• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4520 Courses delivered Online

Mastering CCTV Operations and Surveillance Techniques

By NextGen Learning

With CCTV cameras becoming an increasingly common feature in public spaces across the UK, learning about CCTV operation and surveillance is becoming an essential skill for those seeking to work in the field of security. In fact, according to a report by the British Security Industry Association, the UK is home to over 5 million CCTV cameras, making it one of the most surveilled countries in the world. By taking the CCTV Operator Training course, you will gain the skills and knowledge you need to succeed in this in-demand field and contribute to the safety and security of your community. Learning Outcomes: Understand the role and importance of CCTV in modern-day security operations. Develop knowledge of the legal and ethical considerations surrounding CCTV surveillance. Learn to identify and respond to potential security threats using CCTV monitoring. Gain skills and qualities required to be an effective CCTV operator, such as attention to detail and communication skills. Develop technical knowledge of CCTV systems and their components. Understand the importance of teamwork and communication in CCTV operation. Familiarise oneself with data protection regulations and best practices. Over the course of eight modules, you will learn about the operational requirements for CCTV systems, as well as the technical guidance and legal considerations involved in CCTV operation. You will also gain an understanding of the basics of CCTV surveillance, including the equipment and tools used in monitoring and watch surveillance. The course covers data protection regulations and ethical considerations related to CCTV surveillance, as well as the job requirements and expectations for a CCTV operator. By completing this course, you will develop a wide range of skills that are essential for success in the field of CCTV surveillance, including the ability to monitor CCTV cameras, perform watch surveillance, and analyse CCTV footage to identify potential threats and respond to security incidents. Throughout the course, you will engage in a variety of learning activities, including reading and listening to instructional materials, completing quizzes and assignments, and participating in discussions with your peers. By the end of the course, you will have developed a solid understanding of the principles and practices of data science, as well as the skills and knowledge you need to succeed in a career in CCTV surveillance. Certification Upon completion of the course, learners can obtain a certificate as proof of their achievement. You can receive a £4.99 PDF Certificate sent via email, a £9.99 Printed Hardcopy Certificate for delivery in the UK, or a £19.99 Printed Hardcopy Certificate for international delivery. Each option depends on individual preferences and locations. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals looking to pursue a career in CCTV operation and surveillance Security personnel seeking to enhance their skills and knowledge of CCTV systems Individuals responsible for the installation, maintenance, and management of CCTV systems Those interested in learning about the legal and ethical considerations surrounding CCTV surveillance Career path CCTV Operator - £18,000 to £30,000 per annum CCTV Control Room Supervisor - £20,000 to £35,000 per annum CCTV Technical Manager - £25,000 to £45,000 per annum Security Manager - £30,000 to £60,000 per annum Loss Prevention Manager - £25,000 to £50,000 per annum

Mastering CCTV Operations and Surveillance Techniques
Delivered Online On Demand1 hour
£15

Palo Alto Networks : Firewall: Troubleshooting EDU-330 (11.0)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff Overview The Palo Alto Networks Firewall 11.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven troubleshooting methodologies specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Course Outline Module 1 - Tools and Resources Module 2 - CLI Primer Module 3 - Flow Logic Module 4 - Packet Captures Module 5 - Packet-Diagnostics Logs Module 6 - Host-Inbound Traffic Module 7 - Transit Traffic Module 8 - System Services Module 9 - Certificate Management and SSL Decryption Module 10 - User-ID Module 11 - GlobalProtect Module 12 - Support Escalation and RMAs Module 13 - Next Steps

Palo Alto Networks : Firewall: Troubleshooting EDU-330 (11.0)
Delivered OnlineFlexible Dates
Price on Enquiry

