• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1063 Courses delivered Online

Data Documentation and Record Keeping Essentials

4.3(43)

By John Academy

Master the art of effective data management with our 'Data Documentation and Record Keeping Essentials' course. Explore key topics including data collection, storage, and security, while developing strategies for comprehensive documentation. Gain the skills needed for compliance, access control, and successful record-keeping. Elevate your professional profile with essential data skills and contribute to organizational success. Enroll now for a transformative learning experience in the world of data management.

Data Documentation and Record Keeping Essentials
Delivered Online On Demand
£23.99

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online
£3,395

EDMS and Vendor Documentation

By Course Cloud

Course Overview   Supplier (or vendor) documents are groupings of documents that map out how a construction team plans to construct elements of a project. In the EDMS and Vendor Documentation course, you will learn how to lead digital transformation in a construction business, through the implementation of a document management system.  This course will teach you about the benefits of supplier documentation management in vendor management, what a correspondence management system is and how it works, how to implement an electronic document system (EDS), and much more. It also covers vendor documentation requirements, compliance and best practices. This course is open to everyone and can be studied on a part-time or full-time basis. It provides industry-recognised certification and is taught by an expert instructor. This best selling EDMS and Vendor Documentation has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth EDMS and Vendor Documentation is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The EDMS and Vendor Documentation is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The EDMS and Vendor Documentation is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the EDMS and Vendor Documentation, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the EDMS and Vendor Documentation will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the EDMS and Vendor Documentation to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

EDMS and Vendor Documentation
Delivered Online On Demand
£25

Documentation & Record Keeping for Nurses and AHPs

By M&K Update Ltd

This session covers the legal aspects of documentation and record keeping in healthcare.

Documentation & Record Keeping for Nurses and AHPs
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Documentation & Record Keeping for Nurses and AHPs

By M&K Update Ltd

This session covers the legal aspects of documentation and record keeping in healthcare.

Documentation & Record Keeping for Nurses and AHPs
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Creating API Documentation and Developer Portals Course

By Cherryleaf

An affordable way to master the skills of API documentation writing Cherryleaf’s popular online training course teaches you how the keys skills of writing and managing an API developer portal. You’ll gain confidence you’re approaching each writing project in the right way, and creating content that follows best practice. Who is this course for? This course is for anyone responsible for managing, planning or writing API documentation. For example: Developers wanting to provide API documentation that is complete and meets the needs of the users. Developers wanting to discover best practices in API documentation and developer portals Technical Authors/Writers wanting to understand APIs and how to write documentation for them. Recommended by the ASTC This course is recommended by The Australian Society for Technical Communication and The Technical Communicators Association of New Zealand to their members. It’s a great way to maintain the Continuing Professional Development (CPD) required by technical communication societies. Why attend this course? We use publicly accessible APIs, as part of this course. We also show examples of developer portals from the DevPortal awards, Google, Microsoft, and others. No programming experience is required. Who is this course for? This course is for anyone responsible for managing, planning or writing API documentation. For example: Developers wanting to provide API documentation that is complete and meets the needs of the users. Developers wanting to discover best practices in API documentation and developer portals Technical Authors wanting to understand APIs and how to write documentation for them. Technical information The course modules are delivered over the Web in small, manageable video presentations. You can pause the videos at any time and return to the course at times that suit you. You can download the course handouts. You have the option of taking the course on an iPhone or iPad, using the MyTeachable app in the Apple App Store. You can preview some of the course modules. There are a few free applications that you’ll be using, which you’ll need to install these before you start the course. Billing information You can pay by credit/debit cards or PayPal. The courses are hosted and sold by via the Teachable platform. From a VAT perspective, they are the “Merchant of Record”, and receipts contain their VAT number. Need to train your whole team? If you have five or more people who you would like to take the course, we can offer a group booking option. Delegates get access for 12 months. Contact us for details. Your Instructor Cherryleaf Cherryleaf is a technical writing services company formed in 2002 by people with a passion for technical communication and learning development. Cherryleaf is recognised as a leader within the technical communication profession. Our staff have written articles for the Society for Technical Communication's (STC) Intercom magazine, the Institute of Scientific and Technical Communicator's Communicator journal and tekom's TCWorld magazine. They've also written books on technical communication. We've presented webinars for Adobe, Madcap Software or the STC, and we've spoken at various conferences around the world. Today, organisations throughout Europe use Cherryleaf’s services so they can provide clear information that enables users and staff to complete tasks productively. Course Curriculum Creating API documentation and developer portals (beta) Introduction (4:52) What is an API? (23:39) Using an API (23:28) How APIs are created (1:24) Authentication and accreditation (17:53) What documentation should I write? (17:12) The Overview section (7:04) The Concepts section (2:16) The Getting Started section (5:43) The API Reference section (2:20) Writing the API reference by hand (12:31) Cookbooks (3:46) Tutorial/Colab/Code labs (3:27) One-pagers (1:23) The Case Study section (2:21) The FAQs/Troubleshooting section (2:08) Cheat sheets (2:25) Release notes (Changelog) (2:22) Other content (3:13) Onboarding (2:11) Writing code samples (5:56) Documentation - summary (1:18) Design patterns in developer portals (14:52) Authoring tools for API documentation (37:33) Managing an API documentation project (17:53) Summary (2:58) Frequently Asked Questions When does the course start and finish? art and when you finish.What if I am unhappy with the course?We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund for the current month and/or the previous month.

