• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3 Educators providing Courses in Bristol

Bristol Technology And Engineering Academy

bristol technology and engineering academy

0.0(4)

Bristol,

The school vision drives all that we seek to do on a daily basis and is therefore of central importance to help guide us in how we work, learn and treat one another in our school community. The table here outlines our school vision, values, culture and characteristics in more detail. Governance operates at two different levels at Abbeywood Community School as it is an academy and part of The Olympus Academy Trust. The school has its own School Improvement Committee (SIC) made up of Trust Governors which is accountable to and reports to the Olympus Board of Trustees. The secondary lead Trustee often attends the SIC meeting and some Trust Governors in Olympus also attend the Board’s sub-committees. This means Trust Governors can be directly involved in decision making at Board level, and have the opportunity to input and collaborate in all key areas that may impact schools. Click here to learn more about The Olympus Academy Trust. Abbeywood Community School Improvement Committee The Trust Governors at Abbeywood Community School work closely with the school’s Senior Leadership Team and Staff to develop the vision and aims of the school community. They seek to raise standards and achievement through the appropriate use of all available resources. The Governors’ responsibilities are to: Provide strategic direction for the work and improvement of the school. Support, monitor and evaluate the effectiveness of the school. Ensure accountability for standards and quality of education in the school. Governance is assessed by OFSTED in its Leadership and Management judgement about the school and so is an integral part of the running of the school. The School Improvement Committee consists of people from a variety of backgrounds who represent different areas of the school and local community. Each Trust Governor is appointed for a four year term with all their work being done on a voluntary basis. Currently our Trust Governors have extensive experience in Education, Business, Engineering and Technology. Governors meet as a full team at six meetings during the school year but as well as having a commitment to attend these meetings, Governors will also meet with students and parents, carry out Governor walks around the school, monitor the school improvement agenda, and meet with staff. The school is always keen to hear from people who may be interested in finding out more about our work or in becoming a Trust Governor themselves. Initial contact can be made with the Headteacher or Chair of the School Improvement Committee via the school. SIC Pecuniary Interests and Terms of Office 2022-23 Olympus scheme of delegation

Courses matching "Engineering Mathematics"

Show all 1

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797