SAP System Security Fundamentals

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System Security Administrator Security Architect Technology Consultant Overview This course will prepare you to Understand SAP Security fundamentals Get an overview of the main SAP concepts for security Be prepared to learn more in detail about each SAP concept for security This course will prepare you to Understand SAP Security fundamentals. Get an overview of the main SAP concepts for security. Be prepared to learn more in detail about each SAP concept for security. SAP Access Governance and Control Overview of Security Fundamentals Introduction to SAP Access Governance SAP NetWeaver Application Security Overview Describe SAP User Experience Explain Basic User Administration for AS ABAP Explain Basic Role Administration for AS ABAP Describe SAP Fiori Catalog and Group Administration Concept Describe AS JAVA Security Discuss Custom Development and Security SAP Access Governance and Compliance Describe SAP Access Governance Explain SAP GRC Access Control Describe SAP Identity Management Describe SAP Cloud Identity Access Governance Infrastructure Security Explaining Network Topology Enabling Secure Network Communication (SNC) Enabling Secure Sockets Layer (SSL) Implementing Single Sign-On (SSO) in SAP Systems Security Monitoring with SAP Solution Manager Monitoring Security with SAP Solution Manager SAP Data Privacy Governance and Cybersecurity Introduce EU General Data Privacy Regulation (GDPR) Discuss SAP Support for GDPR Compliance Additional course details: Nexus Humans SAP System Security Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP System Security Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SAP System Security Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

Cyber Security for your business

By The Consortium

This course is specifically designed to equip you with the knowledge and tools needed to assess and enhance your organisation’s security posture across various critical areas.

Cyber Security for your business
Delivered OnlineJoin Waitlist
FREE

Software Testing: Penetration Testing Engineer - CPD Certified

4.7(47)

By Academy for Health and Fitness

Boost Your Career By Enrolling In This Software Testing- Penetration Testing Engineer Bundle To Overcome Your Challenges! 4 in-1 Software Testing- Penetration Testing Engineer Bundle Ever wondered how secure your online data is? In the UK alone, there were over 440,000 cyber security breaches reported in 2023, with businesses and individuals losing millions. Are you equipped to protect yourself and others from these threats and be a Software testing engineer? This comprehensive Software Testing bundle equips you with the essential skills and knowledge to become a sought-after cybersecurity professional. Master penetration testing techniques, uncover vulnerabilities in web applications, and respond effectively to cyber incidents in this Software Testing bundle. With our Software Testing: Penetration Testing Engineer exclusive bundle you will get PDF Certificate, PDF Transcript and Digital Student ID Card (worth £50) Absolutely FREE. This Software Testing- Penetration Testing Engineer Bundle Contains 4 of Our Premium Courses for One Discounted Price: Course 01: Web Application Penetration Testing Course Course 02: CPTE - Certified Penetration Testing Engineer Course 03: Mile2 Certified Penetration Testing Consultant (CPTC) Course 04: Cyber Security Incident Handling and Incident Response Each lesson in this Software Testing: Penetration Testing Engineer course is crafted for easy understanding, enabling you to become proficient in Software Testing: Penetration Testing Engineer. Whether you are a beginner or looking to sharpen your existing skills, this Software Testing: Penetration Testing Engineer is the ideal choice. So enrol now in this Software Testing: Penetration Testing Engineer Today to advance your career! Why Choose Our Bundle Course? FREE Software Testing: Penetration Testing Engineer CPD accredited certificate Get a free student ID card with Software Testing: Penetration Testing Engineer Training Get instant access to this Software Testing: Penetration Testing Engineer course. Learn Software Testing: Penetration Testing Engineer from anywhere in the world The Software Testing: Penetration Testing Engineer is affordable and simple to understand The Software Testing: Penetration Testing Engineer is an entirely online, interactive lesson with voiceover audio Lifetime access to the Software Testing: Penetration Testing Engineer course materials The Software Testing: Penetration Testing Engineer comes with 24/7 tutor support Start your learning journey straightaway! This Software Testing- Penetration Testing Engineer's curriculum has been designed by Software Testing- Penetration Testing Engineer experts with years of Software Testing- Penetration Testing Engineer experience behind them. The Software Testing- Penetration Testing Engineer course is extremely dynamic and well-paced to help you understand Software Testing- Penetration Testing Engineer with ease. You'll discover how to master the Software Testing- Penetration Testing Engineer skill while exploring relevant and essential topics. Assessment Process Once you have completed all the courses in the Software Testing- Penetration Testing Engineer bundle, you can assess your skills and knowledge with an optional assignment. Our expert trainers will assess your assignment and give you feedback afterwards. CPD 40 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Software Testing- Penetration Testing Engineer bundle is suitable for everyone. Requirements You will not need any prior background or expertise in this Software Testing bundle. Career path This Software Testing- Penetration Testing Engineer bundle will allow you to kickstart or take your career in the related sector to the next stage. Certificates CPD QS Accredited PDF Certificate Digital certificate - Included CPD QS Accredited PDF Hard copy certificate Hard copy certificate - £29 If you are an international student, you will be required to pay an additional fee of 10 GBP for international delivery, and 4.99 GBP for delivery within the UK, for each certificate

