• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

976 Educators providing Courses in London

Breech Birth Network

breech birth network

Kingston upon Thames

Hello!! My name is Muge and I am the founder of My Breathing Path! I was born in Istanbul, Turkey and I lived there until 2018. I was working in the Turkish finance industry for more than 10 years and during that time I was suffering from an advanced hernia in my neck. Working in a high stress environment and dealing with lots of problems at the same time, made me a super-achiever. I first came across breathwork in a workshop in 2010. It was extremely powerful but also it was completely different to the other techniques that I had tried before. As I continued to go to the sessions, it helped me to understand my behaviour as a perfectionist and its subsequent consequences for my life, the hernia and my unbalanced relationship with my family, friends and colleagues. After experiencing healing and transformation myself, I decided to become a facilitator. Since 2014, I have been working in the field of Transformational Breath as a Certified Transformational Breath Facilitator in private sessions, workshops and seminars while I continued to work in my finance career. I have experience in working with a wide variety of people – each possessing their own set of needs and goals. My further qualifications, Basic DNA Theta Healing Practitioner and Reiki II Certification are used in conjunction with Transformational Breath sessions to help people reach their potential and achieve their goals. Life is a combination of different journeys and within my new journey in the UK, I look forward to sharing my experiences through transformational breathing sessions with others, who want to discover more about themselves with transformation in their life, increase their self-awareness and live a healthier lifestyle.

Barking Abbey School, A Specialist Sports And Humanities College

barking abbey school, a specialist sports and humanities college

Barking

BARKING ABBEY SCHOOL IS A VERY LARGE SCHOOL ON TWO CAMPUSES IN EAST LONDON THAT SERVES THE BOROUGHS OF BARKING & DAGENHAM AND REDBRIDGE. We are a non-selective, comprehensive twelve form entry school with a proud tradition of academic and sporting success. The school is very popular in the local community for both Year 7 and sixth form admissions and is heavily oversubscribed. Barking Abbey School was founded in 1922 as one of the first co-educational grammar schools in England at the site in Longbridge Road. At the time, it was situated in a largely rural area, with fields and farmland close by. Gradually, as Barking began to expand as a residential centre, the school became the focal point for the community with an educational provision of national standing. In 1970, Barking Abbey Grammar School was merged with Park Modern School to form the Barking Abbey School we know today. Many traditions of the old schools remain, but with important developments to enable the school and its pupils to be fully prepared to meet the challenges and opportunities of life in the twenty-first century. One thing remains central, however: we are an outstanding success. Barking Abbey school has a very large Sixth Form with approximately 450 students. As a result of this we are able to offer a large range of courses to our 16-19 year olds. We are proud of the fact that we are a multi-cultural community and we seek to celebrate our diversity in as many ways as possible. Tolerance of, respect for, and understanding of others are vital aspects of preparing young people for adult life. We want all of our pupils to Belong, Aspire, Succeed.

