

Project Management Level 3 Diploma (Project Manager) - CPD Certified
Delivered Online On Demand2 hours 12 minutes
£12

Employment Law Training

By NextGen Learning

Did you know that over 60% of workplace disputes in the UK arise from a need for more understanding of employment law? Don't let your organisation fall victim to costly legal battles. Our "Employment Law Training" course is your gateway to mastering the intricacies of employment legislation, mitigating risks, and fostering a harmonious workplace. You'll gain a profound understanding of the subject with ten in-depth chapters covering everything from the Basics of Employment Law to Workplace Monitoring and Data Protection. Master the legal recruitment process, craft foolproof employment contracts, and create employee handbooks that ensure compliance. Explore topics like discrimination, health & safety, and dismissal procedures with expert guidance. Take advantage of this opportunity to empower your team with the knowledge they need to thrive in a legally compliant workplace. Enroll now and embrace the world of Employment Law today! Learning Outcomes: Upon completing the Employment Law course, learners will: Employment Law Foundation: Develop a strong understanding of UK Employment Law principles and legislation. Recruitment Proficiency: Master the legal recruitment process, a critical aspect of Employment Law. Contract Expertise: Create effective employment contracts and employee handbooks in line with Employment Law standards. Conflict Resolution: Handle disciplinary procedures, grievances, and dismissal in compliance with Employment Law regulations. Compliance Assurance: Ensure workplace compliance with anti-discrimination laws, health and safety regulations, and data protection, all integral to Employment Law. Risk Mitigation: Learn to effectively identify and mitigate legal risks in the workplace, a key component of Employment Law expertise. What will make you stand out? On completion of this Employment Law online course, you will gain: CPD QS Accredited Proficiency Lifetime access to the whole collection of learning materials. The online test with immediate results You can study and complete the Employment Law course at your own pace. Study for the Employment Law course using any internet-connected device, such as a computer, tablet, or mobile device. "Employment Law Training" offers an invaluable opportunity to delve deep into the intricate world of employment law in the United Kingdom. With a focus on practicality and legal compliance, this comprehensive course empowers you with the knowledge and expertise needed to navigate the complex nuances of the employment landscape effectively. This Employment Law course covers a wide array of essential modules, including recruitment procedures, the art of crafting airtight employment contracts, and the development of employee handbooks that align seamlessly with legal standards. Delve into conflict resolution techniques, encompassing disciplinary processes and dismissal protocols, all within the bounds of UK employment law. Additionally, it explores vital topics such as combating workplace discrimination, upholding stringent health and safety regulations, and ensuring data protection compliance. CPD 10 CPD hours / points Accredited by CPD Quality Standards Chapter 01: Basics of Employment Law 16:17 1: Basics of Employment Law Chapter Preview 16:17 Chapter 02: Legal Recruitment Process 26:44 2: Legal Recruitment Process 26:44 Chapter 03: Employment Contracts 14:06 3: Employment Contracts 14:06 Chapter 04: Employee Handbook 13:03 4: Employee Handbook 13:03 Chapter 05: Disciplinary Procedure 13:55 5: Disciplinary Procedure 13:55 Chapter 06: National Minimum Wage _ National Living Wage 21:57 6: National Minimum Wage _ National Living Wage 21:57 Chapter 07: Parental Rights, Sick Pay and Pension Scheme 31:13 7: Parental Rights, Sick Pay and Pension Scheme 31:13 Chapter 08: Discrimination in the Workplace 27:43 8: Discrimination in the Workplace 27:43 Chapter 09: Health & Safety at Work 10:21 9: Health & Safety at Work 10:21 Chapter 10: Dismissal, Grievances and Employment Tribunals 20:51 10: Dismissal, Grievances and Employment Tribunals 20:51 Chapter 11: Workplace Monitoring and Data Protection 06:59 11: Workplace Monitoring and Data Protection 06:59 Assignment - Employment Law UK 03:00 12: Assignment On Employment Law UK 03:00 PDF Who is this course for? This Employment Law course is perfect for: HR Professionals Managers & Supervisors Business Owners Legal Consultants Compliance Officers Career Advancers Requirements Without any formal requirements, you can delightfully enrol in this Employment Law course. Career path The aim of this exclusive Employment Law course is to help you toward your dream career. So, complete this Employment Law course and enhance your skills to explore opportunities in relevant areas: Solicitor: £27,000 - £38,000 per annum HR Advisor: £25,000 - £29,500 per annum Employment Law Consultant: £40,000 - £45,000 per annum Compliance Officer: £30,000 - £50,000 per year Certificates CPD Quality Standard Certificate Digital certificate - £4.99 Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hardcopy Transcript: £9.99

Employment Law Training
Delivered Online On Demand34 hours
£12

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

ISO 27001 Lead Implementer E-Learning Course

5.0(1)

By Cognicert Limited

The “ISO 27001:2022 Lead Implementer ” course provides comprehensive training in the ISO 27001:2022 standard and all its requirements from the Implementer ’s point of view, as well as basic skills necessary to execute the requirements. It’s a practical-oriented training that should be considered “a must” for every ISO 27001:2022 Implementer. This intensive course is specifically designed to participants to serve as ISO 27001:2022 Lead Implementers. The interactive training program, complete with quizzes, will provide the necessary technical knowledge and understanding of all ISO 27001:2022 requirements to implement the requirement of the standard.