Software Testing: Penetration Testing Engineer - CPD Certified
Delivered Online On Demand27 hours
£25

Certified Professional Ethical Hacker (CPEH) - Complete Video Training

4.3(43)

By John Academy

Description: This Certified Professional Ethical Hacker (CPEH) - Complete Video Training covers everything you need to know about becoming a certified professional ethical hacker. In this course you will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. This course is designed to introduce you to up-to-date penetrating testing, plus certification. This course will enable you to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, you will be able to understand how malware and destructive viruses function. In addition, the CPEH course helps you to learn how to implement counter response and preventative measures when it comes to a network hack. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Professional Ethical Hacker (CPEH) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Professional Ethical Hacker (CPEH) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Professional Ethical Hacker (CPEH) - Complete Video Training
Delivered Online On Demand7 hours 51 minutes
£24

BlackArch Linux Course

4.5(3)

By Studyhub UK

  Cybersecurity is like being a digital guardian, and the BlackArch Linux Course is all about it. In today's connected world, it's super important to understand and be good at keeping digital stuff safe. This course helps you do just that by diving into ethical hacking and how to defend computer networks. You get hands-on experience with Kali and BlackArch Linux, learning about virtualization, gathering information, and doing advanced hacking tricks.   Taking this course has some cool benefits. You'll become a pro at ethical hacking, mastering skills to hack into Android and Windows 7 systems, secure websites, and do advanced computer network tricks. It's not just theory; you get real tools to make digital spaces safer. Whether you dream of being a cybersecurity pro, love IT, or work with networks, this course gives you a leg up, helping you reach your goals in the ever-changing world of cybersecurity. It's not just a class; it's a practical step towards success in the exciting field of digital security.   Learning Outcomes of BlackArch Linux Understand the installation and configuration of both Kali and BlackArch Linux. Develop proficiency in virtualization basics for practical cybersecurity applications. Acquire skills in information gathering, validation, and storage using various tools. Master NMAP techniques and Dracnmap scripts for efficient information gathering. Gain expertise in ethical hacking on Android and Windows 7 using BlackArch tools. Learn web application and website hacking, including browser injections and attacks. Explore advanced techniques such as Man-in-the-Middle attacks on wireless networks. Develop competence in using BEEF for browser attacks and hacking Facebook.   Who Is This BlackArch Linux Course For Aspiring Ethical Hackers IT Professionals Seeking Cybersecurity Skills Students Pursuing Careers in Information Security Network Administrators Enhancing Security Knowledge Individuals Interested in Advanced Linux Distributions   Why Choose This BlackArch Linux Course Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success.   