Moderntronics

moderntronics

Harrow,

In these terms and conditions (“Conditions”) the following expressions shall have the following meanings: “Business Day” means any day other than Saturday, Sunday or a public holiday. “Business Hours” means the hours detailed in Condition 32 below. “Contact Hours” means Monday to Friday (inclusive) from 07:00 hours to 17:00 hours but excluding bank holidays. “Contract” means any contract between MT and the Customer for the supply of Hardware and/or Software (with the associated Licence) and/or services which is subject to these Conditions. “Customer” means any person, firm or company who enters into a Contract with MT to which these Conditions apply. “Force Majeure” means any event outside the reasonable control of either Party affecting its ability to perform any of its obligations (other than as to payment) under these Conditions. “Goods” means all or any tangible or intangible goods or intellectual property including but not limited to Hardware and Software which are provided to a Customer in accordance with these Conditions. “Hardware” means any hardware provided by MT to the Customer. “MT” means MODERNTRONICS Ltd. or its servants and agents as the case may be. “Insolvency Event” means any one of the following in relation to the Customer: (i) a notice being issued to propose a resolution for winding up or dissolution, or such a resolution being passed; (ii) a petition for a winding up or an administration or bankruptcy order being presented, or such an order made; (iii)any steps being taken with a view to a voluntary arrangement or other assignment, composition or arrangement with all or any creditors or any moratorium, readjustment, rescheduling, forgiveness or deferral of all or any indebtedness; (iv) suspension of payments to all or any creditors and/or ceasing business; (v)an encumbrancer taking possession of all or any assets; (vi) an administrator or receiver being appointed over the Customer or all or any of its assets; (vii)any action anywhere similar or analogous to any of the foregoing; or MT reasonably believing that any of the foregoing is imminent. “Licence” has the meaning attributed to it in Condition 23 below. “Minimum Term” means the term set out in Condition 17 below. “Party” means MT or the Customer and “Parties” means both of them. “Response Time” means two Working Hours from an initial call to the hotline under Condition 26 or 28 below. “Seminar” means any seminar provided by MT. “Service Operator” has the meaning given to that term in Condition 28 below. “Site” means https://www.moderntronics.com and all subdomains including (but without limitation) “Software” means software or software updates or upgrades provided by MT and licensed to the Customer under Condition 23 below. “Training Sessions” means any training session provided by MT. “Working Hours” means the hours between 9:00 to 17:00 on any Business Day 2. Interpretation In these Conditions, the following rules apply: A person includes a natural person, corporate or unincorporated body (whether or not having separate legal personality). A reference to a Party includes its personal representatives, successors or permitted assigns. A reference to a statute or statutory provision is a reference to such statute or provision as amended or re-enacted. A reference to a statute or statutory provision includes any subordinate legislation made under that statute or statutory provision, as amended or re-enacted. Any phrase introduced by the terms including, include, in particular or any similar expression shall be construed as illustrative and shall not limit the sense of the words preceding those terms. A reference to writing or written includes faxes and e-mails. 3. General Information These Conditions apply when MT: sells and delivers Hardware; sells and delivers Licences; sells and delivers Software; or provides repairs or any other services to the Customer. They will also apply to other business transactions unless MT agrees that alternative special conditions apply. These Conditions apply to the exclusion of any other conditions that may be proposed by a Customer or implied by law (insofar as such exclusion is lawful). Part II Specific Provisions for the Use of the Online Shop Customers purchasing Goods from the Site, must read all Parts of these Conditions, which apply to them in full. 4. Consumers The Goods and services provided by MT are designed only for sale to and use by businesses in the course of their business activities. MT does not knowingly sell to any person dealing as a consumer or supply anything for personal use. 5. Customer’s Status By placing an order on the Site, the Customer warrants that he or she is: legally capable of entering into binding contracts and, where the Customer is an individual, that he or she is at least 18 years old; and is dealing in a business capacity and purchasing Goods and/or services for the purpose of his business and not for personal use. Part III General Conditions for the Provision of Goods and Services 6. Formation of Contract Quotations provided by MT to the Customer are not binding on MT. The Customer’s order constitutes an offer to MT to buy the Goods or services. All orders are subject to acceptance by MT. The offer will be deemed accepted, and a Contract formed, when MT sends the Customer confirmation that the Goods have been dispatched (“Dispatch Confirmation”) or, in the absence of a Dispatch Confirmation, when the Goods are delivered. The Contract will only relate to those Goods whose dispatch is confirmed to the Customer by a Dispatch Confirmation or if no Dispatch Confirmation is sent, those Goods which are actually dispatched. MT is not obliged to supply any Goods which may have been part of the Customer’s order until the dispatch of such Goods has been confirmed in a separate Dispatch Confirmation. Subject to Condition 17 below, an order for services will be deemed to have been accepted, and a Contract formed, when MT sends the Customer confirmation that the services ordered will be provided (“Service Confirmation”) or, in the absence of a Service Confirmation, when the services begin to be provided. Oral representations will only be binding upon MT if they are expressly confirmed in writing by MT to the Customer. 