• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

16 Courses delivered Online

Compliance and Risk Management - QLS Level 3, 4 & 5

By Imperial Academy

QLS Level 5 Endorsed Course with FREE Certificate | 150 CPD Points | Lifetime Access | Tutor Support

Compliance and Risk Management - QLS Level 3, 4 & 5
Delivered Online On Demand
£90

Electronic Document Management: Efficient Data Handling

4.5(3)

By Studyhub UK

Imagine a world where misplaced documents, complex paper trails, and security vulnerabilities are things of the past. Welcome to the transformative universe of Electronic Document Management (EDM). Our course, 'Electronic Document Management: Efficient Data Handling,' is your gateway to mastering this indispensable realm. Learn how to optimise the flow of digital information, assure compliance with industry regulations, and secure your data assets in the modern world. Dive deep into crucial subjects such as standards, regulations, and the framework to set up an EDM system. Become adept at the electronic document lifecycle, understanding its operations, processes, and control measures. Additionally, our Module 07 on Advanced Topics propels you towards becoming an authority in the field, teaching you nuances that can't be overlooked. Learning Outcomes Acquire a foundational understanding of Electronic Document Management. Gain proficiency in implementing EDM systems compliant with industry regulations. Attain skills to manage the electronic document lifecycle from creation to disposal. Master the operations and processes that govern EDM systems. Learn advanced security measures, document control, and auditing techniques. Why buy this Electronic Document Management: Efficient Data Handling? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Electronic Document Management: Efficient Data Handling there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Electronic Document Management: Efficient Data Handling for? Individuals interested in document management or data security. Aspiring information managers and compliance officers. Administrative staff wanting to modernise data handling methods. IT enthusiasts desiring a specialization in document management. Entrepreneurs looking to implement EDM in their businesses. Prerequisites This Electronic Document Management: Efficient Data Handling does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Electronic Document Management: Efficient Data Handling was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Document Controller: Average Salary £30,000 - £35,000 Compliance Officer: Average Salary £40,000 - £50,000 Information Manager: Average Salary £50,000 - £60,000 Data Analyst: Average Salary £35,000 - £42,000 IT Consultant specialising in EDM: Average Salary £60,000 - £70,000 Operations Manager with EDM focus: Average Salary £55,000 - £65,000 Course Curriculum Module 01: Introduction to Electronic Document Management (EDM) Introduction to Electronic Document Management (EDM) 00:21:00 Module 02: Standards, Regulations and Compliance in EDM Standards, Regulations and Compliance in EDM 00:21:00 Module 03: Implementing and Framework of EDM Implementing and Framework of EDM 00:16:00 Module 04: Electronic Document Lifecycle Management Electronic Document Lifecycle Management 00:20:00 Module 05: Operations and Processes in EDM Operations and Processes in EDM 00:19:00 Module 06: Document Control, Security, and Auditing Document Control, Security, and Auditing 00:21:00 Module 07: Advanced Topics in EDM Advanced Topics in EDM 00:23:00

Electronic Document Management: Efficient Data Handling
Delivered Online On Demand2 hours 21 minutes
£10.99