Creating API Documentation and Developer Portals Course
Delivered Online On Demand3 hours
£238.80

VAL02: Validation Plans and Documentation

By Zenosis

Essential to validation is the provision of documented evidence verifying that manufacturing processes will consistently result in products meeting predetermined quality standards. This module describes the purpose, content and use of validation master plans, project validation plans, and other documentation for validation projects in the medicines and healthcare products industries. It describes the activities of a typical validation team as they carry out a project for a pharmaceutical company.

VAL02: Validation Plans and Documentation
Delivered Online On Demand1 hour 30 minutes
£99

CompTIA Cybersecurity Analyst (CySA+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of Reconnaissance Incidents Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of System Hacking Attacks Assess the Impact of Web-Based Attacks Assess the Impact of Malware Assess the Impact of Hijacking and Impersonation Attacks Assess the Impact of DoS Incidents Assess the Impact of Threats to Mobile Security Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES Assess Command and Control Techniques Assess Persistence Techniques Assess Lateral Movement and Pivoting Techniques Assess Data Exfiltration Techniques Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION Implement a Vulnerability Management Plan Assess Common Vulnerabilities Conduct Vulnerability Scans Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE Deploy a Security Intelligence Collection and Analysis Platform Collect Data from Network-Based Intelligence Sources Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA Use Common Tools to Analyze Logs Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS Analyze Incidents with Windows-Based Tools Analyze Incidents with Linux-Based Tools Analyze Malware Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS Deploy an Incident Handling and Response Architecture Mitigate Incidents Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS Apply a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES Remediate Identity and Access Management Issues Implement Security During the SDLC Additional course details: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cybersecurity Analyst (CySA+)
Delivered Online
£2,475

Data Documentation and Record Keeping Best Practices

4.5(3)

By Studyhub UK

In the age of digitisation, mastering the nuances of data documentation and record-keeping is paramount. The 'Data Documentation and Record Keeping Best Practices' course offers a comprehensive dive into the essentials of organising, storing, and securing data. By embracing the core strategies of documentation and understanding the intricate layers of compliance, learners will be equipped to navigate the vast landscape of data management effectively. Learning Outcomes Understand the foundational concepts of data documentation and record-keeping. Develop proficiency in data collection and organisational techniques. Gain insights into effective data storage and swift retrieval methods. Explore diverse documentation strategies for various data types. Understand the importance of compliance and robust measures for data security and access control. Why buy this Data Documentation and Record Keeping Best Practices? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Data Documentation and Record Keeping Best Practices for? Professionals keen on enhancing their data management abilities. Individuals working in sectors where data handling is vital. Those aiming to ensure compliance in their respective fields. Aspiring data managers and record keepers. Businesses aiming to secure their data assets more rigorously. Career path Data Manager: £40,000 - £55,000 Records Manager: £35,000 - £50,000 Compliance Officer: £30,000 - £45,000 Database Administrator: £42,000 - £58,000 Data Protection Officer: £45,000 - £60,000 Information Security Analyst: £38,000 - £54,000 Prerequisites This Data Documentation and Record Keeping Best Practices does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 1: Introduction to Data Documentation and Record Keeping Introduction to Data Documentation and Record Keeping 00:10:00 Module 2: Data Collection and Organisation Data Collection and Organisation 00:14:00 Module 3: Data Storage and Retrieval Data Storage and Retrieval 00:14:00 Module 4: Data Documentation Strategies Data Documentation Strategies 00:12:00 Module 5: Record-Keeping and Compliance Record-Keeping and Compliance 00:15:00 Module 6: Data Security and Access Control Data Security and Access Control 00:15:00

Data Documentation and Record Keeping Best Practices
Delivered Online On Demand1 hour 20 minutes
£10.99

CT03c - Clinical trial documentation

By Zenosis

Regulatory authorities tend to abide by the maxim that ‘If it isn’t documented, it didn’t happen’. Rigorous documentation of all aspects of a clinical trial is necessary to provide evidence of GCP and compliance with regulatory requirements, as well as enabling effective management of the trial. In this short course we describe important examples of the documents designated by ICH GCP as essential to the conduct of a clinical trial.

CT03c - Clinical trial documentation
Delivered Online On Demand30 minutes
£25