7. Price Unless MT expressly specifies prices to the Customer, MT’s current list of prices applicable at the time of the acknowledgement of order will apply. Unless otherwise agreed in writing, all prices are exclusive of value added tax, postage, freight, insurance, forwarding fees, installation and commissioning, travelling expenses and subsistence, which will be added as appropriate. MT will charge overtime for work outside of their normal Business Hours at up to 150% of the hourly rate from time to time applicable during Business Hours. Subject to Condition 16 below, prices are liable to change at any time, but changes will not affect orders in respect of which MT has already sent the Customer a Dispatch Confirmation or a Service Confirmation as the case may be. The Site contains a large number of products and it is always possible that, despite MT’s efforts, some of the products listed may be incorrectly priced. MT will normally verify prices as part of dispatch procedures so that, where a product’s correct price is less than our stated price, MT will charge the lower amount when dispatching the product to you. If a product’s correct price is higher than the price stated on our site, MT will normally, at our discretion, either contact you for instructions before dispatching the product, or reject your order and notify you of such rejection. MT is under no obligation to provide any Goods or services to the Customer at an incorrect (lower) price, even after MT has sent a Dispatch Confirmation or a Service Confirmation in relation to those Goods or services if such incorrect price could reasonably have been expected to be recognised by the Customer as an error. 8. Delivery and Availability The Customer’s order for Goods will be fulfilled by the delivery date in the Dispatch Confirmation or, if no delivery date is specified, then within 30 days of the date the Customer made his order (where such an order leads to a Contract). The period for delivery or performance of the Contract will normally commence on MT’s acknowledgement of the order. However, if the Customer is required to do anything before MT can effect delivery, MT will, as soon as practicable, notify the Customer accordingly. The time within which MT must deliver any Goods will run from the date on which MT receives notice from the Customer that it has duly complied with such notification from MT. Unless otherwise agreed in writing, any periods mentioned in the acknowledgement of order for services and Software development are based on a preliminary estimate of the required workload and therefore are approximate only. Time of delivery and performance is not of the essence. If MT fails to meet any delivery or performance dates set out in the acknowledgement of order and is solely responsible for such failure, the Customer may terminate the Contract but only after MT has been given an opportunity to rectify the situation and subsequently fails to meet the revised set of delivery or performance dates provided by MT to the Customer in writing. Unless MT has been deliberately or grossly negligent, all further claims of the Customer on the basis of the delay in performance are excluded. If MT cannot deliver or perform its obligations under the Contract due to Force Majeure or a failure of the Customer to cooperate or any other act, default or omission of the Customer, then MT will be entitled to perform its obligations under the Contract once the issue has been resolved, provided the issue occurred while MT was still allowed to deliver or perform and MT shall have no liability whatsoever for any delay or its failure to perform its obligations. 9. Agreed Performance Unless specified otherwise in writing, the agreed performance in respect of any repairs provided by MT, at the Customer’s request will be to adjust the relevant unit(s) to MT’s applicable standard specifications for that unit. Where the relevant unit(s) cannot be repaired to MT’s applicable standard specification due to the Customer limiting the repairs required or the time and money to be invested MT may exceed the Customer’s request if MT considers, at its sole discretion, that such additional repairs are reasonable and will ensure the proper functionality of the unit in question. The agreed performance levels for MT’s maintenance and care services are as set out in Conditions 26 and 28 below; for all other services the agreed performance levels will be as set out in the acknowledgement of order. 10. Refunds Where the Customer returns Goods (at the Customer’s cost) because he or she claims that the Goods are defective, MT will examine the returned Goods and will notify the Customer of its findings within a reasonable period of time. If MT (in its sole discretion) deems that the Goods are defective, MT may at its option repair, replace or provide a refund in respect of such defective Goods. MT will process any repair, replacement or refund as soon as practicable and, in the case of any refund, within 30 days of the day MT confirmed to the Customer that the Customer was entitled to the same. Such refunds will be made in full, including a refund of any delivery charges for sending the item to the Customer. 11. Import Duty If the Customer orders Goods for delivery outside the UK, they may be subject to import duties and taxes which are levied when the delivery reaches the specified destination. The Customer will be responsible for payment of any such import duties and taxes. Please note that MT has no control over these charges and cannot predict their amount. Customers should contact their local customs office for further information before placing an order. Customers must comply with all applicable laws and regulations of the country for which the Goods are destined. The Customer will indemnify and keep indemnified MT in respect of all costs, proceedings, losses and liabilities resulting from any breach by the Customer of any such laws. 12. Retention of Title to Property The Goods will be at the Customer’s risk from the time of delivery. Property in and title to all Goods will remain with MT until MT has received payment for the full price of all the Goods (and/or all other goods and/or services supplied by MT to the Customer under any other contract whatsoever).. The Customer may sell or use Goods in which title is retained during the course of their normal business, but may not give such Goods by way of pledge