ISO 27001 Lead Implementer E-Learning Course
Delivered Online On Demand12 hours
£149.99

CompTIA CySA+ Cybersecurity Analyst Course

4.5(3)

By Studyhub UK

Embark on a transformative journey with the 'CompTIA CySA+ Cybersecurity Analyst Course,' designed to fortify the digital frontiers of business. This comprehensive training program begins with an immersive introduction to the cybersecurity realm, setting the stage for a deep dive into the sophisticated world of threat data and intelligence. With an emphasis on real-world application, participants will gain invaluable insights into organizational security, developing the acumen to anticipate, identify, and neutralize digital threats. Mastery over vulnerability assessment tools and mitigation strategies forms the bedrock of this curriculum, providing learners with a robust skill set pivotal for the modern cybersecurity landscape. Learning Outcomes Interpret threat data to reinforce organizational security frameworks. Assess vulnerabilities using state-of-the-art tools and methodologies. Apply best practices for ensuring software and hardware assurance. Analyze security solutions for robust infrastructure management. Implement and manage incident response protocols to address potential compromises effectively. Why choose this CompTIA CySA+ Cybersecurity Analyst Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the CompTIA CySA+ Cybersecurity Analyst Course Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this CompTIA CySA+ Cybersecurity Analyst Course for? Individuals aiming to specialize in cybersecurity analysis. IT professionals seeking to broaden their cybersecurity knowledge. Organizational staff responsible for managing digital security risks. Security consultants requiring up-to-date threat intelligence expertise. System administrators looking to implement enhanced security measures. Career path Cybersecurity Analyst - £25,000 to £60,000 Vulnerability Analyst - £30,000 to £65,000 Security Operations Centre (SOC) Analyst - £32,000 to £70,000 Incident Responder - £27,000 to £68,000 Digital Forensics Specialist - £35,000 to £75,000 Information Security Consultant - £40,000 to £80,000 Prerequisites This CompTIA CySA+ Cybersecurity Analyst Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA CySA+ Cybersecurity Analyst Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introduction 00:02:00 All about the Exam 00:08:00 What's New on the CompTIA CySA+ Exam? 00:05:00 Meet the Instructors 00:02:00 Thinking like the Enemy 00:09:00 Section 02: The Importance of Threat Data and Intelligence Intelligence Sources and Confidence Levels 00:08:00 Threat Indicators and Actors 00:08:00 Threat Trends 00:07:00 Intelligence Cycle and ISACs 00:06:00 Section 03: Threat Intelligence in Support of Organizational Security Attack Frameworks 00:06:00 Threat Research 00:11:00 Threat Modeling and Intelligence Sharing 00:06:00 Section 04: Vulnerability Assessment Tools Vulnerability Identification 00:07:00 Scanning Parameters and Criteria 00:09:00 Scanning Special Considerations 00:06:00 Validation 00:03:00 Remediation and Mitigation 00:08:00 Inhibitors to Remediation 00:07:00 Section 05: Threats and Vulnerabilities Associated with Specialized Technology Web Applications Scanners, Part 1 00:10:00 Web Applications Scanners, Part 2 00:05:00 Scanning 00:06:00 Configuring and Executing Scans 00:08:00 Vulnerability Scanning 00:10:00 Reverse Engineering 00:08:00 Enumeration 00:06:00 Wireless Assessment Tools 00:08:00 Cloud Assessment Tools 00:04:00 Section 06: Threats and Vulnerabilities Associated with Specialized Technology Mobile and IoT 00:10:00 Embedded and Firmware Systems (RTOS, SoC, and FPGA) 00:09:00 Access and Vehicles Risk 00:08:00 Automation and Control Risk 00:10:00 Section 07: Threats and Vulnerabilities Associated with Operating in the Cloud Cloud Models 00:07:00 Remote Service Invocation (FaaS, IaC, API) 00:10:00 Cloud Vulnerabilities 00:06:00 Section 08: Mitigating Controls for Attacks and Software Vulnerabilities Injection and Overflow Attacks 00:09:00 Authentication Attacks 00:07:00 Exploits 00:08:00 Application Vulnerabilities, Part 1 00:08:00 Application Vulnerabilities, Part 2 00:07:00 Section 09: Security Solutions for Infrastructure Management Network Architecture and Asset Management 00:09:00 Protecting Your Territory 00:05:00 Identity and Access Management 00:11:00 Encryption and Active Defense 00:08:00 Section 10: Software Assurance Best Practices Platforms 00:07:00 SOA and DevSecOps 00:09:00 Secure Software Development 00:08:00 Best Coding Practices 00:04:00 Section 11: Hardware Assurance Best Practices Trusted Hardware 00:10:00 Hardware Encryption 00:04:00 Hardware Security 00:08:00 Section 12: Data Analysis in Security Monitoring Activities Data Analytics 00:10:00 Endpoint Security 00:08:00 Recon Results, Part 1 00:13:00 Recon Results, Part 2 00:05:00 Impact Analysis 00:05:00 Collective Tools 00:09:00 Query Writing 00:07:00 E-mail Analysis, Part 1 00:10:00 E-mail Analysis, Part 2 00:08:00 Section 13: Implement Configuration Changes to Existing Controls to Improve Security Permissions 00:09:00 Firewalls 00:08:00 Intrusion Prevention Rules 00:05:00 DLP and Endpoint Detection 00:05:00 Section 14: The Importance of Proactive Threat Hunting Threat Hunting and the Hypothesis 00:06:00 Threat Hunting Process 00:07:00 Results and Benefits 00:05:00 Section 15: Compare and Contrast Automation Concepts and Technologies Workflow and Scripting 00:07:00 API and Malware Signature Creation 00:08:00 Threat Feeds and Machine Learning 00:06:00 Protocols, Standards, and Software Engineering 00:05:00 Section 16: The Importance of the Incident Response Process IR Roles and Responsibilities 00:08:00 IR Active Preparation 00:10:00 Section 17: Appropriate Incident Response Procedures Incident Response Process 00:07:00 Section 18: Analyze Potential Indicators of Compromise Network Symptoms 00:04:00 Host Symptoms 00:08:00 Application Symptoms 00:04:00 Section 19: Utilize Basic Digital Forensics Techniques Digital Forensics 00:10:00 Seizure and Acquisitions 00:05:00 Forensics Acquisition Tools 00:09:00 Mobile, Virtualization, and Cloud 00:06:00 Forensics Analysis, Part 1 00:04:00 Forensics Analysis, Part 2 00:08:00 Packet Capture 00:12:00 Section 20: The Importance of Data Privacy and Protection Data Privacy and Security 00:06:00 Nontechnical Controls 00:09:00 Technical Controls 00:08:00 Section 21: Security Concepts in Support of Organizational Risk Mitigation Business Impact Analysis 00:05:00 Risk Identification 00:05:00 Risk Calculation and Communication 00:06:00 Training 00:04:00 Supply Chain Assessment 00:04:00 Section 22: The Importance of Frameworks, Policies, Procedures, and Controls Frameworks 00:13:00 Policies and Procedures 00:05:00 Controls and Procedures 00:08:00 Verification 00:06:00 Assignment Assignment - CompTIA CySA+ Cybersecurity Analyst Course 00:00:00

