• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

47 GDPR courses in Coventry delivered Live Online

Certified Information Privacy Auditor (CIPA)

By Training Centre

  Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements.   Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards. Enhance your existing or learn with new skills in the field of Data Protection; Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements; Become a Technical expert on the preparation required for ISO 27701 Certification About This Course   Learning outcomes Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit Course Overview Domain 1-The Process of Auditing Information Privacy Systems & Solutions Domain 2-Governance & Management of Information Privacy Technology Domain 3-Information Systems Acquisition, Development & Implementation Domain 4-Information Systems Operations, Maintenance & Service Management Domain 5-Protection of Personally Identifiable Information (PII) Assets Course Agenda Day 1: Introduction to Privacy Information Management System (PIMS) and ISO/IEC 27701 Day 2: Audit principles, preparation, and launching of an audit Day 3: On-site audit activities and Closing the Audit Accreditation   This course is Accredited by NAS and Administered by the IECB Assessment   All candidates at official training courses will be tested throughout the course delivery, with quizzes and exercises. The final exam is a 10 question essay type exam, offered on the afternoon of the final day. This exam should be completed within 180 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. Prerequisites   None, but candidates would benefit from having a fundamental understanding of Audit principles What's Included?   Comprehensive course materials totalling some 450 pages Case Study Exam fees Exam pass guarantee Who Should Attend?   Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)

Certified Information Privacy Auditor (CIPA)
Delivered OnlineFlexible Dates
£1,250

Confidentiality & Record Keeping

By Prima Cura Training

This course aims to provide a more in depth understanding of confidentiality and record keeping. Providing information on the importance of accurate and true record keeping.

Confidentiality & Record Keeping
Delivered in person or OnlineFlexible Dates
Price on Enquiry

AI Governance Professional (AIGP)

By Training Centre

Aligned with the AIGP certification program, AI Governance Professional Training is for professionals tasked with implementing AI governance and risk management in their organizations. It provides baseline knowledge and strategies for responding to complex risks associated with the evolving AI landscape. This training meets the rapidly growing need for professionals who can develop, integrate and deploy trustworthy AI systems in line with emerging laws and policies. About This Course This training teaches critical artificial intelligence governance concepts that are also integral to the AIGP certification exam. While not purely a 'test prep' course, this training is appropriate for professionals who plan to certify, as well as for those who want to deepen their AI governance knowledge. Both the training and the exam are based on the same body of knowledge.   Module 1: Foundations of artificial intelligence Defines AI and machine learning, presents an overview of the different types of AI systems and their use cases, and positions AI models in the broader socio-cultural context. Module 2: AI impacts on people and responsible AI principles Outlines the core risks and harms posed by AI systems, the characteristics of trustworthy AI systems, and the principles essential to responsible and ethical AI. Module 3: AI development life cycle Describes the AI development life cycle and the broad context in which AI risks are managed. Module 4: Implementing responsible AI governance and risk management Explains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI systems' potential societal benefits. Module 5: Implementing AI projects and systems Outlines mapping, planning and scoping AI projects, testing and validating AI systems during development, and managing and monitoring AI systems after deployment. Module 6: Current laws that apply to AI systems Surveys the existing laws that govern the use of AI, outlines key GDPR intersections, and provides awareness of liability reform. Module 7: Existing and emerging AI laws and standards Describes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be responsibly governed. Module 8: Ongoing AI issues and concerns Presents current discussions and ideas about AI governance, including awareness of legal issues, user concerns, and AI auditing and accountability issues. Accreditation The associated exam is accredited by the IAPP under its ANSI Accreditation Who Should Attend? Any professionals tasked with developing AI governance and risk management in their operations, and anyone pursuing IAPP Artificial Intelligence Governance Professional certification. Prerequisites A general understanding of AI, Corporate Governance, and Business value would be of benefit to participants. Assessment As with all IAPP exams, the AIGP is a 90 question, multiple choice exam to be completed within 150 minutes. Exams are hosted by Pearsonvue and can be taken either remotely, or via any one of hundreds of exam venues globally. A passing score is achieved at 70% Our Guarantee We are an approved IAPP training provider Exam pass guarantee, or retrain until you do, for free What's Included? Participant Guide Study Guide Practice Exam Exam voucher Breakfast, lunch, coffees and snacks (Classroom courses only) Certification Logo