or pledge these Goods as security. Until the property in and title to the Goods passes to the Customer: the Customer shall keep the Goods properly stored, protected and insured and separate from all or any other goods whether belonging to MT, the Customer or any third party; MT shall be entitled at any time forthwith to revoke the Customer’s power to deal with the Goods; and such power shall automatically cease if an Insolvency Event shall occur in respect of the Customer; and the Customer shall not make any modification to the Goods, the Software or their packaging or alter, remove or tamper with any marks, numbers or other means of identification used on or in relation to the Goods. Upon termination of the Customer’s power to deal with the Goods, the Customer shall place the Goods at the disposal of MT and MT are hereby irrevocably authorised without the need for consent of any third party but using only such force as may be necessary, to enter upon any premises of the Customer or any third party for the purpose of removing the Goods. If third parties claim title to Goods with retained title, the Customer will inform MT without delay, will notify the person making the claim of MT’s title and will support MT in enforcing its rights, including taking all the necessary steps required to preserve MT’s rights, including commencing litigation at the Customer’s own expense. If the Customer breaches the Contract, e. g. by delaying payment, the Customer will be obliged to return the Goods with retained title if requested by MT, in return for which MT will not terminate the Contract. 13. Payment Where services, maintenance or care are provided on an ongoing basis, MT will invoice the Customer for these at the beginning of the billing period or as soon as reasonably practicable thereafter. The Customer will pay MT’s invoices in full within 30 days from the date of the relevant invoice. Depending on the scope of an order, payments for such services, maintenance or care are due either upon placement of the order by the Customer or upon partial delivery of the same of between 40 to 50% of their respective order value. BACS or cheque are the only methods of payment accepted. Invoices for Seminars and Training Sessions will be issued at the beginning of the respective session and payment is due immediately and without deduction. 14. Delay of Payment Where a Customer fails to pay an invoice by the due date, MT will be entitled to charge the Customer interest on all monies outstanding from the due date until the actual date of payment (both before and after judgment) at a rate of 8% above the base rate of the Bank of England calculated on a daily basis. 15. Setting-Off and Refusal of Payment The Customer cannot exercise any right of set-off in respect of amounts owed to or by MT. 16. Change of Pricing by MT for Ongoing Maintenance or Care MT may increase its prices for maintenance and services by giving the Customer written notice 2 months prior to the end of the Minimum Term. The Customer has 4 weeks from the date of receipt of the written notice from MT to object to the change. Where the Customer so objects, the Customer will be entitled to give notice to MT to terminate the Contract as of the date of the proposed price increase. 17. Automatic Extension of Contract Where services, maintenance or care are performed on an ongoing basis the Contract will come into effect upon acceptance by MT of the first order from the Customer for Software maintenance. The Contract will initially run until the date specified at “Minimum Service Duration” as set out in the “MT Service Product List” or until the expiry date where an expiry date is stipulated in the Contract (“Minimum Term”). Subject to one of the Parties serving written notice of termination on the other at least three months prior to the expiry of the Minimum Term, the Contract will be extended automatically. In the case of Software Licences supplied without a time limit, the Contract will extend until December 31st of the current year. The subsequent extension periods will begin on January 1st and end on December 31st of the respective year. In the case of Software Licences supplied with limited validity (e.g. a licence for 1-year) the extension is based on the terms and conditions set out in the description of the respective licence (e.g. extension by one further year). Unless otherwise agreed in writing, any extension to a Contract will be on the basis of MT’s current price list as at the date of such extension. 18. Delivery Obligations and Shipping The conditions for EXW (ex works) (MT’s premises or such other place referred to in the relevant order) as set out in the Incoterms 2010 apply to delivery of any Goods. Claims for any transport damages and any replacement of damaged Goods, remain with the Customer who is responsible for adhering to the mode and period for the filing of any claims with carriers, shippers and insurers. 19. Scope of Warranty (Material Deficiencies and Deficiencies in Title) MT warrants that the Hardware is free from defects in workmanship and material as at the time of transfer of risk; and warrants that the Software does not contain any flaws which void or substantially reduce its value or suitability for the usual or contracted purpose. Where MT is not the author of the Software, MT does not warrant that such Software will run without interruptions or errors, nor that MT will be capable of resolving all Software errors, nor that the Customer will be capable of achieving all of the functions included in the Software in all of the combinations chosen by the Customer, nor that these will meet the Customer’s requirements. MT will only warrant the quality and/or durability of Goods if it has expressly agreed in writing with the Customer that it will do so. The warranty period is 1 year. Where MT is the author of the Software such Software is subject to MT’s standard warranty. 20. Obligation to Inspect and Serve Notice of Defects The Customer must inspect the Goods upon delivery or repair and must notify MT in writing of any failure by MT to meet the specification within 7 days of delivery or repair or (where the failure was not apparent on reasonable inspection) within a reasonable time being no more than 1 month after discovery of the failure. Where the Customer fails to provide such notice MT will have no liability under its warranty. 