CompTIA CySA+ Cybersecurity Analyst Course
Delivered Online On Demand11 hours 25 minutes
£10.99

ISO 22301 Lead Implementer Online Course

5.0(1)

By Cognicert Limited

The “ISO 22301:2019 Lead Implementer ” course provides comprehensive training in the ISO 22301:2019 standard and all its requirements from the Implementer ’s point of view, as well as basic skills necessary to execute the requirements. It’s a practical-oriented training that should be considered “a must” for every ISO 22301:2019 Implementer. This intensive course is specifically designed to participants to serve as ISO 22301:2019 Lead Implementers.

ISO 22301 Lead Implementer Online Course
Delivered Online On Demand5 days
£475

Accounts Payable Process: Optimizing Payment Processing Operations

4.3(43)

By John Academy

Optimize your organization's financial health with our comprehensive 'Accounts Payable Process: Optimizing Payment Processing Operations' course. Learn essential skills in vendor management, invoice processing, AP automation, purchase ledger management, and financial budgeting. Master the latest technologies and streamline your payment processing workflow for enhanced efficiency. Enroll now for a transformative learning experience in financial management and take a decisive step toward organizational success.

Accounts Payable Process: Optimizing Payment Processing Operations
Delivered Online On Demand
£24.99

How to Handle Data Breaches in Compliance with GDPR?

By GDPR Advisor

Learn how to effectively manage data breaches under GDPR regulations. Discover essential steps, from establishing a response plan to leveraging GDPR Data Protection Consultancy and gap analysis services. Ensure compliance and protect your organization.

How to Handle Data Breaches in Compliance with GDPR?
Delivered Online On Demand1 hour
FREE

Educators matching "risk mitigation"

Show all 5