AI Governance Professional (AIGP)
Delivered OnlineFlexible Dates
£1,550

GDPR Compliance, Data Protection & Cyber Security Law

By NextGen Learning

Course Overview This comprehensive course is designed to provide a well-rounded understanding of GDPR compliance, data protection frameworks, and key cyber security legislation in the UK and beyond. Covering topics from legal obligations under the General Data Protection Regulation to the implications of cyber crime on modern business, this programme equips learners with the knowledge needed to navigate the increasingly regulated digital landscape. Whether you are responsible for handling sensitive data or advising on compliance procedures, this course offers vital insight into maintaining data integrity and organisational transparency. Upon completion, learners will be able to interpret key legal requirements, identify risk areas, and support best practices within their professional setting. Course Description The GDPR Compliance, Data Protection & Cyber Security Law course explores a range of essential subjects that influence today’s data-driven industries. Learners will gain a strong foundation in legal and regulatory aspects of data handling, including the principles of GDPR, cyber law, and anti-money laundering frameworks. The course also includes modules on commercial and business law to deepen understanding of corporate responsibilities in data management. Ideal for legal assistants, compliance officers, or business managers, this course helps learners enhance their ability to assess data security measures and ensure alignment with current regulations. With a structured curriculum and accessible learning materials, this programme supports learners in achieving a robust legal and regulatory understanding. Course Modules: Module 01: GDPR Module 02: Data Protection Module 03: Paralegal Training Module 04: Commercial Law Module 05: Cyber Law Online Course Module 06: Business Law Module 07: Cyber Security Awareness Training Module 08: Anti-Money Laundering (AML) Training (See full curriculum) Who is this course for? Individuals seeking to understand GDPR and data security regulations. Professionals aiming to improve compliance and data governance within their roles. Beginners with an interest in legal and cyber regulatory frameworks. Business owners, managers, or HR personnel responsible for policy implementation. Career Path Data Protection Officer (DPO) Compliance Consultant Cyber Security Policy Advisor Paralegal in Commercial or Cyber Law Information Governance Analyst Risk and Compliance Coordinator Legal and Regulatory Affairs Assistant

GDPR Compliance, Data Protection & Cyber Security Law
Delivered OnlineFlexible Dates
£9.99

Lexcel Standard Training Requirements Course

By DG Legal

This training is for lawyers and covers key topics to ensure compliance with the Lexcel standard and other regulations.

Lexcel Standard Training Requirements Course
Delivered Online
£225 to £300

CertNexus Incident Response for Business Professionals (IRBIZ)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed primarily for IT leaders and company executives who are responsible for complying with incident response legislation. This course focuses on the knowledge, resources, and skills necessary to comply with incident response, and incident handling process requirements. Overview In this course, you will understand, assess and respond to security threats and operate a system and network security analysis platform. You will: Explain the importance of best practices in preparation for incident response Given a scenario, execute incident response process Explain general mitigation methods and devices Assess and comply with current incident response requirements. This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT?s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response. This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. Assessment of Information Security Risks The Importance of Risk Management Integrating Documentation into Risk Management Response to Cybersecurity Incidents Deployment of Incident Handling and Response Architecture Containment and Mitigation of Incidents Preparation for Forensic Investigation as a CSIRT Investigating Cybersecurity Incidents Use a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation Complying with Legislation Examples of Legislation (if this is covered in above topics, no need to include here) GDPR, HIPPA, Elections Case study: Incident Response and GDPR (Using GDPR legislation, create a response that is compliant with it ? this could be discussion-based activity as well.) State Legislation Resources and Example Search terms to find state legislation Using NYS as example use the NYS Privacy Response act or other legislation to create a similar case study as previous. Provide answers on when to use federal versus state and do you have to follow both?