21. Liability Subject only to Condition 21 d), MT shall not be liable to the Customer in contract, tort (including without limitation negligence) and/or breach of statutory duty for any loss or damage which the Customer may suffer by reason of any act, omission, neglect or default (including negligence) in the performance of the Contract by MT, its servants or agents, in a sum which is greater than GBP 200,000 per incident or series of connected incidents. Subject only to Condition 21 d), MT shall not be liable to the Customer whether in contract or tort (including without limitation negligence and/or breach of statutory duty) for indirect loss of any kind resulting from these Conditions, its performance or any breach of its terms. Subject only to Condition 21 d), MT shall not be liable to the Customer whether in contract or tort (including without limitation negligence and/or breach of statutory duty) for indirect economic loss of any kind including (but without limitation) loss of business opportunity, reputation, goodwill resulting from these Conditions, its performance or any breach of its conditions. Notwithstanding any other provision herein, nothing in these Conditions shall operate so as to limit or exclude MT’s non-excludable liability in respect of death or personal injury caused by the negligence of MT to exclude the application of Section 12 of the Sale of Goods Act 1979 and to exclude liability for fraudulent misrepresentation. MT’s liability for loss of data is limited to the effort required to restore the data from proper backups provided by the Customer. 22. Third Party Rights If any third party claims or takes action against the Customer, because Goods delivered by MT, or their use in accordance with the instructions provided by MT, purportedly violate their commercial rights or proprietary rights, then the Customer will inform MT of the same. MT agrees that they will assist the Customer in defending such claims. Where the claim is made to the Customer within 12 months of the date of delivery, MT will indemnify the Customer against claims provided that the Customer: appoints MT to defend the claims or to settle the dispute, and promptly notifies MT of any such claim, keeps the Customer informed of all information received and provides such reasonable assistance to MT as it shall reasonably require, does not defend the action itself without coordinating such defence with MT, and does not at any time admit liability or otherwise settle or compromise or attempt to settle or compromise the said claim or action except upon the express instruction of MT, the alleged breach of rights is not based on alteration of the delivered item used by the Customer, and does not use the item delivered by MT in conjunction with other items and/or in a fashion that breaches any such rights, in a situation where the use of the item as delivered by MT would not have breached the rights of the person who has filed the claim. MT may at any time and at its own expense acquire on behalf of the Customer the right to continue to use the Goods, to replace the Goods or alter them in such a fashion that the rights of others are no longer breached. If this is not possible, the Customer shall return or destroy the Goods if required to do so by MT who will reimburse the purchasing price for the Goods less depreciation. If the Customer refuses to do so, MT will no longer defend the claim or provide the Customer with any further support. The Customer has no further rights in case of disputes over proprietary rights with third parties and MT shall have no liability therefore unless MT could be blamed for acting deliberately or with gross negligence. Part IV Special Conditions for Delivery of Software 23. Conditions of Use for Delivered Software In the case of delivery of Software to the Customer, MT hereby grants the Customer a simple, non exclusive and non-transferable, licence to use the Software (“Licence”) . The validity of the Licence is not time limited, unless otherwise specified to the contrary in the terms and conditions of the Licence. MT, grants the Customer the use of such Software in the form of the object code and the user documentation with the use being restricted to one electronic data processing system at any one time and only for the tasks for which it is intended. Unless permitted by law, the Customer will not decompile the Software or perform reverse engineering. The Customer may duplicate the Software but only to the extent that this is required for the permitted use, and in order to allow it to perform data backup. Upon delivery of any Software, including updates and upgrades, the Customer will immediately produce a backup copy. MT may terminate the Licence granted to the Customer pursuant to this Condition 23 with immediate effect if the Customer is in breach of the conditions for the use of the Software for a period of 30 days from the date of a written notice of such a breach from MT or any third party. On termination of this Contract howsoever arising, the Customer will return to MT within 30 days all Software together with any related materials owned and licensed by MT and shall delete all copies and partial copies of the Software however stored within 7 days of service of the notice. Proof of such deletion must be provided to MT without delay. On receipt of prior written consent from MT, the Customer may retain a copy of the Software for the purposes of archiving. 24. Delivery of Software MT will only install the Software if this has been expressly agreed in writing between the Customer and MT. MT is able to provide telephone consultancy and support concerning questions relating to the application of the respective Software products as well as the solution of problems that may occur as provided for in Condition 26 below. 