Career Path Ethical Hacker - Salary Range: £40,000 - £70,000 Information Security Analyst - Salary Range: £45,000 - £75,000 Cybersecurity Consultant - Salary Range: £50,000 - £80,000 Network Security Engineer - Salary Range: £45,000 - £75,000 Penetration Tester - Salary Range: £45,000 - £80,000   Certification Upon successful completion of the BlackArch Linux Course, a written assignment test is administered. After passing the test, students can obtain a PDF certificate for a fee of £4.99. For those desiring an original hard copy certificate, it can be ordered at an additional cost of £8.   Prerequisites No prior qualifications or experience are necessary for enrolling in the BlackArch Linux Course. This course, crafted by seasoned professionals, is compatible with PCs, Macs, tablets, and smartphones. Accessibility is seamless, allowing learning from any location with a reliable internet connection. Course Curriculum BlackArch Linux Masterclass Module 01: Kali Linux Installation and Updates 00:31:00 Module 02: Kali Linux Operating System Configuration 00:32:00 Module 03: Virtualization Basics 00:18:00 Module 04: BlackArch Linux Introduction and Installation 00:43:00 Module 05: BlackArch Configuration 00:33:00 Module 06: Information Gathering and Validation 00:33:00 Module 07: Gathering Information with Maltego 00:15:00 Module 08: Cherrytree for Information Database Storage 00:08:00 Module 09: NMAP Techniques for Information Gathering 00:24:00 Module 10: Dracnmap Scripts for BlackArch 00:09:00 Module 11: Android Hacking with BlackArch 00:24:00 Module 12: Windows 7 Hacking with BlackArch 00:21:00 Module 13: Netcat NC Network Hacking with BlackArch 00:14:00 Module 14: Web Application and Website Hacking with BlackArch 00:26:00 Module 15: BEEF, Browser Injections, and Other Browser Attacks 00:25:00 Module 16: Hacking Facebook with BlackArch 00:12:00 Module 17: Hacking Wireless Networks with BlackArch Tools 00:29:00 Module 18: Man in the Middle Attacks with BlackArch 00:20:00 Assignment Assignment - BlackArch Linux Course 00:00:00

BlackArch Linux Course
Delivered Online On Demand6 hours 57 minutes
£10.99

Safety, Security & Situational Awareness for Women (S3AW)

By Stirling Defence

Be prepared, not paranoid! Course curriculum What are we going to teach you? 1 Instructions for this course Enrollment Process Trouble Shooting 2 Welcome to Safety, Security & Situational Awareness for Women How to use the course player 3 Let's get started! The Why Lesson 1 - Introduction to Safety, Security, Situational Awareness for Women Lesson 2 - Principles of Real-time Behaviour Lesson 3 - How to Recognise Threats through Behaviour Observation Test Lesson 4 - The Predator Mindset Lesson 5- The Dynamics of the Brain Lesson 6 - Indicators of Spiking, Common Date Rape Narcotics and their Effects. Lesson 7 - Colour Coded Risk Evaluation Final Assessment Training and Evaluation Feedback Form 4 Next Steps... Before you go... Recommended Reading List

Safety, Security & Situational Awareness for Women (S3AW)
Delivered Online On Demand
£45

Definitive Ethernet switching for engineers

5.0(3)