Security Analyst Training

By Online Training Academy

Are you ready to dive into the world of cybersecurity and become a skilled Security Analyst? Our Security Analyst Training course is meticulously designed to provide you with the knowledge and expertise needed to protect and defend against the ever-evolving threat landscape. Key Features: CPD Certified Free Certificate from Reed CIQ Approved Developed by Specialist Lifetime Access The Security Analyst Training course provides a comprehensive understanding of the role and responsibilities of a security analyst. Learners will explore the current threat landscape, identifying and assessing risks that organizations face. The course covers various types and phases of penetration testing, offering hands-on experience in identifying vulnerabilities. Participants will learn about key methodologies and guidelines for maintaining security, as well as the importance of policies and procedures. The curriculum also includes auditing techniques for vulnerability assessments and penetration tests, and interpreting the results of these tests to enhance security measures. By the end of the course, learners will have practical skills and knowledge to effectively protect and secure organizational systems. Course Curriculum Module 01: What is a Security Analyst - Part 1 Module 02: What is a Security Analyst - Part 2 Module 03: What is a Security Analyst - Part 3 Module 04: Threat Landscape - Part 1 Module 05: Threat Landscape - Part 2 Module 06: Threat Landscape - Part 3 Module 07: Risk Assessment - Part 1 Module 08: Risk Assessment - Part 2 Module 09: Risk Assessment - Part 3 Module 10: Types and Phases of Penetration Testing - Part 1 Module 11: Types and Phases of Penetration Testing - Part 2 Module 12: Types and Phases of Penetration Testing - Part 3 Module 13: Methodologies and Guidelines - Part 1 Module 14: Methodologies and Guidelines - Part 2 Module 15: Methodologies and Guidelines - Part 3 Module 16: Policies and Procedures - Part 1 Module 17: Policies and Procedures - Part 2 Module 18: Policies and Procedures - Part 3 Module 19: Auditing Vulnerability Assessment and Pen Test - Part 1 Module 20: Auditing Vulnerability Assessment and Pen Test - Part 2 Module 21: Auditing Vulnerability Assessment and Pen Test - Part 3 Module 22: Penetration Testing Results - Part 1 Module 23: Penetration Testing Results - Part 2 Module 24: Penetration Testing Results - Part 3 Learning Outcomes: Understand roles and responsibilities of a security analyst. Identify current and emerging threats in the threat landscape. Conduct comprehensive risk assessments and risk management. Execute penetration tests through various types and phases. Apply methodologies and guidelines in security analysis. Develop and implement security policies and procedures. CPD 10 CPD hours / points Accredited by CPD Quality Standards Security Analyst Training 4:06:52 1: Module 01: What is a Security Analyst - Part 1 Preview 00:29 2: Module 02: What is a Security Analyst - Part 2 00:24 3: Module 03: What is a Security Analyst - Part 3 42:38 4: Module 04: Threat Landscape - Part 1 00:26 5: Module 05: Threat Landscape - Part 2 00:32 6: Module 06: Threat Landscape - Part 3 16:07 7: Module 07: Risk Assessment - Part 1 00:34 8: Module 08: Risk Assessment - Part 2 00:38 9: Module 09: Risk Assessment - Part 3 23:01 10: Module 10: Types and Phases of Penetration Testing - Part 1 00:28 11: Module 11: Types and Phases of Penetration Testing - Part 2 00:32 12: Module 12: Types and Phases of Penetration Testing - Part 3 27:37 13: Module 13: Methodologies and Guidelines - Part 1 00:36 14: Module 14: Methodologies and Guidelines - Part 2 00:28 15: Module 15: Methodologies and Guidelines - Part 3 37:27 16: Module 16: Policies and Procedures - Part 1 00:37 17: Module 17: Policies and Procedures - Part 2 00:23 18: Module 18: Policies and Procedures - Part 3 35:05 19: Module 19: Auditing Vulnerability Assessment and Pen Test - Part 1 00:19 20: Module 20: Auditing Vulnerability Assessment and Pen Test - Part 2 00:30 21: Module 21: Auditing Vulnerability Assessment and Pen Test - Part 3 23:50 22: Module 22: Penetration Testing Results - Part 1 00:44 23: Module 23: Penetration Testing Results - Part 2 00:33 24: Module 24: Penetration Testing Results - Part 3 31:54 25: CPD Certificate - Free 01:00 Who is this course for? This Security Analyst Training course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Security Analyst Training. Moreover, this course is ideal for: Aspiring security analysts seeking foundational knowledge. IT professionals transitioning to security roles. Managers responsible for cybersecurity. Students pursuing cybersecurity degrees. Security enthusiasts aiming to enhance their skills. Requirements There are no requirements needed to enrol into this Security Analyst Training course. We welcome individuals from all backgrounds and levels of experience to enrol into this Security Analyst Training course. Career path After finishing this Security Analyst Training course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Security Analyst Training are: Security Analyst Penetration Tester Risk Assessor Vulnerability Auditor Cybersecurity Consultant Information Security Officer Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Security Analyst Training
Delivered Online On Demand5 minutes
£12

Certified Wireless Security Professional (CWSP)

4.8(9)

By Skill Up

Wireless security is essential for any organization, but it can be complex to implement and manage. The CWSP course will give you the skills and knowledge to secure your wireless network from various threats.

Certified Wireless Security Professional (CWSP)
Delivered Online On Demand13 hours 32 minutes
£25

Fraud Detection & Prevention: Essential Tactics

4.3(43)

By John Academy

Master the essential tactics of Fraud Detection & Prevention with our comprehensive course. Explore diverse topics such as Banking Frauds, Cyber Fraud, and Bribery Prevention. Acquire skills in risk management, internal controls, and legal compliance. Safeguard your organization with expert knowledge in fraud investigation and response. Join now to become a proactive defender against financial crime.

Fraud Detection & Prevention: Essential Tactics
Delivered Online On Demand
£23.99

Safety Audits: Expert Techniques for Risk Assessment

4.3(43)

By John Academy

Master the art of safety auditing and risk assessment with our comprehensive course! Explore topics such as safety culture, advanced auditing techniques, risk assessment, and COSHH compliance. Gain practical skills to conduct effective audits, implement corrective actions, and contribute to a safer workplace. Elevate your expertise in occupational health and safety with our expert-led training for continuous improvement and compliance. Join us now for a safer, healthier, and more secure professional environment!

Safety Audits: Expert Techniques for Risk Assessment
Delivered Online On Demand
£24.99

Educators matching " Auditing Techniques"

Show all 3