25. Prerequisites for Running the Delivered Software The proper running of Software systems supplied will only be guaranteed if the Hardware and operating system components used correspond to the reference systems of the respective manufacturer(s), as well as having been approved and certified. Unless otherwise agreed in the Contract, the Customer shall ensure that the provisions in this Condition 25 are complied with. Part VMaintenance and Care Application Software 26. Scope of Performance of MT Services for Application Software For the Software products, unless otherwise expressly agreed in writing, MT will provide the following services, denoted by Service Level “SW-Service STANDARD” and Service Level “SW-Service E-STANDARD”: Right to use Software and documentation updates: MT grants the Customer a non-transferable, non-exclusive Licence to use the Software and any documentation or updates. The right of use is not limited in validity, unless otherwise specified in the terms and conditions of the Licence. Software and documentation updates: MT will supply the Customer with the current version of the Software as specified in the Contract. This will be done as specified by the manufacturer of the Software. The documentation will be supplied in the form determined by the manufacturer of the Software. The installation of Software updates will be performed by suitably qualified personnel of the Customer. Alternatively for an additional charge, MT may install the Software updates on behalf of the Customer. Where the Customer has adapted the Software, the Customer will be liable for the additional cost of performing the same adaptation to the new version of the Software or alternatively the Customer may perform the necessary adaptation himself. Hotline (Service Level “SW-Service STANDARD” only) MT is able to provide consultancy and support by telephone or by e-mail in relation to queries relating to the application of the respective Software products as well as the resolution of any problems (in so far as it is reasonably practicable to do so) which may occur. This service will be provided by MT during the Contact Hours: Wherever possible, qualified consultancy will be provided by MT within the Response Time. E-mail Hotline (Service Level “SW-Service E-STANDARD” only) MT is able to provide e-mail consultancy and support in relation to queries relating to the application of the respective Software products as well as the resolution of any problems (in so far as it is reasonably practicable to do so) which may occur. This service will be provided by MT during the Contact Hours Wherever possible, qualified consultancy will be provided by MT within the Response Time. MT Hotline: E-mail: hotline@MT.com Internet: http://www.MT.com/customersupport Software error messages Where Software problems occur which MT is unable, for whatever reason, to resolve, the Customer may send a written error message to MT. The purpose of such an error message is to identify the error in the Software and enable the manufacturer to resolve the error. MT shall liaise with the manufacturer(s) of the Software products to resolve any Software errors as promptly as possible. Restoration of any data, regardless of the cause of the data loss, is not the responsibility of MT. 27. Obligation of the Customer to Co-operate Pre-conditions for the provision of the services by MT to the Customer are that the Customer has legally acquired the Software and holds a corresponding Licence to use it. In addition, the Software must be in the same condition that it was in when it was delivered. The services exclusively relate to the current release and delivered version of the Software. If earlier Software versions are used, a one-time update service which will be independently invoiced and paid for by the Customer will be provided to update the Software to the latest version. Services will not be performed for Software adaptations made by the Customer (for example including but not limited to macros, programs, variants, user interfaces and database applications). If the operating system for the Hardware is not included in the Contract, the Customer must update the operating system to the most recent version (e. g. by purchasing updates) if this is required in order to use the new versions of the application Software. Hardware and Operating Systems 28. Scope of Performance of MT Maintenance and Care Services for Hardware and Operating System For Hardware products and the operating system, unless otherwise agreed in writing, MT will provide the following services, denoted by Service Level “HW-Service SPECIAL”: The scope of performance is briefly set out in the “Special Description” for each product listed in the attached “MT Service Product List”. The exact scope of performance will be determined in accordance with the attached description of performance issued by the respective MT service operator (“Service Operator” including but not limited to Hewlett-Packard, Fujitsu Siemens and Silicon Graphics). The following shall also apply: Hotline MT is able to provide consultancy and support by telephone or by e-mail in relation to queries relating to the application of the respective Hardware products and operating system, as well as the resolution, (in so far as it is reasonably practicable to do so) of any problems which may occur. This service will be performed by MT during the Contact Hours: Wherever possible, qualified consultancy will be provided by MT within the Response Time. Where queries arise outside of the Contact Hours, the Customer should address such queries directly to MT’s Service Operator Response time for Hardware failures MT will use reasonable endeavours to solve a query within the Response Time. The Response Time shall be deemed to have been initiated either as soon as the customer service personnel arrives on the relevant site, or as soon as remote diagnosis is started, where either is required to resolve the problem. The appropriate Response Time will be determined in accordance with the attached description of performance issued by the respective MT Service Operator. 29. Services Not Included Unless otherwise agreed in writing, the following services will not be provided by MT to the Customer: a) Repair/re-acquisition of devices that have been damaged as a result of: incidents of war of any type civil wars, nuclear energy, deliberate action of the Customer (not of his subcontractors) b) Repair/re-acquisition that is required because of repair work or alterations of devices carried out by the Customer or any third party without the prior written consent of MT. c) Work required due to interface problems between MT’s devices and those of other manufacturers and suppliers. d) Customer service which is required because a product that is not covered under this Contract has caused an error. e) Customer service that has become necessary because devices have been used under adverse conditions (e.g. including contaminations and deviations from recommended room temperature and relative humidity) or in conjunction with accessories or (device-specific) consumables (e.g. including foreign disks, disk stacks, cassettes, printer paper and print heads of any type) (“Device Specific Consumables”) which do not meet the manufacturer’s specifications. f) Replacement of Device-Specific Consumables. g) Data backup. h) Calibration work that is not related to repair. 