By Systems & Network Training

Definitive Ethernet switching course description A hands on comprehensive look at Ethernet switches with extensive coverage of VLANs. The course focuses on the technology and not any one manufacturers product enabling delegates to configure switches from any manufacturer. What will you learn Configure and troubleshoot switches using: Console port telnet HTTP TFTP Configure and troubleshoot switch features such as: Duplex/speed Port based MAC security Spanning Tree Link aggregation Tagged ports Configure and troubleshoot VLANs. Definitive Ethernet switching course details Who will benefit: Technical staff. Prerequisites: Intro to data communications & networking. Duration 3 days Definitive Ethernet switching course contents What is Ethernet? LANs, network cards and cables, CSMA/CD, Ethernet frames, Ethernet evolution, 802.3. Hands on: ping, Ethernet speeds, CSMA/CD. Ethernet layer 2 Layer 2 functions, NICs, MAC addresses, unicasts, multicasts and broadcasts, frame formats. Hands on: Configuring NICs, Analysing MAC addresses with Wireshark IP and Ethernet Relationship Hands on: ARP. What is a switch? Switches connect multiple devices, switches versus hubs, simultaneous conversations, switches work at layer 2, the forwarding database, how the forwarding database is built, broadcast and collision domains Hands on: Difference between hubs and switches. Switch configuration Switch configuration Managed/unmanaged switches, configuration methods, reasons to configure switches. Console ports, HyperTerminal (and alternatives). Hands on: Using the console port to troubleshoot and configure switches. Switches in more detail Latency, forwarding mechanisms, switch fabrics. Hands on: Using telnet and HTTP to switches. Ethernet extensions Auto negotiation, Power over Ethernet. Hands on:Configuring and troubleshooting switch ports: Speed, duplex and security. Redundant links Loops, broadcast storms, STP, BPDU format, STP convergence. Hands on: Tracking blocked ports. STP convergence. Backbone links Architectures, link aggregation, LACP, load sharing, resilience. Hands on: fail over times. VLANs Virtual versus physical LANs, Why have VLANs? Broadcast domains, Creating VLANs, Assigning ports to VLANs. Hands on: Analysing the effect of VLANs on traffic. Enterprise VLANs VLANS are internal, multiple VLANs, Load balancing, Default VLAN, VLAN registration protocols: VTP, GVRP, MVRP. Hands on: VLANs on multiple switches. Tagging/Trunking Reason for tagging, terminology, tagging process, 802.1Q, Tag format, VLAN stacking. Hands on: Configuring and troubleshooting tags. STP variants RSTP, Common STP, Multiple STP, PVST, ring alternatives. Hands on: RSTP. Inter VLANs Layer 3 switching, IP addressing rules, Interconnecting VLANs. Hands on: Routing between VLANs. Troubleshooting Ethernet Methods, tools, locating faults, layer 1 issues, layer 2 issues Hands on: Fixing the network.

Definitive Ethernet switching for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Certified Information Privacy Professional (CIPP/E)

By Training Centre

  The IAPP offers the most encompassing, up-to-date and sought-after global training and certification program for privacy and data protection. The Certified Information Privacy Professional (CIPP) helps organizations around the world bolster compliance and risk mitigation practices, and arms practitioners with the insight needed to add more value to their businesses. Skilled privacy pros are in high demand and IAPP certification is what employers want. When you earn an IAPP credential, you earn the right to be recognized as part of an elite group of knowledgeable, capable and dedicated privacy professionals. With the GDPR effective as of May 2018, among its mandates was the requirement to appoint knowledgeable DPOs (data protection officers) tasked with monitoring compliance, managing internal data protection activities, training data processing staff, conducting internal audits and more. There's a lot to know, there's a lot at stake and there's a lot of opportunity for privacy professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. About This Course   Delivered in a Modular format, the course includes; Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework. Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories. Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors. Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities. Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor. Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches. Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer. Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations. Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance. Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing. Prerequisites   There are no prerequisites for this course but candidates would benefit from reading the freely available materials found on the IAPP website. What's Included?   1 years membership of the IAPP  Breakfast, Lunch and refreshments (Classroom courses only) Official Study Guide (European Data Protection, Law & Practice)* Participant Guide* Official Exam Q&A* Official Practice Exam Official Practice Exam* The Exam Fees * In electronic format for Live Online and hard copy for Classroom delegates     Who Should Attend?   The CIPP/E is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration, including those in the following positions: Cybersecurity Analysts Data Analysts Security Administrators Aspiring Data Protection Officers Accreditation Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Professional (CIPP/E)
Delivered OnlineFlexible Dates
£1,395