• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

64 Evolution courses in Liverpool delivered Live Online

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered OnlineFlexible Dates
Price on Enquiry

GLOBALIZATION AND THE GLOBAL POLITICAL ECONOMY | Live Online | Learning University-Level Course (Non-Credit)

By Gada Academy

Master Globalization and the Global Economy 🌍💡 Discover the forces driving our interconnected world in this live online course. Explore the interplay of politics and economics through key theories, global trade, finance, and governance. Perfect for aspiring policymakers, business leaders, and global thinkers—enroll today to unlock the skills to navigate the global political economy!

GLOBALIZATION AND THE GLOBAL POLITICAL ECONOMY | Live Online | Learning University-Level Course (Non-Credit)
Delivered OnlineFlexible Dates
€119 to €352

GLOBALIZATION AND THE GLOBAL POLITICAL ECONOMY | Live Online | Learning University-Level Course (Non-Credit)

By Gada Academy

This course offers a dynamic introduction to Globalization and the Global Political Economy (GPE), exploring the intricate relationship between political actors and the global economic marketplace. Through a theoretically rich and historically grounded lens, you’ll examine the development, operations, and future trajectory of the global political economy. You’ll learn to apply diverse theoretical frameworks to critically analyze global economic processes. The course begins with an in-depth look at foundational GPE perspectives—mercantilism, liberalism, and structuralism—each built on distinct assumptions that shape our understanding of global economic events. From there, we’ll investigate the international "structures" of production, trade, finance, and knowledge, addressing critical questions: Who controls these structures, and to what end? What rules govern international trade? How do institutions like the IMF, World Bank, and multinational corporations shape global flows of goods and investment? Who benefits from controlling knowledge? The course culminates with an exploration of 21st-century global governance, highlighting the rise of new economic and political power centers and their evolving roles in the world. The course concludes with an exploration of 21st-century global governance, spotlighting the emergence of new economic and political power centers, such as BRICS, and their evolving roles in the world. We’ll also examine how the United States under Donald Trump shifted from traditional liberal internationalism toward more transactional and bilateral approaches, reshaping global relationships and challenging established norms Learning Outcomes By the end of this course, you will be able to: Analyze the major political themes in the historical evolution of the international economy. Understand debates surrounding the emergence and impacts of a globalized economy, including patterns of inequality. Evaluate key GPE theories and perspectives in both historical and contemporary contexts. Apply theoretical insights to explain the causes and effects of international trade, capital flows, monetary relations, and globalization debates. Recognize the vital role of human and environmental security in political economy studies. Demonstrate strong analytical and critical thinking skills when assessing political phenomena. Why Study Global Political Economy? Global Political Economy (GPE), also known as International Political Economy (IPE), untangles the complex interplay between global politics and economics. It’s an ideal field for anyone eager to understand how international policies, trade, finance, and institutions shape the world’s economic landscape. Whether you’re aiming for a career in policymaking, international relations, or a related field, this course equips you with essential tools to navigate the complexities of the global economic system and its profound influence on our world. Who Should Take This Course? This course is perfect for professionals, academics, and students interested in international relations, the global economy, or related disciplines. Whether your focus is policymaking, economic analysis, or global studies, you’ll gain valuable insights and analytical skills to deepen your understanding. Take the Next Step Don’t miss out—register today to secure your spot and immerse yourself in the fascinating world of globalization and political economy!

GLOBALIZATION AND THE GLOBAL POLITICAL ECONOMY | Live Online | Learning University-Level Course (Non-Credit)
Delivered OnlineFlexible Dates
€119 to €352

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. Introducing the Cloud and Cloud Security Describe the Evolution of Cloud Computing Explain the Cloud Service Models Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model Explore the Security Responsibilities Within the SaaS Service Model Describe Cloud Deployment Models Describe Cloud Security Basics Implementing the Cisco Security Solution for SaaS Access Control Explore Security Challenges for Customers Using SaaS Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall Describe Cloud Access Security Broker (CASB) Describe Cisco CloudLock as the CASB Describe OAuth and OAuth Attacks Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security Describe Cisco Cloud Security Solutions for Endpoints Describe AMP for Endpoints Architecture Describe Cisco Umbrella Describe Cisco Cloud Email Security Design Comprehensive Endpoint Security Introducing Cisco Security Solutions for Cloud Protection and Visibility Describe Network Function Virtualization (NFV) Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) Describe Cisco NGFWv/Cisco Firepower Management Center Virtual Describe Cisco ASAv Describe Cisco Services Router 1000V Describe Cisco Stealthwatch Cloud Describe Cisco Tetration Cloud Zero-Trust Model Describing the Network as the Sensor and Enforcer Describe Cisco Stealthwatch Enterprise Describe Cisco ISE Functions and Personas Describe Cisco TrustSec Describe Cisco Stealthwatch and Cisco ISE Integration Describe Cisco Encrypted Traffic Analytics (ETA) Implementing Cisco Security Solutions in AWS Explain AWS Security Offerings Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Discover Cisco Security Solutions in AWS Explain Cisco Stealthwatch Cloud in AWS Describing Cloud Security Management Describe Cloud Management and APIs Explain API Protection Illustrate an API Example: Integrate to ISE Using pxGrid Identify SecDevOps Best Practices Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? Describe Cisco Application Centric Infrastructure (ACI) Describe AWS Reporting Tools Additional course details: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)
Delivered OnlineFlexible Dates
Price on Enquiry

Future Life Progression Practitioner Training

5.0(49)

By Radiant Angel Energy

Future Life Progression Practitioner Training equips you with the skills to effortlessly build rapport, guiding your clients on journeys of evolution, growth and fulfillment of their true potential.

Future Life Progression Practitioner Training
Delivered OnlineJoin Waitlist
£495

Certified Kanban System Design – KMP I - 30 Apr - 2 May

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 30 Apr - 2 May
Delivered OnlineFlexible Dates
£1,074 to £1,195

Certified Kanban System Design – KMP I - 17-19 December

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 17-19 December
Delivered OnlineFlexible Dates
£1,074 to £1,194

Certified Kanban System Design – KMP I - 19-21 November

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 19-21 November
Delivered OnlineFlexible Dates
£1,074 to £1,194

Certified Kanban System Design – KMP I - 24-26 September

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 24-26 September
Delivered OnlineFlexible Dates
£1,074 to £1,194

INTERNATIONAL TRADE

By Export Unlocked Limited

Introduction to International Trade This module provides a foundational understanding of the development and significance of international trade, focusing on the UK's trade strategy and its global role. Participants will explore key topics such as trade definitions, the World Trade Organization (WTO), the evolution of customs, and major post-WW2 trade developments. Additionally, the module covers the UK's entry into and exit from the EU, and the current UK Digital Strategy for International Trade. **Agenda Highlights**: - Definitions and importance of international trade - Overview of the WTO - Customs fundamentals - Post-WW2 global trade growth - Impact of EU membership and Brexit - UK Digital Strategy for international trade growth

INTERNATIONAL TRADE
Delivered OnlineFlexible Dates
£395