30. Restoration of Data/Programs The restoration of data and programs upon repair or replacement of a defective hard disk is limited to starting the copying program (Restore) used to restore the last full data backup. 31. Obligation of the Customer to Cooperate a) Hardware service Pre-conditions for the provision of Hardware services by MT are that the Hardware has been acquired legally and has been installed properly at the Customer’s site. In addition the Hardware affected must correspond to the current revision and be in proper condition when including in the Contract. These pre-conditions shall be met immediately after the expiry of the warranty period specified in the Contract. If the Hardware is included in the Contract at a later date, these pre-conditions must first be confirmed by a takeover inspection of the Hardware by MT, which will be independently invoiced and paid for by the Customer, and if required the pre-conditions will be achieved by MT undertaking the required repair work. b) Operating System Service Pre-conditions for the provision of operating system services are that the Customer has legally acquired the Software and has been granted the necessary corresponding Licence to use it. In addition the Software must be in the same condition as when it was delivered to the Customer. The services exclusively relate to the current release and version of the Software. If earlier Software versions are used, a one-time “Update Service” which will be independently invoiced and paid for by the Customer will be provided to update the Software to the latest version. Operating System services will not be provided for Software adaptations made by the Customer (for example including but not limited to macros, programs, variants, user interfaces and database applications). Part VI Generally Applicable Conditions 32. Prices and Fees for Special Services The following items are not included in the payment for services under Conditions 26 and 28 above and will be invoiced separately in accordance with MT’s current price list: Services performed outside Working Hours on the express request of the Customer. Services to correct errors caused negligently by the Customer or by any unauthorised third party as a result of improper treatment, unsuitable operating media, unauthorised manipulations, Software manipulations, non-adherence to operating conditions or otherwise. ices required due to faulty handling, excessive vibration, chemical influence, excessive dust burden or non-adherence to the properties set forth in the unit specifications. Unreasonable wait times and delays in the performance of services which are caused by the Customer. Services to remedy failures caused by Force Majeure. 33. Backup of Customer Data Prior to the commencement of any service work undertaken by MT, the Customer will backup all data in such a way that it may easily be restored by MT in the event that it is lost in the service process. 34. Change of Installation/Application Site Where maintenance and care services are provided on an ongoing basis by MT, the Customer will immediately inform MT in writing of any change to the installation or application address. If such a change results in an increase in MT’s expenses. MT reserves the right to either increase the prices charged to recover the additional expense incurred or alternatively MT may serve notice on the Customer to terminate the Contract where the new address is outside United Kingdom. 35. Miscellaneous Service Conditions and Obligations of the Customer to Co-operate MT may appoint authorised third parties to provide services. The Customer may only transfer title to services to third parties with the prior written consent of MT. Where defective components or devices are replaced by MT, these will become the property of MT. Extension of the products included in the maintenance agreement may be included in this Contract with the consent of the Customer. On request, MT will offer to the Customer a corresponding extension of the Contract, provided maintenance for the respective product is available. Where MT has to perform any services, the Customer shall accurately and without delay provide MT with any/all information that is required to perform such services. The Customer will provide MT with the name of a competent and appropriately qualified contact person and will provide the name of an appropriate substitute in order for the Hardware and Software to be maintained. Any contact(s) will have participated in the respective Seminars and/or Training Sessions held from time to time by MT or alternatively will have acquired comparable knowledge. These contacts will be available to MT’s technicians on site or will have access to the MT’s hotline as applicable. Consumables and Auxiliaries (which shall include documentation, application programs, data, telephone lines for transmission of voice and data) are not included in the scope of performance and shall be provided by the Customer in the vicinity of the system, such consumables and auxiliaries will be provided during Working Hours or, with prior consultation, outside of these hours. Additionally, the Customer will provide to MT computing time and consumables as required. 36. Specifically Ordered Service Days If service days are ordered for call-off within a specified period, such orders are binding. The services will become due for payment once they have been performed or by the end of the defined time period at the latest. Specifically ordered service days to be called off within a defined time period, can still be called off during a time of three months beyond the expiry of such defined time period. Thereafter they are lost. The claim to payment is thereby unaffected. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