CertNexus Incident Response for Business Professionals (IRBIZ)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered OnlineFlexible Dates
Price on Enquiry

SAP System Security Fundamentals

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System Security Administrator Security Architect Technology Consultant Overview This course will prepare you to Understand SAP Security fundamentals Get an overview of the main SAP concepts for security Be prepared to learn more in detail about each SAP concept for security This course will prepare you to Understand SAP Security fundamentals. Get an overview of the main SAP concepts for security. Be prepared to learn more in detail about each SAP concept for security. SAP Access Governance and Control Overview of Security Fundamentals Introduction to SAP Access Governance SAP NetWeaver Application Security Overview Describe SAP User Experience Explain Basic User Administration for AS ABAP Explain Basic Role Administration for AS ABAP Describe SAP Fiori Catalog and Group Administration Concept Describe AS JAVA Security Discuss Custom Development and Security SAP Access Governance and Compliance Describe SAP Access Governance Explain SAP GRC Access Control Describe SAP Identity Management Describe SAP Cloud Identity Access Governance Infrastructure Security Explaining Network Topology Enabling Secure Network Communication (SNC) Enabling Secure Sockets Layer (SSL) Implementing Single Sign-On (SSO) in SAP Systems Security Monitoring with SAP Solution Manager Monitoring Security with SAP Solution Manager SAP Data Privacy Governance and Cybersecurity Introduce EU General Data Privacy Regulation (GDPR) Discuss SAP Support for GDPR Compliance Additional course details: Nexus Humans SAP System Security Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP System Security Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SAP System Security Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

Webinar: Mailchimp

By LUCA School of Arts

In deze webinar gaan we in op het gebruik van Mailchimp als platform om e-mails vorm te geven en e-adressen van je contacten mee te verzamelen en te beheren. Bovendien zorgt het systeem ook dat je voldoet aan de eisen van de GDPR en privacywetgeving  In deze webinar gaan we in op Mailchimp, niet alleen omdat we hier als school zelf mee werken, maar ook omdat het platform gratis is zolang je minder dan 2000 adressen in het systeem zitten hebt. Voor beginnende kunstenaars en ontwerpers is dat dus een betaalbaar systeem.  In deze workshop belichten we verschillende aspecten van een mailing, adresformulieren en sjablonen. We zoomen ook in op de account van LUCA en wat dit betekent voor studenten en docenten van LUCA. De webinar staat open voor studenten, alumni en docenten van LUCA School of Arts.

Webinar: Mailchimp
Delivered OnlineFlexible Dates
FREE

Accelerated Cybersecurity Training

5.0(1)

By Prefort Consult

An information security manager takes responsibility for overseeing and controlling all aspects of computer security in a business. The job entails planning and carrying out security measures that will protect a business’s data and information from deliberate attack, unauthorized access, corruption and theft.” Randstad.co.uk Learning outcomes: How to ensure essential guidelines are in place for adhering to industry rules and regulations. How to conduct internal audits and reviews to ensure compliance (SOX, etc). How to carry-out gap analysis using ISO27001, ISO27002, ISO27005, NIST CSF etc. How to review companies’ policies, procedures, and guidelines. How to carry-out risk assessment and ensuring the right treatment is selected. How to identify vulnerabilities and patch the weaknesses How to compliance to regulatory requirements (UK Data Privacy, GDPR, HIPAA, etc). How to ensure employees are thoroughly updated about the organization’s policies, regulations, and processes. How to ensure employees are guided and made aware of information security risks the legal implication. Who is the course for? Managers Accountant Engineers Business Analysts Healthcare Professionals. Teachers and Academics. Students and professions with transferable skills. E-mail: info@prefortconsult.com Website: www.prefortconsult.com Mobile: +447455884242 Attending this will enable you to access some paid courses and training for free. HURRY NOW and book your place before the opportunity closes. Note: All sessions/classes will take place online via Zoom. You are also required to attend group discussions to improve your skills like presentation, communication, analysis, etc.

Accelerated Cybersecurity Training
Delivered OnlineFlexible Dates
£2,500