Courses matching " Security"

Show all 399

ISO 14298:2021 Security Printing Lead Implementer

5.0(1)

By Cognicert Limited

The “ISO 14298:2021 Lead Implementer Course” is designed to provide participants with the knowledge and skills necessary to lead the implementation of a Security Printing Management System based on ISO 14298:2021. This comprehensive course covers the key principles, requirements, and best practices for establishing and maintaining an effective security printing management system. Participants will learn how to develop, implement, and manage processes that comply with the ISO 14298 standard.

ISO 14298:2021 Security Printing Lead Implementer
Delivered in London or Online
£1,750

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

SIP security for engineers

5.0(3)

By Systems & Network Training

SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.

SIP security for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Cyber Security demystified

5.0(3)

By Systems & Network Training

Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.

Cyber Security demystified
Delivered in Internationally or OnlineFlexible Dates
£967

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

ISO 14298:2021 Security Printing Management System Lead Auditor Course

5.0(1)

By Cognicert Limited

The "ISO 14298:2021 Lead Auditor Course" integrates the principles of ISO 14298:2021, the International Standard for Security Printing Management, with the methodologies outlined in ISO 19011:2018, the Guidelines for Auditing Management Systems. The course equips participants with the skills and knowledge required to lead security printing audits effectively, ensuring compliance with ISO 14298:2021, and applies the principles of ISO 17011:2017 for conformity assessment bodies. It covers audit planning, execution, and reporting while emphasizing risk management and continual improvement.

ISO 14298:2021 Security Printing Management System Lead Auditor Course
Delivered In-PersonFlexible Dates
£1,160 to £1,450